FakeDaemon icon

FakeDaemon

1 big stars
FakeDaemon screenshot
Name: FakeDaemon
Works on: windowsWindows XP and above
Developer: Bloodware
Version: 1.99
Last Updated: 18 Feb 2017
Release: 15 Jun 2006
Category: Network Tools > Protocol Analyzers and Sniffers
Rate this software:
350 downloads
screenshotsView Screenshots(3)
commentsComments
downloadDownload
Liked it? Tell others:
details

FakeDaemon Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows XP | Windows 2000 | Windows 2003 | Windows 2008 | Windows Vista | Windows 2012
SHA1 Hash: 6e19fb4ff319056a6aeff2e1517296b434251bd2
Size: 116.17 KB
File Format: zip
Rating: 1.782608695 out of 5 based on 23 user ratings
Downloads: 350
License: Free
FakeDaemon is a free software by Bloodware and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2008, Windows Vista, Windows 2012.
You can download FakeDaemon which is 116.17 KB in size and belongs to the software category Protocol Analyzers and Sniffers.
FakeDaemon was released on 2006-06-15 and last updated on our database on 2017-02-18 and is currently at version 1.99.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

FakeDaemon Description

FakeDaemon provides you with a detection tool for hackers that comes in very handy in case you encounter such activity being performed to your system. In one particular word, FakeDaemon can be described as a honeypot for those who are aware of the computing term.
The honeypot is actually a system comprising an isolated, monitored computer and data as well as a fake network site within a network. The whole idea is that this system is able to trick cyberpunks into believing your PC holds valuable information for them.
This makes it easy for you to add their IP addresses to a blacklist within your firewall, thus blocking their way to your computer. FakeDaemon does all of this by simulating various activity on specific ports. Its simple and friendly interface helps you rapidly set up traps by using one of the provided daemons such as FreeBSD, RedHat, SubSeven or NetBus.
Although it may sound as summoning demons and performing other occult rituals, the point is that you are defending your data through them and not attacking anyone. You can also set up a custom daemon that you can configure by setting the welcome, reply as well as goodbye messages, the connectivity timer and corresponding port.
The Log Path is another important detail you want to set up before releasing your favorite daemon. This file holds all the intercepted activity and allows you to pick any IP address it catches in its web and do whatever you please with it.
The bottomline is that FakeDaemon can prove to be the missing piece of the honeypot. Once in place and active, it may start catching hacking IP addresses like a butterfly catcher and that is the whole purpose of it. You’d be amazed at the rate these attacks happen on your system the minute you have connected it to a network - LAN or the Internet.
screenshots

FakeDaemon Screenshots

FakeDaemon screenshot 1 FakeDaemon screenshot 2 FakeDaemon screenshot 3
similarSimilar Software