Security

Additional Security Categories

Most of the programs here are broken down into the important sub-categories. I use real-time anti-virus and anti-malware protection. Despite having a router, I also use a software firewall and I use the Host file managers, as well. Not everyone needs to do these last two steps, but if you don't have a router, you should definitely use a firewall.

www.AlpineSnow.com/BPCS.shtml Password Recovery Time Simulator
password-recovery-time-simulator.png

If you were ever curious about how secure your password is, you can use this tool to help you determine how long it would take a computer to crack it using a brute force attack.

Tinywall.Pados.hu TinyWall
tinywall.png

I've been using this firewall for a couple years, now. It's simply a front-end interface for the built-in Windows firewall, that allows you to easily add/remove access based on applications, on the fly. It's one of the simplest and most lightweight solutions.

www.TorProject.org/TorBrowser Tor Browser
tor-browser.png

If you want to surf in anonymity, this application will provide you randomly changing proxy connections in order to increase privacy and security on the Internet.

TrueCrypt.org TrueCrypt
truecrypt.png

For advanced security, encrypting files, drive images or individual files is one of the best tactics to employ. TrueCrypt is the best free option to accomplish this.

www.WinPatrol.com WinPatrol
winpatrol.png

Similar to AutoRuns in purpose and functionality, this application gives you real-time access to key system areas. You can determine if any malware needs to be removed by comparing the current state of your system to snapshots that the application has previously taken. They describe this software as a "Host-based Intrusion Prevention System (HIPS)."

page 1 of 212next »

Host Files

www.AbelhaDigital.com/HostsMan HostsMan
hostsman.png

Building upon the concept of using Hosts files to protect your system, this program allows you to take advantage of Hosts files from several sources who have created similar lists. You can also manage your Hosts file, create backups, add exceptions and more. In addition to letting Spybot SD add sites to my Host file, I use this program to include the MVP's Host file, as well as the Ad & Tracking server list from www.Hosts-File.net and the AdServers list from PGL.YoYo.org/AS.

www.MVPs.org MVPs.org Host.txt File
mvps-org-host-txt-file.png

One of the simplest methods of protecting your system from ads, malware and viruses is to block known sources. Using the built in Hosts file in Windows, you can redirect those links to a safe IP, such as 127.0.0.1 (your own computer). The MVPs Hosts file blocks tens of thousands of known malicious and unwanted sites this way.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License