<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &amp; Hacking Tools &#8211; CyberSec</title>
	<atom:link href="https://cybersec.co.th/en/product-category/security-hacking-tools/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersec.co.th/en</link>
	<description>Professional IT consultant &#38; service management</description>
	<lastbuilddate>Mon, 06 May 2024 04:11:14 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://cybersec.co.th/wp-content/uploads/2020/12/favicon-cyber.png</url>
	<title>Security &amp; Hacking Tools &#8211; CyberSec</title>
	<link>https://cybersec.co.th/en</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Palo Alto Networks PA-820</title>
		<link>https://cybersec.co.th/en/product/palo-alto-networks-pa-820/</link>
					<comments>https://cybersec.co.th/en/product/palo-alto-networks-pa-820/#respond</comments>
		
		<dc:creator><![CDATA[Visarut Raksatat]]></dc:creator>
		<pubdate>Tue, 22 Dec 2020 14:28:25 +0000</pubdate>
				<guid ispermalink="false">https://cybersec.co.th/?post_type=product&#038;p=3218</guid>

					<description><![CDATA[Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses. The controlling element of the Palo Alto Networks® PA-800 Series appliances is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.</p>
<p>The controlling element of the Palo Alto Networks® PA-800 Series appliances is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<p>Key Security Features:</p>
<p>Classifies all applications, on all ports, all the time</p>
<p>Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed<br />
Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping<br />
Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development<br />
Enforces security policies for any user, at any location</p>
<p>Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms<br />
Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®<br />
Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information<br />
Prevents known and unknown threats</p>
<p>Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed<br />
Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing<br />
Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection</p>
]]></content:encoded>
					
					<wfw:commentrss>https://cybersec.co.th/en/product/palo-alto-networks-pa-820/feed/</wfw:commentrss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Palo Alto Networks PA-220</title>
		<link>https://cybersec.co.th/en/product/palo-alto-networks-pa-220/</link>
					<comments>https://cybersec.co.th/en/product/palo-alto-networks-pa-220/#respond</comments>
		
		<dc:creator><![CDATA[Visarut Raksatat]]></dc:creator>
		<pubdate>Tue, 08 Dec 2020 07:23:10 +0000</pubdate>
				<guid ispermalink="false">https://cybersec.co.th/product/import-placeholder-for-47/</guid>

					<description><![CDATA[This is a simple product.]]></description>
										<content:encoded><![CDATA[<p><span data-sheets-value="{&quot;1&quot;:2,&quot;2&quot;:&quot;Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.\n\nThe controlling element of the Palo Alto Networks® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.\n\nHighlights\n\nHigh availability with active/active and active/passive modes\nRedundant power input for increased reliability\nFan-less design\nSimplified deployments of large numbers of firewalls through USB\nKey Security Features:\n\nClassifies all applications, on all ports, all the time\n\nIdentifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed\nUses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping\nCategorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development\nEnforces security policies for any user, at any location\n\nDeploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms\nEnables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®\nEasily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information\nPrevents known and unknown threats\n\nBlocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed\nLimits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing\nIdentifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection&quot;}" data-sheets-userformat="{&quot;2&quot;:14721,&quot;3&quot;:{&quot;1&quot;:0,&quot;3&quot;:1},&quot;10&quot;:0,&quot;11&quot;:4,&quot;14&quot;:{&quot;1&quot;:3,&quot;3&quot;:1},&quot;15&quot;:&quot;Sarabun&quot;,&quot;16&quot;:16}">Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.</span></p>
<p>The controlling element of the Palo Alto Networks® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.</p>
<p>Highlights</p>
<p>High availability with active/active and active/passive modes<br />
Redundant power input for increased reliability<br />
Fan-less design<br />
Simplified deployments of large numbers of firewalls through USB<br />
Key Security Features:</p>
<p>Classifies all applications, on all ports, all the time</p>
<p>Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed<br />
Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping<br />
Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development<br />
Enforces security policies for any user, at any location</p>
<p>Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms<br />
Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®<br />
Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information<br />
Prevents known and unknown threats</p>
<p>Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed<br />
Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing<br />
Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection</p>
]]></content:encoded>
					
					<wfw:commentrss>https://cybersec.co.th/en/product/palo-alto-networks-pa-220/feed/</wfw:commentrss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>USB RUBBER DUCKY</title>
		<link>https://cybersec.co.th/en/product/usb-rubber-ducky/</link>
					<comments>https://cybersec.co.th/en/product/usb-rubber-ducky/#respond</comments>
		
		<dc:creator><![CDATA[Visarut Raksatat]]></dc:creator>
		<pubdate>Tue, 08 Dec 2020 07:23:10 +0000</pubdate>
				<guid ispermalink="false">https://cybersec.co.th/product/import-placeholder-for-48/</guid>

					<description><![CDATA[https://www.youtube.com/watch?v=sbKN8FhGnqg&#38;t=1s]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute.</span></p>
<p><span style="font-weight: 400;">Payloads are crafted using a simple scripting language and can be used to drop reverse shells, inject binaries, brute force pin codes, and many other automated functions for the penetration tester and systems administrator.</span></p>
<p><span style="font-weight: 400;">Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With its debut, keystroke injection attacks were invented – and since it has captured the imagination with its simple scripting language, formidable hardware, and covert design.</span></p>
]]></content:encoded>
					
					<wfw:commentrss>https://cybersec.co.th/en/product/usb-rubber-ducky/feed/</wfw:commentrss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>