Geek Superhero
Geek Superhero watches your computer for changes, immediately notifying you when a change is made to confirm you want to keep or reject the change. This saves you from lots of headaches. http://www.deprice.com/geeksuperhero.htm (A "Computer Setting Firewall" is an excellent description.)
2. CleverCrypt Enhanced http://www.deprice.com/clevercryptenhanced.htm
Using the latest developments in information security, CleverCrypt has been designed to use the best encryption technology legally available. The product uses 4 encryption layers to protect your data. Using just one of CleverCrypt's encryption layers it has been mathematically calculated that the famous "DES Cracker" machine, if sped up several thousand times, would still take over 149 trillion years to crack a CleverCrypt secure drive. And that's if your using just one of CleverCrypt's four layers.
3. Clean Disk Security http://www.deprice.com/cleandisksecurity.htm
Clean Disk Security gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the Window's swap file, and can optionally clean unneeded temporary files from your hard disk, such as your Internet browser cache, files in your system's Recycle Bin, and can clear the "recent files" list.
4. Cryptainer PE http://www.deprice.com/cryptainerpe.htm
Phenomenally easy to use, Cryptainer PE's encryption works on all versions of Microsoft Windows and works with all known file types. You can protect your files and folders and ensure total privacy with Cryptainer PE. Simply drag and drop the files and folders you want to hide and voila! your files are hidden. With Cryptainer PE you can hide the very existence of your confidential files and folders. Additionally, Cryptainer PE allows you to send encrypted email files. The recipient need not have a copy of Cryptainer PE installed to decrypt the files.
5. Desktop Armor http://www.deprice.com/desktoparmor.htm
Desktop Armor watches dozens and dozens of important settings on your computer and warns you if any program has changed them. This catches many of the changes a virus, worm, or trojan program will make to your computer and lets you immediately fix them back! Plus Desktop Armor includes a lot of other useful features like a Popup blocker, checks to help you avoid Phishing scams and much more.
David D. Deprice reviews top encryption and security solutions at http://www.deprice.com/
Imagine my surprise when I received a phone call from... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
There are several basic concepts to keep in mind when... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Afraid that someone is monitoring your PC or installed a... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
If you use the internet, you have probably been infected... Read More
Ok, you've got a computer, and you get online. You... Read More
In today's times spyware is a very serious issue and... Read More
Much has been said on the theory of password protection... Read More
You are at your computer, checking out software on EBay.... Read More
Ok, ok, I know you've seen them. All those pop... Read More
There has not been a time in the history of... Read More
In a word, no - an email message has always... Read More
With the Internet entering our lives in such an explosive... Read More
If you use emails actively in your communication, you must... Read More
To blog or not to blog? Well, why not? Lots... Read More
There is nothing more important that password security in world... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Phishing is a relatively new form of online fraud that... Read More
There is no doubt that "how-to articles" have become a... Read More
In recent days, I was one of the unfortunate persons... Read More
A couple of years back, I paid my dues the... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
You may not realize it, but as you are surfing... Read More
We all know that it's dangerous to use the same... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Watching how the traditional media covers the latest virus or... Read More
Is your data secure? Think again. Securing data is unlike... Read More
The Internet is a vast International Network of people and... Read More
A few nights ago I received an email from "2CO"... Read More
Some months ago, before there was much publicity regarding phishing... Read More
In the past I've never really paid much attention to... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
As you know, this time the virus under the name... Read More
Phishing is the act of some individual sending an email... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
If you are a parent, you have probably wondered at... Read More
Identity Theft is one of the most serious problems facing... Read More
Before we start, I want to make it clear that... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
This is not some new fangled techno-speak, it is a... Read More
If you run any type of Internet business, Adware and... Read More
Only the top spyware removers are successful at detecting and... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Paypal is a great site and is used by many... Read More
Ok, you've got a computer, and you get online. You... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Huge number of spyware software applications are available in the... Read More
Did you know...? 1 in 5 children who use computer... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
So you want to know who your kids are chatting... Read More
Whether we like it or not, we are all living... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Internet Security |