Geek Superhero
Geek Superhero watches your computer for changes, immediately notifying you when a change is made to confirm you want to keep or reject the change. This saves you from lots of headaches. http://www.deprice.com/geeksuperhero.htm (A "Computer Setting Firewall" is an excellent description.)
2. CleverCrypt Enhanced http://www.deprice.com/clevercryptenhanced.htm
Using the latest developments in information security, CleverCrypt has been designed to use the best encryption technology legally available. The product uses 4 encryption layers to protect your data. Using just one of CleverCrypt's encryption layers it has been mathematically calculated that the famous "DES Cracker" machine, if sped up several thousand times, would still take over 149 trillion years to crack a CleverCrypt secure drive. And that's if your using just one of CleverCrypt's four layers.
3. Clean Disk Security http://www.deprice.com/cleandisksecurity.htm
Clean Disk Security gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the Window's swap file, and can optionally clean unneeded temporary files from your hard disk, such as your Internet browser cache, files in your system's Recycle Bin, and can clear the "recent files" list.
4. Cryptainer PE http://www.deprice.com/cryptainerpe.htm
Phenomenally easy to use, Cryptainer PE's encryption works on all versions of Microsoft Windows and works with all known file types. You can protect your files and folders and ensure total privacy with Cryptainer PE. Simply drag and drop the files and folders you want to hide and voila! your files are hidden. With Cryptainer PE you can hide the very existence of your confidential files and folders. Additionally, Cryptainer PE allows you to send encrypted email files. The recipient need not have a copy of Cryptainer PE installed to decrypt the files.
5. Desktop Armor http://www.deprice.com/desktoparmor.htm
Desktop Armor watches dozens and dozens of important settings on your computer and warns you if any program has changed them. This catches many of the changes a virus, worm, or trojan program will make to your computer and lets you immediately fix them back! Plus Desktop Armor includes a lot of other useful features like a Popup blocker, checks to help you avoid Phishing scams and much more.
David D. Deprice reviews top encryption and security solutions at http://www.deprice.com/
Be careful of sites that promise to send you "instant... Read More
Ok, you've got a computer, and you get online. You... Read More
My first experience with a spyware BHO based infection was... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
The trash folder in my main inbox hit 4000 today.... Read More
The words Corporate Security may conjure up images of a... Read More
Have been an Internet user for more than 9 years,... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
At this point, if you've got the whole "turning the... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Every day millions of people go online to find information,... Read More
I got a virus the other day, Thursday I believe... Read More
Spyware protection software is the easiest way of removing spyware... Read More
You are at your computer, checking out software on EBay.... Read More
The first thing people think about when defending their computers... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
A week or so ago, I received an inquiry from... Read More
Ebay is a great site and is used by many... Read More
If spyware were a person and he set himself up... Read More
Business on the internet is getting down right shameless. This... Read More
If you use emails actively in your communication, you must... Read More
There has not been a time in the history of... Read More
Working from home has its advantages, including no commute, a... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
There has not been a time in the history of... Read More
You'd better learn news from media, not from emails, security... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
The money being spent online is steadily growing. With billions... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
As soon as almost all computer users already got used... Read More
Spyware is the most troublesome software to appear on the... Read More
When it comes to reporting Internet scams most of us... Read More
The Threat10 years ago you could probably have run no... Read More
We all get the odd virus now and then, but... Read More
The words Corporate Security may conjure up images of a... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
In 1997, I decided after 15 years as a practicing... Read More
There are several basic concepts to keep in mind when... Read More
Only the top spyware removers are successful at detecting and... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Credit card fraud is a growing problem for online businesses... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
First, let's do a little recap'. As I stated in... Read More
Well, if that would have been said to me by... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Identity theft is one of the most common criminal acts... Read More
When surfing the Internet you probably take your anonymity for... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Did you know...? 1 in 5 children who use computer... Read More
Since its birth, the Internet has grown and expanded to... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Internet Security |