background preloader

Probably the Best Free Security List in the World

Probably the Best Free Security List in the World
Security List Index Select a Security Category: All Items Keys Discontinued or not updated recently (for at least three years). Item links to a Gizmo's Freeware 'Best Free' page. Item or this icon links to a Gizmo's Freeware page. Web application. Browsers: FF = Firefox; Ch = Chrome; IE = Internet Explorer; OB = Other browsers; AB = All browsers. About This list (earlier "Probably the Best Free Security List in the World") contains thousands of links to free security-related Windows desktop applications and web applications, with the goal of listing everything available that's not malicious or of low usefulness. Use the Windows desktop applications or web applications on this list at your discretion. We periodically check all links on this list with Web of Trust. Use the comments section below, or this (or this) forum thread, to let us know about issues, or suggestions for items that could be added to the list. Related Links Editor This list is maintained by volunteer editor ako (Antti Koponen) Related:  Network/Security

The TCP/IP Guide The TCP/IP Guide Welcome to the free online version of The TCP/IP Guide! My name is Charles and I am the author and publisher. Here are a few tips, links and reminders to help you out: Introduction: Newcomers to The TCP/IP Guide may wish to read the Introduction and Guide to the Guide, which will explain what the Guide is about and provide you with useful information about how to use it. Last but definitely not least: this site is provided as an online reference resource for casual use. If you like The TCP/IP Guide enough to want your own copy in convenient PDF format, please license the full Guide. Thanks again and enjoy the site! Charles Home - Table Of Contents - Contact Us OCS Inventory NG | Home Passwortkarte als Gedankenstütze | schieb Passwörter sind der Schlüssel zu Onlinediensten, E-Mail-Postfächern und Onlineshops. Nur wer das geheime Kennwort eingibt, bekommt Zugang. So weit, so praktisch. Allerdings gibt es zwei Probleme: Zum einen müssen sich Benutzer heute unzählige Passwörter merken, was nicht immer leicht fällt, zumal viele Onlinedienste spezielle Spielregeln für Passwörter haben. Ein Dilemma, für das es eine Lösung gibt. Doch wie funktioniert die Passwortkarte? de.savernova.com * Nichts mehr von schieb.de verpassen * Exklusive Extras wie Audios, Videos und eBooks * Kostenloses eBook "PC Tuning" direkt zum Download * und viele andere Vorteile...

Secure Your Wireless Router In The Short Term By Assigning It An Aggressive Name As more devices ship with wireless networking capabilities, it becomes increasingly important to have routers that are capable of handling connections from hardware such as tablets, laptops and mobile phones. The problem is that many routers still in use are perfectly good pieces of hardware, except for one drawback – they don’t support Wireless-N or offer advanced encryption such as WPA. With the threat of drive-by Wi-Fi theft and the risk of secure data being transferred over a non-secure connection, wireless routers without the most current security options can be temporarily shored up with just a bit of imagination. Meanwhile, there are ways in which you can get hold of modern routers for free and connect to them using low-cost USB devices. Secure Your Wireless Router with Its Name According to figures published in October 2011, Windows XP still has a respectable market share as the operating system on around 33% of all computers connected to the web. Conclusion

Remettre l'ordinateur comme neuf Remettre l'ordinateur comme neuf Cette procédure est destinée à remettre les paramètres du système le plus près possible de quand il venait d'être installé (après l'installation de Windows et des pilotes). Le but est de résoudre des problèmes de performance, services, fichiers ou options du système manquants, démarrage du système et installation de logiciels, mais elle peut aussi résoudre d'autres problèmes (virus, écrans bleus de mort, conflits entre les logiciels, etc.). Cette procédure résoud aussi la plupart des problèmes liés à l'Explorateur Windows. Etape 1: Configurer les fichiers chargés au démarrage et les services. Téléchargez et installez UVK avec les paramètres par défaut. Cliquez sur Autorun manager. Cliquez sur List settings, et assurez vous que Hide system protected files (default) est selectioné, et que Verify file signatures (slow but more secure) est décoché. Assurez vous que Also delete file, en haut da la fenêtre principale est décoché. Réparation avec UVK (recommandé):

Fake Alert Singer Vorsicht vor dem Trojaner FakeAlert (auch bekannt als Fake AV oder Rogue Software). Dieser gibt vor, gut zu sein, will den unbedarften PC-Nutzer aber abzocken. So täuscht die Malware etwa gefährliche Infektionen vor, nur um Sie letztlich zum Kauf einer unnötigen und oft infizierten Software zu verleiten. Das McAfee-Tool "Fake Alert Stinger scannt Ihr System nach solchen Trojanern (unter vielen anderen) und kann diese auch gleich entfernen. Das Tool lässt sich schnell und einfach ganz ohne Installation starten. Fazit: Die Freeware "Fake Alert Stinger" bietet zwar keinen allumfassenden Virus-Schutz, doch ist sie durchaus nützlich, wenn der Computer schon infiziert ist.

TCP/IP Overview and History TCP/IP Overview and History(Page 1 of 3) The best place to start looking at TCP/IP is probably the name itself. TCP/IP in fact consists of dozens of different protocols, but only a few are the “main” protocols that define the core operation of the suite. Due to the importance of these two protocols, their abbreviations have come to represent the entire suite: “TCP/IP”. TCP/IP uses its own four-layer architecture that corresponds roughly to the OSI Reference Model and provides a framework for the various protocols that comprise the suite. As I said earlier, the Internet is a primary reason why TCP/IP is what it is today. The TCP/IP protocols were initially developed as part of the research network developed by the United States Defense Advanced Research Projects Agency (DARPA or ARPA). In 1973, development of a full-fledged system of internetworking protocols for the ARPAnet began. Home - Table Of Contents - Contact Us

Tweaking.com

Related: