Tag Archives: real-time

Beat Obama’s Bandits With TrueCrypt Free (Open-Source) Encryption

The so called “War on Terror” has long since lost its luster and should be appropriately reclassified as The War of Terror. The U.S. has been singularly impudent in terrorizing the terrorists but instead, it has managed to terrorize the rest of the world using a system of surveillance schemes that have gone off the board. Chalk one up for Al Qaeda – the only winners in this debacle.

In the meantime, Americans continue to live in fear – trading away freedoms for security in a war that is simple unwinnable. Obama, despite his assurances that he would “fight terrorism while maintaining our civil liberties” has been a principle mover in this assault on democracy.

And, the master of the reversal has more –

Obama, in a 2008 election sound bite, drew a sharp contrast with the Bush administration which he proclaimed, offered Americans “a false choice between the liberties we cherish and the security we demand.” And for good measure – for stooping “to spy on citizens who are not suspected of a crime.” It’s a surreal world we live in, is it not?

But why be satisfied with my ramblings? Here’s the video.

image

As America continues its slide into Fascism (eagerly joined in the venture by Canada, Australia, the U.K. and countless other self-advertised “democracies”), the justified expectation held by these governments is – you – yes, you – will take no active part in expressing your outrage at the escalating intrusions into your private life. Sadly, the undermining of democracy, or more to the point, democracy as we though we knew it, continues apace.

As a consequence (hardly the only consequence, of course), encryption technology is once again in the spotlight. And no, using encryption does not mean that one has something to hide.

Sophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Putting Obama and his bad boys aside, here are some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

It happens to us all: Just this past week, I lost not only my house keys (first time ever) – but the USB key attached to the keychain. If you guessed that the drive was encrypted – take a bow.   Smile

TrueCrypt:

TrueCrypt is an outstanding free open source software application for establishing and maintaining an on-the-fly-encrypted volume. On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved – without any user intervention. The program automatically and transparently encrypts in real time.

No data stored on an encrypted volume can be read (decrypted) without the correct password/key file or correct encryption keys. The entire file system is encrypted (i.e., file names, folder names, contents, free space, Meta data, etc.).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). When you turn off your computer, the volume will be dismounted and files stored in the volume will be inaccessible and encrypted. You may of course, manually dismount the volume.

TrueCrypt offers a number of options – you can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Installation is simple and straightforward – no gotchas here. Lots of steps – but easy steps.

image

image

image

image

image

If you choose “Keyfiles”, be sure you understand the ramifications. This is an extra security step which has limited application for a home user. You do not need to select this option.

image

image

image

image

image

And – Win 8’s File Explorer reports that the volume has been setup successfully. If you expand the graphic below (click), you’ll also notice my first TrueCrypt volume on this HD from May 9, 2006.

image

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

I’ve been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Win 8, Win 7, Vista, XP, Mac OS X, and Linux.

Download at: TrueCrypt

14 Comments

Filed under downloads, Encryption Software, Freeware, Interconnectivity, Open Source, Software, Utilities

Collusion – Internet Trackers Are All In It Together

imageLook – every business organization has the right to generate income and make a profit – and, in the real world, most organizations generate that income and make that profit aboveboard, and in clear view. But, that’s not necessarily the process on the Internet. In far too many cases, companies generate revenue by staying far below a user’s horizon – in an underhanded and sneaky fashion.

The tool of choice – a tool, which by its very nature is sneaky and underhanded, is the appropriately named Tracking Cookie. A tool, which not only tracks a user’s footprints across the Web but, the data generated is then used to analyze the user’s online behavior.

It’s this behavior analysis (analyzing links I click on, the content I view, searches I make ….) where I draw the line. I find it disturbing that I have little or no say, in the manner in which I’m tracked as I surf the Internet. And, equally as important – how that information is used.

It’s fair to say, that many users do not object to being tracked. I wonder though, that if these same unconcerned users were aware of just how insidious and overwhelming tracking has become – if, they’d continue to be unconcerned.

Should an unconcerned user run the recently released Collusion Firefox add-0n – an add-on which graphs in real-time the “following behavior” of tracking cookies, they might feel less confident that their “I don’t care” perspective is the correct one.

Mozilla CEO Gary Kovacs, in describing Collusion at the recent Technology, Entertainment, and Design conference pointed out, that Collusion “allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction between companies and other trackers.”

Kovacs went on to say that “Collusion will allow us to pull back the curtain and provide users with more information about the growing role of third parties, how data drives most Web experiences, and ultimately how little control we have over that experience and our loss of data.”

I’ve been tinkering with Collusion for the past several days, and I must admit to a new level of unease with this “behind the scenes” look at the nature of tracking now been practiced.

Here’s a screen shot of a spider-web of interaction between companies and trackers, from a short hop around the Internet which I made this morning.

image

I think you’ll agree, that the connection between and amongst trackers and tracking companies, might be more insidious than you had previously considered.

The graphic below (captured from the Collusion site),  briefly explains the  connections illustrated.

image

The Collusion add-on is available for download at Mozilla.

Back to the previous graphic for a moment – you’ll notice that you can export the graph. Should you do so, you’ll end up with data which will look something like the following. What you see is a very small portion of the exported data from today’s test.

javascript”],”news.com”:[2855341,”image/png”]},”visited”:false},”adtechus.com”:{“referrers”:{“techrepublic.com”:[1070986,”application/x-javascript”],”cnet.com”:[2853754,”application/x-javascript”],”thestar.com”:[5351704,”application/x-javascript”]},”visited”:false},”adnxs.com”:{“referrers”:{“techrepublic.com”:[1071838,”text/javascript”,”image/jpeg”],”baselinemag.com”:[2084558,null],”cnet.com”:[2853938,”text/javascript”,”image/jpeg”,”image/gif”],”thestar.com”:[5352178,”text/javascript”,”image/jpeg”,”application/x-shockwave-flash”]},”visited”:false},”techrepublic.com”:{“referrers”:{“twitter.com”:[1077104,”text/html;charset=utf-8″]},”visited”:true},”stumbleupon.com”:{“referrers”:{“techrepublic.com”:[1073845,”text/html;charset=utf-8″],”pcmag.com”:[1466423,”text/html;charset=utf-8″],”webopedia.com

And yes, there are a truckload of free tools which, to some extent, can impact and reduce the effectiveness of tracking – but, the downside in running with these tools is often a less than enjoyable Internet experience.

18 Comments

Filed under downloads, Firefox Add-ons, Opinion, Privacy

TrueCrypt – Free Encryption To The Max

imageSophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have been using for years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, flash drive, Freeware, Open Source, Software, USB, Utilities, Windows Tips and Tools

The Importance of Real-Time Server Monitoring

There’s nothing more frustrating than trying to access information online and being met with that annoying little Error 404 page. Think back to the times you’ve experienced this frustration, and now imagine your customers or consumers having to experience it because of your website. This, in itself, is reason enough to invest in real time server monitoring, something any good IT support company should offer.

What Is It?

Real time server monitoring is software that allows you or your IT department to monitor in real time any glitches or problems that may arise with your server. As soon as something goes wrong or a site begins experiencing problems, you can address the problem then and there.

Benefits:

Feedback

Especially if your site is in its infancy or beta testing stage, feedback on the way your site runs is crucial to making those tweaks and changes that turn a good website into a great website. Real time server monitoring is a means by which you can receive and analyze this feedback before it has a chance to harm your business.

Sales

If you are operating an e-commerce website, where you offer people the option of buying your products online, it is of the utmost important that your server is running and healthy at all times, and that any downtime it may experience is rectified immediately as it happens. Imagine your store is not online, but is in a shopping mall, and you left it unattended and shut up for half a day. Do you think customers would hang around until you finally returned to open the store, or do you think they’d go and find their products elsewhere? I know which one I’d choose!

Mail

Another reason that real time monitoring is so important is that you need immediate and full access to any correspondence you may receive or need to send. In a professional environment, emails are the number one form of communication, and what’s more, with the advent of Smartphones and wireless technology, we expect our emails to be answered in as short a time as possible. If your server has problems that prevent emails from being properly delivered, you are virtually missing out on business meetings and opportunities, which in this fast paced world, will not wait around for you.

What To Look For

If you’re choosing a real time monitoring service or software you should look for a program that is able to check your site using HTTP, HTTPS, FSTP, FTP and FTPS protocols. It’s also highly advisable to go for a program that offers data recording and statistics, so that you can analyze the efficiency of the server and how often it is down—this can be helpful in deciding whether or not you’re with the right hosting service. Your IT support service will be able to advise you as to which programs are better suited to your needs, and in consultation with them you can find a solution that protects your business and website.

Guest article from Sachin.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under Cloud Computing, Integrated Solutions, Network Tools, Networking

BitDefender TrafficLight – Real-time Anti-virus, Anti-phishing Browser Add-on

imageSurfing the Internet without a site reputation Browser add-on is not much different than stumbling down a set of stairs in the dark – while blindfolded. At a minimum, a risky venture.

As with all applications designed to enhance Internet safety however, site reputation Browser add-ons are not without there shortcomings. One particular issue that raises concern is – reputation add-ons are site specific and not page specific. In other words, the site may have passed the test for safety and yet contain a page, or pages, that harbor threats.

BitDefender’s recently released (March 24, 2011), beta – TrafficLight Browser add-on, attempts to address this page specific issue by utilizing “the BitDefender scanning engines to check, and rate, every page and link from the users’ web traffic, blocking unsafe content before it reaches the user’s browser.” In an effort to cover all the bases, TrafficLight is active in in search engines, and social networking sites (Facebook and Twitter), as well.

Control Panel screen capture.

image

Fast facts:

TrafficLight works with virtually any Windows-compatible browser. It even keeps look, feel and functionality consistent if you switch browsers.

TrafficLight intercepts and scans web traffic before it even reaches the browser, effectively blocking disguised or stealth attacks before it’s too late.

TrafficLight scans the pages you visit for malware and phishing attempts each and every time you access them to avoid the threat of legitimate but recently compromised websites.

TrafficLight won’t block an entire website if just some pages within are malicious. Only the potentially harmful elements are blocked, leaving you free to view the rest of the site if you so choose.

TrafficLight relies on intelligence provided by BitDefender Cloud services to flag malware and phishing attempts in search results from Google or Bing. Not only that, but it also checks links in popular social network platforms and blocks them if they are suspect.

TrafficLight does not add a toolbar to your already-cluttered browser interface. Its interface remains invisible until your input is needed or it’s called up with a simple mouse gesture.

Supported Operating systems: Microsoft Windows XP SP2, Windows Vista SP2, Windows 7.

Supported Browsers:
Internet Explorer 7+, Opera, Mozilla Firefox, Google Chrome, Safari.

image

Download free TrafficLight at: BitDefender

Note: As with all beta, or release candidates, take sensible precautions prior to installation. This should include setting a new restore point.

Additional reading:

WOT Beta for Social Media – Facebook, Twitter Protection And More

Free BufferZone Pro – Maybe The Best Surfing Virtualization Application At Any Price

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

12 Comments

Filed under Anti-Malware Tools, BitDefender, Browser add-ons, Browsers, Cyber Crime, Don't Get Hacked, downloads, FaceBook, Free Internet Protection, Freeware, Internet Safety Tools, Malware Protection, Online Safety, Safe Surfing, Software, Spyware - Adware Protection, System Security, Twitter, Windows Tips and Tools

Download TrueCrypt – TrueCrypt Beats The FBI Decryption Team!

image

When the subject of file/disk encryption comes up, when talking with my non-technical friends, I often get the oddest looks and the strangest comments. These comments generally revolve around the fact (my friends’ facts), that only someone with something to hide would need to encrypt files.

They’re right of course, but not for the reasons they set forth.

In the real world, aware computer users know that financial data, and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two), or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have using for the last several years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or in this latest release (November 23, 2009), a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said earlier, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under cybercrime, Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, Linux, Mac, Open Source, Portable Applications, Software, Spyware - Adware Protection, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download Immunet Protect 2 – Free Cloud Based Antivirus Application

When I first reviewed Immunet Protect in May of this year ( while it was still in Beta), I was impressed with it’s light use of system resources and bandwidth. Now, with the official release of Version 2, (June 17, 2010), I’m even more impressed.

Immunet Protect is a lightweight cloud based, community driven, antivirus application, (available in both a free, and a fee version), designed to add a layer of protection while working in partnership with the most popular antimalware solutions.

On my principal home machine for example, Immunet Protect lines up with Microsoft Security Essentials and ThreatFire, to shore up any vulnerabilities my system might have to to zero-day threats.

Zero-day threats are those that are defined as malware that has been written and distributed to take advantage of system vulnerabilities, before security developers can create, and release, counter measures.

In real time, Immunet Protect keeps track of the state of security in the collective community (network), and should a member of the network (the community), encounter malware, you (as a member of the protected community), are instantly protected against the threat.

A rather more impressive security solution than having to wait for a malware definition database update. An update that may take several days. Days in which you are effectively open to infection.

The Beta version had limited functionality since it did not provide complete scanning – it acted as a defender only. But, all that has changed with the addition of new features in the final release, which include:

Two active scanning engines

Custom Scan

Scheduled scan

Context menu scan

And more

Just like the Beta, the final release was equally straightforward to install, and ran without complication.

If you’ve used the Beta release you’ll find (as the following screen capture illustrates), a substantially improved user interface, with much more functionality.

Immunet new 2

Setting the operating parameters (the protection settings), is straightforward. In the following screen capture you’ll notice tooltip pop outs which explain the function of each setting. A very cool feature for less experienced users.

Immunet new 3

During my initial full scan, CPU usage ran at roughly 20% on a dual core machine. And, system memory usage was surprisingly low at only 36 MB, as the following screen capture shows.

Immunet new 1

I have a preference for antimalware solutions that include the ability to launch a specific file scan from the Windows Explorer context menu, and Immunet Protect has included this feature.

image

Should you consider installing, and running, a Cloud Antivirus as supplementary antimalware protection?

If you are uncertain, then consider this:

The Internet is an uncertain world at the best of times

Cybercriminals design specific malware to exploit vulnerable systems without user interaction being required.

No single security application is capable (nor should we expect a single application to be capable), of providing adequate computer system protection. Gaps exist, in protection capabilities, in even the most sophisticated security applications.

Layering (or stacking) security applications, offers the best chance of remaining infection free, by closing these gaps.

A cloud based protective solution, in this case Immunet Protect, is a major step in shoring up any weaknesses, or gaps, and significantly increase your overall ability to detect malware.

Keep in mind however, that even the best layered protection strategy will not make up for lack of experience, and intuitiveness, when surfing the Internet. So, I’ll repeat what I have said here, many times – “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals.”

Immunet Protect Fast facts:

Fast Antivirus: Immunet leverages the speed of cloud computing to deliver real-time protection to your PC

Light Antivirus: Immunet is up to 35 times lighter than traditional antivirus solutions

Real-time Antivirus: Immunet provides cloud-based protection that is always up-to-date against viruses, spyware, bots, worms, Trojans, and keyloggers without slowing down your PC. No need to download any virus signature files!

Companion Antivirus: Immunet is compatible with existing antivirus products to help protect you better. Add an extra, lightweight layer of protection for free

Community Antivirus: Immunet’s Collective Immunity technology protects all users the instant that a virus is detected on one PC

System requirements: Windows XP with Service Pack 2 or later, Vista (32-bit and 64 bit), Windows 7 (32-bit and 64-bit).

Download at: Developer’s site

A final note: I recommend that you approach installation cautiously, since you will be offered the opportunity to install the Ask.com toolbar. There are reports that some users had the toolbar installed despite their refusal. If, this is the case, Immunet Protect needs to address this issue immediately.

In March of this year, I wrote a piece “We Don’t Want No Stinkin’ Toolbar!”, which drew a large number of outraged comments from readers, aimed at software developers.

So, I’ll repeat, for the benefit of developers, a statement I made in that article –

“Stop with the crapware already. If you’re pissing me off, just consider what you’re doing to an average user. Like it or not, there’s a lesson here. In the long run, your behavior will cost you – big time.”

Update – June 21,2010: Immunet Protect is a highly responsible company which listens to its community of users. And, based on feedback received, the company has chosen to remove the Ask toolbar from the application installer as a recent posting (shown below), on the community site clearly indicates.

“Now that our release is out, we’ve had a moment to sit back and reflect on the feedback we’ve gotten from our community. Some of the feedback we received was clear that our implementation of a build with the ASK toolbar gave some people a degree of discomfort.

As a result we’ve released a new build – Version 2.0.11.4. This new build fixes some outstanding UI issues and completely removes the ASK toolbar. In the next couple of weeks we’ll discuss this issue with our Community to review our next steps.”

Kudos to Immunet Protect, for taking this responsible position that other companies should learn from, and emulate.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

41 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Antivirus Applications, Cloud Computing Applications, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Internet Protection, Free Security Programs, Freeware, Software, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

The Winners in the SYNCING.NET Free License Giveaway Are…..

I’m happy to announce the 6 winners of a pair of free license for SYNCING.NET – Business Edition, a superior file synchronization application, that is easy to setup, customize and run, for both less experienced, and expert users alike.

Congratulations to the winners: Corker, David,  Grr, Rod, Luiz, and Rick.

Each winner has been notified directly. If you weren’t one of the lucky winners, you can test drive this great application for 30 days by visiting SYNCING.NET.

Thank you, to all those who participated.

SYNCING.NET – Business Edition Review:

In today’s rugged business environment, having a “competitive advantage”, over the competition, is not just a buzz phrase, it’s critical to success.

Controlling information in such a way, that all parties with access to that information access the same information, all of the time, can be a significant competitive advantage.

Roadblocks that inhibit the exchange of, or access to, the same data, will, unquestionably negatively impact a company’s profitability, and long term viability.

By synchronization data files on multiple computing devices – maintaining the same version of the relevant files, employees can manage their time more efficiently and productively. Enhanced productivity and efficiencies are an obvious competitive advantage, with direct impact on the bottom line.

SYNCING.NET – Business Edition is a premium enterprise grade application, designed for small and medium sized businesses with a difference. SYNCING.NET – Business Edition, has been created with one overriding consideration – simplicity and convenience.

With SYNCING.NET installed, an enterprise now has the ability to synchronize Outlook e-mails, contacts, calendars and tasks in real time, as well as Windows files of any size and type.

If you are in the market for a simple, safe, and complete solution to meet your company’s data synchronization needs then SYNCING.NET, with its  user-friendly interface, and low maintenance, should meet or exceed your expectations.

Sync net 1

Fast facts:

From the developer –

SYNCING.NET Business Edition allows administrators to define user rights. Administrators can allow read-access only, as well as other levels of access for particular users to add or change own content without restrictions.

As the administrator you can manage all of your PCs from any Outlook Group or Sync Folder. In your absence, you can also add up to three additional users as administrators. Even if you have to be away from the office you know your team will still be synchronized.

SYNCING.NET provides a Guest Role option within the Business Edition that allows read-access only, keeping crucial files and data safe from accidental changes.

When creating an Outlook Group or a Sync Folder, you can specify who you want to invite to join these groups. This allows for complete control over who has access to the shared data. Invite/removal privileges are for the Group originator and administrator only.

SYNCING.NET synchronization is automatic and silent. Complete background functionality means you are freed up to focus on the task at hand and nothing else.

If you’ve got an internet connection, then you’ve got real-time updates. SYNCING.NET is completely location independent, so you can easily work on files and Outlook from the road and synchronize that data with every PC in your Group – no server needed. Even working offline is no problem. The second you are back online the data changes you’ve made are automatically synchronized.

SYNCING.NET software only synchronizes the changes in the data – not the entire file. This results in extremely fast, real time synchronization.

When creating an Outlook Group or Sync Folder, you are given a prompt that allows you to individually choose which folders are to be synchronized between the computers in your Group or Folder.

Our simple, intuitive user interface helps you easily sync your Outlook and files. The software is powerful, yet easy to utilize – for any level of PC user.

SYNCING.NET uses military grade, highly secure 256-bit AES encryption for end-to-end transmission. This encryption complies with the 1024-bit RSA authentication to the highest safety standard (military grade).

The key products of the company include three major editions to meet every user’s need: Business Edition, Home Edition, for the home user, and the Professional Edition, for the professional user.

System requirements: Windows 2000/XP/Vista/7

Additional requirements: Microsoft .NET Framework

Download a free 30 day trial at: SYNCING.NET

Purchase price: $225 USD.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under Backup Tools, Business Applications, Contests, downloads, Giveaways, Interconnectivity, Productivity Software, Software, Software Trial Versions, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

License Giveaway – SYNCING.NET Business Edition, 12 Free Licenses

image Continuing with Tech Thoughts occasional focus on business applications, we have arranged with SYNCING.NET to give away 12 licenses (retail value $225 U.S. each), for their flagship application SYNCING.NET – Business Edition, a file synchronization application designed to maintain the same version of files on multiple computing devices.

To enter the contest to win one of the licenses, simply add a comment at the end of this article. On June 7, 2010, all comments will be added to the online List Randomizer, and the first 6 names that appear, will win a free registration code. This week is already off the rails time wise, so I won’t necessarily acknowledge your comment. Once you see your comment in the comment column, you can be sure your entry has been noted.

Please note: Winners will need a separate key for each computer he/she is planning to sync, so we will draw 6 winners (2 licenses each).

Read the following review and I’m sure you’ll agree this is a contest worth entering.

In today’s rugged business environment, having a “competitive advantage”, over the competition, is not just a buzz phrase, it’s critical to success.

Controlling information in such a way, that all parties with access to that information access the same information, all of the time, can be a significant competitive advantage.

Roadblocks that inhibit the exchange of, or access to, the same data, will, unquestionably negatively impact a company’s profitability, and long term viability.

By synchronization data files on multiple computing devices – maintaining the same version of the relevant files, employees can manage their time more efficiently and productively. Enhanced productivity and efficiencies are an obvious competitive advantage, with direct impact on the bottom line.

SYNCING.NET – Business Edition is a premium enterprise grade application, designed for small and medium sized businesses with a difference. SYNCING.NET – Business Edition, has been created with one overriding consideration – simplicity and convenience.

With SYNCING.NET installed, an enterprise now has the ability to synchronize Outlook e-mails, contacts, calendars and tasks in real time, as well as Windows files of any size and type.

If you are in the market for a simple, safe, and complete solution to meet your company’s data synchronization needs then SYNCING.NET, with its  user-friendly interface, and low maintenance, should meet or exceed your expectations.

Sync net 1

Fast facts:

From the developer –

SYNCING.NET Business Edition allows administrators to define user rights. Administrators can allow read-access only, as well as other levels of access for particular users to add or change own content without restrictions.

As the administrator you can manage all of your PCs from any Outlook Group or Sync Folder. In your absence, you can also add up to three additional users as administrators. Even if you have to be away from the office you know your team will still be synchronized.

SYNCING.NET provides a Guest Role option within the Business Edition that allows read-access only, keeping crucial files and data safe from accidental changes.

When creating an Outlook Group or a Sync Folder, you can specify who you want to invite to join these groups. This allows for complete control over who has access to the shared data. Invite/removal privileges are for the Group originator and administrator only.

SYNCING.NET synchronization is automatic and silent. Complete background functionality means you are freed up to focus on the task at hand and nothing else.

If you’ve got an internet connection, then you’ve got real-time updates. SYNCING.NET is completely location independent, so you can easily work on files and Outlook from the road and synchronize that data with every PC in your Group – no server needed. Even working offline is no problem. The second you are back online the data changes you’ve made are automatically synchronized.

SYNCING.NET software only synchronizes the changes in the data – not the entire file. This results in extremely fast, real time synchronization.

When creating an Outlook Group or Sync Folder, you are given a prompt that allows you to individually choose which folders are to be synchronized between the computers in your Group or Folder.

Our simple, intuitive user interface helps you easily sync your Outlook and files. The software is powerful, yet easy to utilize – for any level of PC user.

SYNCING.NET uses military grade, highly secure 256-bit AES encryption for end-to-end transmission. This encryption complies with the 1024-bit RSA authentication to the highest safety standard (military grade).

The key products of the company include three major editions to meet every user’s need: Business Edition, Home Edition, for the home user, and the Professional Edition, for the professional user.

System requirements: Windows 2000/XP/Vista/7

Additional requirements: Microsoft .NET Framework

Download a free 30 day trial at: SYNCING.NET

Purchase price: $225 USD.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

95 Comments

Filed under Business Applications, Contests, downloads, Free Full Versions, Microsoft, Network Tools, Peer to Peer, Productivity Software, Software, Software Giveaways, Software Trial Versions, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download Immunet Protect – A Free Community Based Cloud Antimalware Application

image I have a number of computers; not all of which face the Internet, but those that do, are protected from compromise by a layered (or stacked), security approach.

Here’s an example of a layered security approach – one that I use on my principal home machine. The following applications are stacked on this machine, in order to cover any potential gaps in security coverage:

I should add, I use two additional free security applications, SuperAntiSpyware and Malwarebytes Anti-Malware, as secondary scanners on a weekly basis, as an added precaution.

Nothing is static though, when it comes to ensuring that my machines continue to be protected in the “real” Internet world. A world which is generally a much more demanding world, than that experienced by an average computer user.

Since I operate in this real world – not a test tube environment, I expect my antimalware applications to pass “real world” testing – not “test tube” testing, before relying on them for protection.

For this reason, when I test anti-malware applications, it often takes considerable time in order to get to the heart of the matter – does an application work in “my real Internet world?”

Arguable, the majority of available antimalware applications continue to rely on well established technologies. You could, if you like, replace “well established”, with “old”, or, some might say – “outdated”.

Since most viruses, worms, Trojans and other types of Internet threats only last 24 hours, how do security applications that rely on a definition database to identify malware files (most anti-malware applications), keep up with this onslaught? The simple answer is; they don’t.

Contrast this, with new and emerging security technologies, particularly Cloud based antimalware applications.

I was recently introduced to a new Cloud based antimalware solution,  Immunet Protect, which I have since come to rely on, and have now added to my layered security approach.

Immunet Protect, despite the fact it is Beta (a new enhanced final version is scheduled for release at the end of May which will include active scanning), is a community based antimalware solution which makes it just a little bit different – but in a highly positive way. If you’re familiar with the Browser protection application WOT (Web of Trust), then you have a sense of “community based” applications.

In real time, Immunet Protect keeps track of the state of security in the collective community (network), and should a member of the network (the community), encounter malware, you (as a member of the protected community), are instantly protected against the threat.

Or, as the developer puts it  –  “Every time someone in this collective community encounters a threat, everyone else in the community gains protection from that same threat – in real time.”

A rather more impressive security solution than you having to wait for a malware definition database update. An update that may take several days. Days in which you are effectively open to infection.

Nevertheless, Immunet Protect has been developed to work in conjunction with the most popular antimalware solutions, for added protection. A list of compatible antimalware solutions follows, later in this article.

Installation was straightforward and ran without complication, as the following screen capture indicates.

Immediately following installation you may choose to run a “Flash Scan”, which probes running process, and load point process, for contamination.

Having the ability to share Immunet Protect with your Facebook and Twitter contacts, I though, was a very cool feature. After all, there is strength in increasing numbers.

Immunet 1

Setting the operating parameters (the protection settings), is, again, straightforward.Immunet 3

The following screen capture illustrates the results of my first Flash Scan. Notice that Immunet Protect tracks programs installed over a selectable time frame, and indicates the safety of the installs. As well, the total number of current threats for which protection is offered, is indicated. In this case, 12 Million, plus.

Immunet 4

The History function provides you with a database of scans completed and the results of those scan.

Immunet 5

When active, an Immunet Protect icon (far left), sits in the Taskbar as the following screen capture shows. In this screen capture you can also see my primary security solutions are active and responsive.

Immunet 6

I must admit, I feel an added sense of security when following boot up, Immunet Protect runs an automatic Flash Scan.

Finally, there is virtually no draw against system resources while running Immunet Protect, on a dual core Windows 7 test platform.

Should you consider installing, and running, a Cloud Antivirus as supplementary antimalware protection?

If you are uncertain, then consider this:

The Internet is an uncertain world at the best of times

Cybercriminals design specific malware to exploit vulnerable systems without user interaction being required.

No single security application is capable (nor should we expect a single application to be capable), of providing adequate computer system protection. Gaps exist, in protection capabilities, in even the most sophisticated security applications.

Layering (or stacking) security applications, offers the best chance of remaining infection free, by closing these gaps.

A cloud based protective solution, in this case Immunet Protect, is a major step in shoring up any weaknesses, or gaps, and significantly increase your overall ability to detect malware.

Keep in mind however, that even the best layered protection strategy will not make up for lack of experience, and intuitiveness, when surfing the Internet. So, I’ll repeat what I have said here, many times – “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals.”

The following Anti-Virus packages have been tested to work alongside the Immunet Protect beta. Immunet Protect should be able to install alongside these packages and significantly increase your overall ability to detect viruses.

AVG 8.5 (Free) (Windows XP SP2 / Vista)

AVG 9 Free (Windows XP SP3 / Vista SP1 / Windows 7)

Avast! Free & Premium 4.8/5.0 (Windows XP SP3 / Vista SP1 / Windows 7)

Avira 2009 Personal Free (Windows XP SP3)

Norton Anti-Virus 2008 (Windows XP SP2)

Norton Anti-Virus 2009 (Windows XP SP2 / Vista)

Norton Internet Security 2008 (Windows XP SP2)

Norton Internet Security 2009 (Windows XP SP2 / Vista)

Norton Internet Security 2010 (Windows XP SP3 / Vista SP1 / Windows 7)

Norton 360 2009 (Windows XP SP2 / Vista)

Norton 360 2010 (Windows XP SP2 / Vista SP1 / Windows 7)

Mcafee Security Center 9.3 (Windows XP SP3 / Vista)

Mcafee Security Center 2009 (Windows XP SP2)

Microsoft Security Essentials (Windows XP SP3 / Vista SP1 / Windows 7)

Trend AntiVirus 2010 (Windows XP SP3 / Vista SP1 / Windows 7)

Trend AntiVirus + AntiSpyware 2010 (Windows XP SP3 / Vista SP1 / Windows 7)

Trend Virus Buster 2010 Vista (Japanese Marketplace) (Windows XP SP3 / Vista SP1 / Windows 7)

K7 Total Security 2010 (Windows XP SP3 / Vista SP1 / Windows 7)

System requirements: Windows XP with Service Pack 2 or later, Vista (32-bit and 64 bit), Seven (32-bit and 64-bit).

Download at: Developer’s site (IMMUNET)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

31 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Beta Software, Cloud Computing Applications, cybercrime, Don't Get Scammed, Don't Get Hacked, downloads, Free Security Programs, Freeware, Internet Safety Tools, Software, Spyware - Adware Protection, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP, WOT (Web of Trust)