Protect children from all kinds of inappropriate web content.

Posted by Admin

PUBLISHERS DESCRIPTION:

Naomi
is an advanced internet filtering program, easy to use and totally free, intended for families, and kids in particular.

Naomi is able to constantly monitor all internet connections, protecting children from inappropriate online material - such as obscene or violent contents; pornography, pedophilia and erotism in the form of images or texts, sites that popularize drugs, gambling games, terrorism, hate propaganda, occultism, sects, blasphemy, etc.

Naomi does not rely on a simple list of banned sites; instead, it examines in real-time all the data being transmitted and received through any internet application - such as web browers, chat programs, news readers, etc.

The filtering technology employed in Naomi features:

  • Heuristic analysis capable of recognizing new material automatically.
  • Semantic analysis of web pages contents and analysis of their addresses and links.
  • Recognizes all the major languages (10+).
  • Recognizes ICRA labeling system.
  • Monitoring is not limited to web sites, but covers the whole local internet traffic.
  • Works with all service providers and software applications, and does not alter settings.
  • Allows blocking of file-sharing applications.
  • Password-protected (the password is chosen during the installation).
  • Easy to use: does not require configuration.
  • Can be used on slow connections (it does not perform any download in background).
License type: Freeware
Operating Systems: Windows NT/2000/XP/Vista (XP 64-bit currently not supported; not tested with Windows 98/ME)
File size: 1.4 MB
Developer: Radiant Morning

Note: You need to set a password to access the controls. If you forget that password, it is very difficult to remove the program.

Easy-to-use firewall blocks hackers and other unknown threats.

Posted by Admin

PUBLISHERS DESCRIPTION:

ZoneAlarm
by Check Point is an easy-to-use firewall that blocks hackers and other unknown threats.


Features:

  • Intrusion Blocking systematically identifies hackers and blocks access attempts.
  • Stealth Mode automatically makes your computer invisible to anyone on the Internet.
  • Automatic Program Configuration provides safety and simplicity by automatically configuring programs. Automatically decides whether to allow or deny Internet access to individual programs.
  • Expert Controls give savvy users precise control over security settings.

Note: This free version is for home and private use only.

License type: Freeware
Operating Systems: Windows 2000, Windows XP, Windows Vista
File size: 39.6 MB
Developer: ZoneAlarm



Track software vulnerabilities.

Posted by Admin

PUBLISHERS DESCRIPTION:

The
Secunia Personal Software Inspector BETA works by examining files on your computer (primarily .exe, .dll, and .ocx files). These files contain non-specific meta information provided by the software vendor only. This data is the same for all users, and originates from the installed programs on your computer - never from their configuration. Please read the privacy statement available at the bottom of this page and through the Secunia PSI application for more details about how information from your computer is used by Secunia.

After examining all the files on your local hard drive(s), the collected data is sent to Secunia's servers, which match the data against the Secunia File Signatures engine (https://psi.secunia.com/) to determine the exact applications installed on your system.

This information can then be used to provide you with a detailed report of the missing security related updates for your system.

Purpose of the Secunia PSI

The Secunia PSI is an invaluable tool for you to use when assessing the security patch state of software installed on your system. It constantly monitors your system for insecure software installations, notifies you when an insecure application is installed, and even provides you with detailed instructions for updating the application when available.

It is NOT the purpose of the Secunia PSI to detect whether your system has already been compromised or if local changes, settings, or missing requirements could cause the Secunia PSI to report incorrect results. The Secunia PSI relies on the meta-data of executables and library files. The Secunia PSI does NOT conduct an integrity check of the individual files, rather, it checks whether a specific program is vulnerable according to the reported version numbers and not whether the files have been compromised or replaced by other users or programs.

The Secunia PSI is not a replacement for other security measures such anti-virus or personal firewalls, the Secunia PSI is a great supplement to other security measures such as anti-virus and personal firewalls as it helps preventing exploitation of often overlooked exposures.

Additionally, it is important to understand that the process of identifying insecure software installations on any system involves many different factors and, in rare cases, may result in incorrect detections. Should you encounter such a situation, please send your feedback and all relevant information at support@secunia.com.

NOTE: The free Secunia PSI is available for Private/Home Users ONLY.

License type: Freeware
Operating Systems: Windows 2000 SP4, Windows 2003, Windows XP SP2, latest version of Microsoft Windows Update Agent (WUA)
File size: 3.8 MB
Developer: Secunia

Symantec's Internet Threat Meter

Posted by Admin

Every day, it seems, new threats hit the Internet. It could be a full-time job just trying to keep track of them all. Symantec's Internet Threat Meter keeps you informed about the latest threats, and includes a link to a Symantec site where you can get more information, and find fixes.

The program runs as a nifty little widget in Windows XP, or a Sidebar Gadget in Windows Vista. On a regular basis, it gathers information about the latest threats, and reports the results to you.

Source:
PC World
License type:
Freeware
OS: Macintosh, Windows 2000, Windows XP, Windows Vista
File size: 491 KB
Developer: Symantec

To download, go to Symantec website.

Protect yourself while surfing or performing online transactions.

Posted by Admin

PUBLISHERS DESCRIPTION:


Transaction Guard is FREE software that protects you against spyware while performing sensitive online tasks on a public computer, like Internet banking or other financial transactions. Transaction Guard has two components:
  • Spyware Monitor – Monitors for spyware and notifies you of any intrusions.
  • Secret Keyboard – Provides an on-screen keyboard for entering usernames and passwords.
Using Transaction Guard

Once you have installed Transaction Guard, a new icon will appear in your system tray. You can click this system tray icon to display the Transaction Guard menu to enable or disable the Spyware Monitor feature and to display the on-screen Secret Keyboard in a password clipboard window to securely enter sign in ID and password.

License type: Freeware
OS: Windows 2000, Windows XP, Windows Vista
Requirements: Microsoft Internet Explorer 6.0 (Service Pack 1 and later patches for Windows 2000, and Service Pack 2 and later patches for Windows XP) or higher, Mozilla Firefox 1.5 or higher
Developer: Trend Micro



Testing your Internet Security

Posted by Admin

To give you an idea of how open your computer really is to the outside world, I recommend that you use one of the various online security screening tests that attempt to probe your computer to find weaknesses. The following is a list of sites that I feel do a good job of letting you know how open your computer really is:

Symantec Security Check
Sygate Online Services

Visit a few of these sites and follow their directions to scan
your computer. You will be presented with a report that
shows you the open doors that they found.

What is Freeware?

Freeware is copyrighted computer software which is made available for use free of charge, for an unlimited time. Authors of freeware often want to "give something to the community", but also want credit for their software and to retain control of its future development. Source: Wikipedia

Want to subscribe?

Subscribe in a reader Or, subscribe via email:
Enter your email here:
Find entries: