n
Mib Browser
SimpleSoft, USA needed the MIB Browsing functionality to be available in their SAPro product suite. This application is designed to satisfy that need. The MIB Browser reads a MIB file and displays it in the form of a tree. It allows reading the current values of various MIB variables by querying the remote device and also changing these values on the device. The user is also allowed to save the results of the query as a new variable file or append the results to an existing variable file. The ".var" file, thus created can be used to simulate any new device. This was originally developed on Windows (NT/2000) and later it is ported on Linux.
This was part of SNMP product range by SimpleSoft, USA.
Mib-Editor
SimpleMIBEditor is an easy to use, graphical tool that simplifies the process of creating SMI conforming MIB definition files, without requiring the user to be knowledgeable about the nitty-gritty details of ASN.1 syntax. It guides the user in creating both SNMPv1 and SNMPv2 SMI documents by gathering information in easy to understand dialog boxes and automatically converting it into syntactically correct ASN.1 notation. The complex, arduous task of creating MIB definition files can now be simplified by using the SimpleMIBEditor. SimpleMIBEditor creates new SNMPv1 and SNMPv2 MIBs, automatically corrects many common errors in existing MIB definition files, and also converts MIBs from one SMI to another. This was originally developed on Windows (NT/2000) and later it is ported on Linux.
This was part of SNMP product range by SimpleSoft, USA.
HiSecure Systems
Hisecure system is a network intrusion detection system. It monitors the logs from various network monitoring and controlling appliances and also from network applications. It allows the user to specify script based rules files on per-appliance basis; that translate into queries on the logs generated by the device. Whenever these queries generate a match, it implies that some special situation has arisen, possibly requiring detailed analysis. These alerts are sent to the central Diagnostics Center for further analysis. All the logs generated are sent to the Diagnostics Center for detailed analysis and archival/storage. This will help to discover if a hacker/cracker is attempting to break into a system or to cause a denial of service attack.