Monitors programs' network connections and displays their Internet activity. Allows you to control which programs are allowed to access the internet and can allocate which individual IP addresses and ports these programs may use.
Tests web applications for security breaches. Uses heuristic methods for automatically detecting vulnerabilities to attacks by cross-site scripting or SQL and XML injection. Creates a report on necessary improvements. Requires Cygwin on Windows.