background preloader

Online security

Facebook Twitter

Probably the Best Free Security List in the World. The Best Free Security Software for PC. Ako's current choices for protection. Defencewall personal firewall. F-Secure client security. Winpatrol Free vs PLUS. Easy Clean. Tools and instructions for manually downloading definition database for F-Secure products for both Windows and Linux.

Easy Clean

Note: for more information on the latest database updates, check our DBTracker. Manual Update Using "Check Now": Windows. Jotti - maleware scan. F-Secure. Tools and instructions for manually downloading definition database for F-Secure products for both Windows and Linux.

F-Secure

Note: for more information on the latest database updates, check our DBTracker. Hitman Pro 3 - SurfRight. Second Opinion Malware Scanner If your child is not feeling well and you suspect he or she has a virus infection you're going to visit your doctor. But what do you do when the doctor tells you that he cannot find anything but your child still does not feel very well? Of course, you go to visit another doctor for a second opinion. This is the same what HitmanPro does for your computer.

HitmanPro is a second opinion scanner, designed to rescue your computer from malware (viruses, trojans, rootkits, etc.) that have infected your computer despite all the security measures you have taken (such as anti virus software, firewalls, etc.). Malwarebytes Anti-Malware. SyncBack. Pargon Backup & Recovery 2012 Free. Other security-related programs: VirusTotal -Online Virus, Malware, URL Scanner. Free Computer Security - Personal Software Inspector (PSI)

Stay secure by updating insecure programs onyour computer with the Secunia PSI.

Free Computer Security - Personal Software Inspector (PSI)

Free Online Software Inspector (OSI) Free software downloads. Gizmo's Guide to Securing Your PC. In today's climate what is the best approach to avoiding getting your PC infected with malware?

Gizmo's Guide to Securing Your PC

Gizmo lays out some simple steps you can take to ensure viruses, trojans, keyloggers and other nasties don't take control of your PC After spending years testing security products I've learned an important lesson. Don't get infected by malware. In other words, put maximum effort into preventing infection rather than detecting and removing infection. Safe Computing in Under an Hour. Safe Computing in Under an Hour .... or the Battle of the BOTS**Automated internet malware programs Yes, that's right.

Safe Computing in Under an Hour

You too can secure your PC in under an hour simply by following the guidelines below. These days 95% of your risk of malware infection comes from the Internet and the rest from removable media such as infected CD's and pendrives. How to Install Comodo Firewall. This guide was written for version 7.0 of Comodo Internet Security (CIS).

How to Install Comodo Firewall

This guide will work equally well for configuring Comodo Firewall, but the screenshots are from CIS. Please note that in terms of system protection this article is not really meant to be viewed in isolation. Please read my article about How to Stay Safe While Online in order to get an overview of what you can do to protect your computer. Comodo Firewall provides rock solid protection and is entirely free. If you like you can even download Comodo Internet Security, which comes with Comodo Antivirus. Best Free Drive Imaging Program. Notwithstanding claims of others, I cannot pretend to be entirely unbiased in my reviews; indeed, an “unbiased human” is an oxymoron.

While I am in the process of preparing a 2011 update, there are two points that I would like to mention: bells and whistles and the availability of reliable customer service. Whatever else developers claim their programs are capable of, those programs must be able to accomplish their end; the importance of how they get there is most often a matter of personal preference. My bias dictates that, within the parameters chosen by the user, a disk imaging program ought to be able to faithfully create and restore the image.

To me, factors like resources consumed, GUI, speed of operations, and others are a matter of personal choice or are influenced by the users’ hardware and operating system. Can we agree that, regardless of its features, if a program cannot consistently create and restore accurate images, it is useless? Best Free Adware-Spyware-Scumware Remover. Comodo - Firewall Software. CNET Editors' Choice, 5-Star Rated Comodo Firewall Pro introduces the next evolution in computer security: Default Deny Protection (DDP™).

Comodo - Firewall Software

What is DDP? Most security programs maintain a list of known malware, and use that list to decide which applications and files shouldn't access a PC. The problem here is obvious. What if the list of malware is missing some entries, or isn't up to date? Windows Firewall with Advanced Security (Guide for Vista) Due to requests I have put together a short guide on how to use the Vista "Windows Firewall with Advanced Security" I was not quite sure as to how to put the info forward, as there is the "Windows Firewall with Advanced Security", but there are 2 other areas that need to be looked at.

Windows Firewall with Advanced Security (Guide for Vista)

I decided to jump right in, and first explain the main area:- Location:- Start menu- Control panel- System and Maintenance- Administrative Tools- Windows Firewall with Advanced Security. This brings up an MMC snap in, but I will refer to this as the "Main firewall UI" By default it will show you the 3 profiles that are used. Complete Guide To Protecting Privacy Online. It is a well known fact that invasion of online privacy has become the rule rather than the exception. The source of the threat is not just phishing websites and malicious tracking sources but some of the most trusted websites and web services. Search engines, for instance, use many parameters to identify the location of visitors under the guise of providing users with “better and more personalized search results”.

Likewise, users have become so blind to sharing their personal data online that tracking anyone can simply mean looking up their name on Google or checking out their Facebook profile. For instance, a WhoisLookup can provide the complete details of a website owner including his/her address, phone number, etc (provided Domain Privacy is not enabled). Even social media websites such as Facebook provide periodic prompts for tagging, sharing, and providing personal information which makes one more vulnerable to online and real life scammers. Anonymous Browsing, Proxies and VPN. Last Pass **** Tor Project: Anonymity Online. PeerBlock – open source. Lunascape - multi-featured web browser. Iron WebBrouser. The (Very) Unofficial Facebook Privacy Guide [DOWNLOAD]

Time to lock your Facebook settings and private profile information.

The (Very) Unofficial Facebook Privacy Guide [DOWNLOAD]

Facebook doesn’t make this easy, however; features are constantly added and the default for each new one seems to favor transparency instead of privacy. Getting Started - Sandbox ie. Part One: Introduction Sandboxie runs your applications in an isolated abstraction area called a sandbox.

Getting Started - Sandbox ie

Under the supervision of Sandboxie, an application operates normally and at full speed, but can't effect permanent changes to your computer. Instead, the changes are effected only in the sandbox. This Getting Started tutorial will show you: Avast. Ad-Aware Security - FREE. Forti Client Lite.

Best Firefox security add-ons

Anti-Twin (Freeware) - Find and delete duplicate files or similar images.