Tag Archives: Vista

OPSWAT’s March 2012 Security Industry Market Share Analysis

imageWindows XP is dead-dead-dead. After all, Windows XP is a has-been in the world of operating systems – now 2+generations behind – and, eating dust. Or, so say all the pundits.

If you’re an XP user, as I am, then you can take some solace from OPSWAT’s latest quarterly report (released today), bolstered by more than 353,000 data points, which clearly shows Windows XP continues to hold substantial market share. In fact, according to OPSWAT’s data – Windows XP remains the most popular Windows operating system in both North America and worldwide, with slightly under half of computers using XP.

I’ll point out – I also run with Windows 7 and, Windows 8 Consumer Preview (a super system once one has crossed the “I have to learn some new stuff” barrier) – both of which are considerably safer overall than XP. So, I have no ax to grind – but, I do have an XP horse in the race. There’s little doubt of course, that XP will eventually disappear from the scene – but, not quite yet.

Windows 7, and rightfully so, continues to blaze ahead in the race to displace XP from its preeminent market position and, as shown in the following OPSWAT graphic, now commands better than 46% of the operating system market both in North America, and world wide. Windows Vista on the other hand, is barely on the horizon.

image

Graphic courtesy OPSWAT

Additionally, the OPSWAT report takes a close look at world wide and North American Antivirus vendors market share and, the gathered information in this latest report shows virtually no shift in market penetration from previous reports. In the world wide market place, the same Top 10 players, as expected, continue to hold substantial positions.

image

Graphic courtesy OPSWAT

In the North American marketplace, the same high penetration ratios exist although, the players shift position – with Symantec jumping into first position overall, from its sixth position worldwide.

image

Graphic courtesy OPSWAT

Microsoft, as shown in the following graphic, continues to gain ground with a fairly dramatic shift in growth.

image

As in previous OPSWAT reports, free security solutions remain at the top of the market with the highest numbers of installations. The top three products in North America, and worldwide, are available free for download.

OPSWAT’s analysis of the peer to peer application market share surprised me somewhat, since it showed LimeWire continuing to hold a market share -despite a court injunction prohibiting the use of the application, dated October 26, 2010.

On the other hand, there was no surprise in seeing µTorrent maintaining its lead over the competition in the public file sharing application market – as the following graphic indicates.

image

Graphic courtesy OPSWAT

The full report which is chock fill of absorbing statistics is available here.

So, who is OPSWAT?

If you’re a techie, then you’re very likely familiar with AppRemover, a free powerful anti-malware, antivirus application remover, and Metascan Online, a free online file scanner – both from OPSWAT. Beyond this direct connection however, you might not be familiar with OPSWAT.

From the site:

OPSWAT is the industry leader in software management SDKs, interoperability certification and multiple-engine scanning solutions. Our solutions are simplified and comprehensive, solving complex development problems to reduce time and costs for your engineering and testing teams.

OPSWAT offers software manageability solutions to streamline technology partnerships between leading technology solutions and software vendors. By enabling seamless compatibility and easy management capabilities, we make connecting your solutions with other software applications effortless.

Our innovative multi-scanning solutions deliver optimized anti-malware protection that increases detection rates without sacrificing performance with slow and cumbersome scans. Because no single anti-malware engine can catch every threat, we combine multiple engines to scan simultaneously, significantly improving the probability of detecting a threat.

6 Comments

Filed under OPSWAT, Reports

GigaTribe Private P2P – Share Your Videos, Pics, And Docs Privately

image A few days ago, I ran a few tests on peer to peer downloads, on the off chance that things had improved in this malware infested playground. No such luck, of course.

Of the five game files that I downloaded, every one came packed with a Trojan downloader, which, had I installed any of these applications, would have wrecked havoc on my test machine.

In a nutshell, that’s the main problem with public peer to peer file sharing. The chances are high, that you will not get what you think you will, and you will get what you don’t think you will.

Additional issues (but not the only issues) are:

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share.

Spyware: There’s a chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. I can assure you that spyware can be difficult to detect and remove.

So what’s a fellow to do who enjoys file sharing, and who doesn’t want to be burned by the cybercriminals who skulk on public file sharing networks, searching for victims?

A terrific solution to this quandary is a free application from GigaTribe. An application which is designed to create a private network between you, and your friends, relatives, co-workers, or, whomever you choose.

If you have every used peer to peer software, then you’ll find no learning curve involved in using GigaTribe – it’s functional, efficient, attractive, and “follow the bouncing ball” intuitive.

How much more simply can it be than this:

GigaTribe

The following graphic is from the publisher’s site.

image

Fast facts:

GigaTribe has more than 1, 600,000 users.
Its unique technology has been developed by talented programmers with a strong history in the software industry.

There are no limitations on quantity or file size.
All your files are kept on your hard drive, eliminating the need to transfer them to an external server.

Files are available in their original format.
In just a few clicks, you can share and also find files as if you were in a virtual library. You will see files as they were organized on the hard drive, and you can download them in their original format.

You don’t waste time uploading files.
Once you select which folders you want to share, the contents of those folders are instantly accessible to your friends.

Your files remain yours!
Files you have decided to share are not saved on another company’s equipment. You keep your data under your control.

It´s a two-way sharing service.
Each contact can both share and download. You decide which content is worth downloading among the files available to you.

You may invite up to 500 friends.

Transfer automatically resumes.
If a download is interrupted (for example, if a contact goes offline), the transfer automatically resumes with no loss of data when your contact comes back online.

Security is, of course, GigaTribe´s major concern.

Only the people you have invited can see your files. Only the folders you have selected are visible to your contacts. Every exchange is strongly encrypted – No one can see what is being shared.

Downloads are encrypted (Blowfish 256-bit).

As an added bonus, users’ can create profiles, and have access to personal chat and a private blog, all from within the program. Now that’s cool!

According to the developers, GigaTribe (although I haven’t tested this), can also be used to access your PC from a remote location.

System requirements: Windows 2000, XP, 2003, Vista, Server 2008, Windows 7. (no indication on the publisher’s site of x64 compatibility).

Languages: English, Español, Français, Deutsch, Italiano, Português

Download at: Gigatribe

It’s not often that I can rate an application 100%, but GigaTribe comes very close. A superb application! If you’re into private file sharing, or it’s something that you’ve considered, then give GigaTribe a whirl – I think you’ll be glad you did.

For additional information checkout the developer’s FAQ.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, Geek Software and Tools, Networking, Peer to Peer, Privacy, social networking, Software, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

TrueCrypt – Free Encryption To The Max

imageSophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have been using for years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, flash drive, Freeware, Open Source, Software, USB, Utilities, Windows Tips and Tools

Monitor Your Hardware From The Desktop, With Free All CPU Meter

As you can see from the screen capture of my desktop, I’m a minimalist. Maybe I’m a throwback to an earlier age, but I like the look of a clean desktop – I don’t even show desktop icons.

Click graphic to expand.

image

Those applications I use every day, have been added to the taskbar. It works for me – a clean desktop and, ready access to frequently used programs.

Click graphic to expand.

image

But you will, no doubt, have noticed two desktop gadgets displayed. One is a calendar (got to know the day and the date), and the other gadget is one I can’t do without – All CPU Meter.

image

Since I’m mildly obsessive when it comes to hardware monitoring –  All CPU Meter gives me the following information which makes it an easy task:

How hard the CPU is working.

Ram used, and Ram free.

And, most importantly – the processors core temperatures

As an added bonus, double clicking on the gadget brings up Windows Task Manager, which I refer to frequently.

Once installed, choosing the options which best suit your needs is easy.

image

System requirements: Windows 7, Vista, Server 2008 (64 bit supported).

Supported: Twenty Four Core, Sixteen Core, Twelve Core, Eight Core, Six Core, Quad Core, Triple Core, Dual Core or Single Core.

Download at: Windows Live (Microsoft)

NOTE: In order to show core temperatures, All CPU Meter relies on an additional stand alone application – CoreTemp.

Download CoreTemp at: Download.com

In the two years or so, that I’ve been running with this Gadget, I’ve not experienced any problems – it just sits on the desktop doing its job.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

12 Comments

Filed under Desktop Gadgets, downloads, Freeware, Geek Software and Tools, Microsoft, Software, Windows 7, Windows Tips and Tools, Windows Vista

Fix Up To 50 Windows 7, And Vista Problems, With Free FixWin

image You just have to love Windows as an operating system – it makes it so easy to DO so many things. Often however, Windows does not make it easy to UNDO, or “fix” things. It’s not uncommon that attempting to undo things, does nothing more than create additional problems.

If you are familiar with working with Registry entries, you can fix virtually anything, but…..

So, if you’ve been looking for an easy way to fix issues such as, Win Explorer not starting at boot up, CD drive or DVD drive is missing or not being recognized by Windows, or other programs, or the Device Manager is not functioning correctly (not as uncommon as you might think), then the recently released FixWin freeware application, could be the perfect solution.

It’s important to note however, FixWin does NOT scan for problems. YOU, have to recognize that you have the problem – the application will then correct the problem, provided of course it is one of the 50 very common problems the application is designed to deal with.

The FixWin interface consists of 5 easy to work with tabs:

Windows Explorer

clip_image001

Internet & Connectivity

clip_image002

Windows Media

clip_image003

System Tools

clip_image004

Misc. Additional Fixes

clip_image005

How to use this application (from the developers):

We first suggest that you run the System File Checker Utility. The button provided on the Welcome page, will ‘run sfc /scannow‘ and will check for and replace any corrupted Windows system files. It is expected to take anywhere from 5-10 minutes. If asked to, do reboot.

Next we insist that you create a System Restore Point. The provided button will create one, called Safe Point. We always recommend that you create one before making any changes to your system. Should you wish or need too, you can always go back to this Safe Point.

Having done that, apply at most one fix at a time and restart your computer. Please check if things are to your satisfaction; and if not, you have the option of restoring back immediately.

Since this application does not require installation, it’s a perfect portable application to carry on your “tech tools” flash drive, for the times you get those inevitable calls from family, or friends – “Uh, I don’t know what I did, but….”

System requirements: Windows 7, Vista, (32-bit and 64-bit)

Download at: The Windows Club

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

1 Comment

Filed under 64 Bit Software, Computer Maintenance, Computer Tools, downloads, Freeware, Portable Applications, Software, USB, Utilities, Windows 7, Windows Vista

Immunet 3.0 Released – Exciting Improvements

imageThe latest version of Immunet Protect has just been released (February 9, 2010), and in the development process, this outstanding free companion Antivirus has undergone a name change to – Immunet 3.0 – Powered by ClamAV.

Regular readers here, will remember that in previous reviews of this freebie, I have been very enthusiastic in my recommendations. Now, I have one more reason to be even more enthusiastic.

From the developer’s site:

Toll-Free Customer Support is available for all Immunet Protect FREE users 24 hours a day, 7 days a week through our Immunet Technical Support line at 1-866-891-4480. Immunet Support representatives can help with installation issues, potential virus issues, or even computer performance issues that may or may not be virus-related.

How cool is that?

Immunet Protect 3, is a superior community driven cloud based security application, (now closing in on a million users), which continues to gain increasing popularity – and rightfully so.

In real time, Immunet Protect keeps track of the state of security in the collective community (network), and should a member of the network (the community), encounter malware, you (as a member of the protected community), are instantly protected against the threat.

A rather more impressive security solution than having to wait for a malware definition database update. An update that may take several days. Days in which you are effectively open to infection.

A community driven security application like Immunet Protect, does not suffer from this obvious disadvantage of having to chase runway malware. It’s significant advantage is it’s user base community – operating in real time.

Immunet Protect is designed to add a layer of protection while working in partnership with the most popular antimalware solutions. On my principal home machine for example, Immunet Protect lines up with Microsoft Security Essentials and ThreatFire, to shore up any vulnerabilities my system might have to to zero-day threats.

Version 3 has increased functionality over previous versions, and incorporates a number of new features.

From the developer’s site:

Offline engine – The 3.0 release will now ship with an ‘Offline’ engine. This engine (ClamAV .97) once enabled, will automatically pull down our latest detection sets and allow for complete detection coverage, even when you are not connected to the Internet.

With our Offline protection we now also have several complex engines for detection native to the desktop and have support for file formats such as .DOC, .XLS, HTML etc. as well as strong unpacking support.

Cloud Recall – Unlike traditional Anti-Virus, or even other Cloud Anti-Virus we constantly reconsider all the data we see or have seen in our community. This ‘Cloud Recall’ ensures that your security is advanced with every new piece of information we become aware of. You will always know as much as we do, when we do.

Custom Signature Creation – With 3.0 we now offer the first Windows Anti-Virus product which allows our users to write their own detections with our engines just as we would.

Users can now hunt threats (or Advanced Persistent Threats if you like) by creating signatures which range from simplistic (straight MD5 matches) to complex (logically chained expressive signatures w/ offset support and wild carding).

You’ll find Immunet Protect straightforward to install, and easy to run without complication. The screen captures I’ve setout below, will help you get a good overall feel for the application.

image

Setting the operating parameters (the protection settings), is straightforward. In the following screen capture you’ll notice tooltip pop outs which explain the function of each setting. A very cool feature for less experienced users.

image

I have a preference for antimalware solutions that include the ability to launch a specific file scan from the Windows Explorer context menu, and Immunet Protect has included this important feature.

image

Should you consider installing, and running, a Cloud Antivirus as supplementary antimalware protection?

If you are uncertain, then consider this:

The Internet is an uncertain world at the best of times

Cybercriminals design specific malware to exploit vulnerable systems without user interaction being required.

No single security application is capable (nor should we expect a single application to be capable), of providing adequate computer system protection. Gaps exist, in protection capabilities, in even the most sophisticated security applications.

Layering (or stacking) security applications, offers the best chance of remaining infection free, by closing these gaps.

A cloud based protective solution, in this case Immunet Protect, is a major step in shoring up any weaknesses, or gaps, and significantly increase your overall ability to detect malware.

Keep in mind however, that even the best layered protection strategy will not make up for lack of experience, and intuitiveness, when surfing the Internet. So, I’ll repeat what I have said here, many times – “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals.”

Immunet Protect fast facts:

Fast Antivirus Protection leverages the speed of cloud computing to deliver real-time protection to your PC. Stay protected against over 13 million viruses and thousands of new threats daily without ever downloading another virus detection file again.

Immunet Protect FREE is ideal for consumers who want fast protection that doesn’t slow down their PC, including students, families, and netbook users.

Small and Light Footprint is up to 35 times lighter than traditional antivirus solutions. Immunet’s low disk and memory use won’t weigh down your PC unlike other solutions.

Companion Antivirus means that Immunet is compatible with existing antivirus solutions. Immunet adds an extra, lightweight layer of protection for greater peace of mind. Since traditional antivirus solutions detect on average only 50% of online threats, most users are underprotected, which is why every PC can benefit from Immunet’s essential layer of security.

Collective Immunity technology leverages the shared intelligence on threats gathered within the Immunet Cloud. Immunet’s virus detection technology continuously improves with each new user who installs Immunet Protect. When Immunet detects a threat on one user’s PC, that threat is blocked from harming all users in the Immunet Community simultaneously, giving all Immunet users shared immunity against computer viruses.

Real-time Detection from the Immunet Cloud against viruses, spyware, bots, worms, trojans, and keyloggers without downloading any virus signature files. Stay protected with Collective Immunity™ and intelligent virus detection technology that doesn’t slow down your PC.

Intelligent Scans effectively detect and remove viruses, bots, worms, trojans, keyloggers and spyware, thanks to the power of collective intelligence and the Immunet Cloud.

Choose from several scan options:

  • Flash Scan (Process and Registry)
  • Custom Scan (Specific Files and Directories)
  • Full System Scan

System requirements: Windows XP with Service Pack 2 or later, Vista (32-bit and 64 bit), Windows 7 (32-bit and 64-bit).

Download at: Developer’s site

I have no hesitation in recommending this application. I can’t think of another security application that has enjoyed a such a major increase in users in the last six months, like Immunet Protect has. That’s no accident.

Note: Along with Avast Free Antivirus, Immunet Protect is now offered as part of Google Pack.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Antivirus Applications, Cloud Computing Applications, Don't Get Scammed, Don't Get Hacked, downloads, Free Security Programs, Freeware, Immunet Protect, Interconnectivity, Malware Protection, Software, Spyware - Adware Protection, Windows Tips and Tools

Free PC Decrapifier – Bloatware Begone!

imageYou might think that a reader comment that goes something like this, is unusual – “I don’t know how this program ended up on my computer. One day, it just showed up.” Surprisingly, this is not an unusual comment.

In almost every case, the reader is referring to the trial ware (crapware, bloatware), commonly preinstalled on major manufacturers computers. This is the type of thing that drives users buggy, since trying to figure out how to get rid of trial ware is not as easy as it should be.

Luckily, there is a free application designed to specifically uninstall these annoyances – and that’s PC Decrapifier. It’s been a couple of years since I last posted on this terrific application, so today, I’ve taken another look.

The program does not need to be installed; simply run the executable. Or, if you prefer, you can run this application from a USB drive. You choose the items to be removed from a preconfigured list, and you can create a restore point (highly recommended), to undo any changes.

Note: Since PC Decrapifier is written in a scripting language, you may get an security application warning. This warning (if you receive it), can safely be ignored.

The application, while designed to uninstall crapware, has additional functionality – as the following screen capture suggests. More on this in a moment.

image

Anytime changes are being considered, creating a restore point is always good practice.

image

In the following screen shot, you’ll notice the application has detected an application it considers crapware on my machine.

image

The following screen shot illustrates a relatively unknown aspect of PC Decrapifier – its ability to act as a bulk uninstaller. The user simply checks off those applications which are no longer needed; clicks “Next”, and the application will launch the appropriate uninstallers. A slightly better solution than the Add/Remove Program applet when uninstalling more than one application, I think.

image

image

Working with PC Decrapifier requires no particular skill. The application is “follow the bouncing ball” straightforward.

The following is the current list of software and items that PC Decrapifier can detect and remove. The list is generated from the items the program detects on your computer, and you then choose the items to be removed by the program automatically. What could be simpler than that?

Targeted applications:

AOL Install
AOL UK AOL 9.0, UK Version
AOL US AOL 9.0, US Version
BigFix
Corel Paint Shop Pro Photo XI
Corel Photo Album 6
Corel Snapfire Plus SE
Corel WordPerfect
Dell Search Assistant
Dell URL Assistant
Digital Content Portal
Earthlink Setup Files
Earthlink Setup Files
ESPN Motion
Get High Speed Internet!
Google Desktop
Google Desktop
Google Toolbar
Google Toolbar for Internet Explorer
HP Rhapsody
Internet Service Offers Launcher
Internet Service Offers Launcher
McAfee
Microsoft Office Activation Assistant 2007
Microsoft Office Home and Student 2007
Microsoft Office Standard Edition 2003
Microsoft Office Standard Edition 2003
MS Plus Digital Media Installer
MS Plus Photo Story 2LE
MusicMatch Jukebox
MusicMatch Music Services
muvee autoProducer 5.0
My HP Games
MyWinLocker
Norton AntiSpam
Norton AntiSpam
Norton AntiSpam
Norton AntiVirus 2005
Norton Ghost 10.0
Norton Internet Security
Norton Internet Security
Norton Protection Center
Norton Security Center
Norton Symantec Live Update A common component of Norton Symantec products
Office 2003 Trial Assistant
Orange Internet
PC-cillin Internet Security 12 Trend Micro
QuickBooks Trial
Quicken 2006 Possible Trial Version
Remove Empty Program Folders Looks for and removes empty ‘Program Files’ folders
Reset IE Home and Search Pages
Roxio Express Labeler
Roxio MyDVD LE
Roxio RecordNow
Sonic DLA
Sonic RecordNow Audio
Sonic RecordNow Copy
Sonic Update Manager
Tiscali Internet
Travelocity Gadget
Trend Micro PC-cillin Internet Security 14
Vongo
Vongo
Wanadoo Europe Installer
Wild Tangent Games
Yahoo! Music Jukebox
Yahoo! Toolbar for Internet Explorer

System requirements: Windows XP, Vista, and Win 7.

Download at: Download.com

Note: PC Decrapifier is free for personal use only. If the application is used in a commercial environment “you will require a commercial license. The cost is $20 per “technician” (not per PC)”.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under Computer Tools, downloads, Freeware, Portable Applications, Software, Uninstall Tools, USB, Utilities, Windows Tips and Tools

Is ZoneAlarm Free Firewall 2010 The Best Firewall For You?

imageI’m always surprised when I get asked “The Firewall” question – why do I need one? The answer is always the same – a Firewall, either Hardware or Software, is designed to block unauthorized access to your computer from the Internet, at the same time permitting protected authorized communications – provided it includes outbound protection.

Most casual users that I come into contact with believe that Firewalls need to be expensive to ensure that they get the job none. But, that’s not always the case. ZoneAlarm, for example, is a very robust, uncomplicated, free Firewall, which is non- intrusive, and very appropriate for casual computer users – and gets the job done.

ZoneAlarm Free (last updated November 23rd, 2010), was the first Firewall I installed on a personal system, and that was back in the early days of Internet connectivity – 1996. After all these years, ZoneAlarm Free continues to be my all time favorite free Firewall.

Here’s why:

In my 14 years of experience with ZoneAlarm Free, never once has it let me down.

It’s the least intrusive free Firewall that I’m aware of – Firewalls that demand attention every 5 minutes drive me crazy!

It provides strong inbound intrusion detection, coupled with strong outbound protection. Outbound protection is an absolute “must have” today, since the botnet threat continues to escalate. ZoneAlarm will prohibit botnet connections.

ZoneAlarm’s “stealth mode” keeps my computer invisible on the Internet. If I can’t be seen by cybercriminals, my risk exposure is reduced substantially.

ZoneAlarm Free continuously monitors Internet activity through its True Vector Internet Monitor, and notifies me with an alert if it detects an unsafe, or disallowed activity.

Fast facts:

  • DefenseNet – Leverages real-time threat data from community of millions of users to detect and block the latest attacks.
  • Inbound Firewall Protection – Stops hackers and other intrusions by making your PC invisible online.
  • Outbound Firewall Protection – Blocks spyware, botnets, and other malware from sending your personal data out to the Internet.
  • Quiet and Automatic – Runs in the background, un-noticed and out of the way, with rare alerts.
  • Anti-phishing and Site Check – Toolbar blocks fraudulent websites including those that trick you into entering personal data.
  • Identity Guard – Provides credit scores and recovery services to secure your identity online and offline.
  • Works with all Antivirus – Compatible with antivirus software, such as AVG and Norton Antivirus.

What you need to know:

image

The program settings screen is definitely new user friendly, as the following graphic illustrates.

image

The graphic below illustrates  a security popup since a new application is seeking first time access to the Internet. Users have the opportunity to allow, disallow, and with a checkbox tick, have ZoneAlarm automatically remember the response.

image

The activity log can be particularly valuable for more experienced users.

image

ZoneAlarm’s default settings are well thought out, and provide excellent protection for less experience users particularly – and despite the hype put out by media, most computer user can be classified as having limited system experience.

Experienced users on the other hand, can tinker to their hearts content, customizing and tweaking the application to meet their specific requirements.

If you are a casual computer user, ZoneAlarm Free is definitely worth considering as a new Firewall installation, or as a replacement for a current Firewall that is not meeting your expectations.

The following graphic illustrates ZoneAlarm’s protection details, on one of my systems, over a 60 day period.

image

System Requirements: Windows 7 (32-bit/64-bit ), Vista, XP SP2 or SP3.

Download at: the developer’s site (Check Point Software).

Note: Test your existing Firewall at Steve Gibson’s site – ShieldsUP! If your current Firewall is not in stealth mode (this test will confirm it), and if it can’t be forced into stealth mode, then you should consider changing your Firewall application.

Note: If you are currently running Windows Firewall, then installation and setup is a breeze since you have the opportunity to turn off this Firewall. On the other hand, if you are running another Firewall, it’s important that you uninstall
this application (use the applications built-in uninstaller), before installing ZoneAlarm Free. I mention this as a precaution only, since it’s as likely that you won’t encounter any difficulties. But……..

If your current Firewall does not include a built-in uninstaller, then use Revo Uninstaller which will delete the application including the applicable Registry entries.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

17 Comments

Filed under 64 Bit Software, Anti-Malware Tools, cybercrime, Don't Get Scammed, Don't Get Hacked, downloads, Free Firewalls, Freeware, Internet Safety Tools, Malware Protection, Online Safety, Software, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Dell KACE Free Virtual Disk Utility

imageDell KACE is currently offering a free Virtual Disk Utility for creating, mounting and dismounting Virtual Disks on Windows, MacOSX and other kinds of computers.

Dell KACE uses a rather neat analogy when defining a Virtual Disk Drive – “A Virtual Disk might be compared and contrasted with a USB “thumb” drive. Both are removable media containing directories and files that can be added to a system when needed, updated locally and removed when no longer needed”. For example, I often use Virtual Disks in testing.

Program files, data files, and application directory structures can all be stored on a Virtual Disk Drive and with KACE’s Virtual Disk Utility, you will have the opportunity to both  encrypt, and password protect, the Virtual Drives which you have created. Keep in mind this application creates Virtual Disks – not Virtual Machines

Following installation, the screen shots which follow, illustrate just how easy it is to set up a Virtual Disk with KACE’s Virtual Disk Utility.

I should point out that in normal operation, you would launch the Virtual Disk Utility by selecting the application from the Windows Start Menu; then simply follow the same series of choices. (There are additional methods for Virtual Disk creation, discussed later in this review).

image

As I mentioned earlier, Virtual Disks you create can be encrypted so as to restrict mounting a Virtual Drive to only those users who can provide the correct password.

image

As the following screen capture illustrates, you will have a wide range of choices in picking a drive letter.

image

When finished, an Explorer window will open to show the initial contents of the new Virtual Disk and MyComputer windows will display the mounted drive. You can drag-n-drop files as you normally would, to the new Virtual Disk, launch applications, and open additional Explorer windows via MyComputer while the drive is mounted.

image

Through the Properties tab you can adjust the characteristics of the Virtual Drive.

image

Optionally, you can quickly set up a Virtual Drive (or, more than one Virtual Drive), by selecting a folder on any drive, and then create the drive from within Windows Explorer context menu.

image

Additionally, you can “dismount” a Virtual Drive from within the Windows Explorer context menu.

In this review, I’ve managed to cover only some of the features of this application. To read a more in-depth overview please read an Introduction to Virtual Disk, on the developer’s site.

System Requirements: Windows 7, Vista, XP, or Mac OS 10.5 or later (Windows 64 bit native installation available).

Download at: KACE (Registration is required).

Note: Additionally, the application will install the open source Dokan library which contains a user mode DLL (dokan.dll) and a kernel mode file system driver (dokan.sys). Dokan is used to mount Virtual Disks and make them accessible as normal drives with Explorer visibility and Command Prompt access.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under 64 Bit Software, Business Applications, downloads, Encryption, Freeware, Mac OS X, Open Source, Software, Utilities, Virtualization, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Free GigaTribe – Go Private With Your File Sharing

imageThe Recording Industry Association of America which represents the recording industry distributors in the United States, has managed to have LimeWire banished from the playing field – Boo, Hiss!!

I must confess though, I’ve never been a fan of public, peer to peer file sharing. Unfortunately, with public peer to peer file sharing, the risk factor that the user will not get what he thinks he will, is extremely high.

For example – the last time I tested public peer to peer file sharing, of the five game files that I downloaded, every one came packed with a Trojan downloader, which, had I installed any of these applications on my test machine., would have wrecked havoc.

The two main issues with peer to peer file sharing (but not the only issues) are:

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. I can assure you that spyware can be difficult to detect and remove.

So what’s a user to do who enjoys file sharing, and who doesn’t want to be burned by the cybercriminals who skulk on public file sharing networks searching for victims?

A terrific solution to this dilemma is provided by a free application from GigaTribe (last updated April 23th, 2010). An application which is designed to create a private network between you, and your friends, relatives, co-workers, or, whomever you choose.

If you have every used peer to peer software, then you’ll find no learning curve involved in using GigaTribe – it’s functional, efficient, attractive, and “follow the bouncing ball” intuitive.

How much more simply can it be than this:

GigaTribe

The following graphic is from the publisher’s site.

image

Fast facts:

GigaTribe has more than 1.5 Million users.
Its unique technology has been developed by talented programmers with a strong history in the software industry.

There are no limitations on quantity or file size.
All your files are kept on your hard drive, eliminating the need to transfer them to an external server.

Files are available in their original format.
In just a few clicks, you can share and also find files as if you were in a virtual library. You will see files as they were organized on the hard drive, and you can download them in their original format.

You don’t waste time uploading files.
Once you select which folders you want to share, the contents of those folders are instantly accessible to your friends.

Your files remain yours!
Files you have decided to share are not saved on another company’s equipment. You keep your data under your control.

It´s a two-way sharing service.
Each contact can both share and download. You decide which content is worth downloading among the files available to you.

You may invite up to 500 friends.

Transfer automatically resumes.
If a download is interrupted (for example, if a contact goes offline), the transfer automatically resumes with no loss of data when your contact comes back online.

Security is, of course, GigaTribe´s major concern.

Only the people you have invited can see your files. Only the folders you have selected are visible to your contacts. Every exchange is strongly encrypted – No one can see what is being shared.

As an added bonus, users’ can create profiles, and have access to personal chat and a private blog, all from within the program. Now that’s cool!

Here’s a great example of GigaTribe in action (testimonial from the publisher’s site).

GigaTribe allows us to exchange our course materials or photos and videos of our evenings. We do not need any more to transport our external disks for sharing the big files.

GigaTribe allowed to create a network of exchange exclusively intended for the students of the school. It facilitates sharing and the mutual help between students.

It’s not often that I can rate an application 100%, but GigaTribe comes very close. A superb application! If you’re into private file sharing, or it’s something that you’ve considered, then give GigaTribe a whirl – I think you’ll be glad you did.

Checkout GigaTribe’s one minute Guide.

System requirements: Windows 2000, XP, Vista, Windows 7.

Languages: English, Español, Français, Deutsch, Italiano, Português

Download at: Gigatribe

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under downloads, File Sharing, Freeware, Interconnectivity, Peer to Peer, social networking, Software, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP