background preloader

Advisor - Free Personal PC Audit, for software, hardware and security configuration information on your computer. Software license management, IT asset management, cyber security audits, and more.

Advisor - Free Personal PC Audit, for software, hardware and security configuration information on your computer. Software license management, IT asset management, cyber security audits, and more.
The Belarc Advisor builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Operating Systems: Runs on Windows 10, 8.1, 2012 R2, 8, 2012, 7, 2008 R2, Vista, 2008, 2003 SP2, XP SP3. Both 32-bit and 64-bit Windows are supported. Our professional products also run on all other versions of Windows and on the Macintosh OS X, Linux, and Solaris operating systems. Browsers: Runs on Internet Explorer, Google Chrome, Microsoft Edge, Firefox, Safari, Opera, and many others. Belarc's commercial products are used for software license management, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more. Click on the Click Here to Download icon. FAQs: A: No. A: No.

Free Computer Security - Personal Software Inspector (PSI) Stay secure by updating insecure programs onyour computer with the Secunia PSI The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks. Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to maintain a secure PC. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer. Learn more about PSI in these short videos PSI 3.0 WalkthroughSo simple that anyone can be secure! Tim and DaveShort animated story about security and why Tim is happier than Dave.Watch now (YouTube) Reviews

Freeware Tools and Utilities for Windows All the utilities and tools in this Web site are compressed in a ZIP file. If you don't have a software that can open a ZIP file, you can download the CAM UnZip utility. CAM UnZip is a small freeware utility that allows you to easily extract files from any ZIP file. You can also download 7-Zip archive manager - very good archive manager that allows you to open ZIP files and others archive formats. For more information about installing the utilities at this Web site, click here If you want to add one or more of the following utilities into your Web site, click here See Also: Freeware data recovery - recover deleted or lost files from virtually any storage device with Disk Drill Search in NirSoft Web site: You can also easily jump to the right utilities section: Password Recovery UtilitiesNetwork Monitoring ToolsWeb Browser ToolsVideo/Audio Related UtilitiesInternet Related UtilitiesDesktop UtilitiesOutlook/Office UtilitiesProgrammer ToolsDisk UtilitiesSystem UtilitiesOther Utilities

NTP Server UK TimeTools is a UK-based manufacturer of NTP servers and precision timing equipment. Based on GPS and LF radio technology, our products provide a reliable, accurate and traceable source of time for your network. If synchronised time is important to your organisation, please consider one of our hardware network time server appliances. There are a number of free public NTP time servers available in the UK. TimeTools cannot be held responsible for the operation of the time servers listed on this page. Stratum 1 NTP Time Servers Stratum 2 NTP Time Servers If you wish to suggest a reference for consideration for inclusion on this page, please feel free to contact us. Internet Web Browsing OffByOne Web Browser 3.5a [409k] + "May be the world's smallest and fastest Web Browser with full HTML 3.2 support. It is a completely self-contained, stand-alone 1.1mb application with no dependencies on any other browser or browser component." Lynx for Win32 v. 2-8-3 [714k] {S}+ Text-based web browser Dillo 3.0rc1 [1328k] {S}+ "Multi-platform graphical web browser known for its speed and small footprint." IEradicator [102k] Internet Explorer (versions 3 through 6) removal tool. KillAd v0.11 [42k] + Ad blocker. SAB 0.96 [93k] + Filter out web annoyances. Proxomitron [371k] + Powerful filter for eliminating web annoyances and customizing your browsing experience. PopKi Popup Closer v1.4 [187k] + Prevent popups without using a proxy. Offline Browsing & Download Managers HTTP Get [15k] + Download files from the web HTTrack Website Copier 3.10 [176k] {S}+ Save entire websites to a local directory. WackGet 1.2.2 [127k] {S}+ Download a list of files in the order you specify. Firewalls

Center for Internet Security :: Security Benchmarks Division :: CIS Juniper JunOS Benchmark v1.0.1 Release Date: Thu Nov 11 17:18:49 2010 Description This document, Security Configuration Benchmark for Juniper J, M, MX and T Series Routers, provides prescriptive guidance for establishing a secure configuration posture for Juniper J,M, MX, and T Series Routers versions JUNOS 8.x, 9.x, and 10.x. This guide was tested against J-Series and MX Series running 8.1R3, 9.2R1 and 10R2. This guide may also be relevant to other versions of JUNOS on these platforms, such as JUNOS Enhanced Service, and to other platforms running JUNOS such as EX series switches or SRX series Service Gateways; however these systems are not specifically addressed in this guide at the present time. This guide does not address other Juniper platforms such as ScreenOS Firewalls or Secure Access Instant Virtual Extranet.s (IVE.s). Acknowledgements The CIS community thanks the entire consensus team with special recognition to the following individuals who contributed greatly to the creation of this guide: Authors: Editors:

Free Undelete Utility Recovers Deleted Files, Unerases Lost Data FreeUndelete restores deleted files, including those removed from Windows Recycle Bin. In case of accidental removal of files on a NTFS (1.0 and 2.0) (default for Windows Vista, XP, 2000 and NT), FAT32, FAT16 or FAT12 file systems this is the utility to help. Supported file systems: NTFS 1.0, NTFS 2.0, FAT12, FAT16 and FAT32 The recovered files are saved into a new user-selected location to prevent overwriting the deleted files on the original media. Related Products OfficeRecovery Online Cloud service to repair corrupted files online in web browser. MediaHeal 2010 Suite The suite integrates multiple recovery utilities for corrupted media. PixRecovery Repairs corrupted JPEG, GIF, TIFF, BMP, PNG or RAW images (.jpg, .jpeg, .gif, .tiff, .bmp, .png). PhotoRecovery PhotoRecovery solves photo files related problems. OfficeRecovery 2012 Suites The suites integrate data recovery utilities for office productivity applications. Data Recovery Services Free For Personal Use! Order Business License Features

UncomplicatedFirewall Introduction The Linux kernel in Ubuntu provides a packet filtering system called netfilter, and the traditional interface for manipulating netfilter are the iptables suite of commands. iptables provide a complete firewall solution that is both highly configurable and highly flexible. Becoming proficient in iptables takes time, and getting started with netfilter firewalling using only iptables can be a daunting task. The Uncomplicated Firewall (ufw) is a frontend for iptables and is particularly well-suited for host-based firewalls. ufw provides a framework for managing netfilter, as well as a command-line interface for manipulating the firewall. ufw aims to provide an easy to use interface for people unfamiliar with firewall concepts, while at the same time simplifies complicated iptables commands to help an adminstrator who knows what he or she is doing. ufw is an upstream for other distributions and graphical frontends. UFW in Ubuntu Available Versions in supported versions of Ubuntu

Linux Internet Server Security and Configuration Tutorial Perform the following steps to secure your web site: See Distribution erratas and security fixes (See Yolinux home page for list). [e.g. Red Hat Linux Errata] Update your system where appropriate. Red Hat/CentOS: yum check-update (Print list of packages to be updated.) It is best for security reasons that you reduce the number of inetd network services exposed. Use Linux firewall rules to protect against attacks. It is well known that there are various blocks of IP addresses where nefarious hackers and spam bots reside. There are various friendly services which seek and discover these IP blocks to firewall and deny and they share this information with us. The Spamhaus drop list: This is a script to download the total drop list and generate an iptables filter script to block these very IP addresses: To block the IP addresses just execute the script on each of your servers: . At the very minimum, these blocks of IP addresses should be denied by all servers. #! Links: OpenSSH.org - Shell.

What is mod_security? | LinuxGo.Net | Linux world, linux blog, linux webhosting blog, linux cpanel/whm ModSecurity is an embeddable web application firewall. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with no changes to existing infrastructure. It is an open source project that aims to make the web application firewall technology available to everyone. With over 70% of all web attacks is carried out over the web application level, mod security is an essential tool that every web server should have to detect and block these web base attack. If you are using some open source application (like WordPress, phpNuke, Joomla CMS and etc) without much upgrade or patching, then my advice is to install mod_security to detect and block those common security vulnerabilities. The latest version of mod security will come with built in the core rules set and this core rules set will be able to detect and block common security vulnerabilities like below:- SQL injection and Blind SQL injection. File name injection. 1.

Blog: XSS Defense HOWTO We all agree that cross-site scripting is a serious problem, but what continues to amaze me is the lack of good documentation on the subject. It is easy to find instructions how to execute attacks against applications vulnerable to XSS, but finding something adequate to cover defence is a real challenge. No wonder programmers keep making the same errors over and over again. I am sure that one page that describes the problems and the solutions is somewhere out there, but I have been unable to find it. All I am getting is a page after page after page of half-truths and partial information, and even people saying that XSS is impossible to defend against. Without any planning (so please forgive any omissions), I am now going to write how to produce web applications that are safe against XSS and other injection attacks. This is what you need to do: Identify all system components other than the application itself. The first 4 steps from the list are the actual XSS defence. Notes:

Very usefull utility.
This will show you about everything you would ever want to know about a computer.
Hardware Processor types Speed Memory and Other hardware - Software "even where and when installed" - All the security updates and any you do not have. It uses a browser to display the output in html format and can be saved for future reference. Also does not add anything or change anything on the computer , It's a standalone application that only will run when you start it. Great if you don't have a manual for a computer or just don't want to open it to see how much memory or other things are installed.
Happy Pearling by timepeaces Feb 21

Related: