background preloader

Free Computer Security - Personal Software Inspector (PSI)

Free Computer Security - Personal Software Inspector (PSI)
Stay secure by updating insecure programs onyour computer with the Secunia PSI The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks. Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your PC against cybercriminals. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer. Learn more about PSI in these short videos PSI 3.0 WalkthroughSo simple that anyone can be secure! Tim and DaveShort animated story about security and why Tim is happier than Dave.Watch now (YouTube) Technical Product SheetHere is the full rundown of technical specifications for PSI 3.0Download now (PDF) Reviews Secunia PSI named as Security app of the week by Softpedia. Bill Mullins' Weblog- Tech Thoughts Screenshots History All ok!

Advisor - Free Personal PC Audit, for software, hardware and security configuration information on your computer. Software license management, IT asset management, cyber security audits, and more. The Belarc Advisor builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Operating Systems: Runs on Windows 10, 8.1, 2012 R2, 8, 2012, 7, 2008 R2, Vista, 2008, 2003 SP2, XP SP3. Both 32-bit and 64-bit Windows are supported. Belarc's commercial products are used for software license management, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more. Click on the Click Here to Download icon. FAQs: Q: Will the Belarc Advisor send my PC profile information up to a web server? A: No. Q: Must any previously installed Belarc Advisor be removed before installing a newer version? A: No. Q: When checking for new security definitions the Advisor gets an error.

Ddrescue - Data Recovery Tool Ddrescue is software tool used for data recovery. Ddrescue will copy data from one device such as a hard drive or cdrom, to another device (internal or external) and tries to rescue data in case of read errors. It is available as a stand-alone bootable cd or as part of a multi-boot/recovery distro package such as SystemRescueCd. Ddrescue is licensed under the GNU general public license and is completely free to use. Ddrescue is quite a powerful recovery tool that can recover data in spite of bad sectors and disk errors. This means that if you have two or more copies of a cd or hard drive, and all the copies are damaged to some extent, Ddrescue will be able to piece together the good data from each copy, resulting in a more complete recovery. In general Ddrescue is a great tool to have when dealing with files, hard drives, or cd-roms that are damaged or have lost data. Screenshots Downloads Download from Official SiteMore Information

NTP Server UK TimeTools is a UK-based manufacturer of NTP servers and precision timing equipment. Based on GPS and LF radio technology, our products provide a reliable, accurate and traceable source of time for your network. If synchronised time is important to your organisation, please consider one of our hardware network time server appliances. There are a number of free public NTP time servers available in the UK. Listed below is a selection of NTP servers available in the UK. The list is by no means exhaustive and have not been tested by TimeTools. TimeTools cannot be held responsible for the operation of the time servers listed on this page. Stratum 1 NTP Time Servers Stratum 2 NTP Time Servers If you wish to suggest a reference for consideration for inclusion on this page, please feel free to contact us.

Why You Should Consider Using More Than One Antivirus App I have been using various versions of Windows ever since v3.1 (basically every version, except for ME) and have NEVER needed any actively running antivirus, anti-spyware, or anti-malware programs at all. IMHO, the best computer defense is being an intelligent user. * Keep your Adobe software up-to-date * Keep Windows Firewall running, especially in public networks like libraries & coffee houses * (Here's the big one) Don't open strange attachments from strange people * Be wary of the websites you visit * Be leery of any programs or plugins you install (read reviews from trusted sites) * Don't use Internet Explorer! By following these simple rules, I've never been infected with a virus, and I've been pinned by some weak-sauce malware less times than I'd need one hand to count, which ad-aware took care of promptly (but I didn't have to pay for the full version to keep it running in the background all the time).

Center for Internet Security :: Security Benchmarks Division :: CIS Juniper JunOS Benchmark v1.0.1 Release Date: Thu Nov 11 17:18:49 2010 Description This document, Security Configuration Benchmark for Juniper J, M, MX and T Series Routers, provides prescriptive guidance for establishing a secure configuration posture for Juniper J,M, MX, and T Series Routers versions JUNOS 8.x, 9.x, and 10.x. This guide was tested against J-Series and MX Series running 8.1R3, 9.2R1 and 10R2. Acknowledgements The CIS community thanks the entire consensus team with special recognition to the following individuals who contributed greatly to the creation of this guide: Authors: Martin White Editors: Contributors: Andrew Weck Bill Shelton Sergey Gordeychik Download UncomplicatedFirewall Introduction The Linux kernel in Ubuntu provides a packet filtering system called netfilter, and the traditional interface for manipulating netfilter are the iptables suite of commands. iptables provide a complete firewall solution that is both highly configurable and highly flexible. Becoming proficient in iptables takes time, and getting started with netfilter firewalling using only iptables can be a daunting task. As a result, many frontends for iptables have been created over the years, each trying to achieve a different result and targeting a different audience. UFW in Ubuntu Ubuntu 8.04 LTS introduced ufw, and it is available by default in all Ubuntu installations after 8.04 LTS. Available Versions in supported versions of Ubuntu Ubuntu 12.04 LTS: 0.31.1-1 Ubuntu 14.04 LTS: 0.34~rc-0ubuntu2 Ubuntu 16.04 LTS: 0.35-0ubuntu2 Ubuntu 16.10: 0.35-2 Ubuntu 17.04: 0.35-4 Ubuntu Core: 0.36pre Features ufw has the following features: Basic Usage Getting started with ufw is easy. More Information

Linux Internet Server Security and Configuration Tutorial Perform the following steps to secure your web site: See Distribution erratas and security fixes (See Yolinux home page for list). [e.g. It is best for security reasons that you reduce the number of inetd network services exposed. Use Linux firewall rules to protect against attacks. It is well known that there are various blocks of IP addresses where nefarious hackers and spam bots reside. There are various friendly services which seek and discover these IP blocks to firewall and deny and they share this information with us. The Spamhaus drop list: This is a script to download the total drop list and generate an iptables filter script to block these very IP addresses: To block the IP addresses just execute the script on each of your servers: . At the very minimum, these blocks of IP addresses should be denied by all servers. Block or allow by country: One can deny access by certain countries or the inverse, allow only certain countries to access your server. #! Links: OpenSSH.org - Shell.

What is mod_security? | LinuxGo.Net | Linux world, linux blog, linux webhosting blog, linux cpanel/whm ModSecurity is an embeddable web application firewall. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with no changes to existing infrastructure. It is an open source project that aims to make the web application firewall technology available to everyone. With over 70% of all web attacks is carried out over the web application level, mod security is an essential tool that every web server should have to detect and block these web base attack. The latest version of mod security will come with built in the core rules set and this core rules set will be able to detect and block common security vulnerabilities like below:- Detect requests by malicious automated programs such as robots, crawlers and security scanners SQL injection and Blind SQL injection. Cross Site Scripting (XSS). OS Command Injection and remote command access. File name injection. ColdFusion, PHP and ASP injection. E-Mail Injection 1. 2. 3. 4.

Related: