Tag Archives: USB compatible

Beat Obama’s Bandits With TrueCrypt Free (Open-Source) Encryption

The so called “War on Terror” has long since lost its luster and should be appropriately reclassified as The War of Terror. The U.S. has been singularly impudent in terrorizing the terrorists but instead, it has managed to terrorize the rest of the world using a system of surveillance schemes that have gone off the board. Chalk one up for Al Qaeda – the only winners in this debacle.

In the meantime, Americans continue to live in fear – trading away freedoms for security in a war that is simple unwinnable. Obama, despite his assurances that he would “fight terrorism while maintaining our civil liberties” has been a principle mover in this assault on democracy.

And, the master of the reversal has more –

Obama, in a 2008 election sound bite, drew a sharp contrast with the Bush administration which he proclaimed, offered Americans “a false choice between the liberties we cherish and the security we demand.” And for good measure – for stooping “to spy on citizens who are not suspected of a crime.” It’s a surreal world we live in, is it not?

But why be satisfied with my ramblings? Here’s the video.

image

As America continues its slide into Fascism (eagerly joined in the venture by Canada, Australia, the U.K. and countless other self-advertised “democracies”), the justified expectation held by these governments is – you – yes, you – will take no active part in expressing your outrage at the escalating intrusions into your private life. Sadly, the undermining of democracy, or more to the point, democracy as we though we knew it, continues apace.

As a consequence (hardly the only consequence, of course), encryption technology is once again in the spotlight. And no, using encryption does not mean that one has something to hide.

Sophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Putting Obama and his bad boys aside, here are some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

It happens to us all: Just this past week, I lost not only my house keys (first time ever) – but the USB key attached to the keychain. If you guessed that the drive was encrypted – take a bow.   Smile

TrueCrypt:

TrueCrypt is an outstanding free open source software application for establishing and maintaining an on-the-fly-encrypted volume. On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved – without any user intervention. The program automatically and transparently encrypts in real time.

No data stored on an encrypted volume can be read (decrypted) without the correct password/key file or correct encryption keys. The entire file system is encrypted (i.e., file names, folder names, contents, free space, Meta data, etc.).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). When you turn off your computer, the volume will be dismounted and files stored in the volume will be inaccessible and encrypted. You may of course, manually dismount the volume.

TrueCrypt offers a number of options – you can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Installation is simple and straightforward – no gotchas here. Lots of steps – but easy steps.

image

image

image

image

image

If you choose “Keyfiles”, be sure you understand the ramifications. This is an extra security step which has limited application for a home user. You do not need to select this option.

image

image

image

image

image

And – Win 8’s File Explorer reports that the volume has been setup successfully. If you expand the graphic below (click), you’ll also notice my first TrueCrypt volume on this HD from May 9, 2006.

image

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

I’ve been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Win 8, Win 7, Vista, XP, Mac OS X, and Linux.

Download at: TrueCrypt

14 Comments

Filed under downloads, Encryption Software, Freeware, Interconnectivity, Open Source, Software, Utilities

TrueCrypt – Free Encryption To The Max

imageSophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have been using for years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, flash drive, Freeware, Open Source, Software, USB, Utilities, Windows Tips and Tools

EncryptOnClick – Encrypt and Decrypt Files and Folders With A Few Clicks

The article I posted a few days ago – Free Secret Disk – Keep Your Secret Computer Files “Secret”, led to a more than a few reader questions on additional free encryption applications.

So, I’ve retested the updated versions of a number of free encryption applications I’ve recommended in the past few years, and I’ll post on these in the coming days – starting today with EncryptOnClick

EncryptOnClick ( last updated March 08, 2011), is a free program that lets you securely encrypt and decrypt files/folders. The program is very simple to use, and features military grade 256-bit AES encryption.

After you have launched the application, simply select the target file/folder you want to encrypt.

Following the easy interface, type a password for that file/folder which will then be encrypted. To open the encrypted file/folder at a later date, you must type the correct password.

In the following example I’ve chosen to encrypt a folder by clicking on the Folder button…

image

which prompted me to browse and select the target folder.

image

The application took approximately one minute to encrypt this 220 MB folder and its sub folders.

In the following graphic you can see that the file I’ve highlighted, within the encrypted folder, can only be accessed through EncryptOnClick.

Click on graphic to expand to original size.

image

Decrypting the selected folder is just as simple and straightforward.

image

In the following graphic  you can see that the file I’ve highlighted within the folder (following  decrypting), can now be accessed normally.

Click on graphic to expand to original size.

image

Fast facts:

A very secure encryption and decryption method is used (256-bit AES encryption)

Files are both compressed & encrypted, which results in a smaller file

Password protected

Will encrypt single files or all files in a folder

Very simple to use interface

Can be used on a USB key

Fully Unicode enabled so filenames in any language can be encrypted

Will encrypt, decrypt, compress, and uncompress files which can also be opened and decrypted using third party programs like WinZip 9 – provided the correct password is used

Will detect if you’re decrypting a file that is in a temporary folder, and if so, will prompt you to see if you would like to decrypt it into a different folder

Command line parameters can be used

Complete help file

Tip: Run on a Flash Drive by copying the files EncryptOnClick.exe, EncryptOnClick.exe manifest, ExceedZip.dll to a named folder on the Flash Drive.

System Requirements: Windows XP, Vista, Win 7 and NT.

Download at: Download.com

Tomorrow: Free Encrypt Stick reviewed.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, Privacy, Software, Utilities, Windows Tips and Tools

Free Comodo System Cleaner – CCleaner On Steroids

imageJust a few days ago, I posted my usual annual review of CCleaner – in which I made the point, that this free system cleaner is still my “go to” application for simple system cleanup.

But, if you’re looking for a more powerful free solution, then Comodo System Cleaner might just be ideal. This free application will do what CCleaner will do, and a whole lot more – and I do mean, a whole lot more.

I’m a big fan of Comodo’s products, including their free Firewall and AntiVirus software. So, I was expecting big things from Comodo System Cleaner when I first installed it, and I wasn’t disappointed. In fact, this is now my “go to” application when I need to dig the deep dirt out of a system.

Installation is easy, and preference setup is checkbox simple – as the following selected screen captures indicate. All screen shots are taken from my personal machine – clicking on any graphic will expand it to its original size.

Clean up menu

image

Settings menu

image

Autoruns menu

image

System settings menu – System Tweaks

image

Fast facts:

Registry Cleaner – Optimizes and repairs your Windows registry by running an in-depth scan to remove, or repair, unnecessary or corrupted registry keys.

SafeDelete and Registry Protection – Use these features to backup all your files before cleaning. When cleaning is complete, you’ll be able to make sure your PC is in perfect condition before deleting for good.

Disk Cleaner – This utility lets you quickly clear them all, to free up space and improve performance. Also allows you to schedule regular clean up routines.

Privacy Cleaner – Obliterates your digital paper trail and helps protect you from identity theft by cleaning history, cache, cookies and usage records from Internet browsers, Windows locations, and popular software.

System Settings – With over 50 tweaks in the ‘System Settings’ area alone, you can optimize Windows behavior in a more powerful and intuitive way than ever before.

System Information – Detailed and easily accessible ‘dashboard’ summary of all the hardware and software installed on your computer.

Autorun Manager – Fingertip control over exactly which programs and services start with Windows. Helps improve Windows boot up time, stops unwanted programs from hogging system resources and boosts overall system performance and stability.

File Pending Delete – Provides the ability to delete files that are locked and cannot otherwise be deleted when in Windows ‘User Mode’. Specifying a file with the ‘File Pend Delete’ tool will schedule that file to be deleted immediately after the next system restart.

File Wiper – Allows you to permanently remove confidential or sensitive files from your hard drive. When you delete a file in Windows, you are really only removing the reference to that file from the system table. The file itself remains on your drive and could be easily re-opened by data thieves. ‘File Wiper’ ensures that the files you want to delete are comprehensively erased and cannot be recovered.

Free – for both home and business users.

View the video.

image

I’m a big fan of “all-in-one” system utilities and I have to admit, I really like this all-in-one free application with its simple and effective user interface. I particularly like the easy access the user interface allows to Windows system settings, which makes tweaking the OS a snap.

As the fast facts point out, this application has a wide range of built in system utilities, which in my view, are perfect for the new, or casual computer user. I should point out however, that the built in registry cleaner, just like all registry cleaners, should be used cautiously.

Overall recommendation: Comodo System Cleaner is definitely worth considering as an addition to any users system utilities toolbox.

System requirements: Windows XP, Vista, Win 7 and Server 2003 (all – 32 or 64 bit)

Download at: Comodo

Bonus: What makes this free application even more interesting is; it’s available as a portable program which can easily be run from a USB drive. Great for geeks!

Portable version download at: Download.com

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

22 Comments

Filed under 64 Bit Software, Cleaning Your Computer, Comodo, Computer Maintenance, downloads, Freeware, Portable Applications, Secure File Deletion, Software, System Tweaks, System Utilities, USB, Windows 7, Windows Update, Windows Vista, Windows XP

Download TrueCrypt – TrueCrypt Beats The FBI Decryption Team!

image

When the subject of file/disk encryption comes up, when talking with my non-technical friends, I often get the oddest looks and the strangest comments. These comments generally revolve around the fact (my friends’ facts), that only someone with something to hide would need to encrypt files.

They’re right of course, but not for the reasons they set forth.

In the real world, aware computer users know that financial data, and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two), or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have using for the last several years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or in this latest release (November 23, 2009), a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said earlier, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under cybercrime, Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, Linux, Mac, Open Source, Portable Applications, Software, Spyware - Adware Protection, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download Free USB Safeguard – Simple USB Data Encryption

USB Stick 2 Since USB drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two – both encrypted), or stolen.

If you should lose a USB drive, through happenstance or theft, you need to be sure that any confidential information on the drive cannot be read, and the way to do that is to encrypt your data.

If you’re unfamiliar with data encryption; simply put, it is a process by which bits of data are mathematically jumbled with a password-key. The process makes the data unreadable unless, or until, decrypted by you.

Here’s a very cool free encryption application, USB Safeguard, which will encrypt your USB data in an easy, follow the bouncing ball manner – you can’t get much easier than “Drag and Drop”. Simply download this free application and run it from your USB drive.

The following screen captures illustrate just how easy encryption can be using USB Safeguard. Clicking on any graphic will open a new window to display the graphic in 640x – format.

Launch the application on your USB drive and construct a password.

USB Safeguard 1

You will be queried as to whether you want to save your password on your Home PC.

USB Safeguard 2

Drag and Drop the files on the USB Drive you want to encrypt into the applications interface window. The free application restricts encryption to a maximum of 2 GB.

USB Safeguard 3

Following successful encryption you will have the option of further protecting your files (in the event of loss), by overwriting or deleting the encrypted files. I particularly like this feature, since it adds another layer of security.

USB Safeguard 4

USB Safeguard 5

Decrypting the files is every bit as easy. Simply launch the application (remember, the application is on the USB drive), enter you’re password and voila!

USB Safeguard 7

Fast facts:

Runs with any usb pen drive

No installation required

256-bit AES encryption

Easy drag & drop file adding

Built in file shredder

Secure your data if drive is lost

Supports FAT16, FAT32 and NTFS file system

Without a doubt, this is encryption taken to a new level of simplicity. Ideal for average users, who have little interest in dealing with the finer points of encrypting data.

System requirements: Windows XP/Vista/Seven

Download at: Developer’s Site (USB Safeguard Software)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

14 Comments

Filed under downloads, Encryption, Encryption Software, Freeware, Privacy, Software, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download Free Comodo System Cleaner – Gets the Deep Dirt Out!

What could be a more powerful free solution, than that old standby CCleaner, which removes unused files, and ensures your privacy by cleaning traces of your online activities? Well, how about Comodo System Cleaner (last update February 09, 2010), which will do all that, and much more.

I’m a big fan of Comodo’s products, including their free Firewall and AntiVirus software. So, I was expecting big things from Comodo System Cleaner, and I wasn’t disappointed. After considerable testing, I gave this free application a big “thumbs up”.

Comodo Privacy Cleaner 1

Fast facts:

Registry Cleaner – Optimizes and repairs your Windows registry by running an in-depth scan to remove, or repair, unnecessary or corrupted registry keys.

Disk Cleaner – This utility lets you quickly clear them all, to free up space and improve performance. Also allows you to schedule regular clean up routines.

Privacy Cleaner – Obliterates your digital paper trail and helps protect you from identity theft by cleaning history, cache, cookies and usage records from Internet browsers, Windows locations, and popular software.

System Settings – With over 50 tweaks in the ‘System Settings’ area alone, you can optimize Windows behavior in a more powerful and intuitive way than ever before.

System Information – Detailed and easily accessible ‘dashboard’ summary of all the hardware and software installed on your computer.

Autorun Manager – Fingertip control over exactly which programs and services start with Windows. Helps improve Windows boot up time, stops unwanted programs from hogging system resources and boosts overall system performance and stability.

File Pending Delete – Provides the ability to delete files that are locked and cannot otherwise be deleted when in Windows ‘User Mode’. Specifying a file with the ‘File Pend Delete’ tool will schedule that file to be deleted immediately after the next system restart.

File Wiper – Allows you to permanently remove confidential or sensitive files from your hard drive. When you ‘delete’ a file in Windows, you are really only removing the reference to that file from the system table. The file itself remains on your drive and could be easily re-opened by data thieves. ‘File Wiper’ ensures that the files you want to delete are comprehensively erased and cannot be recovered.

Free – for both home and business users.

Comodo Reg Cleaner 1

I’m a big fan of “all-in-one” system utilities and I have to admit, I really liked this all-in-one free application, with its simple and effective user interface. I particularly liked the easy access the user interface allows to Windows system settings, which makes tweaking the OS a snap.

As the fast facts point out, this application has a wide range of built in system utilities, which in my view, are perfect for the new, or casual computer user. I should point out however, that the built in registry cleaner, just like all registry cleaners, should be used cautiously.

Here’s why – despite the fact that the registry cleaner has a neat feature; it will restart your machine to test if the registry removal will adversely affect your system, on a test run this module screwed up my game settings.

I’m not blaming the module. It was my own fault, since I did not exercise proper caution. Just shows you – even geeks can be careless! It was not a big deal to recover but……….

Comodo provides a comparison chart, on their site, which illustrates the differences between their application and the competition, which you may find interesting.

Comodo Cleaner Comparison

If you’re a casual computer user, Comodo System Cleaner is definitely worth considering as an addition to your system utilities toolbox.

System requirements: Windows XP, Vista, Win 7 and Server 2003 (all – 32 or 64 bit)

Download at: Comodo

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Comodo, Computer Maintenance, downloads, Freeware, Registry Cleaners, Software, System Tweaks, System Utilities, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Two Free Apps to Encrypt Your USB Drive

encryption 1You can call it a Flash Drive, a USB Key, a USB drive, a Keychain drive, or a USB stick. Whatever you call it, you are referring to a small plastic case which contains a circuit board and a USB connector.

Instead of the now obsolete floppy disk (new machines generally don’t have a floppy drive), USB flash drives have become the standard for transporting applications, personal files, documents, pictures, videos, music and so on.

Since USB drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two), or stolen.

If you should lose a USB drive, through happenstance or theft, you need to be sure that any confidential information on the drive cannot be read, and the way to do that is to encrypt your data.

Here are a number of free encryption applications that will encrypt your data, and are suitable for a USB flash drive.

EncryptOnClick

image

EncryptOnClick is a free program that lets you securely encrypt and decrypt files. The program is very simple to use, and features military grade 256-bit AES encryption.

After you have launched the application, simply select the target file/folder you want to encrypt.

Following the easy interface, type a password for that file/folder which will then be encrypted. To open the encrypted file/folder at a later date, you must type the correct password.

Fast facts:

A very secure encryption and decryption method is used (256-bit AES encryption)

Files are both compressed & encrypted, which results in a smaller file

Password protected

Will encrypt single files or all files in a folder

Very simple to use interface

Can be used on a USB key

Fully Unicode enabled so filenames in any language can be encrypted

Will encrypt, decrypt, compress, and uncompress files which can also be opened and decrypted using third party programs like WinZip 9 – provided the correct password is used

Will detect if you’re decrypting a file that is in a temporary folder, and if so, will prompt you to see if you would like to decrypt it into a different folder

Command line parameters can be used

Complete help file

Free technical support, online forums, knowledge base, and FAQs at 2BrightSparks

Tip: Use on a USB key by copying the files EncryptOnClick.exe, EncryptOnClick.exe manifest, ExceedZip.dll to a named folder on the USB key.

System Requirements: Windows 98/ME/2000/XP/2003/Vista (64 bit)

Download at: SnapFiles

TrueCrypt

image

TrueCrypt (updated November 23, 2009), is an outstanding free open source software system, (one I have using for the last several years) for establishing and maintaining an on-the-fly-encrypted volume.

On-the-fly encryption simply means that data are automatically encrypted or decrypted just before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/correct encryption keys.

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified – volumes cannot be distinguished from random data

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

11 Comments

Filed under downloads, Encryption, Encryption Software, flash drive, Freeware, Privacy, Software, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Comodo System Cleaner – The Free “Swiss Army Knife” of System Cleaners

image Calling this free application “a system cleaner” is more than a slight understatement – it’s a bit more “Swiss Army Knife” than that. The inclusion of a System Tweaker, AutoRun Manager, and File Wipe module, takes this application out of the “run of the mill” category.

After considerable testing, and retesting, I gave Comodo System Cleaner a big “thumbs up”.

Comodo Privacy Cleaner 1

Fast facts:

Registry Cleaner – Optimizes and repairs your Windows registry by running an in-depth scan to remove, or repair, unnecessary or corrupted registry keys.

Disk Cleaner – This utility lets you quickly clear them all, to free up space and improve performance. Also allows you to schedule regular clean up routines.

Privacy Cleaner – Obliterates your digital paper trail and helps protect you from identity theft by cleaning history, cache, cookies and usage records from Internet browsers, Windows locations, and popular software.

System Settings – With over 50 tweaks in the ‘System Settings’ area alone, you can optimize Windows behavior in a more powerful and intuitive way than ever before.

System Information – Detailed and easily accessible ‘dashboard’ summary of all the hardware and software installed on your computer.

Autorun Manager – Fingertip control over exactly which programs and services start with Windows. Helps improve Windows boot up time, stops unwanted programs from hogging system resources and boosts overall system performance and stability.

File Pending Delete – Provides the ability to delete files that are locked and cannot otherwise be deleted when in Windows ‘User Mode’. Specifying a file with the ‘File Pend Delete’ tool will schedule that file to be deleted immediately after the next system restart.

File Wiper – Allows you to permanently remove confidential or sensitive files from your hard drive. When you ‘delete’ a file in Windows, you are really only removing the reference to that file from the system table. The file itself remains on your drive and could be easily re-opened by data thieves. ‘File Wiper’ ensures that the files you want to delete are comprehensively erased and cannot be recovered.

Free – for both home and business users.

Comodo Reg Cleaner 1

I’m a big fan of “all-in-one” system utilities and I have to admit, I really liked this all-in-one free application, with its simple and effective user interface. I particularly liked the easy access the user interface allows to Windows system settings (even on my Windows 7 machine), which makes tweaking the OS a snap.

As the fast facts point out, this application has a wide range of built in system utilities, which in my view, are perfect for the new, or casual computer user. I should point out however; the built in registry cleaner, just like all registry cleaners, should be used cautiously.

Here’s why – despite the fact that the registry cleaner has a neat feature; it will restart your machine to test if the registry removal will adversely affect your system, on my first test run, this module screwed up my game settings.

I’m not blaming the module. It was my own fault, since I did not exercise proper caution. Just goes to show you – even geeks can be careless! It was not a big deal to recover but……….

What makes this free application even more interesting is; it’s available as a portable program which can easily be run from a USB drive. Great for geeks!

Comodo provides a comparison chart, on their site, which illustrates the differences between their application and the competition, which you may find interesting.

Comodo Cleaner Comparison

When I need that weekly deep cleaning, or I need additional system access, Comodo System Cleaner has become my “go to” application.

For everyday routine cleaning, I’ll continue to use Ccleaner since it’s FAST and really, it’s so simple, that it’s a bit of a “no brainer”.

Recommendation: I’m a big fan of Comodo’s products, including their free Firewall and AntiVirus software. So I was expecting big things from Comodo System Cleaner, and I wasn’t disappointed.

Comodo System Cleaner is definitely worth considering as an addition to your system utilities toolbox. If you’re building a portable “tech tools” flash drive, this application is a worthy addition.

System requirements: Windows Vista – 32 and 64 bit, XP – 32 and 64 bit, Windows 7.0 – 32 and 64 bit, Server 2003 – 32 and 64 bit

Download at: Comodo

Portable version – (supports both 32 bit and 64 bit systems), download at: Comodo

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Cleaning Your Computer, Comodo, Computer Maintenance, Disk Cleaners, downloads, flash drive, Freeware, New Computer User Software Tools, Portable Applications, Registry Cleaners, Slow Computer, Software, System Tweaks, System Utilities, USB, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Three Free “all-in-one” System Cleaners

I’m a big fan of “all-in-one” system utilities; particularly “all-in-one” system cleaners. System cleaners come in all shades of complexity – some with a simple and effective user interface, and some with an interface that requires a GPS to navigate.

The following are three cleaning utilities that make my list of worthwhile additions, to any computer user’s toolbox – two that I have tested extensively, and one (EasyCleaner), that I’ve been testing for the last few weeks.

EasyCleaner:

EasyCleaner is a small free application that’s capable of cleaning the Windows registry as well as deleting all kinds of unnecessary files, including temp files and backups. It doesn’t stop there though.

While using this excellent little program you can search for duplicate files, manage startup programs, remove invalid shortcuts and add and remove applications. As an added bonus there is even a disk space usage option.

image

System requirements: Windows 95, Windows Me, Windows NT, Windows XP, Windows 2000, Windows 98

Download at: Download.com

CCleaner:

What can you say about CCleaner (the granddaddy of all system cleaners), that hasn’t already been said of this freeware system optimization, privacy, and cleaning tool.

It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. As well, it cleans up traces of your online activities such as your Internet history. Additionally, it contains a fully featured registry cleaner. But the best part is that it’s fast; normally taking less than a second to run.

ccleaner2

System requirements: Windows Vista, Windows 95, Windows Me, Windows NT, Windows XP, Windows 2000, Windows 98

Download at: Download.com

Comodo System Cleaner:

If you’re looking for a more powerful free solution, than either of the two previously mentioned applications, then Comodo System Cleaner might just be ideal. This free application will do what both EasyCleaner and CCleaner will do, and a whole lot more – and I do mean, a whole lot more.

image

Fast facts:

Registry Cleaner – Optimizes and repairs your Windows registry by running an in-depth scan to remove, or repair, unnecessary or corrupted registry keys.

Disk Cleaner – This utility lets you quickly clear them all, to free up space and improve performance. Also allows you to schedule regular clean up routines.

Privacy Cleaner – Obliterates your digital paper trail and helps protect you from identity theft by cleaning history, cache, cookies and usage records from Internet browsers, Windows locations, and popular software.

System Settings – With over 50 tweaks in the ‘System Settings’ area alone, you can optimize Windows behavior in a more powerful and intuitive way than ever before.

System Information – Detailed and easily accessible ‘dashboard’ summary of all the hardware and software installed on your computer.

Autorun Manager – Fingertip control over exactly which programs and services start with Windows. Helps improve Windows boot up time, stops unwanted programs from hogging system resources and boosts overall system performance and stability.

File Pending Delete – Provides the ability to delete files that are locked and cannot otherwise be deleted when in Windows ‘User Mode’. Specifying a file with the ‘File Pend Delete’ tool will schedule that file to be deleted immediately after the next system restart.

File Wiper – Allows you to permanently remove confidential or sensitive files from your hard drive. When you ‘delete’ a file in Windows, you are really only removing the reference to that file from the system table. The file itself remains on your drive and could be easily re-opened by data thieves. ‘File Wiper’ ensures that the files you want to delete are comprehensively erased and cannot be recovered.

System requirements: Windows XP, Vista, Win 7 and Server 2003

Download at: Download.com

Update December 10: A number of readers have pointed out that the registry cleaner function, may be too aggressive. Unless you are a highly skilled user, who is used to working with aggressive cleaners, use a less aggressive registry cleaner.

Bonus: What makes this free application even more interesting is; it’s available as a portable program which can easily be run from a USB drive. Great for geeks!

Portable version download at: Download.com

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

9 Comments

Filed under Cleaning Your Computer, Comodo, Computer Maintenance, Disk Cleaners, Freeware, Geek Software and Tools, New Computer User Software Tools, Privacy, Registry Cleaners, Slow Computer, Software, System Tweaks, System Utilities, Windows Tips and Tools