Category: Security

Store Your Files in Encrypted Containers Using Protect Me

The usual problem with encryption programs is that you need to install the encryption program in order to decrypt the encrypted files. Imagine you encrypt a file and email it to your friends – they cannot decrypt it without installing the same encryption program on their computer first. Protect Me addresses this problem in an entirely different manner – it enables you to store confidential files in a single password protected container.

Read more

Stay Secure with Secunia Personal Software Inspector

The Secunia Personal Software Inspector (or PSI in short) is a free security tool designed to detect and update vulnerable and outdated programs and plug-ins installed on your computer which expose your PC to attacks. These type of attacks attacks which exploit vulnerable programs and plug-ins are rarely blocked by traditional anti-virus software and are therefore increasingly used by cyber-criminals.

Read more

Check System Security with Bitdefender Security Scan

Windows operating system is the most attacked target for the cyber criminals. If you do not keep your system updated and secured with a good antivirus and firewall, then you are at the risk of being the victim of any such online scams, malware infections or other cyber-crimes. Bitdefender Security Scan is a free cloud-based application which can scan your system and analyze your system speed, security, update status and general stability.

Read more

Password Protect Folders Using My Lockbox

Many people want to password protect some of the folders which have their personal documents in it. Windows does not provide any such native tool so that a user can lock any folder they want. But you can password protect any folder on your hard disk using a freeware tool called My Lockbox. This tool enables you to hide, lock and password protect almost any folder on your computer.

Read more

Change MAC Address of Network Card in Windows

MAC address (media access control address) is the hardware network address for the network interface card which is unique for the system. This address is sometimes used to identify a computer over the network. However, there may be a time when you need to change the MAC address of your network card for pure administrative purpose on a network. You can change the MAC address of your network card either through the network interface card properties in Windows.

Read more

F-Secure Free Anti-Theft for Mobile

What would happen if you accidentally lose your mobile phone or someone steals it? Anybody who lays hands on your mobile can access and misuse all the information stored on your mobile. You cannot always prevent your mobile from being lost or stolen, but you can make sure no one takes advantage of it. With F-Secure Anti-Theft for Mobile you can be sure that your personal and confidential information will not be misused by anyone.

Read more

Scan Your Computer with BitDefender Online Scanner

If your computer is infected with malware and your current antivirus solution is not able to detect or remove it, then you can scan your system with the BitDefender online scanner. The BitDefender online scanner is a free on-demand malware scanner which incorporates the award winning BitDefender scanning engines. Accessible from your browser, it will scan and automatically clean the system memory, in addition to all files and hard drive boot sectors.

Read more

Repair Corrupted Files Using Free File Repair Tool

The most annoying thing that we often come across after malware infection is that some of our files get damaged or become corrupted. If you try to open them in a default program, you get a message that the file is damaged. Fortunately, there is a tool called File Repair which can help you repair such corrupted files. The File Repair tool is a freeware which can repair many different kinds of files.

Read more

Removing TDSS Rootkit (Google Redirects) Using TDSSKiller

TDSS is a nasty trojan that has both a rootkit component and a bot component. The rootkit is responsible for making the trojan files invisible on disk, and for providing hidden and encrypted storage for the bot component. The bot component connects to remote computers and makes the infected computer part of a botnet. It is also able to update, download and install additional malware.

Read more

Restore USB Flash Disk Back to Full Capacity

Often malware infects the USB disks in such a way that the capacity of the USB disks is reduced. For example, a 8GB USB flash key may show up only as a 500kb USB key in Windows. Even after you remove the malware or format such a disk, the capacity does not change and you are pretty much stuck. But thanks to a tiny software called BootIce, you can now format such a USB disk and restore them back to their original full capacity.

Read more