SHELL EXTENSION CITY Configure Your System Wickedly
City Gate | Message Board | Search | Site News | Know Your Software | Contact | Daily Rotation
SHELL EXTENSIONS
# F L R X
A G M S Y
B H N T Z
C I O U
D J P V
E K Q W
Hosted Apps
LIST OF SUPPORTERS
OTHER SITES
Some of Joe's Sites
Gives you a temp disposable email address that is good for 10 minutes.....(free).....
Making sure you've got a reliable backup solution is a must for any user - and more so for an administrator .....(free).....
What are they? They're the anti-good ideas. They're the braindamage that makes your $100,000 ASIC-based turbo-stateful packet-mulching firewall transparent to hackers. Where do anti-good ideas come from? They come from misguided attempts to do the impossible - which is another way of saying "trying to ignore reality." Frequently those misguided attempts are sincere efforts by well-meaning people or companies who just don't fully understand the situation, but other times it's just a bunch of savvy entrepreneurs with a well-marketed piece of junk they're selling to make a fast buck. In either case, these dumb ideas are the fundamental reason(s) why all that money you spend on information security is going to be wasted, unless you somehow manage to avoid them .....(free).....
Unlimited backup profiles are supported. A_dailyBackUp can be configured to start the backup automatically after the program starts (using command line options (switches) and to exit when the backup is finished. The files or complete directories will be stored in ZIP compatible archives using a very fast and secure compression procedure.....(free).....
ABC Security Protector enables you to protect your PC by disabling some features like use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, reliably protected by the password and excellent online help is also available.....(free).....
Absolute Uninstaller is similar to standard Windows Add - Remove program but more powerful.The standard Add/Remove program can't uninstall applications completely which often leaves broken registry keys ,unnecessary files on the hard disk.The more junk files your computer have ,the slower it runs. Uninstall Manager can wipe off all the junk files clearly in seconds.It offers a more user-friendly way to remove unneeded applications and to improve your computer efficiency.....(free).....
Access Monitor is a User Access Log utility designed for the Windows XP Operating Systems .....(free).....
Thanks to virtual network computing, you can access your home machine from anywhere, from the Wired How-To Wiki.....(free).....
Intrusion detection system to help you monitor your wireless network.....(free).....
A life saver if your system goes bad .....(free).....
Saves a log file detailing all file system changes and RunOnce activities that will happen during the next system startup after you install new software .....(free).....
File and directory synchronizer that works on local, network or removable devices. Use it to synchronize your data between PCs, laptops, USB drives and more .....(free).....
Aloaha sign! is an excellent tool to validate PDF, d2d, p7m, xmldsig and PKCS 7 signatures. Furthermore it is possible to digitally sign virtually any filetype with any native supported smartcard.....(free).....
Most e-mail readers only show the To and From headers, which can be easily forged. Use this guide to learn how to read the complete message headers .....(free).....
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features. It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies. It runs on Linux, Windows, and Mac OS X .....(free).....
Great list of anonymizers and proxies for surfing in privacy .....(free).....
If you use Google, and you accept it's cookie, you should give some thought to the implications, both good and potentially bad : this page tries to help you do that, together with an easy way to anonymize it without missing out on its benefits .....(free).....
With its emergency task manager, AntiFreeze offers a last recourse when you find your computer in a hung state. Because programs consume too much CPU or too much memory or too many programs have been started, your computer has become unresponsive. The mouse still moves but no programs are responding, you cannot switch to other programs or even close them. You have even tried to start the Windows Task Manager even that won?t work because it does not get enough attention from the scheduler to respond to your mouse clicks and keyboard presses. You are ready to press the reset button, instead you can press the hotkey of AntiFreeze. It will put to sleep all running programs except the most critical ones, giving you the opportunity to close down the programs which are causing problems. You may even be able to save or recover your work (Go to Free Downloads).....(free).....
The anti-virus or anti-malware test file. A number of anti-virus researchers have worked together to produce a file that their (and many other) products "detect" as if it were a virus. It is safe to pass around, because it is not a virus, and does not include any fragments of viral code. Most products react to it as if it were a virus (though they typically report it with an obvious name, such as "EICAR-AV-Test").....(free).....
Will hide your screen from external eyes. No mouse clicks, no fingers configurations to press simultaneous key combination. Just move the mouse pointer to one of the screen corners and viola! Your screen will be hidden with blank window, screensaver or with the screenshot that you could make earlier .....(free).....
Any Password is an easy-to-use tool that lets you store and arrange all your passwords, user IDs, and related information in a tree form. The program saves this information in encrypted files which can be protected by a password. So, the only thing you need to remember is the password for the file. Any Password can also generate random passwords with specified parameters (length, used characters, etc.). You can find any stored information using the incremental search feature.....(free for personal use).....
Any Weblock is a web content control software that gives you the power to block any website on your local computer. It works with any web browser and displays a fake error page. No network knowledge required to configure. You only need to know the domain/subdomain names of the websites.....(free).....
Small API monitor that allows the user to monitor the APIs called by the given application. KAM supports 1749 different APIs as for now .....(free).....
Rather than looking for spyware traces or tracking applications that secretly send or receive data over the Internet, Arovax Shield blocks any attempt by malicious software to add entries to the auto-start menu, change the registry, hijack or install itself into a browser or find any other way to stealthy get itself onto a PC .....(free).....
This program can automatically delete files in a specific folder that are older than the specified time. It checks the file dates by modification time. You can have it run on every Windows startup to delete old temp files, backups, webcam snapshots history, temporary internet files, etc .....(free).....
Hard drive sterilization on a bootable floppy.....(free).....
This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP .....(free).....
Autostart and Process Viewer gives you a control over applications which start with Windows, and shows which processes are running on your computer. But the most important thing is that this program helps you find out which processes and autostart entries are new. You can "accept" a process or a program starting with windows, and if a new ("unaccepted") item appears - the program tells you about it.....(free).....
AVAST is an antivirus set that is able to detect the presence of viruses in computers working under the Windows 9x/Me or Windows NT /2000/XP. The package is able to detect a great quantity of known viruses. It is even able to detect the underlying activities of unknown or self modifying viruses, for which there is actually no possible direct detection.....(free for non-commercial use).....
The time may come that you'll need to reinstall your Windows XP. If you do reinstall Windows XP, then you'll need to re-activate it too - that is, unless you keep this tip handy .....(free).....
Through this tutorial, you will learn how to back-up your DVDs without the use of an expensive DVD Burner.....(free).....
You can use this program to create dated backups of FTP websites. The program allows the downloading of specific directories as well as recursive directory downloads. It also supports the exlusion of specified files and directories, and can be used with windows scheduled tasks to perform scheduled FTP backups.....(free).....
Bacula is a set of computer programs that permits the system administrator to manage backup, recovery, and verification of computer data across a network of computers of different kinds. Bacula can also run entirely upon a single computer and can backup to various types of media, including tape and disk. In technical terms, it is a network Client/Server based backup program. Bacula is relatively easy to use and efficient, while offering many advanced storage management features that make it easy to find and recover lost or damaged files. Due to its modular design, Bacula is scalable from small single computer systems to systems consisting of hundreds of computers located over a large network .....(free).....
Bazooka Adware and Spyware Scanner detects a multitude of spyware, adware, trojan, keylogger, foistware and trackware components; sources of irritation that antivirus software does not deal with. The scanning process will only take about two seconds and tell you how to uninstall the invasive threat using simple step-by-step instructions or put you in contact with the vendor for the most up-to-date and safe uninstall instructions. Currently Bazooka detects 500+ spywares, adwares, keyloggers and dialers .....(free).....
The BCArchive software is designed to compress a group of files or folders to a single encrypted file .....(free).....
Ben Edelman analyzes methods and effects of spyware, with a focus on installation methods and revenue sources. Ben has documented advertisers supporting spyware, advertising intermediaries funding spyware, affiliate commission fraud, and click fraud.....(free).....
The FBI, the Federal Trade Commission, and the National Consumers League held a news conference Monday to warn about so-called "phisher sites" reports CBS News technology consultant Larry Magid. Stealing identities and credit card numbers with bogus e-mail and Web sites that appear to come from legitimate companies is an increasing problem on the Internet.....(free).....
BFilter is a filtering web proxy. It was originally intended for removing banner ads only, but since then its capabilities have been greatly extended. Unlike most of the similar tools, it doesn't rely on blacklists (although it does support them). The problem with blacklists is that advertisers are always one step ahead. You see an ad slip through, you update your blacklist, and in case it didn't help, you add a new entry yourself. Once I got tired of that, I decided to write a proxy that would detect ads heuristically, much like modern anti-virus software manages to detect many viruses unknown to it.....(free).....
Some BHOs are helpful, like the Adobe Acrobat or Google Toolbar Browser Helper Objects, but there could be malicious ones among them that will harm your computer, especially those planted by viruses or spyware. BhoScanner allows you to discover browser helper objects of your computer including parasites and trojans. BhoScanner gives you a quick look at the BHOs installed on Local or Remote PC, tells you by coloured icons ( green icon - safe, yellow icon - unknown, red icon - harmful ) whether specific BHO is known to be safe or harmful .....(free).....
This security application will lock your desktop from unwanted users. There are several display options you can choose from, a totally black screen, capture the desktop, or display a specified bitmap. There is a setup screen where you can define the password, display type, mouse options, and more! There is no installation required, just click on Black Screen and the first time it is launched it will configure your system. Perfect program to secure you desktop with no hassles. Black Screen has a very ingenious mechanism that allows users to enter their password quickly to exit this security program (Note--page seems slow loading. Wait for it).....(free).....
A hosts file you can use to block ads, banners, cookies, web bugs, and even most hijackers. Now includes most major parasites, hijackers and unwanted Search Engines!.....(free).....
BluetoothView is a small utility that runs in the background, and monitor the activity of Bluetooth devices around you. For each detected Bluetooth device, it displays the following information: Device Name, Bluetooth Address, Major Device Type, Minor Device Type, First Detection Time, Last Detection Time, and more. BluetoothView can also notify you when a new Bluetooth device is detected, by displaying a balloon in your taskbar or by playing a small beep sound.....(free).....
Boot builder allows you to create your own custom boot sector from scratch. This utility allows you to recreate or restore boot sectors lost due to virus or other damage to a drive. Boot sectors can be imported/exported to a disk or created from a template. This program supports FAT and NTFS boot sector types.....(free).....
Bootminder will warn you if a floppy is in your A: drive when you are closing down Windows. If you then take out the disk from that drive, the next time you start your computer, it will not boot from that floppy. Conclusion: a reduced chance of a boot-virus infection .....(free).....
Control and kick out the hijackers, kung-fu style.....(free).....
MalWare Removal Tool. BugHunter is a DOS based program which does not require installation of any sort, It can easily be copied to various media and be used to disinfect other systems. BugHunter does not edit the registry of the system, it simply identifies and optionally removes found files. As BugHunter relies on dat file technology similar to that of a virus scanner, updates to the datafile and the program itself will be released from time to time on the Website.....(free).....
Log in to numerous sites with these free web passwords to bypass compulsory registration. You're browsing the web and you click a link to an article on a site (let's say nytimes.com) but instead of getting the article you get a screen asking you to login or register. Infuriated at the idea of pointlessly registering for yet another site you turn to your good buddy bugmenot.com.....(free).....
System Cleanup "Rescue" USB Drive - Having a USB drive available that houses a bunch of handy tools can be a lifesaver; you don't have to worry about if the infected PC can connect to the Internet (you should really be offline anyway).....(free).....
Usenet is one of the oldest repositories of information on the internet. In fact, it predates the internet as we know it. When you think of Usenet, you should generally think of mailing lists. Actually, you should think of a gargantuan network of mailing lists. Large ISPs are blocking Usenet. Luckily for those of us who are sensible, rational, responsible, law-abiding adults who embrace Usenet as an invaluable resource, there are ways to get around these internet restrictions.....(free).....
STG Cache Audit is an advanced, easy to use tool to extract information from the Internet Explorer cache. View, Export (Excel, CSV, Text and HTML) and print the cache lists.....(free).....
View all the internet cache entries (history,cookies,files) stored on your computer.You can search,delete entries. (Go to "Programs").....(free).....
CachePal lets you clear your Internet History, Temporary Internet Files and Cookies from one click on your Internet Explorer toolbar. Simply install, add to your toolbar and click whenever you need to dump your past or see a web site with a clean cache. Perfect for Web or Flash developers who constantly need to clear the browser environment to view changes. Includes uninstall.....(free).....
Cache viewers for IE, Firefox, Chrome and Opera. CacheView is a small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache. For each cache file, the following information is displayed: URL, Content type, File size, Last accessed time, Expiration time, Server name, Server response, and more. You can easily select one or more items from the cache list, and then extract the files to another folder, or copy the URLs list to the clipboard. There's a cache viewer for IE, Firefox, Chrome and Opera.....(free).....
Turn the caps lock key off.....(free).....
CCleaner is a freeware system optimization and privacy tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. But the best part is that it's fast (normally taking less that a second to run) and contains NO Spyware or Adware.....(free).....
Recover files from damaged or corrupted CD, DVD, HD DVD, Blu-Ray disks .....(free).....
Clipboard Format List Tool (CFList) is a free utility to generate a list of available formats on the Windows clipboard .....(free).....
This tool provides an easy way to track changes to certain parts of the operating system. The tool lets support professionals better understand the modifications to users' computers that may have caused problems.....(free).....
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22). .....(free).....
Google Chrome is using a client id variable in the file Local State which can be found in the user data folder of the chrome installation which is unique for every Chrome user. Privacy advocates are already warning users that the id can be used to create exact user profiles of a user?s actions while using Google Chrome. It did not take long though before some users figured out ways to remove or alter the client id so that the collected data was useless for Google. This article is going to show three different methods of editing or removing the Google Chome user id to make sure that no permanent data can be collected when using Google Chrome .....(free).....
Used to get around all Web blocking programs.....(free).....
ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind .....(free).....
CleanAfterMe allows you to easily clean files and Registry entries that are automatically created by the Windows operating system during your regular computer work. With CleanAfterMe, you can clean the cookies, history, cache, passwords of Internet Explorer, the 'Recent' folder, the Registry entries that record the last opened files, the temporary folder of Windows, the event logs, the Recycle Bin, and more. CleanAfterMe is a portable application. This means that you can run it without any installation and without leaving any trace in the Registry.....(free).....
This fellow shows you the tools and processes for cleaning up your machine manually.....(free).....
ClearLogs clears the event log (Security, System or Application) that you specify. You run it from the Command Prompt, and it can also clear logs on a remote computer.....(free).....
Most privacy-conscious users are familiar with deleting files securely, that is, destructively with overwriting and with wiping free space on their disks. But two items that often get overlooked are the swap file (or swap partition), and the hibernation file.....(free).....
ClickZap allows you to run a predefined action when you right click two or three times at your current mouse double-click speed. There is no faster way to lock your computer when screen security is needed quickly......(free).....
Anonymized browsing ... just read the disclaimer and start surfing. HTTP, HTTPS, FTP anonymizing proxy: hide your identity from the sites you visit. Encrypted connection: hide your surfing from local snooping. Remote cookies: keep cookies at our site, and delete them after each session. User configurable content filtration: selectively remove Javascript, Java, etc......(free).....
CloneSpy is a Free Duplicate File CleanUp Tool for Windows 98se/NT/ME/2000/XP.....(free).....
Cobian Backup is a multi-threaded program that can be used to schedule and backup your files and directories from their original location to other directories/drives in the same computer or other computer in your network. FTP backup is also supported in both directions (download and upload). Cobian Backup exists in two different versions: application and service. The program uses very few resources and can be running on the background on your system, checking your backup schedule and executing your backups when necessary. Cobian Backup is not an usual backup application: it only copies your files and folders in original or compressed mode to other destination, creating a security copy as a result. So Cobian Backup can be better described as a "Scheduler for security copies". Cobian Backup supports several methods of compression and strong encryption .....(free).....
A bundle of useful command line utilities for managing your network faster and more efficiently: command-based; ideal for scripting, Measure URL response; performance polling on websites and ASP/PHP scripts. Measure TCP/IP port response; firewall testing. Execute SQL query on any ODBC compliant database. Detailed directory/share content statistics report.....(free).....
Complete protection from Hackers, Spyware, Trojans and Identity theft. Host Intrusion Prevention System stops malware from being installed. Clean PC Mode registers your current applications then will allow only applications that you approve to be installed on your computer. Malware Scan Feature checks your computer for viruses, spyware and trojans before you install Comodo Firewall Pro. Free Download. No charges or license fees ever.....(free).....
SecureEmail, the desktop application that automatically secures your email messages so your confidential data cannot be stolen or modified on its way through the Internet. Security you install and forget - SecureEmail will automatically encrypt and sign all outgoing emails and manage the complex certificate exchange procedure, Full integration with major mail clients - Outlook, Outlook Express, Thunderbird, Incredimail and many other POP, SMTP and IMAP based clients, Encrypt to anyone, anytime - innovative one-time 'session' certificates allow you to encrypt email without first exchanging signed mails, Built-in wizard to lets you quickly download and install Comodo email certificates, Available in 32 bit and 64 bit versions. Supported E-mail Clients: Outlook 2000 and above, Outlook Express, Thunderbird, Windows Mail, Incredimail......(free).....
Security Suite that protects Notebook and Desktop PCs. It provides Access Control, Hard Disk Encryption, VPN, file encryption and Single Sign On. Full functions without any limitations: Pre boot access control, Hard disk, Diskette and removable block devices like ZIP drives or Memory-Sticks encryption, VPN for Lan, Single-Sign-On at Windows, Local and Central Administration, Fast AES algorithm, Encryption of Server Files & Subdirectories - SafeLan.....(free).....
If you're connected to a LAN, the ordinary file managers wont help you a bit. When working with tens of computers the operations you need to do are so many and so complex that a window split in two is not enough. Computer Manager is more than a file manager for LAN users. Select files and subdirectories from different directories and computers, make your computer a http, ftp server, powerful search engine, lan chat, file splitter, automatic resume of file copying to or from network when it becomes unavailable!, show or hide drives and partitions, shows ip and mac address of other lan computers, ftp explorer, list of known computers, more.....(free).....
Control Web Enables and then Starts the IIS, WWW, and FTP services then when you are finished with the services it will Stop the IIS, WWW, and FTP services, then disable them from starting up on the next reboot (Go to Downloads).....(free).....
Many excellent spyware removers scan through thousands of files, but then only suggest you remove a few cookies. Which is why some users regularly remove ALL cookies. especially as it is not nice knowing someone is watching say what sites you visit not matter how harm lees that might be. But this means each time you visit a forum you will need to log in quoting All your details.This program removes all cookies, except those you need to log into any forum. First use Add Wanted to create / amend a list of Cookies wanted. NOTE the wanted Cookies are abbreviated to accept multiple [123], but you need not have more than one of any entry.....(free).....
CookieCooker protects you against others snooping on your internet habits and interests by trading your cookies with others and through other techniques.....(free).....
Cookie Eater can destroy the cookies present in your internet cache. Cookie eater searches your cache for cookies and displays all cookies present. You can then select and destroy the cookies which you don't need. You can also edit cookie contents and can also find more information about them.....(free).....
Cookie Info is a relatively small and simple application that allows you to monitor for and selectively delete or view, newly created cookies (and delete or view cookies already present on your computer).....(free).....
This utility is a manager for cookies created by Internet Explorer, Mozilla, Netscape and Opera (only basic support). It also works with any Gecko-based browser and most of the browsers based in Internet Explorer. The program allows you set a list of the cookies you want to preserve and then delete the remaining ones with a simple mouse click. It also have the option of detecting the cookies for the sites included in your favorites and/or bookmarks. Useful for people who cares about his privacy but don't want to disable or block all the cookies (Go to Utilities).....(free).....
Ever wondered how many cookies are on your computer and where they came from? This little utility will not only show you but also lets you delete the ones you don't want. It will present you with a list of all the cookies on your computer, date and time they were created, life expectancy and show you the web site that put them there.....(free).....
The Cooxie Toolbar reveals what the Internet Explorer has recorded about your online activities, and helps you protect your privacy on the internet. Major features in version 1.0 include: Edit Typed URL's: Lets you add or remove links in the Address bar drop-down list. Edit Visited URL's: Provides overview of the internet history. Edit Cache: Provides overview of cached files and cookies (files stored in "Temporary Internet Files"). Edit Passwords: Reveals saved usernames and passwords. Edit AutoComplete: Reveals text entered in forms, for example previous search phrases on Google. Proxy Management: Harvest, test and manage a set of proxy servers. Proxy Selection: Select a proxy server from a drop-down list in the toolbar. Cookie Display: The cookie associated with the current page is displayed in the toolbar.....(free).....
Copy scratched DVDs and CDs. Copy Cat 2.0 actually skips the bytes which are not readable from file and copies all other bytes; therefore, it extracts max data which is normally not done by Windows copy operations.....(free).....
Copies, moves or deletes files on the next Windows system boot. Works on 95/98/ME/NT/2000/XP. The utility is very useful when the user needs to replace or delete files which are locked by other applications, loaded into memory or cannot be changed until the next system boot. The program can be integrated into the Windows' shell (setup creates the "Copy/Move/Delete on boot" context menu item and GiPo@Utilities file/folder property page) .....(free).....
Control the recycle bin. Helps You Get Rid of Recycle-bin Files Quickly. No more answering "Yes" to delete files, Customizable Hotkey to Empty Recycle-bin, Customizable Hotkey to View the Recycle-Bin, Increased Functionality over previous versions. GUI Assissted Configuration, Completely Hidden - No Windows or Icons, Optionally Alerts you wehn you empty the Recycle-bin, Hotkey allows you to quickly exit the program entirely, Optionally Starts with Windows and uses lfew resources, 100% Freeware - Absolutely NO SPYWARE!, Features Automatic Live Updates utilizing the UpChk engine.....(free).....
The Password Reset Disk is essentially a small file that can be used to reset your password, even if you have changed your password since creating the reset disk. This can be extremely valuable for preventing any embarrassing situations.....(free).....
Unfortunately, Windows XP does not have any user-friendly built-in tools to create secure folders on computers with multiple users. But there is another way to create a secure locked folder without having to buy any 3rd party software.....(free).....
The Controllable Regex Mutilator, CRM114 is a system to examine incoming e-mail, system log streams, data files or other data streams, and to sort, filter, or alter the incoming files or data streams according to the user's wildest desires. Criteria for categorization of data can be by satisfaction of regexes, by sparse binary polynomial matching with a Bayesian Chain Rule evaluator, or by other means. Accuracy of the SBPH/BCR classifier has been seen in excess of 99 per cent, for 1/4 megabyte of learning text. In other words, CRM114 learns, and it learns fast .....(free).....
Cryppie - is a small, yet useful tool that can protect any type of file by completely encrypting its content with wide known BLOWFISH algorithm. No one will be able to decrypt your files without correct password. Besides, the program has some additional helpful functions .....(free).....
Crypt Edit is one of the most powerful freeware word processors. It is a nice replacement for the standard Windows NotePad and WordPad. Crypt Edit requires Windows 95 OSR2, Windows 98/2000 or Windows NT 4.0 or later to run. No additional DLLs or whatever are required. It can easily create, protect, modify, post and print your documents.....(free).....
Creates an encrypted vault. Stick a file or folder in it, and like magic, it's encrypted. Sends encrypted email too.....(free).....
Cryptography, simply defined, is the art of combining some input data, called the plaintext, with a user-specified password to generate an encrypted output, called ciphertext, in such a way that, given the ciphertext, it is extremely difficult to recover the original plaintext without the encryption password in a reasonable amount of time. The algorithms that combine the keys and plaintext are called ciphers. Various ciphers are documented on this page for easy use.....(free).....
This is a must-watch presentation. "In the past, you would count the number of bombers and the number of tanks your enemy had. In the case of cyber war, you really can't tell whether the enemy has good weapons until the enemy uses them," says Richard Clarke, former chairman of the White House Critical Infrastructure Protection Board. In "Cyber War!" Clarke and other insiders talk about a new set of warriors fighting on the new battlefield of cyberspace, and they evaluate just how vulnerable the Internet may be to both virtual and physical attack. This is the full Frontline program, now available in video over the net. (Windows Media, Real, or Quicktime--very high quality and smooth streaming) .....(free).....
Experimental program to protect processes and allow you to try out various system and application behaviour when certain processes are made protected. Protected Processes are a part of the next-generation high-definition audio/video support present in Vista, and related to the Protected Media Path.....(free).....
Freeware for your data recovery needs.....(free).....
1700 default passwords from 374 vendors.....(free).....
Using DelayDel you can "mark" files which will be deleted on next Windows startup. This is useful for deleting files that are used by Windows and cannot be deleted (or in DOS mode only).The program works on all Win32 platforms .....(free).....
Delete files that are difficult to delete, such as some files left by viruses and trojans, or files with corrupted file names. This program can also delete files like the "index.dat" files, which store Internet history, by scheduling them for deletion upon system restart. Select a file to delete from the built-in file browser or drag a file to the application's icon or window from Window's Explorer.....(free).....
When you delete a file or folder using Windows, it is usual for the file or folder to be moved to the Recycle Bin (Trash). When the Recycle Bin is emptied, the data you have deleted is not actually removed from your computer. Instead, Windows makes the space occupied by the file available for writing. In other words, every file you delete using Windows is potentially recoverable in the short term. If you create a new file after deleting using Windows, or save a changed file, it may write over the 'deleted' file's space, thus destroying it permanently. Likewise, defragmenting will possibly overwrite the deleted files. DeleteOnClick completely deletes files in one click rather than sending the file to the recyle bin. The data becomes unrecoverable. For this reason you must use this program carefully. Once a file is 'Securely Deleted' no one can undelete it.....(free).....
EASEUS Deleted File Recovery is a fully functional freeware designed to recover deleted files from all types of media such as Hard Disk Drives, Floppy Drives, Smart Media, Compact Flash, Memory Sticks, and other types of removable media. Go to Products.....(free).....
Remove all the spam, free trial software, and advertising.....(free).....
Prevents the moving of desktop icons .....(free).....
Roughly 60% of all disk drive failures are mechanical in nature?from spindle-bearing wear to read/write heads banging into delicate disk platters?and now technology built into the drives can report anticipated and specific failures to give you a chance to rectify the situation, hopefully before it is too late to retrieve your data. Includes links to a great bunch of hard drive utilities.....(free).....
A guide to observing packet spoofing by ISPs. Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. .....(free).....
DieHard eliminates ? or greatly reduces the likelihood of ? a class of bugs and security vulnerabilities called memory errors. DieHard prevents certain kinds of errors from happening at all. It also reduces the probability that a bug will have any effect at all. DieHard works by randomly locating program objects far apart from each other in memory. This scattering of memory objects all over memory not only makes some errors unlikely to happen, it also makes it virtually impossible for a hacker to know where vulnerable parts of the program's data are. This thwarts a wide class of exploits.....(free).....
Article about how big brother and big media can still put the Internet genie back in the bottle .....(free).....
Monitors file system changes in Windows NT/2000/XP. It allows you to select the folder and to customize the monitoring settings for the specified folder (the event list to process and some other options). The program can also monitor changes in subfolders if necessary. This program can work in the background and generates an HTML log of file system changes. The program can be integrated into the Windows' shell (setup creates the "Monitor" context menu item and GiPo@Utilities file/folder property page)......(free).....
This utility will allow you to disable Windows Messenger on per-user basis, or on a machine wide basis. Download the ZIP file and extract MessengerDisable.exe to your hard drive. You can either double click the EXE file, or create a shortcut to it, as you prefer. You can, optionally, use this utility to remove Windows Messenger from your machine. You may need Administrator level privileges to run this program.....(free).....
The easy way, a GUI .....(free).....
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Verify the effectiveness of file and disk wiping programs. Undelete previously deleted files.....(free).....
Disk wiping utility.....(free).....
Securely erases the contents of a disk replacing it with random data or leaving the drive completely blank. Numerous passes can be performed to ensure data is totally unrecoverable. Program works on hard and floppy disks aswell as USB/Flash drives.....(free).....
Hide the closure button of a window to avoid accidental closure .....(free).....
Many, many online DNS and networking tools for network administrators, domain owners, users of hosted DNS services, etc .....(free).....
DnsEye monitors network traffic by capturing Domain Name System DNS packets in the network and displaying the host names resolved information. The program allows you to monitor requested URLs in a network, to open the url in a browser and save the captured DNS name list in the file. The tool is designed with a user-friendly interface and is easy to use.....(free).....
dotNetTools includes all 3 following tools: dotNet Sniffer, PvLog DeObfuscator and LicenseManagerKiller. dotNet Sniffer 2 uses the .NET profiler API to save assemblies loaded from memory. Once a module is handled by the .NET Framework, dotNet Sniffer saves it to disc if it was loaded from memory. Some tools are changing the module (decrypt methods ...) after loading; dotNet Sniffer 2 allows you to save the module again during the execution of the first method (JIT). PvLog DeObfuscator is a MSIL code optimizer. One side effect of the optimizer is that it can make more readable obfuscated code. PvLog DeObfuscator can also rename the types and names of members to further improve readability. PvLog LicenseManagerKiller is to prove and warn against the inefficiency of managing licenses in managed code.....(free).....
This simple online script tests your browser for parasites -- ?Parasite? is a shorthand term for ?unsolicited commercial software? ? that is, a program that gets installed on your computer which you never asked for, and which does something you probably don?t want it to, for someone else?s profit (Update: We fixed the link).....(free).....
DriveImage XML is an easy to use and reliable program for imaging and backing up partitions and logical drives. The program allows you to: Backup logical drives and partitions to image files, Browse these images, view and extract files, Restore these images to the same or a different drive, Copy directly from drive to drive, Schedule automatic backups with your Task Scheduler, Image creation uses Microsoft's Volume Shadow Services (VSS), allowing you to create safe "hot images" even from drives currently in use. Images are stored in XML files, allowing you to process them with 3rd party tools. Never again be stuck with a useless backup.....(free).....
DriverMax is a new program which allows you to easily reinstall all your Windows drivers. No more searching for rare drivers on discs or on the web or inserting one installation CD after the other. Simply export all your current drivers (or just the ones that work ok) to a folder or a compressed file. After reinstalling Windows you will have everything in one place. Registration required.....(free).....
Deletes a specified Windows service from the Service Configuration Manager (SCM) database.....(free).....
Retrieves and interprets the pre-recorded information that is present on dvd media (dvd+r, dvd+r dl, dvd+rw, dvd+rw dl, dvd-r, dvd-r dl, dvd-rw and dvd-ram) and on blu-ray media (bd-r and bd-re). This information contains a variety of parameters such as disc manufacturing information and supported write speeds. Even though this information is usually printed on the packaging, the brand name may differ from the actual manufacturer or sometimes there might not even be any packaging information at all .....(free).....
The sanitizer is a filter that rewrites MIME messages so as to 'defang' well known email-based exploits and trojan horses (or viruses). It can also scan attachments with third-party virus scanners. Running a virus scanner is like getting a flu-shot. A good idea, but why expose yourself to the virus at all? The Anomy sanitizer lets you avoid all the stuff you don't really need, but might hurt you. This is what makes Anomy different from virus scanners and tools to apply them to your incoming email. It's a big difference, and nobody said you couldn't do both......(free).....
EasyCleaner is a small program which searches the Windows registry for entries that are pointing nowhere. EasyCleaner also lets you delete all kinds of unnecessary files such as temps and backups. You can search for duplicate files and you can view some interesting info about your disk space usage! You are also able to manage startup programs, invalid shortcuts and add/remove software list .....(free).....
Easy File Backup software will ensure your data is backed up at your convenience. This free backup software program will allow you to back up your data at a specified interval, and/or on a routinely basis. Easy File Backup is a simple data backup application that runs unobtrusively while being minimized in the system tray. With an easy to use interface, you can select the files or entire directories, including sub directories, in which you wish to backup. You can select the source disk drives, either local or network, and specify the destination directory in which you wish to store the backed up data. With an option to load during Windows startup, and a built in scheduler, you are ensured that your data is backed up prior to working on it.....(free).....
EmptyDesk is free easy-to-use windows utility that lets you clear your desktop with just a click on a button. Need an empty, cleared desktop, no icons showing? Look no further.....(free).....
Emsa Port Blocker is a TCP blocking utility. What it does, is blocking unwanted tcp access from/to your computer. It is not a firewall, but up to some extent it could be regarded as a similar tool. Its purpose is to prohibit TCP access on certain ports and ip addresses. IT can also be used as a TCP monitor because it shows TCP connections currently active on the machine.....(free).....
This back-up administrator account can come in handy if you encounter some problems logging into or otherwise using Vista .....(free).....
EncryptOnClick is a program that lets you securely encrypt and decrypt files. EncryptOnClick is like hiring your own highly experienced data security guard who ensures the files you want to keep safe and out of view from others stay that way. The program is very simple to use and features military grade 256-bit AES encryption.....(free).....
Scan for devices connected to your network. Are you aware of all the devices ? USB sticks, CDs, floppies, smartphones, MP3 players, handhelds, iPods, digital cameras ? that have been connected to your network? As an administrator, do you know how many employees have been using or are using portable storage devices at the moment? Monitoring your network for these devices is not only time-consuming but nearly impossible to do manually. With GFI?s free web utility EndPointScan you can actually check within minutes what devices are or have been connected to computers in your network and by whom .....(free).....
Analyze those nasty software and other license agreements for interesting words and phrases.....(free).....
Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but this functionality might be unnecessary and may leave you susceptible to being attacked. The safest policy is to disable the majority of those features unless you decide they are necessary. If you determine that a site is trustworthy, you can choose to enable the functionality temporarily and then disable it once you are finished visiting the site .....(free).....
Event Log Explorer is a free software for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. It extends starndard Event Viewer monitoring functionality and brings new features .....(free).....
This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also provides an overview of the current situation.....(free).....
Microsoft Internet Explorer (IE) stores cookies in different files on your hard disk drive. More you browse the web, more cookies are stored on your PC. Each cookie has its own lifetime - from several seconds to several years. But IE does not remove expired cookies from your PC even they are expired and will be never used. So, your hard drive can store several hundreds or even thousands unused and useless files. You can use Expired Cookies Cleaner software to remove expired cookie files and speed up your PC and free some disk space.....(free).....
A fork of the greatest SSH client ever. ExtraPuTTY has all the features from the original and adds others as described bellow: allow win32 application to send,receive data on Telnet, SSH, RLogin and Raw protocols. offers TestStand steps to send,receive data on Telnet, SSH, RLogin and Raw protocols. automatic sequencing of commands. generate report of all exchanges (Command,reply) in HTML or Text format .....(free).....
Allows a user of Windows XP Home to view and change the access rights on file system objects of NTFS file systems. The extension provides the security tab known from Windows NT4, Windows 2000 and WIndows XP Pro at the property page of file system objects. For faster access it adds an additional menu item to the context menu of such objects (optional). .....(free).....
All anti-spyware programs are not as they seem. According to the author, "Some of the products listed on this page simply do not provide proven, reliable anti-spyware protection. Others may use unfair, deceptive, high pressure sales tactics and false positives to scare up sales from gullible, confused users. A very few of these products are either associated with known distributors of spyware/adware or have been known to install spyware/adware themselves".....(free).....
FBackup is a free backup software for both personal and commercial use. It protects your important data by backing it up automatically to any USB/Firewire device, local or network location. The backed up data can be either compressed (using standard zip compression) or an exact copy of the original files .....(free).....
Notifies users of shared directories when files are added, deleted, or moved in share.....(free).....
A file protecting software. See of this as a password protected box that can contain your files. You need to dustribute only the box, and every person trying to open the box needs a password. You can even set expiry dates. Most of all, this application needs no installation. Neither on the protectors machine, nor on the viewers machine. Go to downloads .....(free).....
Block attacks from worms, viruses, and trojans. Double filter system provides double-layer protection. User rules for customized configs.....(free).....
Locate potential viruses and worms hiding in non-executable files (Go to Downloads).....(free).....
This tool is an easy way to find the MAC address of a local or remote computer on the network. Select the target and method and find the MAC address of a remote computer on the network. The software can not only find the MAC address of a computer, but also detect the manufacturer of its network card. Free for non-commercial use.....(free).....
Data recovery tool. Undelete files. Recover deleted hard drive. Restore folders. FineRecovery is a free and powerful utility to restore deleted files from hard disk. Typical hard drive can be scanned for recoverable files within minutes.....(free).....
Bypass outbound firewall control.....(free).....
Firewall Builder is a GUI firewall configuration and management tool that supports iptables (netfilter), ipfilter, pf, ipfw, Cisco PIX (FWSM, ASA) and Cisco routers extended access lists. Firewall Builder uses an object-oriented approach, it helps administrator maintain a database of network objects and allows policy editing using simple drag-and-drop operations.....(free).....
Folder Lockbox is a security software enabling you to password protect any folder on your computer. The protected folder (lockbox) is hidden from any user and application of your system, including Administrator and System itself. It is impossible to access the lockbox not only from the local computer, but also from the net. The program is extremely easy to use. You can set the lockbox location and the password during the setup procedure. After the setup is done, lockbox will be hidden and locked until you enter the valid password. Folder Lockbox Control Panel allows you easily change basic lockbox parameters: lockbox location, protection status, password. In addition, skinned user interface lets you choose from different skins to select the most comfortable look and feel of the software.....(free).....
What happens to unprotected machines. According to the author, "I decided to try an experiment. I wondered just exactly how easy it really was to get an unpatched machine compromised, and what it would look like to "Joe Average" computer user. I set up a VMWare image of a fresh install of Windows XP Home Edition, and headed out on the internet to see just exactly what happened. My trip was an enlightening journey into the dangers lurking out on the 'net for the unwary, and along the way I've learned some interesting things about the spyware/adware industry".....(free).....
If you cannot get to MySpace from school, or cannot get to GMail at work, or Live in Belarus, or China, or one of the other nations who censor the internet, download this proxy manager and go around the block.....(free).....
FreeFixer is a general purpose removal tool which will help you to delete potentially unwanted software, such as adware, spyware, trojans, viruses and worms. FreeFixer works by scanning a large number of locations where unwanted software has a known record of appearing or leaving traces. The scan locations include the programs that run on your computer, the programs that starts when you reboot your computer, your browser's plug-ins, your home page setting, etc. FreeFixer does not know what is unwanted, so it presents the scan result and it's up to you decide if some file should be removed and if some settings should restored to their default value. Please be careful.....(free).....
Your computer remembers the web sites you have visited and what you have entered in these pages. Ask yourself what would happen if your boss, spouse, kids or colleagues could see what you have been doing. Mil Free Internet Eraser 2.5 deletes Internet cookies and history tracks from your computer .....(free).....
FreeOTFE is a free, open source, on-the-fly transparent disk encryption program for PCs and PDAs. Using this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive .....(free).....
freeSSHd, like its name says, is a free implementation of an SSH server. It provides strong encryption and authentication over insecure networks like Internet. Users can open remote console or even access their remote files thanks to buit-in SFTP server .....(free).....
FreeUndelete is a freeware data recovery program for deleted files. In case of accidental deletion of files on a NTFS file system (used by default in Windows XP, 2000 and NT) FreeUndelete is the utility to help.....(free).....
Freenet is a global peer-to-peer network designed to allow users to publish and consume information without fear of censorship. To use it, you must download the Freenet software, available for Windows, Mac, Linux and other operating systems. Once you install and run Freenet, your computer will join a global, decentralized P2P network. You will be able to publish and consume information anonymously, either through your web browser, or through a variety of third party applications.....(free).....
G-Zapper is a free tool to block and delete the Google cookie which allows tracking of your searches. See if your PC has a Google cookie, view its actual value, and block it with just one click. This new version is updated to include blocking of Google Analytics which may be tracking web sites you visit .....(free).....
Lets you share entire folders with friends in a private peer to peer environment. Share all your files (home movies, pictures, documents?) no matter how large they are. It's secure, encrypted?and free.....(free).....
Numerous powerful and easy-to-use system tools and utilities to fix, speed up, maintain and protect your PC. It allows you to clean common system junk files, as well as invalid registry entries and Internet traces. You can manage and delete browser add-ons, analyze disk space usage and find duplicate files. You can also view and manage installed shell extensions, encrypt your files from unauthorized access and use, split large files into smaller manageable files and then rejoin them. Furthermore, Glary Utilities includes the options to optimize memory, find, fix, or remove broken Windows shortcuts, manage the programs that start at Windows startup and uninstall software. Other features include secure file deletion, an Empty Folder finder and more.....(free).....
EMail-Security. Includes GnuPG: The core; this is the actual encryption tool, WinPT: A key manager and helper for various encryption matters, GPA: Another key manager, tastes are simply different, GPGol: A plugin for Microsoft Outlook 2003 (email encryption), GPGee: A plugin for Microsoft Explorer (file encryption), Sylpheed-Claws: A complete email program including the plugin for GnuPG. NOTE--WE FIXED THE LINK, SORRY ABOUT THE ERROR.....(free).....
Here at Shell City we use Google as a spam filter by redirecting our other mail through our Google mail accounts. It works great. We've gone from 500 spams a day to 20 .....(free).....
Google bombing involves manipulating search engines' contextual search methodologies to cause a certain search phrase to point to an unexpected page, usually for comedic or satirical purposes. For example, run a search for "miserable failure" in Yahoo Search. You'll see prominent links to President George W. Bush's biography at whitehouse.gov at or near the top of the list .....(free).....
Use Google as a proxy to access otherwise forbidden sites. It's so simple, you won't believe it .....(free).....
Google Hack Honeypot is the reaction to a new type of malicious web traffic: search engine hackers. GHH is a ?Google Hack? honeypot. It is designed to provide reconaissance against attackers that use search engines as a hacking tool against your resources. GHH implements honeypot theory to provide additional security to your web presence. These insecure tools, when combined with the power of a search engine and index which Google provides, results in a convenient attack vector for malicious users. GHH is a tool to combat this threat. GHH is powered by the Google search engine index and the Google Hacking Database (GHDB) maintained by the johnny.ihackstuff.com community .....(free).....
GrapeBackup is a backup program with following features: extremely fast, easy to use, supports incremental backups (multiple versions of a directory are saved in a repository and may be retrieved independently). Create your backups daily or even twice a day. Only changed files will be stored. This is also very useful if you want to be able to access different stages of your work. Allows you to limit I/O throughput (it is limited to 1 MB per second in the basic version). This unique feature allows you to continue to work during a GrapeBackup run. Your computer will not become unusable just because you run a backup. Uses ZIP format for storing files or single file repository (If you want to burn the created file on CDs? or similar and it is bigger than 650MB you can use 7-zip File Manager to split the file in smaller pieces), runs on multiple platforms. It was tested on Windows XP and Kubuntu (Linux) but should also run on any platform that supports Java. Command line interface lets you automate your backups.....(free).....
Strips privacy-breaching Global Unique Identifiers -- GUIDs -- from MS Office documents. Open source.....(free).....
Automates the recovery of files and data out of corrupted gzip and tar files.....(free).....
The HABClean package includes two utilities, Destroy and Scrubber, that are designed to remove all traces of sensitive files from hard or floppy disks before you pass them on to someone else. While they are not intended to defeat the efforts of data-recovery professionals, they will make it very difficult for anyone to recover data from disks on which they have been used. Thus, unless you have very valuable data on your disks, the cost of recovery will be much greater than the value of the data to someone else.....(free).....
The HABClean package includes two utilities, Destroy and Scrubber, that are designed to remove all traces of sensitive files from hard or floppy disks before you pass them on to someone else. While they are not intended to defeat the efforts of data-recovery professionals, they will make it very difficult for anyone to recover data from disks on which they have been used. Thus, unless you have very valuable data on your disks, the cost of recovery will be much greater than the value of the data to someone else. For 2K and XP.....(free).....
HashOnClick is a program to calculate the CRC-32, MD5, or SHA-1 hash value for a file. It is implemented as a shell extension, i.e. right-click on a file, in Windows Explorer, to calculate the hash value for a file. It's that simple! There are many reasons why you may wish to find out the hash value of a file. Many web sites for example list the MD5 value of a file, so that when you download it you can check to see if the file on your computer is correct. Some FTP servers also let you retrieve the MD5 value of a file (via the XMD5 FTP extension). CRC32 values are used in Zip files, and some FTP servers also let you retrieve the CRC32 value of a file (via the XCRC FTP extension).....(free).....
Use Hide All to get rid of windows that you need open, but don't use all the time so that they don't clutter your taskbar, for instance, email clients, management utilities, etc. Hide All also allows you to hide all your desktop icons as well as the Windows taskbar. You can also hide the application itself so that it isn't visible as well. When you want Hide All to be visible again simple hold down control and tap H .....(free).....
Hide the desktop icons when the mouse is elsewhere .....(free).....
Free Hide Folder is a free computer security software to hide your private folders. It is very useful to keep your personal data away from others. Others will not know where your personal files exist and they will not be able to accidentally view them. You can hide folders simply with a few mouse clicks. Free Hide Folder is protected by a password that you can change or remove at any time .....(free).....
Hide Outlook Express creates a Tray Icon, and allows you to show and hide Outlook Express by clicking the icon. It can also be set to hide Outlook Express when you minimize it.....(free).....
Sometimes you don't want others to be able to manipulate the system .....(free).....
Popups, errors, browser trouble, slow PC? HijackRemote helps you kick them to the curb by connecting to a remote community of spyware professionals using HijackThis.....(free).....
Homepage hijacker detector and remover. Initially based on the article Hijacked!, but expanded with almost a dozen other checks against hijacker tricks. It is continually updated to detect and remove new hijacks. It does not target specific programs/URLs, just the methods used by hijackers to force you onto their sites.....(free).....
2 volumes, from the NSA .....(free).....
Application that lets you manage your Hosts file with ease.....(free).....
According to the author, "As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own".....(free).....
hpObserver is a small program that allows you to monitor networks and websites (or IPs if you prefer). Current features include: Monitor HTTP or UNC path - Continuous or single pass monitoring - Comparison validation - hpHosts inclusion status - Obtain Servers IP - Obtain webpage size (in bytes) - Print/Save results - Send URL to vURL Desktop Edition or vURL online edition - Send URL to SiteAdvisor - Send URL to TrustedSource - Server response code (i.e. 200, 404, 501 etc).....(free).....
Adds enhancements to the Windows context menu. If you are using Windows as Administrator then you can launch programs or associated handlers via HShellExtPack in a lower privileged context. (this way e.g. your browser and mailer would have less chance to run unwanted content of mails or web pages).....(free).....
This small program will encrypt the source code of your webpages. Completly normal on browser but encrypted in source code. Drag & Drop to application icon to quicly create the encrypted copy of you page .....(free).....
Control each outgoing HTTP request from your computer and download only necessary Internet resources. Avoid converting your own Internet traffic into income for someone else.....(free).....
iProtectYou allows parents to control which web sites can be visited, which programs can have Internet access, block e-mails, chat sessions and instant messages with inappropriate words, stop annoying ads, and/or restrict internet time to a predetermined schedule.It will gather detailed information about your child's online activity. Comes provided with a huge built-in database.....(free).....
ICE ECC is a file verification and repair tool. ICE ECC allow to protect your important files and sensitive data against digital corruption using Reed-Solomon codes.....(free).....
ICE Encrypt is a simple files/folder encrypting program. ICE Encrypt uses for encryption algorithm of the new generation - ICESafe. This is symmetric algorithm of encryption outperform all known symmetric block algorithms (DES, AES, BlowFish, GOST, ...). ICESafe is not just new algorithm of encrypting. It?s a new ideology of protection of the information.....(free).....
This utility creates or maintains an exact duplicate of the original directory. ICE Mirror will compare the mirrored directory to the master directory and correct any disparities .....(free).....
IceSword is a sophisticated discovery tool that can protect against sinister rootkits if used before they infect a machine. It has a Windows Explorer-like interface but displays hidden processes and resources that Windows Explorer would never show......(free).....
provides email identity services that proactively combat email fraud spawned by phishing. The IconixSM solution that we offer uses icons to enable users to quickly and visually distinguish emails sent by identified senders. Iconix eMail ID is software that works in conjunction with your email program and confirms the source of an email message. Once confirmed, we make the message easy to identify by placing an icon next to it. If you ever wonder who is really sending you an email message; Iconix eMail ID helps solve that problem .....(free).....
In Windows, many applications have something called a "product ID number", a "GUID" or a "Unique ID number". This number may be the same through Internet Explorer, Windows Media Player - even the operating system itself. Since this number nevers changes, it would be the PERFECT way a malicious person or even an advertising company could track your habits. Maybe through a malicious website ActiveX control, or java applet. Well why not just delete it? In this case, you would have a constant ID of nothing - and given the small number of people that might also have that "null" value, it could still be used to track you. ID-Blaster Plus works by changing these ID numbers frequently, destroying tracking tactics using these numbers. ID-Blaster can run from the system tray, using up very little resources, and constantly protect you in the background.....(free).....
The top ten signs that your son is a hacker. I advise any parents to read this list carefully and if their son matches the profile, they should take action.....(free).....
IECacheList Lite - Display the contents of Internet Explorer's index.dat files, including 'lost' and hidden content.....(free).....
IECacheView is a small utility that reads the cache folder of Internet Explorer, and displays the list of all files currently stored in the cache. For each cache file, the following information is displayed: Filename, Content Type, URL, Last Accessed Time, Last Modified Time, Expiration Time, Number Of Hits, File Size, Folder Name, and full path of the cache filename. You can easily save the cache information into text/html/xml file, or copy the cache table to the clipboard and then paste it to another application, like Excel or OpenOffice Spreadsheet .....(free).....
IE History Manager is a small program that gives you the ability to manage yours Internet History. It reads all information from the history file on your computer, and displays the list of all URLs that you have visited in the last few days. IE History Manager allows you to erase these Internet tracks, including Internet Explorer's cache, cookies, history, visited URLs, typed URLs, autocomplete memory, index.dat files .....(free).....
Internet Explorer doesn't allow you to view and edit the entire URL list that it stores inside the history file. This utility reads all information from the history file on your computer, and displays the list of all URLs that you have visited in the last few days. It also allows you to select one or more URL addresses, and then remove them from the history file or save them into text, HTML or XML file. In addition, you are allowed to view the visited URL list of other user profiles on your computer, and even access the visited URL list on a remote computer, as long as you have permission to access the history folder.....(free).....
A good practice is to disable active user accounts after a certain period of inactivity. Inactive Users Tracker automates the management of inactive user accounts. The program periodically checks all user accounts in specified domains and reports to you all accounts inactive for more than a specified number of days. This product has two important features: Checks all users and reports those that have been inactive for a specified number of days. Automatically disables inactive user accounts.....(free).....
Index.dat Analyzer is a tool to view, examine and delete contents of index.dat files. Index.dat files are hidden files on your computer that contain all tracks of your online activity, where have you been on internet, what sites you visited, list of URL-s, files and documents you recently accessed. Index.dat files stored on your computer are obviously a potential privacy threat as they can be found and viewed without your knowledge.....(free).....
Inferno is a Windows program that can delete any file using a variety of overwrite patterns, including two that comply with the Department of Defense and the Gutmann overwipe pattern. Inferno can also encrypt and decrypt files using super-strong AES 256-bit encryption.....(free).....
The Backup utility is not included in the default installation of Windows XP Home Edition. The Backup icon is not present on the Start menu in Windows XP Home Edition, nor is Backup listed in Add Remove Programs for Windows XP Home edition. This article describes how to install Backup, which is included on the XP CD-ROM.....(free).....
Save both incoming and outgoing Internet traffic (all data sent or received by browser) on the hard drive for future use .....(free).....
Shows which processes listen at which ports. Before Inzider there was no other tool that could do this in Windows.....(free).....
Monitors your network and will let you know when something serious is happening as quickly as possible.....(free).....
SRWare Iron is a real alternative browser. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that cause privacy concerns.....(free).....
If you are worried that some programs on your PC are secretly making connections to websites in the background, here's a quick tip that uses a simple DOS command to detect and prevent such suspicious activity.....(free).....
Software designed to tweak some of your Windows hidden settings for easier use, increased security and improved performance. iTweak contains more than 73 powerful tweaks to customize your computer.....(free).....
JAP makes it possible to surf the internet anonymously. JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website. Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called mixes. Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user.....(free).....
This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; what we describe here is the language hackers use among themselves for fun, social communication, and technical debate .....(free).....
Jetable.org provides you with a temporary email address. As soon as it is created, all the emails sent to this address are forwarded to your actual email address. This address will be deactivated after the lifespan you selected comes to its end.....(free).....
The Jetico Personal Firewall allows the user to protect the computer from both inbound hackers' attacks and outbound access attempts performed by malicious software. Three-layers of protection: I. Low-level network packets filtering. The level checks network packet validity as well as various parameters of the network packet (like source and destination addresses, protocol, etc.) II. Application-level network events filtering. The level filters network connections on per application basis allowing to monitor, limit or block network activity of concrete Windows applications III. Filtering of user-level process activity. This kind of protection notifies user and cuts off dirty tricks performed by trojans and other malicious programs.....(free).....
K9 is an email filtering application that learns from its mistakes and becomes better and better at being able to identify spam. More importantly it learns to recognize what you consider to be spam.....(free).....
KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).....(free).....
Detect keylogging activity on your computer.....(free).....
KLog is a Win32 implementation of nix syslog daemon to support remote logging of message from syslog-enabled unix servers, routers and other networked devices and applications. Here is a brief summary of klog features: Lets you flexibly pick up events to log based on priority/facility and source IP address. Optionally produces audible alerts when the message received meets certain criteria. Convenient GUI. Can run in background, taking up a 256 pixels of screen nicely packed as a 16x16 square in your notification tray area. Open source for those willing to add missing features, fix bugs and examine code for potential flaws and fun.You're free to torture it the way you want to as long as you preserve original author's credentials.....(free).....
Kruptos 2 is a powerfull 128 bit file encryption utility that allows you to secure any sensitive files stored on your PC or portable storage device.Kruptos 2 includes a powerful file shredding utility, and the ability to generate self decrypting files.....(free).....
Last Changed Files finds the 100 recent changed files on your hard disk or within multiple subdirectories. Once you start Last Changed Files, the software automatically scans your hard drive and shows you the top 100 new created or last changed files on your hard disk. You see the following columns in the top 100 largest files list: file name, full folder path, file size and date of last change .....(free).....
A comparison of anti-leak features of the most popular personal firewalls .....(free).....
LightFusion enables you to embed files in your executables, still leaving them executable. You can then use the Visual Basic module provided to extract the embedded files at runtime. If anybody could make any modifications to the module, fix any bugs, make it more efficient or write a module for another language, please send me the module along with a text file describing the changes you have made.....(free).....
Simple security tool that lets you 'lock' down executable files and prevents them from being opened.....(free).....
With LockImage you protect an image by converting it into a password protected executable with an embedded viewer. It consists of exactly one file and does not need any installation. This software tries to the implement the concept of Steganos LockNote for images .....(free).....
Lock your Windows folders for privacy.....(free).....
The really easy way to keep others out of your machine. One click .....(free).....
On Windows domains and workstations, it is possible to set an Account lockout threshold, which determines the number of failed logon attempts that will cause a user account to be locked out. A locked out account cannot be used until it is reset by an administrator or the account lockout duration has expired. With Lockout Resetter, an administrator can easily reset any locked out account .....(free).....
Displays a log of any kind in real-time. Enables one to define three groups of log lines, filter them and display in different colors. Opens and closes log files automatically in dependency on their file date/time stamp or the file name. Widely supports command line options .....(free).....
Repairs Winsock 2 settings, caused by buggy or improperly-removed Internet software, that result in loss of Internet access .....(free).....
LSrunase can be used to run a command using another user account and passing the password as a parameter. This is a big improvement over the standard runas tool which is not able to accept a password. LSrunase can be used in scripts. LSrunase extends the normal lsrunas with the use of encrypted passwords.....(free).....
Mail Box Dispatcher allows you control incoming email messages directly on server side. You can delete unwanted messages from your mailboxes without downloading them (it will destroy all spam-incoming traffic). Built-in auto-selection rules and mail box monitoring ability with internal email cache transform this tool to powerful anti spam weapon.....(free).....
Back up all your e-mail messages from multiple applications into one persistent and safe archive. You can import your mail from Outlook, Windows Mail, Outlook Express, Thunderbird, Exchange, as well as POP/IMAP accounts and local files. You read your mail from within the interface, search fast through all your messages by keyword and advanced criteria, and even burn a Backup CD with the click of a button or export messages to .eml format. Messages are stored MIME-compatible, and can be recovered at any time without information loss .....(free).....
Elevating your normal account to admin. Temporary admin for your Limited User account .....free).....
One of the easiest online password generators which can generate a single random password or lists of hundreds of random passwords. You choose the character sets, password length and the quantity to create. Hash values can also be created for your convenience. This password generator is useful for getting a random password for personal use or for generating large lists of default passwords.....(free).....
The Microsoft Windows Malicious Software Removal Tool checks computers running Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software?including Blaster, Sasser, and Mydoom?and helps remove any infection found. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents. You can run the tool from this Web page anytime or download it to your computer.....(free).....
Along with viruses, one of the biggest threats to computer users on the Internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop-up ads, track what web sites you visit, and generally screw things up. Malware programs are usually poorly-programmed and can cause your computer to become unbearably slow and unstable in addition to all the other havoc they wreak. Many of them will reinstall themselves even after you think you have removed them, or hide themselves deep within Windows, making them very difficult to clean. This guide will detail the different varieties of malware along with basic preventive measures.....(free).....
Malwarebytes is a site dedicated to fighting spyware. Malwarebytes has a variety of tools that can identify and remove certain malicious software. When your computer becomes infected with spyware, Malwarebytes may provide the needed assistance to remove the spyware infection and restore the machine. All software created by Malwarebytes is freeware. The programs are given to the internet community without nags or specified time limitations .....(free).....
Md5Checker is a free, faster, lightweight and easy-to-use tool to manage, calculate and verify MD5 checksum of multiple files or folders. Calculate and display MD5 checksum of multiple files at one time. Use MD5 checksum to fleetly verify whether files have been changed. Load, save, add, remove and update MD5 checksum conveniently. It is about 300 KB and does not require any installation (portable). .....(free).....
File recovery tool for memory cards uses an advanced algorithm to deeply scan your card for lost, deleted and/or formatted files and photos, it was designed with the home user in mind. You'll find and recover your digital files in just a few simple steps UPDATE---we missed this: it'll find your lost files for free, but it's $9.95 to recover them--crippleware, sorry.....(free).....
MegaCipher allows on-the-fly encryption of all kinds of data with 128-bit open keys. Crypted data can only be decrypted with the correct password. The key cannot be found with brute force attack as it can have 340,282,366,920,938,463,463,374,607,431,770,000,000 possible combinations!!! Now you can safely hide your private data from others eyes .....(free).....
This is an easy to use and very reliable Windows text encryption tool: Right click a text file, select 'Mince-Encrypt', type a password and your file will be secure from unwanted prying eyes. Double-click to decrypt.....(free).....
MozBackup is a simple utility for creating backups of Mozilla Firefox, Mozilla Thunderbird, Mozilla Sunbird, Flock, SeaMonkey, Mozilla Suite, Spicebird and Netscape profiles. It allows you to backup and restore bookmarks, mail, contacts, history, extensions, cache etc. It's an easy way to do Firefox backup, Thunderbird backup... .....(free).....
You have a router, you want to know what it does all day long? Then MRTG is for you. It will monitor SNMP network devices and draw pretty pictures showing how much traffic has passed through each interface .....(free).....
MRU-Blaster is an all-new program, made to do one large task - detect and clean MRU (most recently used) lists on your computer. These MRU lists contain information such as the names and/or locations of the last files you have accessed. But they are located ALL OVER your registry, and for almost ANY file type. By looking at these MRU lists, someone could determine what files you opened/saved/looked at, what their file names were, and much more! (And, in many cases, the lists are displayed in drop-down menus automatically.).....(free).....
MSConfig a tool coming with Windows includes a basic startup manager which allows you to enable/disable auto-start programs. It does not however allow you to completely remove an entry from the list. This is where MSConfig Cleanup comes in! It scans the startup configurations and allows you to remove any item that has been previously disabled via MSConfig.....(free).....
Muffin is a World Wide Web filtering system written entirely in Java that can filter any HTTP data sent and received by your web browser .....(free).....
My IPs is a little utility that will return your actual Internet IP address even if you're behind a Firewall or Router. In addition it will retrieve the Host name and Network IPs from all the Computers connected to your Network .....(free).....
myTrashMail.com is a free email provider for temporary email. Also known as disposable email, fake email or anonymous email. You should use this free email service to reduce spam coming to your personal email address.....(free).....
MyWanIP find your Internet IP address even from behind a router. When you run MyWanIP it detects your current Internet IP address and reports your address to you in the pop-up box. Although there are functions within Windows and other free services that report your IP address MyWanIP is different. If you have a LAN or connect to the Internet through a router, the other services report the LAN IP address of your server. Of course, if someone wants to connect to your server they don't need to know your server's LAN IP address, they need to know your server's Internet IP address. Unlike other utilities, MyWanIP reports your Internet IP address.....(free).....
NeatSurf is a powerful and easy to use IE privacy security utility. It prevents IE from writing to your history, cache, cookies, user data, etc... Just download and run NeatSurf.exe. It will start an instance of Internet Explorer and continue to run until another IE browser is opened regularly.....(free).....
NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows 98 and above. A trimmed-down version called MiniStumbler is available for Windows CE. NetStumbler is commonly used for: Wardriving, Verifying network configurations, Finding locations with poor coverage in one?s WLAN, Detecting causes of wireless interference, Detecting unauthorized (?rogue?) access points, Aiming directional antennas for long-haul WLAN links .....(free).....
NetSurveyor is an 802.11 (WiFi) network discovery tool and, as such, its goal in life is to gather information about nearby wireless access points in real time and display it in a useful way. Similar in purpose to NetStumbler, it includes many more features. The data is displayed using a variety of different diagnostic views and charts. Data can be recorded for extended periods and played-back at a later date/time. Also, reports can be generated in Adobe PDF format.....(free).....
Net Workshop is a collection of TCP and UDP servers, clients and relays, all in one application. Very useful if you want to troubleshoot your network or learn how other applications work. Featuring AutoUpdate, you can download the latest version without leaving Net Workshop's IDE! NetWorkshop now features Web Browser, FTP Client, File Transfer and Connections windows (shows currently open connections, listening ports, etc)......(free).....
Protects you from Phishing attacks. See the hosting location of every site you visit. Like a giant neighbourhood watch scheme, empowering the most alert and most expert members to defend everyone within the community against phishing frauds. The Toolbar also Traps suspicious URLs containing characters which have no common purpose other than to deceive. Enforces display of browser navigational controls (toolbar & address bar) in all windows, to defend against pop up windows which attempt to hide the navigational controls. Clearly displays sites' hosting location, including country, helping you to evaluate fraudulent urls.....(free).....
NetiExpress helps newbies and lazy people to configure Outlook Express in order to not send emails in HTML format. NetiExpress is a small and convenient software written in C, ready to be forwarded by email to people who send HTML email only because it's the OE default configuration.....(free).....
Perfect tool for small companies. Each user on network can say on his PC whether he wants to be connected to internet. If no one wants the connection is hanged up. All users see the current connection status and time they had been connected.....(free).....
A multi-threaded IP, SNMP and NetBIOS scanner with a modern interface and several advanced features. It is intended for both system administrators and general users who are interested in computer security. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden). In addition, it allows you to mount shared resources as network drives, browse them using Windows Explorer, filter the results list and more .....(free).....
Nockylock is a freeware program that locks the keyboard and locks the mouse.....(free).....
Runs hidden in the background until it detects any kind of change in a directory it has been told to monitor. When a change occurs (e.g. create, delete, modify a file) it visually alerts the user. Can be used, for example, to detect incoming information over a network or to detect tampering of files. Uses very little memory and practically no CPU time (Go to Downloads).....(free).....
NT File Recovery is a quick and effective solution to restore accidentally deleted files from NTFS file system. The software supports recovering all types of files like documents, applications, media files etc. NT File Recovery can be installed on and run from flash drive (USB), so that the risk of overwriting your data is minimized.....(free).....
When you distribute an Office document electronically, the document might contain information that you do not want to share publicly, such as information you?ve designated as ?hidden? or information that allows you to collaborate on writing and editing the document with others. The Remove Hidden Data add-in is a tool that you can use to remove personal or hidden data that might not be immediately apparent when you view the document in your Microsoft Office application. With this add-in you can permanently remove hidden and collaboration data, such as change tracking and comments, from Word 2003/XP, Excel 2003/XP, and PowerPoint 2003/XP files.....(free).....
What a seasoned computer technician brings to on-site computer repairs .....(free).....
OneClick Hide Window helps you to hide all active program windows immediately by clicking left mouse buttons. You can hide the browser window, folder windows, app windows, anything.....(free).....
The AutoRun function in Windows can launch installers and other programs automatically when you insert a CD or flash drive, but this convenience poses a serious security risk. Unfortunately, simply turning off AutoPlay, a separate feature, isn't enough to prevent AutoRun from introducing a rogue program into your system .....(free).....
Got a file via e-mail and don't know how to open it? Downloaded a document and don't know what archiver was used to compress it? Let's try to see what we can tell you about it!.....(free).....
Never rely on one single product only, but that said, this could be a good supplement for your Spybot or AdAware program.....(free).....
ManageEngine OpUtils is a comprehensive set of unique system and network monitoring tools. This web-based software helps network engineers monitor, diagnose and troubleshoot their IT resources. Network engineers and IT operations staff managing large networks would find this toolset very useful and handy, especially during troubleshooting. The free edition of the OpUtils product includes the following 25 tools: Ping, enhanced ping, ping scan, snmp ping , snmp scan, proxy ping , trace route , dns resolver, dns scan, mac address resolver, mac address scan, node calculator, subnet list, subnet calculator, system information, disk space monitor, cpu monitor, process scan, software scan, ip node browser, mib node viewer , mib module viewer, snmp walker, snmp graph, trap receiver, mib browser.....(free).....
Taking a few minutes to unbundle your DNS service from your ISP Internet connection means a safer, faster, smarter and more reliable Internet experience.....(free).....
Being in a Private Mode while surfing the Internet is a must nowadays, above all if you surf from a public computer. But even in your house is safer to surf without leaving any fingerprints (anonymously), because you don?t want your geeky children find out the number of your credit card and use it to buy one hundred hamburgers from McDonald.....(free).....
Highly secure and functional password manager. Open source.....(free).....
Outlook Express Backup Free is software to backup your Outlook Express email database. This freeware will helps you to backup your mail-boxes and basic settings of your Outlook Express. To restore backup file, please use Outlook Express Restore Wizard, also free from this site .....(free).....
Back up a system's Outlook Express files and settings in case of some unfortunate accident. It is not a program for transferring OE from computer to computer unless you wish to do a bit of editing, which can easily be done if you are savvy enough. If you just need to be able to transfer the DBX files to another computer, it of course will back them up so you can IMPORT then into the second system.....(free).....
PacketProtector is a Linux distribution for wireless routers, built on top of OpenWrt. The goal of this project is to transform the router into a unified threat management device. Here's what you get- a stateful firewall (iptables), WPA/WPA2 Enterprise wireless (802.1X and PEAP with FreeRADIUS), intrusion prevention (Snort-inline), remote access VPN (OpenVPN), content filtering/parental controls (DansGuardian), web antivirus (DG + ClamAV), anti-phishing (OpenDNS), automatic updates (for Snort and ClamAV), a local certificate authority (OpenSSL), secure management interfaces (SSH and HTTPS), advanced firewall scripts for blocking IM and P2P apps, IP spoofing prevention (Linux rp_filter), basic protocol anomaly detection (ipt_unclean), Each of these services is automatically bootstrapped and configured with sensible defaults. A secure web interface makes common configuration tasks as simple as a point and click. All you need is a Linksys WRTSL54GS or ASUS WL-500g (Deluxe or Premium) router, and a USB 2.0 drive with 100MB of free space.....(free).....
PacketTrap free network management tools are comprehensive, effective and intuitive. IT organizations around the world rely on our network management tools every day, why shouldn't you? .....(free).....
Pandora Recovery is a powerful free tool that provides its users an effective way to attempt recovery of permanently deleted files. And that does not mean restoration of a file from Recycle Bin. Pandora Recovery actually recovers files permanently removed from Recycle Bin, files originally deleted using Shift + Delete keys bypassing Recycle Bin and files deleted from DOS prompt. Pandora Recovery is not a backup tool - it can recover files that have been deleted months before Pandora Recovery was installed. And while the likelihood of successful recovery is negatively affected by the time passed since the deletion of files Pandora Recovery users were able to recover files deleted more than five years after deletion.....(free).....
The program can attach any desktop window to one of the screen edges and auto hide it. (Hidden panels will work like the windows TaskBar).....(free).....
The Parallel Port Monitor is a utility for viewing and manipulating the state of a parallel port on a Windows 95/98/ME/NT/2000 computer .....(free).....
Prevent others from adjusting your PC settings, or from viewing certain web sites.....(free).....
Partition Rescue backs up your disk's partition system to floppy disk. If your disk's partition system gets damaged you can restore it by booting your system using this rescue disk. It can recover your disk from damaged partition table, missing partitions, virus attack etc.....(free).....
With this program you could save all data on a partition to a file (such as you could save this file on a CD for example). Then if something goes wrong, you can completely restore the partition from the backup file. You no longer have to reinstall every piece of software from scratch. All you have to do is restore the partition from the backup file and then update any software that was modified since the backup was created. Partition Saving is able to compress data (using the gzip compression algorithm) and split it up into several files (e.g. if you need to save a 2 Gb partition onto a CD, this can be done by compressing it and, if necessary, splitting it up into 650 Mb files). Most partition types are supported. In the case of FAT (12, 16 and 32), ext2/3 and NTFS partitions, you can choose between saving all sectors or in-use sectors only.....(free).....
Create a password protected central repository for all your user names and passwords. All passwords are encrypted using the Blowfish algorithm. All your data is stored on an xml file. Since Passfile does not write any information to your registry or any ini file one can copy the file to a removable media such as CD-RW, USB memory stick and carry all your passwords around.....(free).....
Password manager with a clean, easy to use interface and strong encryption.....(free).....
With Password Safe, a free Windows utility designed by Bruce Schneier, users can keep their passwords securely encrypted on their computers. A single Safe Combination--just one thing to remember--unlocks them all. Password Safe protects passwords with the Twofish encryption algorithm, a fast, free alternative to DES. The program's security has been thoroughly verified by Counterpane Labs under the supervision of Bruce Schneier, author of Applied Cryptography and creator of the Twofish algorithm.....(free).....
The PC Decrapifier will uninstall many of the common trialware and annoyances found on new PCs from OEMs.....(free).....
Instructions for getting around blocking software, including an interesting program, Circumventor .....(free).....
Periscope is a PE file inspection tool. For example you can use it as an aid when you are looking for malicious code in files .....(free).....
A free network firewall designed to protect your PC against attacks from the Internet or via a local area network. SoftPerfect Personal Firewall offers customizable security using user-defined rules for packet filtering. It supports multiple network adapter configurations. The program is easy to use, comes with a set of predefined rules and it is completely free. Additional features include password protection, logging and more.....(free).....
Executable code steganography. It embeds text into windows exe files using interchangeable assembly opcodes.....(free).....
Fill up your hard drive. Why? Some old applications and games won't install or work properly if they detect that your hard drive has more than 2GB or 4GB free, depending on how they were written. This is because those programs were written in the days when most people didn't even know what a gigabyte was. Another reason you might need to temporarily fill up your drive is that developers often have to stress-test their applications or installer routines to ensure they work gracefully when a PC is very low on disk space. Finally, the only way to truly permanently erase data on a hard drive is to overwrite it with other data. Simply reformatting your drive is not enough.....(free).....
According to the author, "The astounding response to the first MailFrontier Phishing IQ test, taken by over 225,000 people, successfully raised "phishing" awareness to an all-time high. But with phishing emails increasing daily, it's time for a whole new challenge: the MailFrontier Phishing IQ Test II. We're back with 10 new suspect "phish" fresh from our collection ? all actually received by real people like you. Whether you're brand new or a repeat tester, the question is the same: If you received one of these emails in your inbox ? what would you do?".....(free).....
System Monitoring, Configuration Management, and More. PIKT is cross-categorical, multi-purpose software for monitoring and configuring computer systems, administering networks, organizing system security, and much more. PIKT is intended primarily for system monitoring, and secondarily for configuration management, but its versatility and extensibility evoke many other wide-ranging uses.....(free).....
Feature-rich Windows program for safe and comfortable storing of any secure information like passwords, accounts, PINs etc. PINs uses a secure 448 bit Blowfish algorithm to ensure the data are not crackable. The password used for securing access to stored data is not saved anywhere. PINs does not require installation and does not need any special dlls, drivers or system files which can mess up your system. This means that PINs can run directly from floppy - including data files - without installing anything. This is extremely useful if you wish to easily access your data on other computers as well.....(free).....
Plax Network Suite is an easy to use collection of network tools which give you full control over the internet activity of your computer. Designed for quick access, the Windows Firewall button provides an instant ON/OFF switch for Windows XP Firewall. Designed to integrate with Windows, and be powerful but simple to use, Windows Firewall operates deep under cover, without bothering you at all. It can help stop viruses and worms reaching your computer, ask for permission to block or unblock certain connection requests from applications and software, and create a security log if required. It's an automatic first line of defense for those who don't have any other software installed. Just in case you need and instant internet lockdown, Plax Network Suite offers the possibility to block all internet connections by the flick of a button. This works like an Internet shield preventing any hacker or spyware reaching your computer. Whenever you want to cloak your computer IP address, Plax Network Suite can instantly block all inbound ping connections. This prevents other users from knowing if your computer is online or not. Perhaps one of the most popular features of Plax Network Suite is the visual report of all open TCP/IP and UDP ports and the mapping to the owning application. This can be used to quickly identify unknown open ports and their associated applications. The software provides detailed information about every network connection: Protocol, Process ID, Process Name, Local Address, Local Port, Remote Address, Remote Port, and Connection State. They say ?the best defense is a good offense? and Plax Network Suite provides you with an active reconnaissance tool: the port scanner. Simply enter the IP address to be scanned and the range of ports and within seconds you find out which ports are open on the target PC .....(free).....
Simple, tiny, barebones, GUI-free tool for controlling popups in Internet Explorer.....(free).....
POP Peeper is an email notifier with several options that will decrease or eliminate the risks of reading your email (viruses, javascript, webbugs, etc). POP Peeper can be run from a portable device and can be password protected. Many notification options are availble to indicate when new mail has arrived, such as sound alerts (configurable for each account), flashing scroll lock, skinnable popup notifier, customized screensaver and more.....(free).....
Port Reporter logs TCP and UDP port activity on a local Windows system. Port Reporter is a small application that runs as a service on Windows 2000, Windows XP, and Windows Server 2003. On Windows XP and Windows Server 2003 this service is able to log which ports are used, which process is using the port, if the process is a service, which modules the process has loaded and which user account is running the process. On Windows 2000 systems, this service is limited to logging which ports are used and when. In both cases the information that the service provides can be helpful for security purposes, troubleshooting scenarios, and profiling systems? port usage.....(free).....
Portinator is a Windows command line utility to monitor local network port usage for changes. By setting a baseline and running Portinator at various intervals, the user can be notified by email or view a log file of any changes to network port usage on that machine. Portinator has several options to aid in reducing noisy emails. Portinator uses md5 checksums to help in identifying/monitoring applications using ports (can be useful in identifying .exe changes such as trojans).....(free).....
Portmon is a utility that monitors and displays all serial and parallel port activity on a Windows system. It has advanced filtering and search capabilities that make it a powerful tool for exploring the way Windows works, seeing how applications use ports, or tracking down problems in system or application configurations .....(free).....
The Print Logger FE software is intended for a print management (print control and audit printing activity) for printers at print workstation, based on Windows NT operation systems family. At this time this family includes Windows 2000/XP and Windows Vista. The program inspects the print jobs on a computer, where software is installed. Main assignment of the program - collection of the information about sizes (in pages) for local print jobs and record it to the database for the subsequent analysis or creation reports about printing activity .....(free).....
The PrivacyBar toolbar offers a complete set of privacy and security tools with Easy Access, providing Instant Security Controls with a mouse click. No more digging in preferences menus or editing complicated configuration screens. Just point to the toolbar, select the privacy and security options you require: light to paranoid, and surf .....(free).....
Privacy Mantra cleans your computer from online and offline tracks. Most people are unaware of that every web site they have visited remains in the undeletable index.dat file, even after the Internet history and cache has been removed. Your system is also keeping information of executables you run, movies you watch and documents you open. Some of these prints can't be deleted manually as they are locked by the system. Privacy Mantra will erase and wash away most privacy threats in your machine including, Internet history, cache, cookies, index.dat files, auto-complete forms, search assistant, recent documents, open/save dialogs, run files and more. Privacy Mantra allows the user to easily download the latest database of threats. It will not only protect your privacy but also free disk space by deleting junk files. Privacy Mantra is Windows NT/2000/XP/2003 compatible.....(free).....
Enhances the functionality of Windows Task Manager by providing a security risk rating, a process description, and file path. The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger.....(free).....
This program scans devices on your local network or the Internet to determine if they are accessible from your computer. Use it to Quickly determine if there is a problem on your home or small business network, Identify and locate intermittent network problems, Monitor your favorite web servers to see if they are up or down. The program uses the ECHO protocol to test each device at regular intervals and displays the devices status in the main window. A log file records status changes of each device, providing useful troubleshooting information. If a computer can not be reached, the reason why is displayed in the status column.....(free).....
Program Protector is state of art security utility, which allows you to password protect programs. You can password protect any Windows application. This functionality is achieved by modifying executable file of the application, so that it requires to enter valid password before program can start.....(shareware, $18.95 after trial).....
Protect Folders is a utility to prevent malicious users from unwanted access to your sensitive data. The free version can protect three folders, five megabytes each.....(free).....
Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system secure. (Must give an email address to dl).....(free).....
Protowall is a lightweight program that runs in the background, taking up little CPU and memory, while blocking thousands of bad IP addresses. In Protowall, all the work is done by the driver that filters each packet, extracts the IP header and then compares the address with the ones in the table, then either discards or permits the packet to pass. The GUI is essentially a "driver instructor" that communicates to the driver the IP list to check against. The GUI also receives notifications from the driver when a packet arrives and when actions are performed with a packet. Protowall Blocks both inbound and outbound packets. Protowall blocks incoming packets from Internet addresses that are on the Bluetack Blacklists.....(free).....
Free, highly flexible, user-configurable, small but very powerful, local HTTP web-filtering proxy .....(free).....
Simple change to the configuration of your web browser, setting it such that it avoids making connections to banner advertisement servers and avoids downloading ad images. If your browser can't connect to the advertisement server, it can't show you the ad image. The trick behind this is that it uses a mechanism already built into most recent browsers (IE, Netscape, Mozilla, and Opera) and available on most platforms (Windows, Mac, UNIX) .....(free).....
Proxy Changer is a windows program that runs in the system tray and allows you to quickly change between proxy servers, or to quickly change proxy settings. Simply setup proxy servers in the program and set one as default and one as an alternate to be able to quickly switch between them. Can also enable and disable proxy, set to automatically detect settings, or to use the automatic configuration setting, all from the system tray within a few clicks. Ideal for users who use a laptop between home and work, or for anyone who needs to quickly and effortlessly be able to change a proxy setting in IE. All settings are changed on the fly without the need to restart Internet Explorer .....(free).....
It takes way too many clicks to turn your Internet Explorer proxy on and off. After installing ProxyPal, just add it to your IE toolbar and you have one click access to toggle your proxy. This is very useful for corporate latptops that connect to the Internet away from work. Install ProxyPal today to put an end to seven-clicking your proxy on and off.....(free).....
If you ever needed to switch between different proxy servers while surfing the net, then this program is for you, it allows you to define list of proxy servers and switch between them just in a couple mouse clicks.....(free).....
ProxyWay is a free proxy server agent which you can use together with your web browser to ensure your anonymity when you surf the Internet and download files: anonymous proxy surfing, changing computer information that is sent out by your web browser. ProxyWay provides an extended proxy management system that enables you to search for, analyze, validate proxy servers and create proxy chains.....(free).....
There are times when you want to be sure that no one can listen to your online conversations. Whether exchanging credit card numbers, or discussing sensitive corporate material, or sharing delicate personal information, you need to be sure of your privacy. Most chat and instant messaging programs route your communications through central servers, and/or relay your messages in plain text for all to see. Enter PSST... With PSST, your private messages don't go through any server - they are peer to peer, direct from your PC to the PC of the person you're talking to. Also, they're encrypted, meaning that nobody without a lot of expensive resources can eavesdrop on you. All encryption is handled automatically in the background, so you don't have to mess around with complicated keys and so forth.....(free).....
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator.....(free).....
Fast way to change your proxy settings in IE. Enable or disable the proxy, or set it to a default setting or an alternate setting. Minimizes to the system tray where you are only a right-click away from changing the setting. Great to use if you need to change your proxy often. (You may need to restart IE when you change the proxy for the change to take effect) No need to install, runs right from the exe file. Requires the .NET Framework from Microsoft.....(free).....
Existing SFV file verification programs are slow and cumbersome to use. Most users need to verify files and the quicker, the better. QuickSFV integrates into the Windows Explorer shell and makes it very easy to verify files. Just double-click on the .SFV file and QuickSFV does the rest. QuickSFV also understands several other file verification formats including .CRC, .CSV and .CKZ .....(free).....
File recovery utility for the Ext2FS partitions used in the Linux OS and several Unix. Runs on Windows. Recovered data can be written to any disk visible by the host OS .....(free).....
This program copys a disk as a raw image from one drive directly to another. This utility is designed for people who have faulty drive and want to transfer the data directly to another drive without doing a file by file copy. This saves the need for operating system re-installs and allows drives with an unknown file system to be copied (including from console game machines, data recorders, mac etc). The program has a built in data recovery function which will attempt to recover data from bad sectors to ensure all the available data is restored from the drive. This program is designed to run under NT/XP/2000 or later operating systems. It will run under windows 95/98/Me operating systems but only windows logical drives can be copied.....(free).....
Run Windows XP from CD. Reatogo?s fully configured download bundle for a bootable Recovery-CD with BartPE+XPE. ...burn your first CD within a few minutes and enjoy the comfort of a full XP environment for your recovery needs! One click setup, all included fully configured and ready to go.....(free).....
KutinSoft Reboot Service was designed in order to reboot a server distantly.....(free).....
Each time that you open a file the name of the file that you opened is recorded by the operating system in the Recent folder or the Registry. This utility displays the list of all recently opened files, and allows you to delete unwanted filename entries. You can also save the files list into text/html/xml file.....(free).....
Any time a program or Windows crashes, any files that were open are not closed properly. Part of closing is writing all the file location information in all the right places. Without this info, Windows can't find all the parts of the file. When scandisk or chkdisk is run, all the parts are identified as "lost file fragments" and converted (if you want) into CHK files. These can then be recovered.....(free).....
Recover Files is a professional file recovery software that allows it's user to recover accidentally deleted files. Even files removed from the Recycle Bin, network drive, compact flash card, portable drives, in a DOS window, or from Windows Explorer with the SHIFT key held down.....(free).....
Generate .reg file from Registry changes made by application. RegFromApp monitors the Registry changes made by the application that you selected, and creates a standard RegEdit registration file (.reg) that contains all the Registry changes made by the application. You can use the generated .reg file to import these changes with RegEdit when it's needed .....(free).....
Users gradually experience a degradation in their Windows performance. Much of it can be attributed to Windows Registry Errors. By using Free Window Registry Repair regularly and repairing your registry your system should not only be more stable but it will also help Windows run faster. For your convenience it automatically backs up any repairs made so that you always can restore Windows registry to the original state.....(free).....
MJ Registry Watcher is a simple system tray program that monitors for changes to any of the startup folders, startup registry keys, and any files you want alerting on.....(free).....
Remote Memory Info displays remote network computer memory usage and statistics .....(free).....
Remove Toolbar Buddy is an essential utility to delete unwanted toolbars and other Internet Explorer add-ons such as buttons, menus and browser helper objects.....(free).....
Your virus scanner and firewall cannot stop a script on a page you are viewing from changing your Internet setting or your home page. Repellent can! Your virus scanner cannot delete Cookies, Repellent can! You can surf the Internet in confidence, no one can tell where you have been unless you want them to. Repellent can delete all Cookies as they download. Repellent can solve all your email and Internet virus worries with the click of a button. You can disable all VB and Java applets and scripting, as well as all Registry files. You can disable all JS, JSE, WSH, VBS,VBE, VB,PIF, SCR, BAT, files from running, and more.....(free).....
Automatically backup files, directories, even entire drives! Karen's Replicator copies selected files from one drive/folder to another. Source and Destination folders can reside anywhere on your network. Options include repeated copies at intervals as short as a few minutes, or as long as several months, copy only files that have changed, and the replication of folder and file deletions. New features allow you to specify which files should not be copied, and also which days a file should be skipped.....(free).....
Tells you how to obtain the unmodified body of emails including HTML codes if any and MIME information.....(free).....
Tools, challenges, essays, and a message board, all pertaining to reversing .....(free).....
Password Manager and Web Form Filler that completely automates password entering and form filling. RoboForm was named PC Magazine Editor's Choice, and CNET Download.com's Software of the Year. RoboForm: Memorizes your passwords and Logs You In automatically. Fills long registration and checkout forms with one click. Encrypts your passwords to achieve complete security. Generates random passwords that hackers cannot guess. Fights Phishing by filling passwords only on matching web sites. Defeats Keyloggers by not using keyboard to type passwords. Backs up your passwords, Copies them between computers. Synchronizes passwords between computers using GoodSync. Searches for keywords in your passwords, notes and Internet. Portable: Pass2Go RF runs from USB key, no install needed. PDA-friendly: sync your passwords to Pocket PC and Palm. Neutral: works with Internet Explorer, AOL/MSN, Firefox .....(free).....
List of free so-called security products that are, in fact, malware or are of unknown, questionable, or dubious value as anti-spyware protection.....(free).....
View the Syslog from your Router. With Portinfo and View advanced IP information. Systray with log info as hint. Memory use in Systray mode ~560kb. Can save as daily syslog_date.txt. Go to English freeware .....(free).....
RunAsAdmin is a tool that lets administrators keep and easily use their administrative rights but still enjoy the safety of using less privileged accounts.....(free).....
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn't change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application. You can run multiple applications simultaneously, each application works with different date and time, while the real date/time of your system continues to run normally .....(free).....
RunScanner is a complete free windows system utility which scans your system for all configured running programs. You can use runscanner to detect autostart programs, spyware, adware, homepage hijackers, unverified drivers and other problems. You can import and export your results and let other people help you to solve your problems. Upload of reports and check with the online database.....(free).....
Firefox Add-on segments the cache on the basis of the originating document, defending against web privacy attacks that remote sites can use to determine your browser history at other sites .....(free).....
SafeDelete is an advanced security tool for Windows that allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. The patterns used for overwriting are based on Peter Gutmann's paper Secure Deletion of Data from Magnetic and Solid-State Memory and are selected to effectively remove magnetic remnants from the hard drive. Other methods include the one defined in the National Industrial Security Program Operating Manual of the U.S. Department of Defence, and overwriting with pseudorandom data. You can also define your own overwriting methods. Delete any file using a variety of overwrite patterns.. Comply with the Department of Defense and the Gutmann overwipe pattern. Ability to encrypt and decrypt files using the super-strong AES 256-bit encryption.....(free).....
Safe XP allows users to quickly tweak various security and privacy related settings in XP. The options include Media Player settings, Services settings (error reporting, time synch, remote registry etc.), as well as and option to remove items from the Start menu, network security settings and more. Safe XP improves your system performance and makes Windows run faster, more secure and reliable! It is suitable for beginners and experts. CAUTION--This program automatically changes many settings in your Windows config. You may not know which settings are changed. And some have indicated there may be problems restoring the system.....(free).....
Safety.Net offers Internet security, content security and advanced Internet firewall protection for all your LAN computers, and trust controls to block unwanted or harmful applications from accessing the network. You can define granular user or computer specific access controls based on site, content, PICS ratings and time of day. You can monitor connection level network activity round-the-clock and view detailed reports to analyze traffic and usage patterns. Free for non-commercial use.....(free).....
SanityCheck is an advanced rootkit and malware detection tool for Windows which thoroughly scans the system for threats and irregularities which indicate malware or rootkit behavior. By making use of special deep inventory techniques, this program detects hidden and spoofed processes, hidden threads, hidden drivers and a large number of hooks and hacks which are typically the work of rootkits and malware. It offers a comprehensible report which gives a detailed explanation of any irregularities found and offers suggestions on how to solve or further investigate any situation (Go to Free Downloads).....(free).....
Some (read: many) programs do not support auto save. This program saves your work every X minutes, and all you have to do is specify when and give the application title (if you don't, the program saves your work in the current application). Note: If pressing Ctrl+S does not save in an application, Saver will not either.....(free).....
Very tiny secure notepad: a notepad and file cipher utility. Uses AES-256 and SHA-256 encryption - with such a level of key size, your data are top-secret protected.....(free).....
These are Firefox bookmarklets to aid in security auditing. Click and drag the extentions up to the bookmarks toolbar and click them to perform the intended action when you find a site that you'd like to begin auditing. These were coded up by random people in random places but collected for useful security bookmarklets for by-hand auditing purposes......(free).....
ABC Security Protector is a nice free password protected security utility, which enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, reliably protected by the password and excellent online help is also available.....(free).....
The Threats and Countermeasures Guide contains detailed information about relevant security settings that can be configured on Microsoft Windows Server 2003 and Windows XP.....(free).....
This extension allows you to save the current state of Firefox (history, text data, cookies) and return to that state at any later moment. Besides the manually saved states, Session Manager automatically stores the current state in case of a crash. All sessions are stored in the "sessions" folder inside your profile directory and can be moved around as any other file. To get to that folder, simply select "Open Session Folder" in Session Manager's menu (might not work on all OSes). Finally, Session Manager also allows to reopen the 10 last closed windows and tabs.....(free).....
Manually set the default Windows web browser.....(free).....
Essentially it boils down to this: Windows XP comes with a bunch of pre-loaded software. Lots of it you can't even find in Add/Remove programs. Why? Because Microsoft designed it this way.....(free).....
Shutdown screensaver powers down the computer after 2 minutes from startup. It works on all versions of Windows. It can be very useful if it happens often to you to forget turning off your machine. It displays number of seconds left to shutdown. You can terminate the countdown by deactivating screensaver .....(free).....
Tax records, resumes, photo albums--the modern hard drive can keep increasingly larger volumes of information at the ready. But that can turn into a problem when it comes to effectively erasing the devices. There are a number of options for cleansing the drives of unwanted computers, from special wiping software to destruction services to manufacturers' recycling programs. But what many PC owners don't realize, experts say, is that these methods are often not enough.....(free).....
Smart Email Recovery offers an easy way to recover deleted email and corrupted email databases in Microsoft Outlook Express. The innovative technology allows for fully automatic operation, and recovers deleted messages quickly and efficiently. Unlike competition, Smart Email Recovery does not depend on the DBX header when scanning the mail database for messages (Go to Products).....(free).....
Make your PC run faster and ensure problem-free operation, protect your security and recover lost data with the only software suite you'll ever need! Fix your computer yourself and make it load and run faster in a few easy steps. Clean up registry errors and take care of viruses and spyware, ensure your personal privacy and recover deleted files. Do all that and more with Smart PC Suite.....(free).....
Open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more .....(free).....
SocketSniff allows you to watch the Windows Sockets (WinSock) activity of the selected process. For each created socket, the following information is displayed: socket handle, socket type, local and remote addresses, local and remote ports, total number of send/receive bytes, and more. You can also watch the content of each send or receive call, in Ascii mode or as Hex Dump .....(free).....
Network scanner runs from a USB stick -- SoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and several advanced features. It is intended for both system administrators and general users who are interested in computer security. The program pings computers, scans for listening TCP ports and displays which types of resources are shared on the network (including system and hidden). In addition, it allows you to mount shared folders as network drives, browse them using Windows Explorer, filter the results list and more. SoftPerfect Network Scanner can also check for a user-defined port and report back if one is open. It can also resolve host names and auto-detect your local and external IP range. It supports remote shutdown and Wake-On-LAN. It is absolutely free, requires no installation.....(free).....
Eliminates hidden applications and processes. Removing rootkits without compromising system integrity is particularly challenging and needs to be done with care. Our free software, Sophos Anti-Rootkit, finds and removes any rootkit that is hidden on your computer. What is a rootkit? The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.....(free).....
Ever worry that the code that you are downloading is malicious? Verify the code before you run it, with Source Search. Just drag and drop your project file onto the form and let Source Search check out the code against a customizable search dictionary. It will also enumerate through your project file to make sure that all referenced components are scanned. I have included a basic dictionary with the project.....(free).....
Spacetornado Killer is a free Windows utility that allows you to kill multiple running Windows processes at once, with one click of a button.....(free).....
The best spam stopper we've found. Works from the server. SpamAssassin is a mail filter to identify spam. It is an intelligent email filter which uses a diverse range of tests to identify unsolicited bulk email, more commonly known as Spam. These tests are applied to email headers and content to classify email using advanced statistical methods. In addition, SpamAssassin has a modular architecture that allows other technologies to be quickly wielded against spam and is designed for easy integration into virtually any email system.....(free).....
Enter your email address to convert it into unicode for use on a web site. This makes it hard for spam bots to read your email address .....(free).....
Site devoted to phishing scam news, including a list of the most recent reported schemes. According to the site" Scammers are sending masses of spoof or fake email out in an attempt to acquire eBay, Paypal, AOL, Yahoo, Earthlink, MSN, Microsoft, AT&T, Hotmail, FDIC, MBNA, Citibank, Barclays iBank, Nat West, Bank One, Nationwide, Halifax and Fleet Bank users' identities, passwords, credit card numbers and pins and bank account details to commit fraud".....(free).....
Keeping the data in and the riff-raff out! Spyware on-access scanner.....(free).....
Stop Web Sites from installing Spyware, Sleazeware and Cookies on your PC. SpySites includes a database of over 4,600 known Spy/Sleaze sites and guides you through the simple process of including them in Internet Explorer's Restricted Zone and setting policies to prevent them from performing intrusive acts on your PC. By setting the policies for the Restricted sites zone to a very high level of security, you can be assured that any web sites added to the Restricted sites zone cannot do certain things which could compromise your privacy and security .....(free).....
Application that when it is running it simply monitors system folders for any new exe or dll being added or renamed.....(free).....
SpywareBlaster doesn't scan and clean for spyware - it prevents it from ever being installed. How? By setting a "kill bit" for the CLSIDs of spyware ActiveX controls, it prevents the installation of any of them from a webpage. You can run Internet Explorer with Active-X enabled, but you will never even get a "Yes/No" box popped up, asking you to install a spyware Active-X control (Internet Explorer will never download or run it!). All other Active-X controls or plug-ins will work fine. The SpywareBlaster database contains information on these known spyware Active-X controls. Make sure you run the Check For Updates feature frequently to get the latest database! (And make sure you check the new items to protect your system against them!) As a side benefit, setting this "kill bit" will also prevent the spyware Active-X from running, in many cases, if it is already installed on your system.....(free).....
An anti-virus program scans files before you open them and prevents execution if a virus is detected - SpywareGuard does the same thing, but for spyware.....(free).....
The ranks of spyware and adware expand daily, but some take root more often than others. Here are six of the usual suspects.....(free).....
A wealth of resources to help you fight spyware and adware.....(free).....
Password manager, and login robot. Once installed SSO Plus will store all IDs and passwords you enter. Then you return to your previously visited login screen, you will find SSO Plus has already entered your ID and password, ready for you to logon .....(free).....
Stealth Web Page Recorder is a simple spy software utility for web page recording. This program will be useful if you want to record e-mail messages of any Web Mail service. Also it can record contents of password protected pages and web pages which use secure HTTPS connection. It is absolutely undetectable after the installation. Stealth Web Page Recorder stores the text of web pages visited and lets you easily review the saved information later. It has convenient user interface similar to the History bar in the Internet Explorer. You can configure program to record all web pages or only user defined. Note: the program works only with Internet Explorer.....(free).....
Steel Run-As helps you in executing audit commands or any kind of application which runs properly when run only with administrator privileges without having to give the user full rights to his machine. For example "Some CD writing" applications run properly only when run in administrator mode or with any other username with those credentials. Steel Run-As lets you give access to the user to run that application with administrator credentials without making him into a administrator equivalent account. Steel Run-As supports file CRC checking. This ensures the credibility of the target program. Misuse of the targeted program is not allowed. Steel Run-As outputs a single executable ".exe" and does not need any installation in the target machine. Steel Run-As also doesn't need any extension through command line.....(free).....
This guide explains how to implement the security measures recommended in the Microsoft Windows XP Security Guide in a small or medium business environment without an Active Directory directory service deployment. These recommendations help ensure that your desktop and laptop systems running Windows XP Professional Service Pack 2 (SP2) are more secure from the majority of current security threats.....(free).....
Control programs that start with Windows .....(free).....
When the Windows Media Player 9 starts, it calls home to update its radio preset list from the Internet. The network administrator may want to restrict this behavior.....(free).....
Utility that reveals file streams with Windows NT 4.0, 2000, XP, 2003 or Vista. Stream Explorer will show you the number of streams in each file as they are listed per folder. When you select a directory entry, Stream Explorer will list all the streams in that entry, and you can see their type, their size and contents. The unnamed stream is shown as . This new version 1.0.3 will show streams in folders as well, with thanks to J?rgen G?rtner for pointing out that folders can also contain streams.....(free).....
SUPERAntiSpyware is the most thorough AntiSpyware scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware that other products miss! SUPERAntiSpyware will remove ALL the Spyware, NOT just the easy ones .....(free).....
A free runas administrator replacement with total encryption.....(free).....
Switzerland is a tool which will will spot IP packets which are forged or modified between clients, inform you, and give you copies of the modified packets. It is for testing networks, ISPs and firewalls, and was developed by the Electronic Frontier Foundation. Is your ISP interfering with your BitTorrent connections? Cutting off your VOIP calls? Undermining the principles of network neutrality? In order to answer those questions, concerned Internet users need tools to test their Internet connections and gather evidence about ISP interference practices. .....(free).....
SyncBack is a program that helps you easily back up and synchronise your files to the same drive or a different drive or medium (CDRW, CompactFlash, etc); an FTP server; a Network; or a Zip archive.....(free).....
This utility makes an exact replica of files on a machine via the network to another machine. It was designed for load-sharing situations where all the servers need to have a copy of all the files, but can also be used for other situations, for example to publish files from a development machine to a production machine, or to have a backup server standing by that can immediately take over without first having to restore from a backup .....(free).....
The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. The Suite is a bundling of the following selected Sysinternals Utilities:, AccessChk, AccessEnum, AdExplorer, AdRestore, Autologon, Autoruns, BgInfo, CacheSet, ClockRes, Contig, Ctrl2Cap, DebugView, DiskExt, DiskMon, DiskView, Disk Usage (DU), EFSDump, FileMon, Handle, Hex2dec, Junction, LDMDump, ListDLLs, LiveKd, LoadOrder, LogonSessions, NewSid, NTFSInfo, PageDefrag, PendMoves, PortMon, ProcessExplorer, Process Monitor, ProcFeatures, PsExec, PsFile, PsGetSid, PsInfo, PsKill, PsList, PsLoggedOn, PsLogList, PsPasswd, PsService, PsShutdown, PsSuspend, RegDelNull, RegJump, RegMon, RootkitRevealer, SDelete, ShareEnum, SigCheck, Streams, Strings, Sync, TCPView, VolumeID, WhoIs, WinObj, ZoomIt.....(free).....
Free syslog tool. It can simulate networking device such as router, firewall and servers to send TCP and UDP syslog message to syslog server. You can use this free tool to evaluate the performance of your syslog server. SysLog Sender is based on internet standard protocol, which is specified by RFC 3164 and RFC 3195 .....(free).....
System Protect represents an essential supplement of security programs. Extend your Extend your security programs, Prevent accidental file removal. Guard system files, Keep your system stable. Protect personal files, Avoid losing important data. Get deletion attempt alerts, Safeguard protected files/folders. .....(free).....
System Snapshot is a program designed to immediately create restore points for the Windows XP System Restore utility .....(free).....
Removes the entire taskbar from the current logged in user. Stops users from changing Taskbar properties. Stops users from accessing the Start Menu. Stops users from interfacing with icons in the system tray. Easy Setup/Implementation. Starts up from the Hkey_Current_User Run key or Hkey_local_Machine Run key. Runs hidden in the background.....(free).....
TFlasher is a utility to assist in visually comparing images. It allows two images to be displayed side by side. Alternatively, the images can both occupy the same screen area so that only one is visible. In this second mode, you can toggle rapidly between both images, and the pixels that differ will produce a very obvious flickering effect.....(free).....
Maybe you don't care. Or maybe you do.....(free).....
The way Tiny Watcher works is pretty simple: basically, it starts by taking a snapshot of important parts of your Windows system; then it tracks changes (every time you log in, or whenever you want to). When a change is detected, you are notified. For example, you will be notified if a program puts itself in the startup lists of your machine, or if files are modified/created in your Windows directory, etc. Tiny Watcher has been designed to work discreetly. You will barely notice it at logon time: the about box shows for less than 5 seconds, and a progression gauge displays briefly. Both of these windows being optional, Tiny Watcher can run completely silent. Most of the time, you will just forget that it's here. When a suspicious item is detected, however, you will be informed about it. You will be able to decide what to do about it (some items can be disabled or removed right away). For more details, see "The warning window" paragraph. .....(free).....
Disables mouse and keyboard input.....(free).....
Easily enable and disable your network connection from the command prompt. Requires Windows 2000 or higher.....(free).....
Toolbar Chest for Outlook Express will save many of your Outlook Express settings such as Toolbar content, size and position. Toolbar Chest for OE will save window positions, layout settings and many other settings. Get your Outlook Express configuration just the way you like it, back it up with Toolbar Chest for OE, and never worry about having to reload Windows to get it back.....(free).....
ToolbarCop is a browser extensions manager which can disable or eliminate the following browser add-ons selectively from Internet Explorer: Unwanted Browser Helper Objects (BHO), Toolbars (Tool Band), Standard Toolbar buttons, Context menu Extensions, Third-party download managers and Third-party Protocol Handlers and their residual entries remaining in the registry.....(free).....
Make use of all that space on your thumb drive -- 1. Boot a separate operating system, 2. Encrypt your drive, 3. Make a portable MP3 player, 4. Speed up or lock down Vista, 5. Never forget it, 6. Quick launch your workspace, 7. Assemble a PC repair kit, 8. Put on the DemocraKey "computer condom," 9. Sync your data, 10. Assign custom icons .....(free).....
Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.....(free).....
Show disabled pictures in Internet Explorer by clicking them. It is possible to disable showing picture in Internet Explorer in order to make pages load faster and to save traffic. To show the picture you need after that, you have to right-click it, find and select the Show Picture item in the menu. And that?s for each picture. It is okay if you need one or two pictures, otherwise these operations will take a lot of effort, nerves and time ? now it will be enough just to click a disabled picture in order to show it.....(free).....
Traffic Graph is a network analytic tool that examines local area network usage and provides a display of upload and download statistics. The main puropse of the application is monitoring (and counting) the IP traffic between your local area network (LAN) and Internet.....(free).....
Trivial Proxy is a small app that lets you see and log network activity of the any applications(browsers, email clients etc.). So what does that mean in English? Simple, run TrivialProxy and configure it to redirect the local port to the specified host:port; configure the appication to use this port and localhost (it's very easy, there's), and voila! You're seeing and logging the network activity of this application! Supports HTTP (web), HTTPS (secure web), POP3 (recieve mail), SMTP (send mail), NNTP (newsgroups)! It works great with Internet Explorer, Firefox, Outlook, and many more.....(free).....
Windows Firewall may be blocking a program or a service if programs do not respond to a client's request or client programs do not receive data from the server. If Microsoft Windows Firewall is blocking a port that is used by a service or by a program, you can configure the Windows Firewall to create an exception.....(free).....
Free open-source disk encryption software for Windows Vista/XP/2000 and Linux .....(free).....
SSH client for Windows which incorporates powerful SSH port forwarding capabilities, including dynamic forwarding through integrated SOCKS and HTTP CONNECT proxy; support for RSA and DSA public key authentication with comprehensive user keypair management; state-of-the-art terminal emulation with support for the bvterm, xterm, and vt100 protocols; one of the most advanced graphical SFTP clients; an advanced command-line SFTP client; an FTP-to-SFTP bridge allowing you to connect to an SFTP server using legacy FTP applications; WinSSHD remote administration features; single-click Remote Desktop forwarding.....(free).....
The Fire FTP button that will let you access ftp from any toolbar. The clear cache button lets you, guess what, clear private data.....(free).....
UBCD4Win is a bootable recovery CD that contains software used for repairing, restoring, or diagnosing almost any computer problem. Our goal is to be the most complete and easy to use free computer diagnostic tool. Almost all software included in UBCD4Win are freeware utilities for Windows.....(free).....
Undelete Plus is a quick and effective way to retrieve accidentally deleted files, files removed from the Recycle Bin, in a DOS window, from Windows Explorer with the SHIFT key held down. Undelete Plus works under Win 95/98/Me/NT/2000/XP/2003/Vista operating systems. The program supports all Windows file systems for hard and floppy drives including FAT12/16/32,NTFS/NTFS5 and image recovery from CompactFlash, SmartMedia, MultiMedia and Secure Digital cards. For a limited time Undelete Plus is FREE Software for general non-commercial use.....(free).....
Recovers files which have been deleted from Windows or DOS which are not recoverable from the recycle bin. Undelete supports FAT and NTFS file systems UPDATE--sorry, our mistake, looks like this is shareware, not free.....(free).....
Automatically hide a window's buttons and other controls .....(free).....
Free book about the hacking phreaking scene. Underground: Tales of hacking, madness, obsession on the electronic frontier. Available in multiple formats, including audio in mp3.....(free).....
Unknown Devices helps you find what those unknown devices in Device Manager really are. By checking Device Manager for unknown devices and extracting information from it, this program attempts to figure out what the device is. You might not have to open your case or look up random numbers off of PCI cards to figure out what they are.....(free).....
Unname removes the name of a file, leaving only the extension. Since Windows hides certain extensions (namely LNK and URL), removing the name of such a file would leave it nameless, or unnamed. This is ideal for completely hiding the filename of a shortcut on the desktop.....(free).....
Recovers files from disks with physical damage. Allows you to copy files from disks with problems such as bad sectors, scratches or that just give errors when reading data. The program will attempt to recover every readable piece of a file and put the pieces together. Using this method most types of files can be made useable even if some parts were not recoverable in the end.....(free).....
Cause neighbors who are stealing your wireless internet to view the net upside down.....(free).....
The User Agent Switcher extension adds a menu and a toolbar button to switch the user agent of the browser. It is designed for Firefox, Flock, Mozilla and Seamonkey, and will run on any platform that these browsers support including Windows, Mac OS X and Linux.....(free).....
The User Profile Hive Cleanup service helps to ensure user sessions are completely terminated when a user logs off. System processes and applications occasionally maintain connections to registry keys in the user profile after a user logs off. In those cases the user session is prevented from completely ending. This can result in problems when using Roaming User Profiles in a server environment or when using locked profiles as implemented through the Shared Computer Toolkit for Windows XP. On Windows 2000 you can benefit from this service if the application event log shows event id 1000 where the message text indicates that the profile is not unloading and that the error is "Access is denied". On Windows XP and Windows Server 2003 either event ids 1517 and 1524 indicate the same profile unload problem. To accomplish this the service monitors for logged off users that still have registry hives loaded. When that happens the service determines which application have handles opened to the hives and releases them. It logs the application name and what registry keys were left open. After this the system finishes unloading the profile .....(free).....
Straightforward, step by step help guide explaining how to use it with a minimal amount of disk space, what it does and how it works. System Restore can return your system to an earlier state if problems are caused by a program you installed, malicious web sites, recovery of deleted files even after you've emptied the Recycle Bin, a corrupted Registry as well as many other common problems. By using it regularly you'll always be able to fix a problem in minutes. The article is available for viewing online and as a downloadable Help file (.chm) for installation on your PC.....(free).....
Video Ads Blocker (VAB) increases browsing speeds by up to 300 percent. It reduces the amount of incoming traffic and web page loading time by blocking the most annoying Internet ads without loading. VAB can block advertisement in the forms of: Inline videos, Background sounds, JAVA Applets, Animated gif files, Macromedia Flash movies. By default everything except background sounds and animated gif files are blocked. To block or allow any form of advertisement choose ?No? or ?Yes? respectively. For the program to work it has to be in a ?Monitor? state. To turn the program on, click Monitor button. Program?s icon will change from sitting dog to standing ? the program is active. Any changes that you make will take an effect the next time you open a new browser window or restart Internet Explorer (close all opened windows).....(free).....
Repellent can solve all your email and Internet virus worries with the click of a button, you can disable all VB and Java applets and scripting, as well as all Registry files. These are the viruses and worms that your virus scanner is trying to find and kill. These script viruses do the real damage, like "Melissa" and "KAK". A virus scanner can miss a new virus because it does not know the signature yet. Repellent does not need to know the signature. It simply disables the scripting capabilities. And to ensure that an Active Server page (asp file) cannot re-enable them by editing the Registry, Repellent also disables the files that run the scripting.....(free).....
A scalable, stable and secure patch management framework for MS based applications and operating systems. With this product a company or university can build a solution that provides a provision-able desktop client that interacts with a single or multi-tiered WSUS architecture. This solution also allows for delegated access to client patch status (with 4 supported levels of delegation), a robust web reporting mechanism with six included default reports, and a data rollup feature that allows both strongly and weakly coupled WSUS servers to act in a collective reporting process.....(free).....
Software and protocol that enables secure distributed communication for small (on the order of 10-50 nodes) trusted groups of users. WASTE is designed to enable small companies and small teams within larger companies to easily communicate and collaborate in a secure and efficient fashion, independent of physical network topology. WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization. .....(free).....
Web Monitor controls all outgoing HTTP requests from your computer and blocks unwanted Internet resources and redirects. Web Monitor protects your privacy and saves your Internet bandwidth .....(free).....
URL (Web Tracks) Finder is a FREE tool that allows you to scan and check files on your computer's hard drive for Internet addresses. Features: You can search for addresses containing specified substring. You can scan predefined groups of files. You can create and modify such predefined groups of files. Search results are displayed in a table. You can save search results to the file. Internet Tracks Finder is a free tool that allows you to scan files on your computer's hard drive for internet tracks. The files found are displayed for the user to investigate. You may find unencrypted private data and estimate the efficiency of any internet eraser software.....(free).....
What Is Transferring is a easy-to-use packet sniffer for Windows 2000/XP. It is able to capture TCP/IP packets that pass through your network adapter, and view the captured data in Text mode (for HTML page, email, etc.) or in Hex/Ascii mode (for ZIP, JPEG, GIF, etc.). With this software, you can check: 1) If there is any unwanted connections. For example, if you do nothing but this software captured some HTTP or UDP connections - it means that some software automatically tried to connect to other computer. (might be spyware, adware, virus, trojan, etc.) 2) What have those connections sent or received. For example, if you installed adware on your computer, you may want to know if your privacy was sent out. It works on Windows 2000/XP, no need to install any capture driver. It also allows you to save captured data to text file.....(free).....
WhyReboot is a small (~60KB) Windows application that displays a list of pending file operations that will occur after rebooting your computer.....(free).....
Wi-Fi Security can be hard. There are many options, many settings, and a lot of techno-babble in many WiFi clients that make it difficult for non-technical users to understand. The LucidLink WiFi Client eliminates all of the clutter and only presents what you need to connect to the WiFi network. It automatically determines the WiFi security method being used on the network and requests only the information required to connect to that network. The LucidLink WiFi Client was designed from our WiFi security background and ease of use was the foremost design consideration. It warns you if you attempt to connect to an insecure or poorly secured Wi-Fi network (you can choose not show these warnings) and it detects suspicious networks or access points that may be posing an ?evil twin? attack threat.....(free).....
Wi-Fi signal strength always visible .....(free).....
WinBuilder is a script engine that will run projects developed by several authors which produce very efficient boot disks available for several windows platforms.....(free).....
An easy way to delete any or all of the following: Recent Documents MRU list, Temporary Files folder, Cookies folder, IE History, IE Temporary Internet Files, Any others, if you add them yourself, What's different from all the other batch files. It just takes one doubleclick from within Windows. , Then next time you reboot (and only the next time, until you choose to run it again) all that stuff will get deleted. You don't need to have an Autoexec.bat file, nor muck about with the Registry. And because it runs under Windows it uses Windows' memory management too, even with Win9x, without needing to set a temporary SmartDrive cache in DOS.....(free).....
WinPatrol uses a heuristic approach to detecting attacks and violations of your computing environment. Unlike traditional security programs, WinPatrol doesn't scan your hard drive searching for previously identified threats. Instead a snapshot is taken of your critical system resources and WinPatrol alerts you to any changes that occur without your knowledge. You'll be warned immediately while others wait to hear about it on the news.....(free).....
WinSCP is an open source SFTP client and FTP client for Windows. Its main function is the secure file transfer between a local and a remote computer. Beyond this, WinSCP offers basic file manager functionality. It uses Secure Shell (SSH) and supports, in addition to Secure FTP, also legacy SCP protocol.....(free).....
WinZapper lets you erase event records selectively from the Security Log in Windows NT 4.0 and Windows 2000 .....(free).....
File Encryption System that use an innovative, fast, secure and easy way to protect and compress your most important documents, files, music, video, productions etc. Fully integrated in Windows shell, easy to use, fast, practically uncrackable.Just right-click the file(s) you want to encrypt on windows explorer, insert personal password and you will get a packet file that nobody knows about its content. Do the same on encrypted file and you will retrieve the exact original file(s). Every application delivered is released with its own unique key: so you can also distribute encrypted files within your friends in total security. Smart graphical interface, high file compression, very fast processing, high compression: more than real security .....(free).....
Windentify Beta Lite is a freeware demo of a state-of-the-art voice-based identification system that prevents any sort of unauthorized access to your PC. Secure, reliable, and with the unique facility to restrict access to systems and files to just a single user?s voiceprint, this is the best in voice-based security applications.....(free).....
WinDirStat is a disk usage statistics viewer and cleanup tool for Microsoft Windows.....(free).....
Small utility to hide windows with a key press.....(free).....
You can download the Windows 2000 Resource Kit software tools listed on this page for free and install them on your computer. These utilities can help you streamline administrative tasks such as managing Active Directory?, administering security features, working with Group Policy and Terminal Services, automating application deployment, and other important jobs.....(free).....
Windows Defender is a free program that helps you stay productive by protecting your computer against pop-ups, slow performance and security threats caused by spyware and other potentially unwanted software.....(free).....
The Windows Inspection Tool Set (WiTS) provides you with cross-linked, filtered views into a Windows system. View operating system information, processes, services, users, network interfaces and connections, file shares, printers and more. Get notified of system resource status, new network connections, process starts and exits, service status and other system events.....(free).....
Windows PowerShell is a new task-based command line shell and intuitive scripting language for system administration that provides comprehensive control and automation for Windows administrators. Windows PowerShell makes administrators more productive by improving the manageability of the Windows operating system and applications that run on Windows. From Microsoft .....(free).....
Rampant misinformation is understandable, because it is hard for the general consumer to find a simple yet comprehensive explanation of just what WPA is. This page tries to fill that gap by explaining WPA in a straightforward, detailed way.....(free).....
Read files containing Windows 9x,NT,2K,XP,2K3 registry hives. It extracts many useful information about configuration and windows installation settings of host machine. Registry hive can be exported into REGEDIT4 format. Every topic data can be saved to CSV. It's designed in Multiple Document Interface.....(free).....
Managing shared computers can be difficult, technically challenging, time-consuming, and expensive. And what?s more, without system restrictions and protections, users can inadvertently change the desktop appearance, reconfigure system settings, and introduce unwanted software, viruses, and other harmful programs. Repairing damaged shared computers can require significant time and effort. User privacy is also an issue for shared computer environments. Shared computers often use shared user accounts that make Internet history, saved documents, and cached Web pages available to subsequent users. Windows SteadyState provides a more effective way to help defend shared computers from changes by untrusted users and unwanted software installations. It can also help safeguard system resources .....(free).....
Allows creation of a bootable ISO image with integration of service packs, creation of user accounts, integration of drivers, hotfixes, patches, software.....(free).....
With WinSpy, you can find out what the others have done on your computer, including what web sites they have visited, what text they've read, images they've looked at, movies they've seen. and also what files they opened/saved, what kind of search they have done and what they ran at the start menu. Double clicking the displayed item will directly open or link to the file or the URLs stored on your computer. Version 2.0 adds an Index.dat Viewer, which can view the URLs in index.dat file.....(free).....
In the recesses of your computer, 20-30 invisible processes run silently in the background. Some hog system resources, turning your PC into a sluggish computer. Worse yet, other useless processes harbour spyware and Trojans - violating your privacy and giving hackers free reign on your computer. WinTasks Process Library is an invaluable resource for anyone who wants to know the exact purpose of every single process .....(free).....
WipeDir is a utility designed for use by developers to facilitate the removal of directories that may contain open files. Though intended for use as part of uninstall methods, it may have other applications. Features include: Two versions, GUI and console. Several options controlled by command-line switches. If unable to delete a directory immediately, it waits for up to five seconds for other applications to close. If still unable to delete the directory, it can instruct Windows to delete the directory when next restarted.....(free).....
Erase items from your hard drive using standards promulgated by US Department of Defence and NATO .....(free).....
WirelessKeyView recovers all wireless network keys (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.....(free).....
WirelessNetView is a small utility that runs in the background, and monitors the activity of wireless networks around you. For each detected network, it displays the following information: SSID, Last Signal Quality, Average Signal Quality, Detection Counter, Authentication Algorithm, Cipher Algorithm, MAC Address, RSSI, Channel Frequency, Channel Number, and more.....(free).....
Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark has a rich feature set which includes the following: Deep inspection of hundreds of protocols, with more being added all the time. Live capture and offline analysis. Standard three-pane packet browser. Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others. Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility. The most powerful display filters in the industry. Rich VoIP analysis. Read/write many different capture file formats: tcpdump (libpcap), Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer? (compressed and uncompressed), Sniffer? Pro, and NetXray?, Network Instruments Observer, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets, EtherPeek/TokenPeek/AiroPeek, and many others. Capture files compressed with gzip can be decompressed on the fly. Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom). Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2. Coloring rules can be applied to the packet list for quick, intuitive analysis. Output can be exported to XML, PostScript?, CSV, or plain text .....(free).....
Command line tool that allows to shutdown, power-off, reboot, logout remote PC. It may be used as alternate of shutdown.exe utility .....(free).....
WTF (What's This File) is a simple method of checking what's running on your machine, researching any Task found, and then ending the Task if required. Best of all, unlike many tools in it's class, you don't need to study a large manual to use it. WTF is freeware, includes an installer/uninstaller and like all RCMedia Services applications, does not contain any spyware, adware or backdoor nonsense of any kind.....(free).....
Instant Messaging (IM) and Chat program which lets you communicate with anyone on the Internet using 256-bit Strong Encryption.....(free).....
Takes the best aspects of the HiJackThis concept and links it up to the SpywareGuide database. The result is something like a systems management tool with a built-in expert system. Lists active processes. List autostarting programs. Lists BHOs, Download Program Files, IE Extension plugins, etc... Shows file size and MD5 of all files instantly. One-Click "Triage" : shows which items are "good", "bad" or "unknown." Integrated file-uploader. Integrated deactivation and removal of an item or file. Can kill running processes (within the limits of the OS security model). Can delete in-use files (after reboot). Can export the log file in text form, Excel format and in HJT-compatible format. Detects hundreds of suspicious programs.....(free).....
Whenever you browse the Internet and access a site which may contain questionable material, the program will save the site name on your computer. Approximately every 30 days or 2 weeks (depending on your preference), a person of your choice (an accountability partner) will receive an email containing all possible questionable sites you may have visited within the month .....(free).....
According to the author, "XP-AntiSpy is a little utility that lets you disable some built-in update and authentication 'features' in WindowsXP. For example, there's a service running in the background which is called 'Automatic Updates'. I don't know what this service transfers from my machine to other machines on the internet, especially the MS ones. So I play it safe and disable such functions. If you like, you can even disable these functions manually, by going through the System and checking or unchecking some checkboxes. This will take you approximately half an hour. But why waste time when a little neat utility can do the same in 1 minute? This utility was successfully tested by lots of users, and was found to disable all the known 'Suspicious' Functions in WindowsXP. It's customiseable, but comes up with the Default settings, which are recommended".....(free).....
This pack is designed to bring a Windows XP CD with SP2 integrated fully up to date with all of the latest hotfixes released by Microsoft since SP2's release. It accomplishes this task via direct integration, where files on the CD are directly overwritten by the updated files. This method has numerous advantages over other integration techniques.....(free).....
A New Way of Cloning the Windows System Disk. Freeware Package for personal use only.....(free).....
yMail is an advanced no-frills email client with powerful spam-deleting tools. It will give you control of your incoming mail with programmable spam filters, including bayesian filtering. It doesn't open or display attachments automatically, and is therefore much more secure than programs which do. It warns you if you try and open attachments, and refuses point-blank to run executable files. It won't render HTML emails, so it's proof against spam which runs off and loads web bugs when you preview it. (That's one trick they use to confirm your email address is valid). It also ignores receive notifications, javascript, vbscript and monkeyscript .....(free).....
ZHider is a tiny and easy-to-use utility that can instantly hide windows (programs) with a quick keystroke. Windows are hidden completely from view and from the task bar without a trace. Hidden windows can easily be brought back into view with another quick keystroke that toggles their visibilty from hidden to visible. Handy for a wide range of practical uses including removing annoying, clutter windows (too many instant messages?), holding secret messages for yourself that you don't want to save or close, protecting privacy if someone wanders by, and yes -- even hiding windows from employers .....(free).....
The problem: You need to hide your open windows, quickly. The desktop is filled with them. The toolbar is hidden. You can only remember - Ctrl + Alt + Del. You panic. What do you do? It's easy! Draw a zigzag and Zigzag Cleaner will hide applications and documents. All or spare. To restore, just draw another zigzag. Easy? You bet! Program will speed up your work considerably .....(free).....
Will allow you to edit and modify Internet Explorer Security Zones.....(free).....
Anti-root kit tool. "Trend Micro RootkitBuster is a rootkit scanner that scans hidden files, registry entries, processes, drivers, and Master Boot Record (MBR) rootkits. In addition, RootkitBuster can also clean hidden files and registry entries."
Shred your files. "It completely removes a file from your disk without leaving any track. It is very fast. It overwrites any deleted file with blanks or random data N times - where N is given by the user. Also, it changes the filename. No setup is needed."
Everything you need to know about host files. "As time has progressed the focus of this project has changed from just blocking ads/banners to protecting the user from the many parasites that now exist on the Internet. It doesn't serve much purpose if you block the ad banner from displaying as most other HOSTS files do, but get hijacked by a parasite from an evil exploit or download contained on the web site."
A program to edit your host file. "HostsMan is a freeware application that lets you manage your Hosts file with ease. No Spyware! No Adware! No Viruses! 100% Freeware! Clean & simple."
Are you tired of trying to remember all the different User IDs and passwords you need? SecureIT can help. SecureIT is a small utility designed to hold items of sensitive information in a single file for easy retrieval. The data items are encrypted and a password is required to access them. SecureIT has been designed with ease-of-use in mind. It allows for the easy addition and amendment of the data items
Advanced Detection and Removal, Light on System Resources and won't slow down your computer, Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System! Real-Time Protection, Prevent potentially harmful software from installing or re-installing!
You have dozens of accounts on all kinds of websites and other systems, each of whom wants you to pick a secure password. But they all have different rules, and anyway, you can't even remember one secure password that consists of a random string of letters and numbers, let alone dozens of them! So, you use simple, easy to remember (and easy to guess) passwords, or you use the same password everywhere. We all do it. But in these days of identity theft, that is a very bad idea! Enter PasswordCard. A PasswordCard is a credit card-sized card you keep in your wallet, which lets you pick very secure passwords for all your websites, without having to remember them! You just keep them with you, and even if your wallet does get stolen, the thief will still not know your actual passwords Thanks to Sequimtech Blog
SystemRescueCd is a Linux system rescue disk available as a bootable CD-ROM or USB stick for administrating or repairing your system and data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the partitions of the hard disk. It comes with a lot of linux software such as system tools (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It requires no installation. It can be used on linux servers, linux desktops or windows boxes. The kernel supports the important file systems (ext2/ext3/ext4, reiserfs, reiser4, btrfs, xfs, jfs, vfat, ntfs, iso9660), as well as network filesystems (samba and nfs)
MiniTool Partition Recovery is a Free Partition Recovery Software for Windows. MiniTool Partition Recovery can recover lost and deleted partitions from IDE disk, SATA disk, SCSI disk and Removable disk. The partition recovery function can retrieve the lost partitions quickly & easily. It supports FAT12, FAT16, FAT32, VFAT, NTFS and NTFS5 file system. MiniTool Partition Recovery can run under 32/64bit Windows 2000 Pro./XP/Vista/Window 7. It's a must-have partition recovery software and free for home users
Hard Drive Eraser will shred a drive partition beyond any possible recovery
If System Restore is failing to restore your system, starting fresh may be your best option. At least future restore points will work. It's also a good idea after cleaning up malware. Otherwise, you might accidentally reinfect your PC by restoring the wrong point
Conceals the windows of visible programs of your own choice (including from the taskbar). When Hide an active window is switched on, the analogue of the "anti-boss" key is added to the window that is active at this moment. Changes the icon of the program in the system tray. or shuts down of the icon of the program in the system tray.
DiskPulse is a free and easy-to-use disk change monitoring utility allowing one to monitor one or more disks or directories and detect file system changes in real-time. In addition, DiskPulse Pro adds the ability to save HTML, Excel CSV and text reports, provides an option to monitor specific file types and allows one to automatically send E-Mail notifications or execute custom commands. Thanks to ghacks
SocketSniff allows you to watch the Windows Sockets activity of the selected process. For each created socket, the following information is displayed: socket handle, socket type, local and remote addresses, local and remote ports, total number of send/receive bytes, and more. You can also watch the content of each send or receive call, in Ascii mode or as Hex Dump
Plenty of utilities can recover deleted files, but what if you can't boot your computer, or the whole drive has been formatted? Here's how to dig deep and recover the most elusive deleted files, or even whole partitions
If you’re already running a full anti-malware suite, you might not even realize that Windows Defender is already installed with Windows, and is probably wasting precious resources. Here’s how to get rid of it
Windows 7 has got a super administrator account which, by default, is disabled. Such account is automatically created when Windows 7 boots up for the first time but, for security reasons, is hidden from view. Turn it on with a simple query in the Command Prompt
Double Driver is a very simple and useful tool which not only allows you to view all the drivers installed on your system but also allows you to backup, restore, save and print all chosen drivers
Software for transmitting files with security using public key 1024 bit and Rijndael for symmetric encryption
Microsoft Fix it Center unleashes automatic troubleshooters to solve the issues you have now and prevent new ones
According to the author, "There are many ways to block bad websites and unwanted content. I break this guide into three different ways to prevent your PC from being infected by accidentally visiting a malicious or compromised website: (1) programs and tips that help prevent your PC from being a target for malware. (2) Programs that alert you to potentially malicious websites when they appear -- the self-censorship or "just change the channel approach". (3) Programs that filter unwanted content/websites from appearing -- the censorship approach"
Google regularly receives requests from government agencies around the world to remove content from its services, or provide information about users of our services and products. The interactive map shows the number of requests along with information definingeach request that it received between July 1, 2009 and December 31, 2009, with certain limitations
Event Log Explorer is an effective software solution for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. Event Log Explorer greatly extends standard Windows Event Viewer monitoring functionality and brings many new features
Beat the censors... A slideshow explaining it all
Comprehensive online library of processes is for everyone who needs to know the exact nature and purpose of every process that should, and should not, be running on their PC
Felix is a pencil-and-paper cipher offering relatively good security for causal use. Unlike modern encoding schemes that require, at a minimum, a computer to be of any practical consequence; Felix requires only that you follow three elementary rules (outlined below). If you're curious about cryptology, the Felix cipher is a great place to start. This cipher can typically be understood and applied, even by children, in a handful of minutes. Quite simply that means, its easy to implement for common folks
Every time you install a new program, you make a leap of faith. The installation utility adds some files to your system, replaces other files, and changes elements of the Registry and essential INI files. You hope it will make those changes cleanly and correctly and will record them for use by the program's uninstall utility. But in case it doesn't, This tool can provide a record of exactly what the install program did (scroll down to find it)
Recovers files from disks with physical damage. Allows you to copy files from disks with problems such as bad sectors, scratches or that just give errors when reading data. The program will attempt to recover every readable piece of a file and put the pieces together. Using this method most types of files can be made useable even if some parts of the file were not recoverable in the end
Scans a given computer for open ports. Reports which service the port is related to and if its open, closed or filtered via a firewall. Useful utility for checking your computer is secure from hacking attempts and only services you want to share are visible to other users via the network
Securely erases the contents of a disk replacing it with random data or leaving the drive completely blank. Numerous passes can be performed to ensure data is totally unrecoverable. Program works on hard and floppy disks aswell as USB/Flash drives
With stories abounding of identity theft aided by information lifted from discarded storage devices, you want devices you no longer plan to use to have no usable information when they head out the door. Here's how to wipe them clean
All inclusive backup of operating systems, device drivers and programs. Includes 100’s of Tools. With Kleo, you can now create all inclusive backups of your servers. Saves 100s of hours tracking down original CD’s or obsolete device drives. Kleo enables you to recover from server failure without the need of any other software.
Disable Startup is a free startup manager and monitoring program, it can scan all Windows Startups on your computer, and monitor all new startup items, helps you control, manage and optimize Windows Startup configuration. It can work with fine Windows XP and Vista, is one protecting tool for Windows Startup from changes. This software can help you save system memory and resources by disable unnecessary programs, because windows launches many unnecessary programs and services at boot up. Disable Startup also monitor the start page of Internet Explorer; stop any change that you don't know. Thanks to Web Talk
AppCrashView is a small utility for Windows Vista and Windows 7 that displays the details of all application crashes occurred in your system. The crashes information is extracted from the .wer files created by the Windows Error Reporting (WER) component of the operating system every time that a crash is occurred. AppCrashView also allows you to easily save the crashes list to text/csv/html/xml file
This program copys a disk as a raw image from one drive directly to another. This utility is designed for people who have faulty drive and want to transfer the data directly to another drive without doing a file by file copy. This saves the need for operating system re-installs and allows drives with an unknown file system to be copied (including from console game machines, data recorders, mac etc). The program has a built in data recovery function which will attempt to recover data from bad sectors to ensure all the available data is restored from the drive. This program is designed to run under NT/XP/2000 or later operating systems
Creates a database of computers on your network and their configurations. Allows you to track what applications are installed across your network for license auditing purposes. A great help for large networks trying to ensure they are legitimate. Audit also provides a great way of determining which computers in your network require hardware upgrades or software installations
TestDisk is a powerful free data recovery software! It was primarily designed to help recover lost partitions and make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting a Partition Table). Partition table recovery using TestDisk is really easy
The so called SmartScreen Filter has been added to Internet Explorer 8 by Microsoft. The filter has been designed to warn the user in case unsafe websites are accessed in the web browser. Some Internet Explorer users on the other hand might prefer to deactivate it. Either because they are using a security software that checks the websites for them, like Web of Trust for instance or a security software that integrates in the web browser and checks the accessed websites, or because they do not want to transmit information about the visited websites to Microsoft.
Have you ever accidently deleted a file, or removed a crucial part of a document only to realize it no longer makes sense? Windows 7 is smart enough to protect you from yourself, and here we’ll see how you can restore files in any edition of Windows 7
Most of us remember Windows System Restore as a lame-duck feature from Windows XP; when it seemed we might benefit from using it, it never quite worked how we expected. That's no longer the case. Windows System Restore is an awesome system recovery tool, and it's included with Windows for free. It's the ideal solution for rolling back bad drivers, fixing when buggy software breaks your PC, or simply rolling you back to a previous point in time. If you've still got a bad taste in your mouth from the lackluster XP version of System Restore, it's time to take a look at it again if you've upgraded to Windows 7 or Vist
Permanently deletes selected files from your computer with the most reliable data termination algorithms. A stranger can't recover erased confidential information
TweakNow PowerPack is a fully-integrated suite of utilities that let you fine-tune every aspect of your computer's operating system and Web browser. The Registry Cleaner module provides you with a safe and simple way to clean Windows Registry. To keep your computer always at top performance, we recommend to clean your registry at least once a month. For Windows tweaking lovers, the suite provides more than 100 hidden Windows settings in the Windows Secret section. Using modules included in this section, you can easily customize your Windows like geeks do. The Virtual Desktop module lets you run as many as four custom-designed desktop configurations simultaneously, allowing you to tailor your computer screen to your mood and your work requirements. Last but not least, the suite also gives you a complete picture of all aspects of your computer's hardware, including detailed information about your motherboard, processor, video card, memory, hard disk and network
Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids. It is based on a hierarchical design targeted at federations of clusters. It leverages widely used technologies such as XML for data representation, XDR for compact, portable data transport, and RRDtool for data storage and visualization. It uses carefully engineered data structures and algorithms to achieve very low per-node overheads and high concurrency. The implementation is robust, has been ported to an extensive set of operating systems and processor architectures, and is currently in use on thousands of clusters around the world. It has been used to link clusters across university campuses and around the world and can scale to handle clusters with 2000 nodes
Recover lost or deleted files, and also Delete files safely, so they can't be recovered. If you delete a file in Windows, this file isn't really deleted. Windows instead intentionally "forgets" where the file is located on the hard disk. It is possible to restore some of these files if they have not been overwritten on the hard disk. Our new tool FileWing can help you recovering unintentionally deleted files and can also help deleting files by overwriting them multiple times, so that they cannot be recovered anymore - by anyone
The Drumlin PDF software and DRM service provides a complete and free PDF security solution. It includes a free PDF reader with built-in military-strength encryption, wide-ranging secure publishing ('writing' a secure PDF file), coupled with a free central Digital Rights Management (DRM) service. THERE IS NO CHARGE! Simply download the Drumlin software, register when prompted, and you are ready. Select any PDF and use the built-in PUBLISH facility to create your own secured PDF ready for distributing. PDF security for ebook publishing and secure document distribution couldn't be simpler!
KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).
PhpSecInfo provides an equivalent to the phpinfo() function that reports security information about the PHP environment, and offers suggestions for improvement. It is not a replacement for secure development techniques, and does not do any kind of code or app auditing, but can be a useful tool in a multilayered security approach.
Create a Restore Point with single click in Windows with Quick Restore Maker. Normally, to create a system restore point, you have to, via the Control Panel, open the System Protection box and then open the System Restore utility (rstrui.exe) to create a restore point. Quick Restore Maker allows you to create one in a single click. Thanks to The Windows Club
There are certain times where you need to protect your files, pictures, documents etc. from nosy users. In these cases, most of the times, the only solution you have got is to buy expensive applications to lock and protect your stuff. But, did you know that Windows has got a special command which turn a folder in a lock, a safe, a stronghold
One way to protect your machine is to lock it using a simple USB drive which can be used in the same way you use your key to turn on your car. PREDATOR locks your PC when you are away, even if your Windows session is still opened. It uses a regular USB flash drive as an access control device. Free for non-commercial use. Thanks to Web Talk
Backup software designed to automate all your backup, synchronization, and archiving tasks
Software to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption
USB Dumper is a small portable software program for the Windows operating system that can be used to create automatic backups of data on USB devices that are connected to the computer system. The program is configured in an ini file that is supplied with the download. The parameters that can be edited include the destination for the backups on a local hard drive, a system tray icon that can be shown or hidden and a prompt that can also be shown or hidden
Quick Checksum Verifier checks file integrity by secure time proven algorithms like MD5 and SHA-1
Portable tool to securely delete data
Only allow one application to be active
NoDrives Manager is a simple, free tool for hiding Windows drives. The hidden drives are still accessible but they are not visible in the Windows Explorer
Help users test if their ports are open with just a few clicks. Tests both TCP & UDP ports
Fab Autobackup 2 is a program wich allows users to backup and restore personal data and settings like emails, documents, internet browser bookmarks... You can use it as Windows PE plugin (developed for Bart's PE Builder) or as a standalone program for Windows
GMER detects and removes rootkits. It scans for hidden processes, hidden threads, hidden modules, hidden services, hidden files, hidden Alternate Data Streams, hidden registry keys, drivers hooking SSDT, drivers hooking IDT, drivers hooking IRP calls, inline hooks
Save all incoming and outgoing Internet traffic on the hard disk and capture all the incoming and outgoing Internet traffic of your programs. Internet Content Logger works on the system level, and supports nearly all know Internet related programs. The Internet content for each program is saved in its individual log file. The content log files also are separated by date and by computer users. Important: Please note that Internet Content Logger is NOT a spyware program. It always stays in the system try menu (near the clock) and is always viewable by everyone who works on the computer.
The Microsoft Windows Server 2003 Resource Kit Tools are a set of tools to help administrators streamline management tasks such as troubleshooting operating system issues, managing Active Directory, configuring networking and security features, and automating application deployment. Contains dozens of great utilities
From Microsoft, The Windows 7 Security Compliance Management Toolkit provides an end-to-end solution to help you plan, deploy, and monitor the security baselines of computers running Windows 7 and BitLocker Drive Encryption in your environment
This utility displays the list of all applications that are loaded automatically when Windows starts up. For each application, the following information is displayed: Startup Type (Registry/Startup Folder), Command-Line String, Product Name, File Version, Company Name, Location in the Registry or file system, and more. It allows you to easily disable or delete unwanted programs that runs in your Windows startup. You can use it on your currently running instance of Windows, as well as you can use it on external instance of Windows in another drive. WhatInStartup also supports a special "Permanent Disabling" feature - If a program that you previously disabled added itself again to the startup list of Windows, WhatInStartup will automatically detect the change and disable it again
All your applications can be installed on your new PC with one click. Should you need to reinstall your system, Allmyapps takes care of reinstalling all your favorite applications in the blink of an eye
Format Recovery for EMail is a powerful and free EMail Recovery Software. The software can recover EMail from a damaged dbx file or deleted dbx file or re-installed Windows drive. The mail fragment can be saved as an EML file. It supports Outlook Express and Foxmail format. Even if the file name is lost, deleted or formatted, it can scan the lost EMail from the drive or hard disk
Keeping track of where you've been does not end with simply clearing out your browsing history and other private data—your operating system continues to store more information about what you've been up to, like cached DNS lookups and worse, Flash cookies that don't get wiped. It's worth noting that you won't be able to erase all of your tracks all the time—if you are browsing stuff that you shouldn't at work, you can still get caught by a system admin even if the history on your PC is gone. On your own PC, however, here is how to boost your browsing privacy
Copy Cat 2.0 will skip the bytes which are not readable from files and copy all other bytes. Windows will not usually copy portions of a damaged disk. Therefore it extracts max data which is normally not done by windows copy operation. Copy Cat can be helpful at times when you want to copy a CD or DVD which is scratched,when you want to copy data from harddisk area which is partially not readable , when you want to copy data from floppy which is currently not being copied by windows
Hard Drive Powerwash will clean your hard disk by removing file clutter from your system drive, from external drives or from network drives. It checks for unnecessary files of more than 50 kinds. Additionally, it deletes your internet tracks including cookies, typed URLs and other form data for Internet Explorer and Firefox. And it allows you to add custom file types or custom folders that should be deleted. Thanks to Web Talk
Tiny stand alone DOS program that Enrypts and Decrypts any kind of files with a very safe and fast csprng algorithm
Learn what they are, their history, protection, and some of the characteristics of a virus hoax
The Netalyzr analyzes various properties of your Internet connection that you should care about — including blocking of important services, HTTP caching behavior and proxy correctness, your DNS server's resilience to abuse, NAT detection, as well as latency & bandwidth measurements — and reports its findings in a detailed report. You can check out an example report from a real network to get a better idea of our tests. To perform these tests, the Netalyzr runs a Java applet on your computer. You may be asked to confirm network-related activities that your system's applet security policy or firewall considers sensitive. We hope that you will permit any such activity, as it will ensure more comprehensive test results
Hide specified applications even as they run
You can back up your data files on to disk, diskette, CD or DVD. Buckup Mill will keep track of file versions and disks. You can restore any file to any previous version without having to know on which disk or in which backup set it is located. You can create unlimited incremental backups. This saves time, backups and restores are very fast
comprehensive data recovery software to recover data on major windows operating system. It recovers files emptied from the Recycle Bin, lost due to hard drive crash, formatted or damaged hard drive, virus infection and other unknown reasons. Support recovery of all major file types, including text, exl, pdf, bmp, exe, html, jpg, avi, mp3, etc. As a easy disk data recovery software, get delete and formatted files back. Thanks to Web Talk
Great for backing up each version of a worked on file. The copy changed files tool is a free program that lets you copy changed files from one directory tree to another. The program only copies changed files, leaving all other files behind. Needed if you have a vast amount of images/documents/source code files that you only want to make a incremental backup of, You have a lot of customer websites that you maintain and only want to update the changed files, You need to copy changed files only from one directory tree to another, or You take a lot of pictures you want to backup several times a day to a DVD or another media where you cannot overwrite only append to.
Are you aware of all the devices – USB sticks, CDs, floppies, smartphones, MP3 players, handhelds, iPods, digital cameras – that have been connected to your network? As an administrator, do you know how many employees have been using or are using portable storage devices at the moment? Monitoring your network for these devices is not only time-consuming but nearly impossible to do manually. With GFI’s free web utility EndPointScan you can actually check within minutes what devices are or have been connected to computers in your network and by whom
KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database
You're probably familiar with the popular proprietary commercial package Norton Ghost, and its OpenSource counterpart, Partition Image. The problem with these software packages is that it takes a lot of time to massively clone systems to many computers. You've probably also heard of Symantec's solution to this problem, Symantec Ghost Corporate Edition with multicasting. Well, now there is an OpenSource clone system (OCS) solution called Clonezilla with unicasting and multicasting! Clonezilla, based on DRBL, Partition Image, ntfsclone, partclone, and udpcast, allows you to do bare metal backup and recovery. Two types of Clonezilla are available, Clonezilla live and Clonezilla SE (server edition). Clonezilla live is suitable for single machine backup and restore. While Clonezilla SE is for massive deployment, it can clone many (40 plus!) computers simultaneously. Clonezilla saves and restores only used blocks in the harddisk. This increases the clone efficiency. At the NCHC's Classroom C, Clonezilla SE was used to clone 41 computers simultaneously. It took only about 10 minutes to clone a 5.6 GBytes system image to all 41 computers via multicasting
Data recovery utility that scans your media for traces of lost files (images, documents, etc.), and can undelete files from FAT12, FAT16, FAT32, exFAT, and NTFS partitions
Utility that allows you to parse through any NTFS partition on any media readable by your computer
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple. Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times
There are several web services which are locked to particular regions. Hulu and Pandora, for instance, are available only for US residents. In order to access these sites from outside the regions they are meant for, you have to trick them into believing you reside inside those regions or countries. One way to achieve that is to use a VPN (Virtual Private Network). Enter HideIPVPN. This free VPN service is the only one that offers you US and UK based IP addresses, and you decide which country’s IP address you want. Want to watch Hulu? Use their US servers. Want to stream music from Spotify? Switch to a UK server. HideIPVPN is the only one I know that offers this kind of flexibility. Using HideIPVPN you can successfully bypass the region-lock of Hulu, Pandora, Spotify, BBC iPlayer, Veoh and anything that’s available only on the US and UK. Thanks to instant fundas which has managed to find this service free
CurrPorts is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that the process was created, and the user that created it. In addition, CurrPorts allows you to close unwanted TCP connections, kill the process that opened the ports, and save the TCP/UDP ports information to HTML file , XML file, or to tab-delimited text file. CurrPorts also automatically mark with pink color suspicious TCP/UDP ports owned by unidentified applications (Applications without version information and icons)
MobaSSH allows you to run commands and transfer files on a remote Windows PC from any operating system (GNU/Linux, Unix, HP-UX, AIX, Windows, ...) through a fully secured and encrypted network connection. MobaSSH is 100% compatible with the Linux/Unix/HPUx/AIX SSH clients, but also with Putty or WinSCP on Windows
MJ Registry Watcher is a simple registry, file and directory hooker/poller, that safeguards the most important startup files, registry keys and values, and other more exotic registry locations commonly attacked by trojans. It has very low resource usage, and is set to poll every 30 seconds by default, although you can adjust this to anywhere between 0 and 9999. A configuration file stores all your settings for future use. MJRW not only polls the system, but it also hooks it, so that most changes to keys, files and directories are reported instantaneously. Key deletions are still caught by the polling loop though, since they cannot be hooked. Exactly which keys and files are protected can be completely configured by the user, although the sets I supply with MJRW will cover most standard PCs
Throughout the last two years, scareware (fake security software), quickly emerged as the single most profitable monetization strategy for cybercriminals to take advantage of. Due to the aggressive advertising practices applied by the cybercrime gangs, thousands of users fall victim to the scam on a daily basis, with the gangs themselves earning hundreds of thousands of dollars in the process
Prevent cut, paste, copy, delete, re-naming of files & folders. Prevent: 1. Stops Cut 2. Stops Paste 3. Stops Copy 4. Stops Delete 5. Stops Copy To 6. Stops Move to 7. Stops Send To 8. Prevents renaming 9. Disables Task Manager’s End Process button. Also it doesn’t allow you to right click on process name and click on end process. It also grays out the context menu items, disable Ctrl+C, Ctrl+X and Ctrl+V and/or stops the process.
DriveImage XML is an easy to use and reliable program for imaging and backing up partitions and logical drives. Image creation uses Microsoft's Volume Shadow Services (VSS), allowing you to create safe "hot images" even from drives currently in use. Images are stored in XML files, allowing you to process them with 3rd party tools. Never again be stuck with a useless backup! Restore images to drives without having to reboot. DriveImage XML is now faster than ever, offering two different compression levels. DriveImage XML runs under Windows XP, Windows Server 2003, Vista and Windows 7 only. The program will backup, image and restore drives formatted with FAT 12, 16, 32 and NTFS
Partition Find & Mount implements a new concept of deleted or lost partition recovery. It works in the most convenient way possible — by locating and mounting partitions into the system, thus making those lost partitions available to you like any generic disk volume. Partition Find & Mount will also work in case any Boot Record (including the Master Boot Record) is missing, damaged or overwritten
Fast and user friendly free tool for driver backup, restoration and removal with command line options, automatic restoration from CD and path formatting. DriverBackup! includes also an interactive command line builder
The Connection Monitor is a tool that allows the user to observe incoming and outgoing network connections. This is ideal for those whose computer is part of a local network or is accessible over an internet connection, as you can keep track of all wanted and unwanted outbound and inbound Socket-Connections on your computer monitor
New wireless network tool Informs you of who is using your wireless network, Informs you of all the names, Informs you of all the IP addresses, Informs you of the Mac addresses, Scans your wireless network in only 10 seconds, Detects computers even if you don't see them in program neighbourhood, Detects computers even if you can't ping them
Predator can lock and protect your PC with a USB flash drive as a key. Thanks to gHacks
Your computer and others may automatically place files on your USB drive every time you use it. Now you can keep it clear and clean just as automatically – using rules you set up and approve
Secret Data Manager is a personal tool to help computer users keep their private files in encrypted status. It is a great option for anyone who is looking for a powerful and convenient way to protect data from being read, or even stole from the computer
A tiny SSH and SFTP server for Windows. It features SSH2 password-based, interactive and public-key authentication methods and fully supports forwarding and sftp subsystem. Yet its management console makes it extremely easy to configure and deploy, both locally and remotely. Single-user version is free
PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its 'Photo Recovery' name) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it will still work even if your media's filesystem has been severely damaged or re-formatted
Unison is a file-synchronization tool for Unix and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating the changes in each replica to the other. Unison shares a number of features with tools such as configuration management packages (CVS, PRCS, Subversion, BitKeeper, etc.), distributed filesystems (Coda, etc.), uni-directional mirroring utilities (rsync, etc.), and other synchronizers (Intellisync, Reconcile, etc)
StaxBackup is a GUI for Microsoft robocopy and reg command line applications useful to make file and registry key backups
This application is a powerful data encoder and decoder that has the possibility to encode or decode everything and anything that fits on/in your Hard Disk Drive. You can encode texts, pictures, movies, music, applications ... so on
RegStart is a powerful Registry Start-Up Cleaner which will help you remove or backup any element present in your Registry or Start Menu start-up locations. Due to its powerful registry scanner RegStart has the ability to look in all startup locations and it will show you every start-up entry present in your system registry. If you are logged in as an administrator RegStart will give you the possibility to clean the start-up locations for all users present on your station. Please note that RegStart also has the ability to scan the "Start Menu" start-up locations and it will show you every file present in those locations. RegStart has a few extras too, that is, it will give you the possibility to edit special system files that are normally read on system start-up
Shaft is a powerful cleanup utility used to remove unnecessary files like temporary files, links to recent files, cookies, temporary internet files and so on. Shaft gives you the possibility to select the files that are to be deleted or folders that should be cleaned up. Why bother with manual cleanup when you have the possibility to do it automatically using Shaft
Quark is a powerful security tool which will help you protect your computer from unauthorized access by taking over your system and denying any user interaction until the correct password has been provided
Free Hide Folder is a free computer security software to hide your private folders. It is very useful to keep your personal data away from others. Others will not know where your personal files exist and they will not be able to accidentally view them. You can hide folders simply with a few mouse clicks. Free Hide Folder is protected by a password that you can change or remove at any time
Removes invalid, dead and duplicate email addresses from your mailing list. Thanks to gHacks
Network diagnostics utility. Run the utility dirrectly from storage media and get info about the current system IP the user administrator rights and the public IP of your network. With this utility you can ping an IP address or a host name dirrectly without the use of the command line
QtWeb is a lightweight, secure and portable browser having unique user privacy features
DeltaCopy is an open source, fast incremental backup program. Let's say you have to backup one file that is 500 MB every night. A normal file copy would copy the entire file even if a few bytes have changed. DeltaCopy, on the other hand, would only copy the part of file that has actually been modified. This reduces the data transfer to just a small fraction of 500 MB saving time and network bandwidth. In technical terms, DeltaCopy is a "Windows Friendly" wrapper around the Rsync program, currently maintained by Wayne Davison. "rsync" is primarily designed for Unix/Linux/BSD systems. Although ports are available for Windows, they typically require downloading Cygwin libraries and manual configuration
TrID is an utility designed to identify file types from their binary signatures. While there are similar utilities with hard coded rules, TriID has no such rules. Instead, it is extensible and can be trained to recognize new formats in a fast and automatic way. TrID has many uses: identify what kind of file was sent to you via e-mail, aid in forensic analysis, support in file recovery, etc. TrID uses a database of definitions which describe recurring patterns for supported file types. As this is subject to very frequent update, it's made available as a separate package. Just download both TrID and this archive and unpack in the same folder
ItsHidden gives you free VPN for anonymous surfing. Thanks to instant fundas
With the proper hardware that you probably already have and freeware available online, you can easily build your own basic computer forensics lab that will hold up in court, reduce E-Discovery costs and, most importantly, retrieve valuable evidence for all investigations. Thanks to Hack in the Box
FreeOTFE is a free, open source, "on-the-fly" transparent disk encryption program for PCs and PDAs. Using this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive
A Fast and Efficient disk based backup utility. AKGBackup is a backup program written entirely in Java. As a result, it has the advantage that it should run on any platform as Java is a language having cross platform portability as one of its strong points. It is an utility for backing up your files on a different hard disk drive, network drives, floppies, different partition of the same disk drive or any media your operating system can write to
According to the author, "Traditional backup programs are still largely built on concepts from the days when everyone backed up their data to cheap backup media (i.e. discs or tape). They are typically designed to backup all information to a set of backup media. Even though most backup programs now allow you to back up data to external hard disks or network locations, most still create monolithic backup files. Getting to the data once it's on the backup media usually involves a restore process that moves the individual file data back to a hard disk. Nowadays however hard disks are cheap and online storage is practically getting cheaper by the minute. Backing up using a process that creates large, monolithic backup files just doesn't make as much sense anymore. Hard drives are very good as storing individual files and online backups services are most efficient when they can upload small incremental files changes rather than larger monolithic backup files. After this realization I started to look for possible alternatives to the monolithic backup process. Most of what I found offered little more than what NT Backup and some clever scripts had to offer. There were some notable exceptions and the solution I ultimately settled on is largely inspired by one of these exceptions, a tool named rsync. However once I made the decision to move away from NT Backup and a traditional, monolithic backup system things got a lot more complicated."
Product Key Finder is a free Windows application that retrieves license key information (CD Keys) from the Windows registry. Product Key Finder currently supports retrieval of 200+ windows applications such Microsoft Windows, Microsoft Office and Adobe Acrobat
KeyScrambler Personal is a browser add-on. It protects all your inputs against known and unknown keyloggers in IE, Firefox, and Flock: your login credentials, credit card numbers, passwords, search terms, Java, Flash, PDF Forms, web email, and more (scroll down to find)
Erase Hard Drive Completely. Detects and displays information about all partitions, hard disks and floppy drives currently connected to your computer. Wipes out all floppies and hard disk drives completely by secure overwriting data on physical level using [One Pass Zeros] data destruction method. Erases partitions, logical drives and even not used disk space. Erasing report is created and can be saved as a file. Supports IDE, SATA and SCSI drives. Supports larger than 128GB hard disks via using LBA(LBA48) mode to access drive's data
Metadata are details of any file which are included in the file and this includes data like author, date created, modified, type of file, computer used for creation and many more details. When you share any file with your friends, its better to remove these personal information from the files. If you are sharing photos, you can check this freeware to remove metadata from images. In Windows 7 (also in Vista), you can easily remove the metadata from any file using the properties window. In order to remove personal information and properties, follow these steps
Rogue DHCP servers are those DHCP servers that are misconfigured or unauthorized unknowingly or those that are configured with a malicious intent for network attacks. Either be the case the impact on clients that are serviced by the rogue DHCP servers are critical. That is the clients would experience network access problems due to rogue DHCP server leasing incorrect IP addresses & incorrect options to the client. Security threats are caused when malicious user with rogue DHCP server can spread bad network parameters and thereby sniff the traffic sent by the clients. There are also certain Trojans like DNS-changing that uses a compromised machine in the network to pollute the network by installing rogue DHCP servers on the machine. Rogue detection tool is a GUI tool that checks if there are any rogue DHCP servers in the local subnet
Tool to allow capturing and protocol analysis of network traffic. Network Monitor 3 is a protocol analyzer. It enables you to capture, to view, and to analyze network data. You can use it to help troubleshoot problems with applications on the network
Back-up software. A really fast Disc Imaging Backup Software. Makes a complete .iso copy of your hard drive. It has a built-in scheduler, you can set it up to create backups on a regular schedule, making it harder for you to "forget" to take care of business. Images can be saved off to network drives, DVDs, or removable drives (USB and FireWire). Images can be password-protected for the security of your data. Using Microsoft's Volume Shadow copy Service (VSS), Free for personal use by Macrium Software.
MonitorES is a small utility helps you to turn off the monitor display when you lock down your machine.Also when you lock your machine , it will pause all your media programs like winamp & set your IM Messengers status message to "Away" and restore it back to normal when you back.Also supports HOTKEY(CTRL+F2) to just turn off display
HTTP Proxy Server with Remote Proxy, User-Agent, Cookie, HTML Tug, Outgoing Header, Incoming Header and Access Log.
Disk eraser software for secure formatting of hard drives without the possibility of data recovery. DOS application can be run from floppy boot disk. DoD 5220.22-M compatible. Erasing PC Hard Drives. Free version
Software to keep track of your stolen laptop. Prey is a simple and lightweight program that will help you track and find your laptop if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free
ICE ECC is a file verification and repair tool. ICE ECC allows you to protect your important files and sensitive data against digital corruption using Reed-Solomon codes. Did you know that a typical CD-R/DVD-R disk can hold its data intact for only a few years? ICE ECC is the perfect solution to this problem - before you store your data, protect it against corruption with ICE ECC. ICE ECC is easy to use. To protect a file against corruption, just select the file/files/directories with the program by navigating the explorer-style window and click Create. This creates recovery file/files of the original files. You can easily control the size and number of the recovery files. When you want to verify whether the file has been modified or if the data in it has been corrupted, just select the appropriate .ecc file and click Verify. ICE ECC will then do a full analysis of the file and let you know if it has been corrupted, in that case ICE ECC will automatically recover it for you
freeSSHd, like its name says, is a free implementation of an SSH server. It provides strong encryption and authentication over insecure networks like Internet. Users can open remote console or even access their remote files thanks to buit-in SFTP server
The program allows you to monitor all your network connections or a specific network connection (such as Ethernet or PPP) only. The software also features a system of highly customizable visual and sound alerts. You can set it up to alert you when the network connection is down or when some suspicious activity, such as unusually heavy data flow, occurs. It can also automatically disconnect all dialup connections and shut down the system
A Comparison of Free SSH and SCP Programs for Windows 9x, NT, ME, 2000 and XP
A step-by-step guide
PDF Security, Copy Protection, Digital Rights Management (DRM) and Distribution Management Solution. PDF Security, DRM, Protection and Distribution Management technologies are used as a copyright enforcement mechanisms and sometimes as an alternative mechanism to copyright law. Granting exclusive ownership rights to authors and creators through Copyrights, Security and DRM, allows for a better chance of enrichment of more and more creativities and cultural products, and they can nominally compensate their efforts and costs. Intellectual efforts for producing a product or artifact must be appropriately prizes and we must prevent people to benefit from such products free of charge. PDF Security and DRM provides a better base for protecting contents against illegal distributions, usages and sells. PDF Security and Digital Rights Management (DRM) systems are provided to ease distribution of PDF documents for end users by enforcing some usage and distribution limitations like printing, copying, save, transfer
SRWare Iron is a real alternative, based on the Chromium-source with the same features as Chrome - but without the critical privacy concerns. Use the innovative features without worrying about your privacy.
ServerWatch is a Windows application designed to help network administrators keep track of the servers on their networks. ServerWatch is being developed under the OpenSoftware License and will be available free of charge. Currently the system is in Alpha phase of development, the alpha is available for download now, but please kep in mind that this is testing purposes only at the moment and not all features are built yet. For more information about ServerWatch, or its developers, please follow the links on the menu
BluetoothView is a small utility that runs in the background, and monitor the activity of Bluetooth devices around you. For each detected Bluetooth device, it displays the following information: Device Name, Bluetooth Address, Major Device Type, Minor Device Type, First Detection Time, Last Detection Time, and more. BluetoothView can also notify you when a new Bluetooth device is detected, by displaying a balloon in your taskbar or by playing a small beep sound
Using this too, you can lock your keyboard and mouse by entering a phrase, and then unlock it by entering a different one
Copies smaller drives onto larger ones for migrating or backing up complete installations as well as for data rescue. The download package contains HDClone as a Windows application (HDClone/W) and as a self-booting application (HDClone/S). You can easily create a bootable HDClone/S floppy disk or CD/DVD on Windows with only few mouse clicks. A floppy image, ISO image, and manual (PDF) are also enclosed
The SANS SIFT Workstation is a VMware Appliance that is preconfigured with all the necessary tools to perform a forensic examination. Includes the Autopsy Forensic Browser. The appliance is utilized in the Computer Forensic, Investigation, and Response course offered by SANS. Examine core file system data and metadata structures to increase understanding of the FAT, NTFS, UNIX, LINUX file systems. The popular appliance is now offered as a free download via this site. Free registration is required
Smart NTFS Recovery is a data recovery tool for Windows operating system that supports the NTFS files system. The software easily recovers data from hard disks and any type of storage media - flash drives, USB drives, memory stick, PC card, multimedia card, and secure digital card with NTFS file system. Smart NTFS Recovery can recover any deleted files, including MS Office files, photos, mp3 and zip files, even if the partition table is lost. (Scroll down)
RegSentry is a registry key monitoring application that sits in your system tray and notifies you of changes to important registry keys that Internet Worms, or Spyware programs may add to the registry database. It includes functionality to revert changes and delete values. Notifications are via a flashing icon in the system tray or a pop-up warning dialog. (Scroll down)
Windows Operating Systems use the AUTORUN.INF file from removable drives in order to know which actions to perform when a new external storage device, such as a USB drive or CD/DVD, is inserted into the PC. The problem is that this feature, widely critizised by the security community, is used by malware in order to spread by infecting as soon as a new drive is inserted in a computer. Due to the large amount of malware-related problems associated with Microsoft AutoRun we have created a free utility for our user community called Panda USB Vaccine
Free Wipe Wizard erases private files and wipes sensitive information in a secure manner. Files erased with Free Wipe Wizard can never be recovered with any other tool. The erased information will hold secure even if special methods are used to sense weak magnetic information off your hard disk surfac
System administrators do not have physical access to dedicated servers. These servers are usually hosted by a web hosting company in a secured data center. Most dedicated servers are rented for a certain period of time and then passed on to the next customer. While some dedicated server hosters securely wipe and format the hard drives before they are made available again some only format them
EASEUS Disk Copy is a potent freeware providing sector-by-sector disk/partition clone regardless of your operating system, file systems and partition scheme. The sector-by-sector method assures you a copy 100% identical to the original. Disk Copy can be used for copy, cloning, or upgrading your original small hard drive to a new larger drive. Simply speaking, it can copy anything from the old hard drive including the deleted, lost files and inaccessible data
Recovers files which have been deleted from Windows or DOS which are not recoverable from the recycle bin. Undelete supports FAT and NTFS file systems
SecretDrive is a small, efficient and reliable program to create up to 8 encrypted virtual disks. Virtual disk is protected by one of five modern encryption algorithms: AES, GOST 28174-89, Blowfish, Twofish, CAST 256. Virtual disk looks like usual hard disk, so you can format it, defragment, check, backup and do other operations. It can be located in a file or in the random access memory Hide sensitive data in encrypted virtual drives. 32 bit version is free. Thanks to instant fundas
ShowMyPC provides free and premium tools for Instant Collaboration to all users. Software includes Desktop Sharing, Screen Recording, Remote PC access. Free!! Instant No Installation, No registration, No logins. Desktop and single Application Sharing. Chat and White board, Screen Recording. Built using standard SSH and VNC software.
So you've looked in task manager, and there's a dozen iexplore.exe processes listed! Clicking the End Process button for each will take far too long
DTaskManager, obviously, is a Task-Manager, but specifically engineered to give additional functionalities that the Windows bundled TaskManager (and other third party products) do not have: 1. Three different ways to close a process, as the "termination request", the standard "forced termination" with dialogue tolerance, and the "forced termination" of any type of process, bypassing all permissions (it can also terminate running system processes). 2. DTaskManager allows you to suspend and reactivate a process (as in Linux). This is useful, for example, to temporarily suspend a task that uses system resources when you don't want to terminate it (such as a DivX encoding process). 3. DTaskManager allows you to select more than one process at a time, and terminate all of them "simultaneously". 4. DTaskManager does not need any useless confirmation. Scrool to middle of page)
A common problem when dealing with malware is that it will place numerous registry keys into your systems registry. Most of which are very difficult to remove. Malwarebytes has created an application to eliminate this very problem - RegASSASSIN. RegASSASSIN is a portable application which makes difficult to remove registry keys placed on your system by malware a thing of the past. The program allows you to remove registry keys by resetting the keys permissions and then deleting it. Please use with caution as deleting critical registry keys may cause system errors
Using Returnil, you can work using a virtual copy of your system, with the real system being preserved, untouched in the background. This provides two key advantages: Protection and Convenience. The personal edition - feature packed - is free
The Windows operating system has a Registry setting that can add USB write protection to a computer system. It is like a switch that can be enabled to make use of the write protection or disabled to allow write processes
Solution for the detection, isolation, and removal of the Conficker virus on your network
MailCloak encryption provides strong protection for your important emails
From Comodo, SecureEmail, the desktop application that automatically secures your email messages so your confidential data cannot be stolen or modified on its way through the Internet. Security you install and forget - SecureEmail will automatically encrypt and sign all outgoing emails and manage the complex certificate exchange procedure. Full integration with major mail clients - Outlook, Outlook Express, Thunderbird, Incredimail and many other POP, SMTP and IMAP based clients. Encrypt to anyone, anytime - innovative one-time 'session' certificates allow you to encrypt email without first exchanging signed mails. Built-in wizard to lets you quickly download and install Comodo email certificates. Available in 32 bit and 64 bit versions
Monitor data through your computers Ethernet network ports, support to capture all network packets bypassing the protocol stack. You can use this free network utility to monitor all your network adapters in your PC, not only local computer, this program can monitor and capture remote host packet. This useful network utility has some powerful features for analyzing all network packages, including kernel level packet filtering, network statistics engine and more. This program can work smoothly under most Windows operating systems; include Windows XP, 2003, 2000 and Windows Vista. This is one handy tool for normal users, programmers and network administrator
Currently just an automated process killer. It means that the running of an application is not blocked and a little time (less than one second) can pass until the tool kills a process. But more is to come
Many have come to love this Firefox extension. It allows JavaScript, Java and Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank), and provides the most powerful Anti-XSS protection available in a browser. You can enable JavaScript, Java and plugin execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows
Lets you have a separate disk on your PC which may be locked and unlocked with a password within one second! Moreover, when locked it is invisible in the Windows system
Smart idea from the Conficker Working Group. If chart fails to show certain icons, you are infected. So easy
Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 98, ME, NT, 2000, XP, Vista, Windows Server 2003 and Server 2008. Eraser is Free software and its source code is released under GNU General Public License
WhatChanged is a simple utility that searches for modified files and registry entries. It is useful for checking program installations. There are two steps for using WhatChanged: 1) First, take a snapshot of the state of the system 2) Second, run it again to see the differences from the previous snapshot. What Changed uses the "brute force method" to check files and the registry
SafeHouse Explorer creates hidden private storage areas on your local hard drive or external media to hold your confidential files. Your files are completely invisible until you enter your password. After you enter your secret password, you access your files using SafeHouse Explorer's familiar drag-and-drop Explorer-like interface. Thanks to Instant Fundas
7-Zip is a file archiver with a high compression ratio. Supported formats: Packing / unpacking: 7z, zip, gzip, bzip2 and tar. Unpacking only: arj, cab, chm, cpio, deb, dmg, hfs, iso, lzh, lzma, msi, nsis, rar, rpm, udf, wim, xar and z. for zip and gzip formats, 7-Zip provides a compression ratio that is 2-10 % better than the ratio provided by PKZip and WinZip. Strong AES-256 encryption in 7z and ZIP formats. Integration with Windows Shell
Press Ctrl-Q to block all input for 5 seconds
Disable the Close button (X) of selected windows
Say you are browsing, ahem, stuff on the Internet that you aren’t supposed to see and somebody walks into the room
Simple internet tools is a dozen simple yet helpful tools for both the common user and admins.
FlashCrypt is an effective and reliable folder security software for Microsoft Windows users. It allows you to lock any folder on your computer with a couple of mouse clicks. Military-grade 256-bit AES algorithm guarantees the highest level of data protection. Want to securely protect your files? You don't need to be a computer or security expert anymore! FlashCrypt provides extremely easy-to-use, but safe and secure folder protection solution. (Look under Products)
This step-by-step article describes how to examine a small Windows memory dump file. You can use this file to determine why your computer has stopped responding
An ordinary deleting of files isn't enough! When you wish to delete any sensitive information, like industrial secrets or some unwanted content, you want to be sure that it will be deleted permanently. Sorry to say, there is a plenty of software recovery tools that can restore your deleted items. If you need to destroy any data and eliminate any possibility of its restoration you need a "shredder". This software destroys the data you choose before the deletion, using a complicated procedure of filling the actual content with random data. Freeraser can function on three levels: 1. a fast destruction (standard 1-round filling of random data) 2. a forced destruction (3 rounds of filling according to DoD 5220.22M standard) 3. an ultimate destruction (35 rounds of filling with data according to Guttman algorithm)
SpyMe Tools is very useful in detecting Registry and Disk changes. If any application installs spyware, adware, dlls, programs, files, or any other type of file, picture, or program, etc. or changes the Registry's content, you will be able to see exactly where the modification occurred so you can take measures. It seems like more and more programs are attempting to install spyware, advertisements, or other garbage without your knowledge, but with this software you will know everything that is added or removed. To detect Registry/Disk changes the program will create Dumps of the actual states of Registry/Disk. This means that at any time you can open the Dump file and view the contents of the Registry/Disk just as they were when you've scanned the Registry/Disk. The program can compare two different dump files so you'll see exactly what changed in the Registry/Disk between the two scans. You can also use the program to backup your Registry. The program can restore old states of Registry keys using the data in the Dump files. To prevent other persons from viewing your scanned files you may encrypt them so that a password will be required whenever someone tries to open them. SpyMe Tools also includes a Real time Disk/Registry monitor so you may spot the changes in real time.(Real time Disk monitor works only on NT platform, including Win2k and Win XP.) Thanks to Lifehacker
Lots of good tools, maybe all you need. Most of the applications don't require installation and the kit can be run directly from your thumb drive
In just two clicks, WinBubble will help you to Customize and Tweak your Windows Vista easily. Its features cover Customization, Security and Optimization
The Xen hypervisor, the powerful open source industry standard for virtualization, offers a powerful, efficient, and secure feature set for virtualization of x86, x86_64, IA64, PowerPC, and other CPU architectures. It supports a wide range of guest operating systems including Windows, Linux, Solaris, and various versions of the BSD operating systems
Folder Checker can be used to monitor changes inside specified folders. The program will alert when files are added, deleted or modified in these folders
This is a security program that can be used to detect unknown viruses and spyware. It allows the power user to trust the system executables initially and alerts when new programs are run or when existing programs are modified
With SolarWinds free Wake-On-LAN, powering up a remote PC is no longer an issue. When the remote network adapter hears a Magic Packet created for its unique MAC address, the network adapter alerts the computer to power up. If Wake-On-LAN is enabled in the computer's BIOS settings, then the system will start up just as if the power button has been pressed. When a device is shut down, its network interface card is still receiving power and keeps listening on the network for a magic packet to arrive – enabling Wake-On-LAN to do its magic! Go to Downloads
Many people believe that emptying the Recycle Bin will cause the deleted information to disappear forever. Unfortunately, that's not true. Many file-recovery programs and different forensic techniques exist that can recover information contained in deleted files. That means that those disk drives can still contain confidential or secret data which can be recovered. The U.S. Department of Defense has published their 5220.22M Standard for secure clearing of disk drives. That is to say, taking all of the unallocated space on a disk drive (not to include existing files) and render the contents of those unallocated areas safe from forensic recovery techniques and insure that no confidential information, in deleted files, can ever be recovered. SidesWipe is a simple and straightforward Windows utility that brings this capability to your desktop or server. SidesWipe also supports other more extensive secure drive cleaning methods such as the Guttman method, NSA, UK standard, Canadian RCMP suggested method, as well as a very quick and easy Single Sweep method. All methods are supported. You make the choice
When you access the Internet with your web browser, a lot of things happen that are hidden to you. The browser and the website exchange "headers" that define the behaviour of the browser's cache system, create or use cookies, tell the website who you are and where you came from, and so on. Moreover, the page's html code contains hidden tags or javascript programs that control the browser's behaviour, such as "mouse-over" animation, page layering, URL masking or pop-up messages. And last but not least, the page often contains ads and banners that pollute the screen and slow down your web experience. Proximodo acts as a mediator between the browser and the website. It "sees" everything that is going on and, according to your choices, modifies headers and html page content on-the-fly to make things right. You don't want pop-ups and banners? Just activate the corresponding filters and they will disappear. You want cookies to be deleted when you close your browser? Proximodo will do it for you. You want a fast navigation in the pages you already visited? Page caching will be forced. Basically, Proximodo is a clone of a great piece of software called The Proxomitron, developed by Scott R. Lemmon. Now that for sad reasons Proxomitron is unmaintained, I started this project to carry on the idea. Though a few Proxomitron features are still missing in Proximodo (mainly SSL support) the essential is already there: 100% of Proxomitron filters will run under Proximodo (plus there is a menu to import your custom Proxomitron filters). Proximodo currently comes with default Proxomitron filters, which can do quite a lot of different things. But you can write your own filters, using a powerful syntax that, despite its seeming complexity, is quite easy to use and master.
Delete files that are difficult to delete, such as some files left by viruses and trojans, or files with corrupted file names. This program can also delete files like the "index.dat" files, which store Internet history, by scheduling them for deletion upon system restart. Select a file to delete from the built-in file browser or drag a file to the application's icon or window from Window's Explorer
The Proxy Switcher is a small tray icon type utility that allows you to select whether Windows and Mozilla Firefox should use a proxy server for Internet access in a couple of clicks. No more digging around in the Internet Options screen for Windows or the Advaced tab in Firefox. Simply right click on the tray icon and choose 'Home' for a direct connection to the Internet or 'Office' to use the proxy, there is even an 'Auto' option which will change the setting for you when you connect to your work/home or work VPN network. Proxy Switcher will even inform your windows environment of the changes so you don't even need to restart applications such as Internet Explorer or MSN Messenger when the proxy settings change
Proxomitron lets you view the web the way YOU want. Getting rid of many common annoyances is as simple as clicking on one of the filtering rules included with the program, but best of all, the Proxomitron's rules aren't "hard-coded". You can look at them, modify them, even write entirely new ones! If you know some HTML, you'll find the Proxomitron allows you to personally customize just about any web page you view. You'll no longer be at some web-master's tender mercy. Even if you know no HTML, you'll find the included rules give you far more control than you've ever had before, and my hopes are that other Proxomitron user will contribute useful rules they've written for the benefit of everyone. Besides filtering web pages, The Proxomitron also allows you to control the normally hidden HTTP header messages that pass between your browser and the outside world. Many people are unaware that this covert conversation is even taking place, yet it can reveal all sorts of information. See exactly what your web browser has to say, then have it tell the world only what you want! Even those notorious "cookies" can be deleted or modified if you wish. Proxomitron: a free, highly flexible, user-configurable, small but very powerful, local HTTP web-filtering proxy
Provides a fully customisable way of filtering out unwanted proxies via control files, a proxy tester to check anonymity - and a fully functional search engine crawler to find lists of posted proxies. Included within the kit is a php checker which can be uploaded to your own webspace to spread the processor load and bandwidth of the actual testing. This is fully integrated into Charon where it will simply send your pages lists of proxies and harvest the results
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Verify the effectiveness of file and disk wiping programs. Undelete previously deleted files
A simple, fast, and powerful backup program. Customize the program to your needs. Allows you to backup whole folders/directories, or individual files, or files matching a search pattern. Organizes your backup tasks into groups to keep you on top of what would otherwise be a complicated job
Online tool scans a file with numerous antivirus programs
Firefox add-on for easy cache status and management
Automatically hide a window's buttons and other controls, by Skrommel
Prevents the moving of desktop icons, by Skrommel
Make rules that move files automatically, by Skrommel
Click on the desktop to hide all windows. By Skrommel
Ghostery browser add-on tracks those who track you on the web and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity .....(free).....
Great article from Dan Lyons (Fake Steve Jobs) raising questions about some of the most popular sources of tech news just shilling for their own monetary interests. Must read!.....(free).....
LicenseCrawler will enable you to find the license keys and serial numbers of Microsoft products and other programs on your machine.....(free).....
This is one of the best articles we've seen on this interesting subject .....(free).....
It continues .....(free).....
After you login to your computer, Screen Lock quietly waits for you to insert your Password Booster or USB flash drive. Now, whenever you remove the device from the USB port, your computer login session is immediately locked. Only the device that was used to lock your computer can be used to unlock you computer. This is the locking device.....(free).....
HDD Raw Copy Tool is a utility for low-level, sector-by-sector hard disk duplication and image creation .....(free).....
Allows you to change (spoof) Media Access Control (MAC) Address of your Network Interface Card (NIC) or Wireless Network Card (WiFi), irrespective of the NIC drivers or its manufacturer. Current user-friendly version has many new features which allows you to change IP Address, Gateway, DNS Servers, IPv6 support, enable/disable DHCP in one click, network configuration presets and many more features.....(free).....
RegFromApp monitors the Registry changes made by the application that you selected, and creates a standard RegEdit registration file (.reg) that contains all the Registry changes made by the application. You can use the generated .reg file to import these changes with RegEdit when it's needed.....(free).....
System Restore Manager is a freeware portable utility which allows you to completely manage your Windows system restore points and customize its options .....(free).....
Comodo Cleaning Essentials (CCE) is a set of computer security tools designed to help users identify and remove malware and unsafe processes from infected computers. Instantly identify and stop every untrusted process running on an endpoint with a single click. Powerful antivirus scanner capable of removing malware, rootkits, hidden files and malicious registry keys hidden deep within a system. Forensic level stats and graphs allow internal processes and resource usage to be analyzed with unrivaled granularity. Integration with Comodo cloud scanners provides real-time safety verdicts for unknown processes. No installation required – can run direct from USB or user desktop via RDP.....(free).....
Advanced Onion Router is a client for TOR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. It is able to "force" a program and its plugins to use the Tor proxy regardless of its configured proxy.....(free).....
Microsoft has a plan to automatically upgrade Windows customers to the latest version of Internet Explorer available for their PC. That would be IE 8 for XP and IE 9 for Vista and Windows 7. This link provides downloads to prevent the auto upgrade on your machine.....(free).....
Here is the list .....(free).....
BleachBit quickly frees disk space, removes hidden junk, and safeguards your privacy. You can erase cache, Internet history, cookies (including the much-maligned "evercookie"), DOM storage, unused localizations, and temporary files of 70 applications including Firefox, Internet Explorer, Flash, Google Chrome, Opera, Safari, Adobe Reader, APT, and more. Includes wipe function to prevent recovery of deleted files, supports the winapp.ini cleaner list, and available for 52 languages. Also available for Linux.....(free).....
This free time tracking tool shows the times your computer has been active during the last 3 weeks, with no previous setup required. The software doesn't need to run in the background, because Windows OS tracks logon and logoff/standby times (working hours) by default, and the program analyses it .....(free).....
Log source, destination [fqdn or ip address] and packet size of all network traffic on your network, of course also outbound traffic. The network card will be set into promiscuous mode. Save sniffed HTTP and FTP files. Just for fun, pictures are shown in a slideshow and in a screensaver like window. Sniff for HTTP, FTP, POP3, SMTP, SMB, VNC and AIM password/hash and HTTP cookies like 'GX'. Select a client and follow his clicks in your browser. [WebSession] Screensaver included. Shows sniffed pictures in a slideshow. For advanced user: You can capture traffic into a pcap file, send a pcap file and replay a pcap file. For advanced user: You can restrict captured traffic by tcpdump filters. .....(free).....
PortScan shows all open ports and additional information like host name, MAC address, HTTP, SMB, FTP, iSCSI, SMTP and SNMP services. Up to 100 threads are used for scaning large ip address ranges. You can search for UPnP enabled devices, Bonjour services, Netgear router, Samsung printer and Freecom network devices. So you can find them even if you don't know the ip address. Ping any computer with 3 standard sized ping packets, with 3 different sizes, each 10 times or ping the computer continuously. .....(free).....
This utility displays the list of all applications that are loaded automatically when Windows starts up. For each application, the following information is displayed: Startup Type (Registry/Startup Folder), Command-Line String, Product Name, File Version, Company Name, Location in the Registry or file system, and more.....(free).....
Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next-generation scan engine technology, including process scanning, digitally signed .DAT files, and scan performance optimizations. It detects and removes threats identified under the "List Viruses" icon in the Stinger application .....(free).....
ReStartMe is designed to do one thing, and that is to restart processes, crashed or otherwise.The way ReStartMe is used is that when it is started, you add processes to watch. You can either start a new program, or add a currently running process. Once you tell ReStartMe to watch a process, it will watch it, but it won't react until the process exits. When a process that ReStartMe is watching exits for any reason, whether it was closed properly or not, ReStartMe will restart it.....(free).....
With Macrium Reflect Free Edition you'll be able to easily make an accurate and reliable image of your HDD or individual partitions. Using this image you can restore the entire disk, partition or individual files and folders in the event of a partial or complete system loss. Download thanks to Major Geeks!.....(free).....
Comments | Report Entry | Added: 05/30/2013
Front-end for PsTools (FePsTools) is a graphical interface around the command line tools from SysInternal's PsTools. FePsTools gives you an easy way to build the command you need to execute a PsTool utility. While you are clicking and typing the needed options you can see the command line build up.
Comments | Report Entry | Added: 05/31/2013
The Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites and online media for signs of terrorist or other threats against the U.S.
Comments | Report Entry | Added: 05/31/2013
OpenVPN is a easy to use open source VPN client
Comments | Report Entry | Added: 06/20/2013
WinDataReflector is a lightweight file synchronization and backup tool that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up and support for two way synchronization with fully customizable rules.
Comments | Report Entry | Added: 06/22/2013
Description : RogueKiller is a program written in C++ and able to : Kill malicious processes Stop malicious services Unload malicious DLLs from processes Kill malicious hidden processes Find and remove malicious autostart entries, including : Registry keys (RUN/RUNONCE, ...) Tasks (Scheduler 1.0/2.0) Startup folders Hijack entries, including : Shell / Load entries Extension association hijacks DLL hijacks Many, many others ... Read / Fix DNS Hijacks (DNS Fix button) Read / Fix Proxy Hijacks (Proxy Fix button) Read / Fix Hosts Hijacks (Hosts Fix button) Restore shortcuts / files hidden by rogues of type "Fake HDD" Read / Fix malicious Master Boot Record (MBR) -- Even hidden by rootkit List / Fix SSDT - Shadow SSDT - IRP Hooks (Even with inline hooks) Find and restore system files patched / faked by a rootkit
Comments | Report Entry | Added: 07/05/2013
xShredder for Microsoft Windows XP, Vista and Win 7 protect your privacy! With xShredder you can destroy your sensitive files.
Comments | Report Entry | Added: 07/08/2013
It has been almost two decades since the beginning of the web. This means that the web is no longer just a technology of the present, but also, a record of our past. Email, one of the original forms of social media, is even older than the web and contains a detailed description of our personal and professional history. Immersion is an invitation to dive into the history of your email life in a platform that offers you the safety of knowing that you can always delete your data.
Comments | Report Entry | Added: 07/17/2013
Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer. A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. This tool will help you remove these types of programs
Comments | Report Entry | Added: 09/20/2013
Many companies use dark pattern techniques to make it difficult to find how to delete your account. JustDelete.me aims to be a directory of urls to enable you to easily delete your account from web services.
Comments | Report Entry | Added: 10/13/2013
PeStudio is a free tool performing the static analysis and investigation of any Windows executable binary. A file being analyzed with PeStudio is never launched. Therefore you can evaluate unknown executable and even malware with no risk.
Comments | Report Entry | Added: 10/31/2013
Efficient system backup & recovery. No need to reinstall OS or applications to get everything back. Backup data, system, hard disk, partition or individual files to a safe destination for disaster recovery. Disk clone, disk upgrade and SSD migration solution. Directly recover individual files from disk/partition backup image, no need to recover the whole image.
Comments | Report Entry | Added: 12/14/2013
Wise Program Uninstaller is able to remove your software by safe uninstall. And it can repair the programs of Windows Office, Adobe etc.
Comments | Report Entry | Added: 12/14/2013
The free web debugging proxy for any browser, system or platform
Comments | Report Entry | Added: 03/07/2014
CryptSync is a small utility that synchronizes two folders while encrypting the contents in one folder. That means one of the two folders has all files unencrypted (the files you work with) and the other folder has all the files encrypted.
Comments | Report Entry | Added: 05/16/2014
WifiInfoView scans the wireless networks in your area and displays extensive information about them, including: Network Name (SSID), MAC Address, PHY Type (802.11g or 802.11n), RSSI, Signal Quality, Frequency, Channel Number, Maximum Speed, Company Name, Router Model and Router Name (Only for routers that provides this information), and more...
Comments | Report Entry | Added: 05/24/2014
eToolz includes some of the most important network tools like NS-Lookup, Ping, TraceRoute and Whois. eToolz is portable and can be used on USB devices.
Comments | Report Entry | Added: 05/26/2014
With this tool you can integrate Addons, Drivers, Gadgets, Language packs, Modified Files, Theme Packs, Tweaks, Silent Installers, Updates. You can also remove features such as Windows Media Player and customize Windows default services state. Win Toolkit also comes with extra tools which helps you convert files, make ISOs, download the latest updates (thanks to SoLoR and McRip), and completely customize your images to tailor your Windows installation disk to your exact needs. (Site requires registration)
Comments | Report Entry | Added: 08/19/2014
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
Comments | Report Entry | Added: 08/25/2014
DBAN is free erasure software designed for the home user. It automatically deletes the contents of any hard disk that it can detect. This method can help prevent identity theft before recycling a computer. DBAN is also a commonly used solution to remove viruses and spyware from Microsoft Windows installations.
Comments | Report Entry | Added: 08/28/2014
FOG is a Linux-based, free and open source computer imaging solution for Windows XP, Vista and 7 that ties together a few open-source tools with a php-based web interface. FOG doesn't use any boot disks, or CDs; everything is done via TFTP and PXE. Also with fog many drivers are built into the kernel, so you don't really need to worry about drivers (unless there isn't a linux kernel driver for it). FOG also supports putting an image that came from a computer with a 80GB partition onto a machine with a 40GB hard drive as long as the data is less than 40GB. Fog also includes a graphical Windows service that is used to change the hostname of the PC, restart the computer if a task is created for it, and auto import hosts into the FOG database. The service also installs printers, and does simple snap-ins.
Comments | Report Entry | Added: 09/04/2014
RDCMan manages multiple remote desktop connections. It is useful for managing server labs or large server farms where you need regular access to each machine such as automated checkin systems and data centers. It is similar to the built-in MMC Remote Desktops snap-in, but more flexible.
Comments | Report Entry | Added: 09/12/2014
DataNumen Disk Image (DDKI) is a powerful tool to create disk or drive images. It can clone the raw data of the disk or drive byte by byte. Useful for data recovery and forensic.
Comments | Report Entry | Added: 09/17/2014
It is a very basic V2P free tool to simply dump a VHD contents/structure to a physical drive. It designed to work only with dynamic VHD like Disk2vhds output.
Comments | Report Entry | Added: 10/13/2014
Nero BackItUp 2014. The Nero BackItUp 2014 backup combo offers 4x local automatic backup (to hard disks, external storage, CD/DVD/Blu-ray and NAS) and your very own personal online hard disk for that extra bit of data security! ( Free with paid Add ons )
Comments | Report Entry | Added: 10/22/2014
Avetix Antivirus Free ensures comprehensive protection of your PC, by intercepting all threats, such as viruses, worms, spyware and trojans. It also uses Anti-Adware technology to prevent unexpected and annoying advertising pages opening on your browser. Thanks to its preventive action, Avetix also ensures the removal of viruses before they appear on your computer, by checking suspicious files before they are opened and monitoring Internet and e-mail links that may be harmful to your PC. Avetix is an antivirus software that can guarantee total and constant protection during your normal daily computer activities. In the event of a probable threat, Avetix notifies you immediately and guides you through a range of actions. It automatically detects any risk to your computer and always notifies you while you are using the your computer. Its activity does not affect the efficiency of your operating system or slow down normal computer processes in any way, ensuring optimum performance
Comments | Report Entry | Added: 12/01/2014
Active KillDisk Linux Console is an easy-to use and compact utility that allows to sanitize storage media using more than 23 international data sanitizing standards. It erases permanently all data on Hard Disks, Camera Flash Cards and USB disks, SCSI storage and RAID disk arrays even in parallel mode (several disks at the same time).
Comments | Report Entry | Added: 12/03/2014
Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a checkbox, and spent hours afterwards removing adware? Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser? Unchecky aims to keep potentially unwanted programs out of your computer.
Comments | Report Entry | Added: 12/03/2014
Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human rights defenders and journalists around the world.
Comments | Report Entry | Added: 12/04/2014
Install and Update All Your Programs at Once. No toolbars. No clicking next. Just pick your apps and click Get Installer.
Comments | Report Entry | Added: 12/06/2014
FreeFileSync is a free Open Source software that helps you synchronize files and synchronize folders for Windows, Linux and Mac OS X. It is designed to save your time setting up and running backup jobs while having nice visual feedback along the way
Comments | Report Entry | Added: 01/05/2016
Redo Backup and Recovery is so simple that anyone can use it. It is the easiest, most complete disaster recovery solution available. It allows bare-metal restore. Bare metal restore is not only the best solution for hardware failure, it is also the ultimate antivirus: Even if your hard drive melts or gets completely erased by a virus, you can have a completely-functional system back up and running in as little as 10 minutes.
Comments | Report Entry | Added: 01/08/2016
Released by Adobe to help users uninstall Adobe Flash from their systems
DONATE!
Poor old Joe needs your help! Donate with PayPal today!
Donate $50 and we will give you a link for a month in our list of supporters!
Contact Us!

Or Donate Bitcoins! Donate Bitcoins
SUBMIT FREEWARE
OUR HEADLINES
SEND FRIENDS
ShellCity.Net

ShellCity.Net

Daily Rotation

Have a program listed here? use one of the links images below!

ShellCity.Net Favorite
Or this one.
ShellCity.Net Favorite

Site Policies
RSS Feed ShellCity.Net XML Sitemap W3C Valid PHP Powered Apache.org Made With Nano PageRank Checker