security-privacy |
||
. |
||
. Crypting |
||
. Firewall |
|
|
. Instant Messaging Crypting | . Spyware Install Prevention |
Anti-Virus |
||||
![]() |
*** |
4.6.691 |
Translated | |
avast! antivirus software is based on the ALWIL Software virus scanning technology since 1988. avast! antivirus engine scans for computer viruses, worms and Trojans. It can be used to scan any object you like - files, memory, e-mails, web sites etc. The avast! antivirus technology is offered in a number of editions to enable protection at all levels, from PDAs to large networks. . Free for personal, non-commercial use |
Anonymous Surfing |
|||
![]() |
*** |
00.05.022
|
Requires JavaSun runtime |
JAP makes it possible to surf the internet anonymously and unobservably. Without Anonymization, every computer in the internet communicates using a traceable Address. That means: JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website. |
Blocklist Manager |
||||
![]() |
*** |
2.5.3 beta |
||
The Blocklist Manager is an application that downloads blacklists from various sources, processes for duplicates and merges based on rules, converts to a new format, and exports them to applications such as: - PeerGuardian It is a Swiss army knife of network security tools: - IP Range Calculator ! If you've got Division by zero errors when trying to download lists, just disable temporarly XP themes. |
Crypting |
||||
![]() |
*** |
4.4 |
||
OVSoft PowerCrypt 2000 is the innovative and powerful file encoder. Make sure your files safe with a 100% secure encryption algorithm. This encryption is unbreakable. Encode multiple files at a time, manage your archives, compress data for better disk space usage and create packages with multiple encrypted files. LAN shared folders are supported as local directories. New versions offer advanced features as fast MD5 checksum performing and filename encoding. Secure your communications with encrypted messages and attachments. Get the capability to send email with no more dangers from other buggy email clients like Outlook or Eudora. Get three goals at a time: maximum security, easy usage and fast encryption. |
Firewall |
||||
![]() |
*** |
4.2.2.911 |
Translated | |
Kerio Personal Firewall (KPF) helps users control how their computers exchange data with other computers on the Internet or local network. Great default rules to be protected against many threats, with explanations (not made by me). Some tips to configure Kerio with common programs. This list summarized the top 20 attacking class C (/24) subnets over the last three days. The number of 'attacks' indicates the number of targets reporting scans from this subnet. Transform Ip ranges to KPF values Useful to add many Ips to block with Kerio. . Free for non commercial use |
Instant Messaging Crypting |
||||
![]() |
*** |
2.1.6 |
Translated | |
You are using an instant messenger to chat with your friends or colleagues. Did you know your messages are sent over the Internet in cleartext form? By encrypting messages before they leave your computer to the Internet, SimpLite prevents eavesdroppers from reading your personal instant messenger conversations. As the original successor of Simp 1.0, SimpLite benefits from state of the art algorithms to secure your messages, whilst maintaining an intuitive interface. SimpLite is free for personal use at home or at the office. The only restriction is that only one product from the SimpLite family can be launched at the same time: either SimpLite-MSN, SimpLite-AIM, SimpLite-ICQ or SimpLite-Yahoo!. . Free for personal or internal business purposes |
IP Blocker |
||||||
![]() |
*** |
2 beta 6b |
Open Source | |||
PeerGuardian 2 is Methlabs’ premier IP blocker for Windows. With features like support for multiple lists, a list editor, automatic updates, and blocking all of IPv4 (TCP, UDP, ICMP, etc), PeerGuardian 2 is the safest and easiest way to protect your privacy on P2P. Plus, by integrating with Blocklist.org, lists are built custom just for you. |
Network Monitoring |
|||||||
![]() |
*** |
0.10.12 |
Open Source |
Multiplatform | |||
Ethereal is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, viewing summary and detail information for each packet. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. You need WinPcap 3.1 beta 4 for packet capture in Ethereal. WinPcap is an architecture for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library (wpcap.dll, based on libpcap version 0.6.2). |
Opened Ports Information |
||||
![]() |
*** |
1.07 |
Translated | |
CurrPorts displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that the process was created, and the user that created it. |
Packet Filter |
|||
CHX-I Packet Filter | *** |
2.8.2 |
|
The CHX-I Stateful Packet Filter can be used on Windows 2000/XP servers or workstations as a first level of defense. Its great performance, flexibility, graphic user interface and management features make the CHX-I Packet Filter the ultimate IP security tool. . Free for non-commercial use (home users, students and charitable organizations) |
Security Hardening |
||||
![]() |
*** |
1.2 |
||
Harden-It™ is a Network and System hardening tool for Windows, by hardening the IP stack your Network can sustain or completely thwart various sophisticated network attacks. Harden-It is intended for advanced or professional user. |
![]() |
*** |
1.25 |
||
Secure-It™ is a local Windows security hardening tool, proactively secure your PC by either disabling the intrusion and propagation vectors proactively or simply reduce the attack surface by disabling unimportant functions. |
Spywares Installation Prevention |
|||
![]() |
*** |
3.4 |
|
SpywareBlaster doesn't scan and clean for spyware - it prevents it from ever being installed. By setting a "kill bit" for spyware ActiveX controls, SpywareBlaster can prevent the installation of any spyware ActiveX controls from a webpage. It does this while not interfering with "friendly" ActiveX controls - so your browser can work correctly and you can have peace of mind! . A shareware (9,95 $ for 1 year) version exists which allows you to use the auto-update feature and commercial use. |
Steganography |
|||
![]() |
*** |
1.0 |
|
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file! This exciting product gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are interecepted a third-party probably would not know that they contained hidden information. In order to keep the final file size a low as possible, GRL RealHidden gives you the option of compressing the hidden file. |
System Access Protection |
|||
![]() |
*** |
4.70.0117 |
|
SecureIt Pro is a versatile security application for your Windows desktop. Use SecureIt Pro to lock your computer when you're not there, to stop malicious users from accessing your desktop, or simply for fun. Using it is easy - just enter a password and click Lock - SecureIt Pro does the rest. Disabling the main Windows key functions, like Ctrl+Alt+Del, Alt+Tab, the Windows key, and the Ctrl+Esc key combination; SecureIt Pro can also disable the Windows boot keys; detect for cold boots; allow other people to leave messages; log incorrect password attempts; or even hide itself every few seconds. Advanced customizability options include the ability to block out offensive words from messages; to stop certain people from leaving messages; setting the background appearance while SecureIt Pro is locked; determining audio visual warnings to notify people of an incorrect password attempt; setting multiple passwords so that more than one user can unlock SecureIt Pro; log events, password protect the main interface and settings; and even verify that the entered password is correct. User friendly features abound - the ability to set password reminders is great for users who tend to be on the forgetful side of life. For security-minded users, lock the settings so that only people who know the valid password will be able to change the settings. Also, the advanced Keydisk feature provides for more security by using a disk as a 'key' to lock and unlock SecureIt Pro. For more settings, users can use the advanced settings dialog to access deeper settings regarding SecureIt Pro's operation, like how SecureIt Pro behaves after it is unlocked; where the registry values are stored; or define shortcut keys for easy access to SecureIt Pro's functions. In addition to shortcut keys for ease-of-access, the QuickSecure and QuickLock features of SecureIt Pro allow users to quickly secure their computer. |
Traceroute, WhoIs, ... |
||||
![]() |
*** |
2.1.8.18 |
||
Day and Night trace: Admins beloved toy, Command-line execution mode. Full replacement for good old buddy tracert., Domain Harvester: helps to find similar domains, passive OS fingerprinting, Port scanner (knows 3,612 well known ports), IP-Range-Scanner (scan from Start-IP to End-IP), analyze eMail headers against RBLs, Connection viewer / TCP, IP, UDP etc. statistics, HTTP Server Spy, Atomic Clock Sync, build in TELNET client, long period Ping and HTTP monitor, Low CPU-Usage. . A shareware version (23,95 € for 1-2 licenses) exists with more features. |
Windows Identification Numbers Changer |
|||
![]() |
*** |
2.0 |
|
In Windows, many applications have something called a "product ID number", a "GUID" or a "Unique ID number". This number may be the same through Internet Explorer, Windows Media Player - even the operating system itself. Since this number nevers changes, it would be the PERFECT way a malicious person or even an advertising company could track your habits. Maybe through a malicious website ActiveX control, or java applet. Well why not just delete it? ID-Blaster Plus works by changing these ID numbers frequently, destroying tracking tactics using these numbers. ID-Blaster can run from the system tray, using up very little resources, and constantly protect you in the background. |