Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.

X-Cleaner Deluxe
http://www.deprice.com/xcleanerdeluxe.htm

X-Cleaner is a top ranked privacy software solution from Xblock, one of the most trusted names in anti-spyware technology. X-Cleaner not only deletes browser and system usage tracks, shreds pictures and generates secure passwords it also features unique anti-spy and anti-adware technology and inoculation features that help prevent infections.

GhostSurf 2005 Platinum
http://www.deprice.com/ghostsurfstandard.htm

GhostSurf Standard is a suite of Internet privacy tools. GhostSurf stops the prying eyes of hackers, Web sites, your Internet Service Provider and even your boss by ensuring an anonymous, untraceable Internet connection. GhostSurf lets you customize your privacy level in real-time to suit your surfing needs. A variety of privacy options enable you to block personal information, mask your IP address, route your data through anonymous hubs and even encrypt your Internet connection. GhostSurf's TracksCleaner component protects your privacy by erasing your Web history, files, cache, clipboard, cookies and more to Department of Defense standards, and it prevents undelete tools and aggressive hardware recovery systems from retrieving your deleted files.

Outpost Firewall Pro
http://www.deprice.com/outpostfirewallpro.htm

The firewall provides Security, Control, Privacy and Ease of Use. Outpost Firewall starts protecting as soon as it is installed. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox. Outpost can place your computer into stealth mode, making it invisible to hackers. In addition, the program can remove annoying pop-ups and ads and increase connection speed. To ensure your protection against new threats, Outpost updates information frequently through a custom utility.

CyberScrub Professional
http://www.deprice.com/cyberscrubprofessional.htm

CyberScrub's Internet clean up erases all evidence of your on-line activity to ensure your valued privacy. Most people are shocked to learn files have been placed on their computer (without their knowledge or permission) that create user profiles and document their Internet activity. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk. CyberScrub allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).

CleverCrypt Enhanced
http://www.deprice.com/clevercryptenhanced.htm

CleverCrypt Enhanced represents the latest generation of security products from Quantum Digital Security. Create impenetrable encrypted virtual hard drives to store all of your confidential files in. CleverCrypt Enhanced provides more protection than ever before, with up to 1280 bit military grade encryption. Simply create a secure hard drive and drag & drop your files for ultimate protection. Even if your whole computer (or laptop) is stolen nobody will be able to access information inside your CleverCrypt drive without knowing your passwords.

John Deprice shares his tools and ideas for protecting your identity at http://www.deprice.com

In The News:


pen paper and inkwell


cat break through


Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More