Tag Archives: protect

How to Protect Your Privacy on Social Media

Guest writer Sarah Clare tackles the thorny issue of Internet privacy and offers spot-on advice  to help you keep your online information private.

imageThis week, social media was abuzz over reports that Instagram’s new terms of service allowed the photo-sharing site to hock its users personal photos for advertisements and other promotions. The story prompted outcry about the privacy that members can expect (or not expect) on social media sites like Instagram and Facebook, which purchased Instagram and which has a spotty history when it comes to its users’ privacy.

Understanding your rights and how you can protect your privacy on social media is important. The things you do online leave a virtual footprint that can be traced back to you for years to come. If you really want to protect your privacy on social media, here are a few things you can do:

Use a Dummy E-mail

One of the easiest ways that other users can find you on social media is by searching for your e-mail. You can make it harder, if not impossible, for people to find you by using a dummy e-mail. That way, only your close friends or family who you give the e-mail to can find your profile. Be sure to use an e-mail that does not include your name and that you only use for this purpose.

Use a Fake Name

Of course, even if you’re using a dummy e-mail, if you’re using your real name, anyone can find you. Make it harder for others to connect your profile to you by using a fake name. An easy way to do it is to simply drop your last name, using your first and middle name instead. Or you can use a nickname instead of your first name. Or you can make up a new name entirely.

Again, be sure you keep this name private and only give it to close friends and family who you want to know about your profile. Don’t use the name for any other purposes.

Set Privacy Options

Every social network has options for allowing you to control what you share with your network and with the public. You can control your privacy settings for your whole profile and for individual posts. Take the time to investigate your options and to set what you can to private. In many cases, you can lock down all your information so that it is visible only to your contacts (or even only to yourself).

Keep Business and Personal Separate

Most of us want to maintain some privacy online to protect our professional identities. You can help do this by using one profile for your private connections and another profile for your business connections. Of course, you would use your real name for your business profile and would share little to no personal information on it. You can then share personal information on your personal profile kept private through the previous steps.

Control What You Share

Of course, the easiest way to keep your information private online is not to share it. No matter what you do to protect your information, there will be some way for businesses or other people to see it. Keep your information private by keeping it offline, especially personal photos, information about your children, or thoughts about your political or religious beliefs.

Online privacy is a serious issue, and one which requires a greater level of personal responsibility as the options for connecting online continue to expand. These tips can help you to keep your personal information private while you connect with friends and business contacts online.

Sarah Clare is a writer and oversees the site projectmanagementsoftware.com, where she has recently been researching bug tracking software. In her spare time, Sarah enjoys cooking and scrapbooking.

3 Comments

Filed under Guest Writers, Internet Safety, Online Privacy, Social Networks

Get Ready For School With These 35 Free Computer Apps

Heading back to school? Make your life easier and checkout these free PC applications.

image

Take a look at the following recommended free downloads that will help you communicate, get those assignments done, have some fun, and manage and protect your system while you’re surfing the Internet.

These applications have riding out the storm of new competitors, and have developed a strong, loyal following, based on their reliability and functionality.

Process those words:

Nitro PDF:

With its ability to not only view and review PDF files, but create PDF files as well, it’s little wonder Nitro PDF Reader has amassed such a large following. I have to say that Nitro PDF Reader is my favorite PDF tool so, I’m more than a little enthusiastic to get on the go with this latest release.

Version 2 continues the strong tradition which Nitro has established with previous version – it’s fast, lightweight, and incorporates customizable security controls, including the option to completely disable JavaScript – no small consideration for security conscious users.

Listen N Write:

Anyone who has to transcribe recorded audio should try Listen N Write, a free tool designed specifically for transcription. Perfect for lectures.

LibreOffice:

LibreOffice is the power-packed free (open source) personal productivity suite for Windows, Macintosh and GNU/Linux, that gives you six feature-rich applications for all your document production and data processing needs: Writer, Calc, Impress, Draw, Math and Base.

AbiWord:

AbiWord is a free light weight word processing program similar to Microsoft Word. It is suitable for a wide variety of word processing tasks.

AbiWord allows you to collaborate with multiple people on one document at the same time. It is tightly integrated with the AbiCollab.net web service, which lets you store documents online, allows easy document sharing with your friends, and performs format conversions on the fly.

WordWeb:

WordWeb is a one-click English thesaurus and dictionary for Windows that can look up words in almost any program. It works off-line, but can also look up words in web references such as the Wikipedia encyclopedia.

Manipulate and correct your pics – put them online:

FastStone Image Viewer:

This is one of my favorite photo applications, with good reason. It’s not just a viewer, but an image browser, converter, and an editor as well. You’ll find the interface intuitive and very easy to use. This program is loaded with features including, renaming, cropping, color adjustments, lossless JPEG transformation, drop shadow effects, image frames, scanner support, histogram and much more.

IrfanView:

With IrfanView you can fix and enhance digital photos including resizing, cropping, correcting red eye, flipping, and rotating. As well, you can perform a wide variety of image adjustments, including brightness, contrast, and applying special effects such as sharpen and blur. I’ve been using this neat little program (every day) for years, and with each new release it just keeps getting better.

Google Picasa:

A free application that helps you locate and organize all the photos on your computer, edit and add effects with a few simple clicks, and share your photos with others through email, prints, and on the web.

Play those tunes:

Audacity:

Audacity is free, open source software for recording and editing sounds. It’s available for Mac OS X, Microsoft Windows, GNU/Linux, and other operating systems. Definitely the best of breed.

iTunes:

According to Apple, this is the world’s best digital music jukebox. Download music, TV shows, movies, and more.

Winamp:

A multimedia player that supports numerous audio and video formats. It also plays streamed video and audio content. Winamp is designed for people who like to customize, tinker and tweak: offering the widest range of extensions, skins, and services to add to your listening experience.

Watch your fav videos:

Miro:

Miro is a free application designed to be easy to use and to give you an elegant full screen viewing experience. Not only can Miro play virtually any video in HD, including, QuickTime, WMV, MPEG, AVI, and XVID, but on top of that this application, which sports major changes from previous editions, is effectively a media management center.

VLC:

VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVD, Audio CD, VCD, and various streaming protocols.

Free Video To iPhone Converter:

Convert video files to Apple iPhone MP4 video format. Convert the whole movie or select a partition from the movie to convert (trim video).

iPod Video Converter:

Free iPod Video Converter provides an easy and completed way to convert all popular video formats to iPod video. You can enjoy DVD/VCD and AVI, MPEG, WMV, RM, RMVB, DivX, ASF, VOB video files in your iPod with few clicks.

Better browsing:

Firefox:

Firefox includes tons of useful features such as tabbed browsing, built-in and customizable search bars, a built-in RSS reader and a huge library of extensions developed by thousand of developers.

Opera:

The fastest browser on Earth – but that’s not all. Use Opera Turbo to double your page-download speed on slow connections. Download Opera now and get more from the Web.

Google Chrome:

A browser that combines a minimal design with new technology designed to improve the user experience. Includes download and documentation.

Web of Trust (WOT):

WOT is a free Internet Browser add-on. WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.

Cocoon for Firefox:

Protect your privacy and security online with this Firefox add-on, which has on-the-fly e-mail dropboxes and lets you watch Netflix from outside the U.S.

Protect your system:

Immunet Protect – Free Cloud Based Antivirus Application:

Immunet Protect is a lightweight cloud based, community driven, antivirus application, (available in both a free, and a paid version), designed to add a layer of protection while working in partnership with the most popular antimalware solutions.

Microsoft Security Essentials:

Microsoft Security Essentials, which incorporates antivirus, antispyware and rootkit protection, all under one roof, was released by Microsoft as a free  replacement application for the late, and unlamented, Windows Live OneCare.

ThreatFire:

ThreatFire blocks malware (including zero-day threats) by analyzing program behavior, instead of relying only on a signature based database. ThreatFire works together with your signature based security applications, to increase the effectiveness of your total security arsenal.

SUPERAntiSpyware Free Edition:

The free version of this award winning program, is used by millions of people worldwide to protect their computers. And why not? SUPERAntiSpyware is well known for its high malware detection rate. A simple, intuitive, and easy to use interface makes SUPERAntiSpyware straightforward to setup, customize, and run, for both less experienced and expert users alike.

Malwarebytes’ Anti-Malware

Malwarebytes’ Anti-Malware has an excellent reputation (shared by me), as a first class security application, for its ability to identify and remove adware, Trojans, key-loggers, home page hijackers, and other malware threats.

PC Tools Firewall Plus 7:

I’ve been running with PC Tools Firewall since I installed Win 7 and I have been impressed with its performance. It installed easily, set up quickly, and has not caused any conflicts with my machine. The default settings are well thought out, and provide excellent protection for less experience users. Experienced users on the other hand can tinker to their hearts content, customizing and tweaking the application to meet their specific requirements.

Staying in touch:

Windows Live Essentials 2011:

Do more with Windows on your PC with free programs from Microsoft for photos, movies, instant messaging, email, social networking, and more. Get it all in one simple download.

Pidgin:

A multi-protocol Instant Messaging client that allows you to use all of your IM accounts at once. Pidgin can work with: AIM, Bonjour, Gadu-Gadu, Google Talk, ICQ, IRC, MSN, Yahoo!, MySpace IM and many more.

Trillian:

A fully featured, stand-alone, chat client that supports AIM, ICQ, MSN, Yahoo Messenger, and IRC.

Skype:

In its basic form, Skype is a free communication package, using proprietary code, which allows users to make free computer to computer calls, including video calls, across the globe. As well, there are a bundle of additional features, that can be purchased at a low cost, which will expand the application’s functionality.

System Tools:

WinPatrol:

You can monitor your startup programs and services, cookies and current tasks. Should you need to, WinPatrol allows you to terminate processes and enable, or disable, startup programs. There are additional features that make WinPatrol a very powerful addition to your security applications.

CCleaner:

CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it’s fast; normally taking less than a second to run.

Autoruns:

You can configure Autoruns to show additional locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and more. Autoruns goes considerably beyond the MSConfig utility bundled with Windows.

Glary Utilities:

Glary Utilities, a free all-in-one utility, is a terrific collection of system tools and utilities to fix, speed up, maintain and protect your PC. Personal experience with this application for the last 2 years has convinced me that a typical user can really benefit by having this application on their system. With this free program you can tweak, repair, optimize and improve your system’s performance; and its ease of operation makes it ideal for less experienced users.

Revo Uninstaller:

Revo Uninstaller is a superior program to uninstall programs from your computer. This free program with its advanced and fast algorithm scans before, and after you uninstall an application. After the program’s regular uninstaller runs, you can remove additional unnecessary files, folders and registry keys that are usually left over (those “orphaned” registry entries we talked about earlier), on your computer. This feature is a definite plus.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Audio Applications, Browser Plug-ins, Chrome, Computer Tools, Digital Media, downloads, Free Office Suites, Free PDF Software, Malware Protection, MS Word Alternatives, Multimedia Tools, Photo Tools, Software, Video Apps, Windows Tips and Tools, Writing Aids

Delete Data Permanently With Free Free File Shredder 2

This article is a companion piece to – Staples Resells Storage Devices Without Wiping Customers’ Personal Information – published earlier today.

File Shredder 3Many of us now own, and use a paper file shredder to destroy documents, and personal and financial papers that we don’t want to fall into the hands of identity thieves, or anyone else not entitled to have access.

So now, consider those files on your computer that you’ve deleted, sent to the recycle bin, and then flushed as you emptied the recycle bin. When you go through this process the deleted files are gone forever, right?

Well if you’re a typical computer user, you quite likely do believe that they’re gone forever, since the deleted files can’t be seen in Windows Explorer. In fact, you can’t find these files anywhere on your Hard Drive.

It may surprise you to learn that not only can I find those files but I can recover them as well. Oh, it’s not because I’m a super- duper tech wizard – although I will say, with some modesty, that I am. LOL.

Here’s the lowdown: when a file is deleted from your Hard Drive, what really gets deleted is the system link pointing towards the file, but not the file itself. Surprisingly, it is relatively easy to retrieve the deleted file using specialized file recovery software (often available as a free download), which takes advantage of shortcomings in the Windows operating systems.

Let me give you an example. Recently, I agreed to rebuild 30+ computers (at no cost – my way of giving back), being donated to a local charity for distribution to less fortunate families.

While working on these machines I noticed immediately that although the Hard Drives had undergone file deletion, they had not been wiped. Since these machine had been donated by a government agency; that struck me as being negligent in the extreme.

In order to bring this situation to the attention of those who had committed this serious breach in security, I recovered a number of these files. Not unexpectedly, the recovered files did in fact did contain confidential information. In this case – confidential information on families on public assistance.

As part of the process, I saved the recovered files to disk and presented the disk to the appropriate authorities. Shock, surprise, embarrassment, were just some of the reactions. It’s easy to see from this example, that deleted files (or a good portion of a file) can easily be recovered.

In order to delete or shred files permanently, to protect your privacy and potentially your security, or for any other reason for that matter, you need a program such as File Shredder 2 that is capable of overwriting the file with a random series of binary data multiple times.

This process is often called shredding. That way, the actual content of the file has been overwritten and the possibilities of recovering such a shredded file becomes mainly theoretical.

File Shredder 2, is a simple but powerful program, with a straightforward interface, that many users judge to be better than some commercial file shredders. With File Shredder 2 you can remove files from your hard drive permanently, and feel confident that the file can’t be recovered.

File Shredder 4

Running the program allows you to choose between 5 different shredding algorithms, each one gradually stronger than the previous one. As well, it has an integrated Disk Wiper which uses a shredding algorithm to wipe unused disk space. I use this feature frequently, to clean up my drives (after running test applications), and to destroy any leftover fragments of previously deleted/uninstalled files.

If you’re looking for a great free file shredder application that does what it says it does, in an easy to understand manner, I highly recommend File Shredder 2.

System requirements: Windows 2000,  XP, Vista, Win 7.

Download at: Download.com

If you’re looking for a more robust portable application – checkout Disk Wipe.

Disk Wipe is a free, portable Windows application for permanent volume data destruction. With Disk Wipe you can erase all disk data and prevent recovery of that data.

Disk Wipe uses powerful algorithms which fill the volume with useless rubbish binary data, multiple times. The possibility of recovering information from drives formatted with Disk Wipe, is virtually non existent.

System requirements: Windows 2000,  XP, Vista, Win 7.

Download at: the developer’s site (Disk Wipe)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under Freeware, Geek Software and Tools, Hard Drive Tools, Portable Applications, Privacy, Secure File Deletion, Software, USB, Windows Tips and Tools

250 Zemana AntiLogger License Giveaway At MalwareTips.com

Regular readers may remember, that I thoroughly tested Zemana AntiLogger a year or so ago. Subsequently, through the generosity of Zemana we were able to offer two thousands plus, free licenses to readers.

During the testing period I ran a series of Anti-Keylogger Tests, including tests for web cam penetration. All test methods were defeated by Zemana AntiLogger.

A quick recap of Zemana AntiLogger’s capabilities.

Secure your Internet banking and financial transactions

Protect information in emails and Instant Messages

Protect keystrokes from spyware

Protect all screen images

Webcam Logger protection

System Defense

No need to download latest virus signatures

No need to know or detect the malware’s signature

No need to wait for updates from a virus lab

No need to scan files

Proactively looks for suspicious activity

Catches not just the usual suspects, but also sophisticated “zero day” malware

Prevents theft of data via secure connections (HTTPS / SSL)

Does not slow down your PC

Easy to download, install and use

Future-proof

This application, which is arguably the best Antikeylogger application on the market, is not freeware, but you may download a 15 day trial version at: Zemana

Better yet, take a run over to MalwareTips.com, read the article carefully, and follow the instructions to obtain a new 12 month license.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

14 Comments

Filed under 64 Bit Software, Anti-Keyloggers, Anti-Malware Tools, Cyber Crime, Don't Get Hacked, Free Full Versions, Giveaways, Internet Safety Tools, Malware Protection, Software Giveaways, System Security, Windows Tips and Tools

Free Secret Disk – Keep Your Secret Computer Files “Secret”

imageThe days of privileged information, and personal privacy, have gone with the wind. Private information concerning you is accumulated, bought and sold, and then manipulated for profit. If you’re like most people in developed countries – you probably don’t care. After all, you have nothing to hide; right?

In the broader sense, you are probably right; not that there’s much you could do about it, in any case. We really do live in the era of “Big Brother”.

Privacy though, can be a real issue when it comes to your computer, and the information stored on your Hard Drive. Something, I’m sure, you do not want compromised.

Most of us have information on our machines that we consider privileged information – sensitive financial data readily comes to mind. As well, many of us have additional files that we may consider sensitive and confidential. Files that we don’t want a spouse, girlfriend, a child, or others, to have ready access to.

Recently, I’ve noticed the unusually high number of child pornographers (those with child pornography on their Hard Drives), who were caught (including in my own community), following maintenance work on their computers by computer technicians.

Possession of child pornography is a heinous crime, and we should use all appropriate methods to root out both its production, and possession; applying the most severe criminal sanctions for those convicted.

Having said that however, I’ve always had an aversion to computer technicians inappropriately searching through customers’ Hard Drives. Something which occurs much more often than the average user might suspect.

Hint: Don’t keep what might be considered embarrassing personal pics on your computer unless they are encrypted, or otherwise protected. You wouldn’t want that type of pic copied by someone (and they frequently are by those having unrestricted access), for their own uses – would you?

I’ve long been a strong believer in encrypting information that needs to be restricted, and there are many free encryption programs available for download, that do a great job.

Encryption though, is not the only way to restrict access to private information on a computer. Last year, I came across a neat little program – that’s since been updated – which handles the privacy issue in an non-encrypted way. A way that is effective in ensuring private files remain private.

Secret Disk 1.27 (updated January 23, 2011), does one thing, and it does it very well. It creates a separate secret disk on your Hard Drive, in a non-complex way, for your “secret” files. When the disk is locked it’s invisible, and cannot be seen by other users.

Installation and setup is a snap. Following installation, simply assign a password to Secret Disk, and you’re good to go – simple, fast, and uncomplicated!

Multi-language.

image

image

image

image

The screen capture below, shows Secret Disk as drive “Z” on my Windows 7 test system.

Click on graphic to expand to original size.

image

Fast facts:

Separate disk for your private files – this tool will create a separate disk for your private files.

Access with a password – you can access Secret Disk only with a password.

Locking – when locked Secret Disk disappears and stays invisible with all contents.

One second protection – when you need protection Secret Disk disappears within one second with all content, no matter how many files you have on the disk.

Power failure – in case of power (or Windows) failure, Secret Disk will be automatically locked.

Automatic locking – Secret Disk can be automatically locked if you away from your PC (screensaver is running), or when you press the  F8 key.

No hardware – no additional hardware required. Space for secret disk will be taken from your system disk.

Recommendation: If you’re looking for a free application to protect your secret files from prying eyes, Secret Disk is definitely worth taking a look at.

Secret Disk is a particularly good application for novice, or casual computer users, who don’t have the skills to work with more complex encryption applications.

System requirements: Windows Vista, Windows XP, Windows 7

Supported languages: English, French, Italian, Korean, Chinese, Russian, Norwegian, Spanish, Portuguese, Dutch, Turkish, Japanese, Finnish, German

Download at: Developer’s site (PrivacyRoot.com)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under downloads, Encryption Software Alternatives, Freeware, Privacy, Software, System Security, System Utilities, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Avira AntiVir Personal 10 – Is It The Best Free Antivirus Available?

image

If you were building a wish list of the features that you would like to see in a free anti-virus program, I’m sure you would include the following:

An easy to use and understand, yet comprehensive, user interface.

An on demand scanner to seek out viruses, Trojans, backdoor programs, hoaxes, worms, dialers and other malicious programs.

And, perhaps most important, the ability to stop a detected malicious program  dead in its tracks.

The ability to repair, delete, rename and quarantine programs, or files.

Well you’re in luck. Avira AntiVir Personal will meet, and even exceed, all of your wishes. This anti-virus program offers comprehensive protection, driven by an easy to use interface.

Avira AntiVir Personal is not just another free AV solution. Avira may just be the best free AV solution available. It’s certainly the most popular in its class, and with good reason, in my view.

I’ve been using Avira, in one release or another for years on a Windows XP Professional machine, and I have never had to deal with an infection on that particular computer.

I’m not suggesting that Avira is the only reason this machine has never been infected, but – it is the foundation on which all of the other security solutions, specific to that machine, are built. Regular readers are well aware, that I faithfully follow the Three Commandments of Safe Surfing:

Stop – consider where you’re action might lead.

Think – consider the consequences to your security.

Click – only after making an educated decision to proceed.

If you’re a typical, or an average user, you should find that Avira AntiVir Personal will meet, and even exceed, all of your requirements.

As an indication of this programs popularity, Download.com reports 100+ MILLION total downloads – 665,000 last week alone.

image

Fast facts:

Highly Configurable

Protection from viruses, worms and Trojans

Includes anti-spyware and anti-adware features

Protection against expensive dialers

Protection from hidden rootkits

Protection from phishing

Extensive malware Recognition

Monitors every action executed by the user or the operating system

Reacts promptly when a malicious program is detected.

Automatic updates of antivirus signatures, engine and software – I have to admit, I love this feature

Now in Version 10.0.0.567 (updated April 22, 2010)

Quick Summary:

Easy to download, easy to install, easy to configure, easy to use, and very effective.

System requirements: Windows 7, XP, Vista (32-bit and 64-bit).

Download at: Download.com

Note: Free for home-users only.

If you find the nag screen annoying, take a look at “Remove Avira Notifier – Here’s How”, on this site. If you’re running a 64 bit system, then checkout my buddy G’s site –Disable Avira Notifier in Windows 7.

Note: Since we’re talking about Avira, you should be aware that Avira offers a free Avira AntiVir Rescue System, “which is a Linux-based application that allows accessing computers that cannot be booted anymore. Thus it is possible to repair a damaged system, rescue data, and scan the system for virus infections”.

If you are an active computer user, you should consider adding this application to your antimalware tool box.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

25 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Antivirus Applications, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Security Programs, Freeware, Software, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Zemana AntiLogger Provides Protection Against Web Cam Hacks

image The wired world has it’s fair share of weird and semi-weird people, but none more weird, it seems to me, than those who spy on others through web cam hacks.

Just in the last two days, we’ve included the following stories in the Tech Thoughts Daily Net News column.

Hacker arrested for spying on schoolgirls via their own webcams.

PC consultant pleads not guilty to malware ‘sextortion’ plot.

If you Google “web cam hacks”, you’ll be astonished by the number of returned links – including links to “how-to videos”. I’m a firm believer in the free exchange of information, but even my high level of tolerance is pushed to the extreme when I see this.

Thankfully, this is an issue that I don’t have to contend with – not that I can imagine someone being interested in hacking my web cam. I rarely run around naked – I save that for special occasions.  🙂

Since I use a Webcam extensively for communicating though, I need reassurance that my cam cannot be hacked – that I will not become a victim of the truly weird creepy crawlies, who fly beneath the Internet radar.

I use only one machine that’s equipped with a web cam, and that cam is protected from intrusion by Zemana AntiLogger, which offers outstanding active Webcam protection.

Regular readers may remember, that I thoroughly tested Zemana AntiLogger earlier this year. Subsequently, through the generosity of Zemana we were able to offer thousands of free licenses to readers.

During the testing period I ran a series of Anti-Keylogger Tests, including tests for web cam penetration. All test methods were defeated by Zemana AntiLogger.

The screen capture below shows the Anti-Web Cam module inside Zemana AntiLogger.

image

A quick recap of Zemana AntiLogger’s capabilities.

Secure your Internet banking and financial transactions

Protect information in emails and Instant Messages

Protect keystrokes from spyware

Protect all screen images

Webcam Logger protection

System Defense

No need to download latest virus signatures

No need to know or detect the malware’s signature

No need to wait for updates from a virus lab

No need to scan files

Proactively looks for suspicious activity

Catches not just the usual suspects, but also sophisticated “zero day” malware

Prevents theft of data via secure connections (HTTPS / SSL)

Does not slow down your PC

Easy to download, install and use

Future-proof

To read the full review of this powerful application, “Zemana AntiLogger – An Ounce of Prevention”, go here.

If keylogger protection is a concern, particularly if you, or someone in your family runs a web cam, you should consider adding this application to your security toolbox.

This application is not freeware, but you may download a 15 day trial version at: Zemana

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

15 Comments

Filed under Anti-Keyloggers, Anti-Malware Tools, cybercrime, Don't Get Hacked, downloads, Interconnectivity, Internet Safety Tools, Online Safety, Software, Software Trial Versions, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

I’ve Got a Secret and Free Secret Disk Keeps it That Way

imageThe days of privileged information, and personal privacy, have gone with the wind.

Private information concerning you is accumulated, bought and sold, and then manipulated for profit. If you’re like most people in developed countries – you probably don’t care. After all, you have nothing to hide; right?

In the broader sense, you are probably right; not that there’s much you could do about it, in any case. We really do live in the era of “Big Brother”.

Privacy though, can be a real issue when it comes to your computer, and the information stored on your Hard Drive. Something, I’m sure, you do not want compromised.

Most of us have information on our machines that we consider privileged information – sensitive financial data readily comes to mind. As well, many of us have additional files that we may consider sensitive and confidential. Files that we don’t want a spouse, girlfriend, a child, or others, to have ready access to.

Recently, I’ve noticed the unusually high number of child pornographers (those with child pornography on their Hard Drives), who were caught (including in my own community), following maintenance work on their computers by Technicians. Curiously, in almost every case; Technicians employed by national computer chains.

Possession of child pornography is a heinous crime, and we should use all appropriate methods to root out both its production, and possession; applying the most severe criminal sanctions for those convicted.

Having said that however, I’ve always had an aversion to computer technicians inappropriately searching through customers’ Hard Drives. Something which occurs much more often than the average user might suspect.

Hint: Don’t keep what might be considered embarrassing personal pics on your computer unless they are encrypted, or otherwise protected. You wouldn’t want that type of pic copied by someone (and they frequently are by those having unrestricted access), for their own uses – would you?

I’ve long been a strong believer in encrypting information that needs to be restricted, and there are many free encryption programs available for download, that do a great job.

Encryption though, is not the only way to restrict access to private information on a computer. Recently, I came across a neat little program that handles the privacy issue in an non-encrypted way. A way that is effective in ensuring private files remain private.

Secret Disk does one thing, and it does it very well. It creates a separate secret disk on your Hard Drive, in a non-complex way, for your “secret” files. When the disk is locked it’s invisible, and cannot be seen by other users.

Installation and setup is a snap. Following installation, simply assign a password to Secret Disk, and you’re good to go – simple, fast, and uncomplicated!

image

image

image

The screen capture below, shows Secret Disk as drive “X” on my Windows 7 test system.

Secret Disk 1

Fast facts:

Separate disk for your private files – this tool will create a separate disk for your private files.

Access with a password – you can access Secret Disk only with a password.

Locking – when locked Secret Disk disappears and stays invisible with all contents.

One second protection – when you need protection Secret Disk disappears within one second with all content, no matter how many files you have on the disk.

Power failure – in case of power (or Windows) failure, Secret Disk will be automatically locked.

Automatic locking – Secret Disk can be automatically locked if you away from your PC (screensaver is running), or when you press the  F8 key.

No hardware – no additional hardware required. Space for secret disk will be taken from your system disk.

Recommendation: If you’re looking for a free application to protect your secret files from prying eyes, Secret Disk is definitely worth taking a look at.

Secret Disk is a particularly good application for novice, or casual computer users, who don’t have the skills to work with more complex encryption applications.

System requirements: Windows Vista, Windows XP, Windows 7

Supported languages: English, French, Italian, Korean, Chinese, Russian, Norwegian, Spanish, Portuguese, Dutch, Turkish, Japanese, Finnish, German

Download at: Developer’s site (PrivacyRoot.com)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

21 Comments

Filed under downloads, Encryption Software Alternatives, Freeware, pornography, Software, System Security, System Utilities, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

How to Tune Up Your Anti-Malware Strategy With These Free Solutions

image

As highly regarded security guru Bruce Schneier says, “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology”

Unfortunately, the average user continues to rely only on technology for protection. Recently, I setup a new computer system for a friend; an average user, and as I was tinkering with her system, one though kept bouncing around in my head. “What do I need to do to keep her protected on the Internet?”

I started with the usual things of course, including installing the following security applications.

PC Tools Firewall

– PC Tools Firewall is definitely worth considering as a new Firewall installation, or as a replacement for a current Firewall that is not meeting expectations.

Microsoft Security Essentials

– Easy to set up and run, particularly for new users. The interface is positively simple offering Quick Scan, Full Scan, or Custom Scan. Provides full real time protection against viruses, spyware, and other malicious software.

Avira AntiVir Personal

– Offers on demand scans for viruses, Trojans, backdoor programs, hoaxes, worms, dialers and other malicious programs. As well you can repair, delete, block, rename and quarantine programs, or files.

Firefox

– I then installed the most effective security add-ons, including NoScript, KeyScrambler, Adblock Plus and BetterPrivacy.

WOT

– Web of Trust, a browser add-on which offers Internet users active preventive protection against Web-based attacks, online scams, identify theft, and unreliable shopping sites.

Winpatrol

– This program uses a simple yet effective method of fighting all kinds of malicious programs.

GesWall

– An isolator which dynamically isolates Internet applications including Web Browsers, Chat Clients, Email Clients, and so on.

Malwarebytes’ Anti-Malware

– A simple, intuitive, and easy to use interface, makes Malwarebytes’ Anti-Malware straightforward to setup, customize and run, for both less experienced and expert users alike. This application was installed as a secondary on demand scanner.

SUPERAntiSpyware Free Edition

– SUPERAntiSpyware is also straightforward to setup, customize and run, for both less experienced and expert users alike. This application was installed as an additional secondary on demand scanner. This should not be considered overkill – there is no one single anti-malware application that is likely to catch everything. Better safe than sorry, and all that.

ThreatFire

ThreatFire blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my own front line defenses.

So what could go wrong with this kind of armor against the pack of jackal-like cyber-criminals who prowl the Internet? The short answer is – plenty.

adware 4She still faces substantial risks while surfing the Internet regardless of the antispyware, antivirus, and the other Internet security applications I installed.

Malware evolves so rapidly today, that staying ahead of the curve has proven to be all but impossible for security software developers, despite their best efforts.

While it may be true that reputable Anti-malware software is often capable of detecting harmful and malicious attempts to compromise a computer, this is not always the case. Anti-malware programs that rely on a definition database (most anti-malware programs), can often be behind the curve in recognizing the newest threats.

You might be wondering just how many new malware threats circulate on the Internet – and here’s one answer. Over the last three months alone, PandaLabs has recorded five million new strains of malware.

On the face of it, it may appear that this huge number of new malware strains presents an insurmountable problem. But malware itself is only part of the problem.

The method used to deliver the malware – social engineering – that’s the most significant problem currently, for an average user. Social engineering, which relies on, and exploits our natural curiosity, is a sure winner for the bad guys.

Cyber-criminals are increasingly relying on this aspect of social engineering to create an opportunity designed to drop malicious code, including rootkits, password stealers, Trojan horses, and spam bots on our computers.

So the problem I found myself having to deal with was “If all these security applications I installed won’t offer her absolute protection against cyber-criminals, what, or who will?” The only plausible answer was – she must take on this responsibility herself. The inescapable fact is – she must become her own best protection. In my experience it’s the only strategy that works.

My friend, (just like most average users), had a need to believe, and desperately wanted to be able to trust, that the installed security applications would totally protect her on the Internet.

She, like the rest of us, needed to become convinced that a mild case of paranoia when using the Internet, was in her own best interest. Being suspicious, and untrusting while surfing the web, might not make her invulnerable to malware infections or worse, but it will certainly reduce her odds enormously.

It took considerable effort to finally convince her that mild paranoia would play an important role in preventing her from becoming a victim of cyber criminals.

Particularly, overcoming the instinctive human response (and we all have it), to just “click” while surfing the Internet. That instinctive response, would pose one of the biggest risks to her online safety and security.

Security experts argue (including me), that a significant number of malware infections could be avoided if users stopped “just clicking haphazardly” or opening the types of files that are clearly dangerous.

At the end of the day, I finally managed to get her agreement that she would not engage in any of the following unsafe surfing practices.

Downloading files and software through file-sharing applications such as BitTorrent, eDonkey, KaZaA and other such programs.

Clicking links in instant messaging (IM) that have no context or are composed of only general text.

Downloading executable software from web sites without ensuring that the site is reputable.

Using an unsecured USB stick on public computers, or other computers that are used by more than one person.

Opening email attachments from unknown people.

Opening email attachments without first scanning them for viruses.

Opening email attachments that end in a file extension of .exe, .vbs, or .lnk.

Regular readers of this site are very familiar with the following recommended security strategy to protect their computer system, their money and their identity:

Don’t open unknown email attachments

Don’t run programs of unknown origin

Disable hidden filename extensions

Keep all applications (including your operating system) patched

Turn off your computer or disconnect from the network when not in use

Disable Java, JavaScript, and ActiveX if possible

Disable scripting features in email programs

Make regular backups of critical data

Make a boot disk in case your computer is damaged or compromised

Turn off file and printer sharing on the computer

Install a personal firewall on the computer

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet

Ensure the anti-virus software scans all e-mail attachments

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected. Most of all, understand that you are your own best protection.

Well known software developer Comodo Group, have developed a new Internet video series, Really Simple Security, published on a dedicated YouTube channel, that makes it easier than ever for an average user to become much more proactive in their own protection. This is a site that should be in everyone’s bookmarks.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

25 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Comodo, cybercrime, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Firewalls, Freeware, Microsoft, PC Tools, Software, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Free Avira AntiVir Personal Protection – Get the Real Deal!

image Avira AntiVir Personal is not just another free AV solution. This application may just be the best free application for monitoring interactions with your operating system, to ensure that if a malicious program is detected it will be stopped dead in its tracks! It’s certainly the most popular in its class, and with good reason.

Avira AntiVir Personal offers effective, on demand scans for viruses, Trojans, backdoor programs, hoaxes, worms, dialers and other malicious programs. It’s simple interface provides easy access to a command structure, that makes it easy to repair, delete, block, rename and quarantine programs, or files.

I’ve been testing Avira in one release or another for years, and I continue to be impressed with its performance. I have come to rely on it as my primary anti-virus application on my test platforms.

If you’re a typical, or an average user, you should find that Avira AntiVir Personal will meet, and even exceed, all of your requirements.

As an indication of this programs popularity, Download.com reports almost 70 MILLION downloads, making it the leading antivirus software, offered for download on this site.

image

Fast facts:

Highly Configurable

Protection from viruses, worms and Trojans

Protection against expensive dialers

Protection from hidden rootkits

Protection from phishing

Extensive malware Recognition

Monitors every action executed by the user or the operating system

Reacts promptly when a malicious program is detected.

Automatic updates of antivirus signatures, engine and software – I have to admit, I love this feature

Now in Version 9.0.0.415

Quick Summary:

Easy to download, easy to install, easy to configure, easy to use, and very effective.

System requirements: Windows 2000/XP/Vista/Win 7, UNIX

Download at: Download.com

Note: Free for home-users only.

If you need more convincing, watch the CNET video review of Avira AntiVir Personal – Free Antivirus ( 2:17 mins.)

If you find the nag screen annoying, take a look at “Disable Avira Notifier”, on this site.

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

11 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Security Programs, Freeware, Internet Safety Tools, Malware Removal, Software, System File Protection, System Security, Windows Tips and Tools