Tag Archives: automatic

Secunia PSI 3.0 (Beta) – Automatic, Comprehensive Patching Of Insecure Applications

imageOne of the most frequently repeated pieces of advice on this site is – “Keep all applications (including your operating system) patched, and up to date”. Taking this simply step, reduces the likelihood that malware will become an issue a user will have to deal with – significantly.

Sounds like good, practical advice – and it is. But as those of us involved in computer security know; this is advice that is not always followed. Some hold the view (including me), that it is rarely followed.

One particular application that I have reviewed and recommended a number of times – that assists users in keeping a system fully patched is – Secunia Personal Software Inspector (PSI) – which constantly monitors a system for insecure software installations, notifies the user when an insecure application is installed, and then provides the user with detailed instructions for updating the application, when available.

There’s less reason now, than ever, to disregard this critical advice. Today, Secunia launched version 3 (Beta) of its free Personal Software Inspector (PSI), with a host of new features. The new version makes patching software more comprehensive, automatic, and easier than ever. How simple is that? PSI 3 takes the burden out of updating and patching.

Fast facts:

Extended automatic patching using the Secunia Package System (SPS), removing the dependency on vendors providing silent installers.

It automatically detects insecure programs – from all software vendors, not just those from Microsoft – that need updating.

The Secunia PSI then downloads the required security updates and installs them without any effort from the user, making it much easier to maintain a secure PC.

New and dramatically simplified user interface

Non-intrusive authenticated vulnerability and patch scanning

Auto-update of programs

Covers programs and plug-ins from thousands of vendors

Unprecedented accuracy

Reports security status for each.

Wondering just how PSI does its job? Secunia explains:

The Secunia PSI works by examining files on a computer (primarily .exe, .dll, and .ocx files). These files contain non-specific meta information provided by the software vendor. This data is the same for all users and originates from the installed programs on your computer — never from their configuration.

After examining all the files on the local hard drive(s), the collected data is sent to Secunia’s servers, which match the data against the Secunia File Signatures engine. This information can then be used to provide a detailed report of the missing security related updates for the user’s system. The Secunia PSI automatically performs scans every seven days to ensure that the latest secure versions of the software is installed.

The Secunia PSI 3.0 (beta) can be downloaded from Secunia’s website now at Secunia.com/PSI.

Previous reviews of this must have application here include:

Not Running Secunia PSI? Why Not?

Secunia Personal Software Inspector – Insurance Against Vulnerabilities

How secure do you think you are? Run a quick scan of your computer with Secunia Online Software Inspector.

About Secunia:

Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats, risks across their networks, and end-points. This is enabled by Secunia’s award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets.

Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. Secunia has operations in North America, the UK, and the Middle East, and is headquartered in Copenhagen, Denmark.

7 Comments

Filed under 64 Bit Software, Application Vulnerabilities, downloads, Freeware, Malware Protection, Secunia

Smarter Than Ever – IObit Releases Free Smart Defrag 2

IObit announces a new version of their free disk defragment software – Smart Defrag 2.

Defrag In a real sense, it’s often difficult to measure an increase in system performance following Hard Drive defragmentation. Nevertheless, I do agree, that defragging is a positive maintenance process, and should be done regularly.

A  quick recap on disk fragmentation: What is it?

Creating and deleting files and folders, installing new software, and downloading files from the Internet, will cause a Hard Drive to become fragmented. When you delete files or folders, the first available empty spaces on the Hard Drive are filled in randomly when you create new files and folders – as you do when you save pics from your camera, install software, save emails, or create documents.

To keep fragmentation to a minimum, I run the paid version of TuneUp Utilities 2011 in the background, which continuously optimizes, amongst other things, my computer’s hardware, including automatic disk defragging.

The latest release (March 18, 2011 ), of the award winning free system tool, IObit Smart Defrag 2 , can also run on this type of “set and forget” basis. I occasionally hear from users that they can’t remember the last time they defragged their disk/s – they’ll get to it – eventually. But, they don’t have to – IObit Smart Defrag 2, can do this for them on a continuous basis.

Sporting a brand new user interface, (which remains uncluttered), IObit Smart Defrag 2 continues to be easy to use, and as in previous versions – it’s fast and efficient, and best of all, it’s free.

Installation: Be cautious.

image

NEW – Boot time defrag allows files which can’t be defragged, or moved while the system is running, to be defragged. These files include pagefile, hibernation file, MFT, and system files.

image

image

If you’re running the automatic defrag feature, you’ll have ready access to a simple reporting tool.

image

Running a full defrag, and full optimization (which places  frequently used files and folders into the fastest area of the disk), took just a few minutes.

image

Fast facts:

Extremely Fast and Efficient Defragmentation Enhanced – Using IObit’s latest defrag engine and the new “Boot Time Defrag” technology, Smart Defrag 2 has not only the world’s fastest defragmenting speed but also the most advanced defragmenting ability. It’s been specially designed for modern, large hard drives, which eliminates the long waiting time.

Always-on Automatic Defragment Enhanced – Smart Defrag 2 works automatically and quietly in the background, so it continually and constantly keeps your computer fragment-free.

New! “Boot Time Defrag” Technology – Smart Defrag 2 uses a new “Boot Time Defrag” technology which allows you to defrag files during the system boot process – files which cannot be defragged or are not safe to move after the system is already up.

System requirements: Windows 7 (32-bit and 64-bit), Vista (32-bit and 64-bit), XP (32-bit and 64-bit) with SP2/SP3 or Home/Professional/Media Center, and 2000.

Languages: English, Albanian, Arabic, Brazilian Portuguese, Bulgarian, Czech, Danish, Dutch, Finnish, Flemish, French, German, Greek, Hungarian, Italiano, Japanese, Korean, Malayalam, Norwegian, Polish, Romanian, Russian, Slovak, Slovenian, Spanish, Swedish, Turkish, Vietnamese, 简体中文, 繁體中文.

Download at: Download.com

The addition of a “boot-time defrag” feature (not always available in a free defrager), coupled with an improved defrag engine, makes Smart Defrag 2 a worthy competitor in a crowded freeware defrag market.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under 64 Bit Software, Computer Maintenance, Computer Tune Up Utilities, Defrag Tools, Defraggers, downloads, Freeware, Hard Drive Tools, IObit, Software, TuneUp Utilities, Windows Tips and Tools

Stolen or Lost Laptop Tracker Software – Adeona Free

stolen-laptopYou’ll never lose your Laptop computer, and you take particular care to ensure it won’t be stolen, right? Of course you do. But does loss, or theft, of laptops happen? You bet.

Recent survey results from the Ponemon Institute, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of those lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you, than the above statistics indicate?

adeona

Adeona (named after the Roman goddess of safe returns), is a recently released small software client for tracking the location of a lost, or stolen laptop, that does not rely on a proprietary central service, but instead, is offered free by the Open Source community.

This powerful free software has been developed through collaboration involving the University of Washington, the University of California San Diego and the University of California Davis.

The developer’s website describes the application as follows:

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop.

The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.

The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Quick facts:

Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.

Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates. (See caveat)

Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.

The Mac OS X version can capture pictures of the laptop user, or thief, using the built-in iSight camera.

System Requirements: Windows XP/Vista, Mac OS X, Linux

Download at the developer’s web site: Adeona

A caveat: According to the development team, “OpenDHT has been experiencing some problems. We are working on a new private version, that does not depend on OpenDHT”.

For a review and download links to free encryption software read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this site.

5 Comments

Filed under Free Laptop Tracking Software, Freeware, Geek Software and Tools, Open Source, Software, Surveilance Tools, Windows Tips and Tools

Evonsoft Computer Repair – Free, One Click System Utility

System utilities that incorporate multiple functions such as a Registry Cleaner, Junk File Remover, Privacy Cleanup, and in some applications, even more functionality, can be intimidating to new computer users.

New users are very often unfamiliar with both the technology itself, and the technical terms involved in using this type of application.

While it’s generally true that more advanced users want/need much more control than a one click system utility provides, this type of utility can be the ideal solution for a new user.

Evonsoft Computer Repair is one such advanced system utility for Windows that allows the user to safely remove spyware, clean the registry, sweep for privacy issues, and clean junk files with a single mouse click.

According to the developers, with one click, Evonsoft Computer Repair will scan your computer and provide a list of the errors found by the application. You will then have the choice of cleaning each item individually, or allow the application to repair the errors automatically.

In my own testing, I found that the application was extremely fast and that it worked as advertised. I did find however, that the lack of a clear explanation left me feeling slightly uncomfortable. I suspect that more advanced users might also feel the same way.

On the other hand, this lack of explanation might be the very feature that the new user will find most appealing about this application. Most new computer users, in my experience, don’t want to know the details; they just want the job done.

Quick facts:

Scans and removes spyware and adware

Cleans your System and should boost performance

Repairs your PC and keeps it tuned

Very easy to use

Free – no adware, spyware, or viruses

System Requirements: 32-bit Windows Vista, XP, 2000, and 2003 Server.

Download at: Download.com

For a review, and a download link for similar free system utilities, checkout “Advanced WindowsCare Personal”, and “Glary Utilities – Perfect Collection of Free System Tools”, on this site.

2 Comments

Filed under Disk Cleaners, Freeware, Privacy, Registry Cleaners, Slow Computer, Software, System Utilities, Utilities, Windows Tips and Tools

Adeona – Free – Stolen/Lost Laptop Tracker Software

You’ll never lose your Laptop computer, and you take particular care to ensure it won’t be stolen, right? Of course you do. But does loss, or theft, of laptops happen? You bet.

Recent survey results from the Ponemon Institute, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of those lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you, than the above statistics indicate?

Adeona (named after the Roman goddess of safe returns), is a newly released small software client for tracking the location of a lost, or stolen laptop, that does not rely on a proprietary central service, but instead, is offered free by the Open Source community.

This powerful free software has been developed through collaboration involving the University of Washington, the University of California San Diego and the University of California Davis.

The developer’s website describes the application as follows:

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop.

The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.

The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Quick facts:

Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.

Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates.

Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.

The Mac OS X version can capture pictures of the laptop user, or thief, using the built-in iSight camera.

System Requirements: Windows XP/Vista, Mac OS X, Linux

Download at the developer’s web site: Adeona

For a review and download links to free encryption software read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this Blog.

2 Comments

Filed under Free Laptop Tracking Software, Freeware, Geek Software and Tools, Interconnectivity, Open Source, Software, Utilities, Windows Tips and Tools

Evonsoft Computer Repair – Free, Simple, System Utility for Novices

System utilities that incorporate multiple functions such as a Registry Cleaner, Junk File Remover, Privacy Cleanup, and in some applications, even more functionality, can be intimidating to new computer users.

New users are very often unfamiliar with both the technology itself, and the technical terms involved in using this type of application.

While it’s true that more advanced users want/need much more control than a one click system utility provides, this type of utility can be the ideal solution for a new user.

Evonsoft Computer Repair is one such advanced system utility for Windows that allows the user to safely remove spyware, clean the registry, sweep for privacy issues, and clean junk files with a mouse click.

According to the developers, with 1 click, Evonsoft Computer Repair will scan your computer and provide a list of the errors found by the application. You will then have the choice of cleaning each item individually, or allow the application to repair the errors automatically.

In my own testing, I found that the application was extremely fast and that it worked as advertised. I did find however, that the lack of a clear explanation left me feeling slightly uncomfortable. I suspect that more advanced users might also feel the same way.

On the other hand, this lack of explanation might be the very feature that the new user will find most appealing about this application. Most new computer users, in my experience, don’t want to know the details; they just want the job done.

Quick Facts:

Scans and removes spyware and adware

Cleans your System and should boost performance

Repairs your PC and keeps it tuned

Very easy to use

Free – no adware, spyware, or viruses

System Requirements: 32-bit Windows Vista, XP, 2000, and 2003 Server.

Download at: Download.com

8 Comments

Filed under Disk Cleaners, Freeware, Privacy, Registry Cleaners, Slow Computer, Software, Spyware - Adware Protection, System File Protection, System Utilities, Utilities, Windows Tips and Tools

Lost or Stolen Laptop – Get it Back With Adeona (Maybe)

Survey results released this past week by The Ponemon Institute, which was sponsored by Dell, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of these lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you have a better chance that it will be returned to you, than the above statistics indicate?

Adeona is a newly released small software client for tracking the location of a lost or stolen laptop that does not rely on a proprietary central service, and which is offered free by the Open Source community.

The developer’s website describes the application as follows:

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop. The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.

The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Stolen Laptop Pic from an onboard camera.

Quick facts:

  • Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.
  • Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates.
  • Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.
  • The Mac OS X version can capture pictures of the laptop user or thief using the built-in iSight camera.

System Requirements: Windows XP/Vista, Mac OS X, Linux

Download at the developer’s web site: Adeona

Please note: I have been advised that these files are currently available for download.

For a primary on what happens to stolen information read, Another Advantage of Credit Cards, on my good friend TechPaul’s Blog

2 Comments

Filed under Freeware, Geek Software and Tools, Interconnectivity, Mobile Applications, Open Source, Software, Surveilance Tools, Surveillance, System Security, Utilities, Windows Tips and Tools

Free Encryption Software – TrueCrypt – USB Security

Whenever the subject of file/disk encryption comes up when talking with my non-technical friends, I often get the oddest looks and the strangest comments. These comments generally revolve around the fact (my friends’ facts), that only someone with something to hide would need to encrypt files.

Well, they’re right; but not for the reasons that they suggest.

The real world shows us continually, that financial data and other confidential information can easily be subject to intrusive viewing by others not authorized to do so.

Two examples of how this might occur:

Internet malware attack: Statistics have shown, more and more, that financial data is targeted by hackers/information thieves, for the purpose of identity theft. The reality is; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read/heard the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week. In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It is a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until decrypted.

TrueCrypt is an outstanding free open source software system, (one I have using for the last several years) for establishing and maintaining an on-the-fly-encrypted volume. On-the-fly encryption simply means that data are automatically encrypted or decrypted just before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/correct encryption keys.

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or in this latest release (March 17, 2008), a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

As I stated earlier I have been using TrueCrypt for a number of years and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try. Indicative of this application’s popularity is the fact that it has been downloaded 5,837,372 times.

Quick Facts:

  • Creates a virtual encrypted disk within a file and mounts it as a real disk
  • Encrypts an entire hard disk partition or a storage device such as USB flash drive
  • Encryption is automatic, real-time (on-the-fly) and transparent
  • Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)
  • Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS
  • Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts
  • Pipelined operations increasing read/write speed by up to 100% (Windows)
  • Mac OS X version
  • Graphical user interface for the Linux version of TrueCrypt
  • XTS mode of operation – XTS is faster and more secure than LRW

Download at: Download.com

6 Comments

Filed under Anti-Malware Tools, Encryption, Encryption Software, Freeware, Portable Applications, Privacy, Software, System Security, USB, Utilities, Windows Tips and Tools