Most of the malicious programs (also called malware) make entries in the Windows registry in such a way that you are not able to rid of them easily. These registry keys are crafted using special methods and therefore they cannot be removed or accessed using the software which use the normal Windows API calls. You can remove such obstinate registry keys using a special tool called RegASSASIN from MalwareBytes – the makes of the popular anti-malware software.
Read moreCategory: Security
Remove Viruses with Windows Live OneCare Online Scanner
If your computer is infected with malware and you do not have an antivirus product installed, then you can use the Windows Live OneCare online safety scanner to get rid of the viruses and spyware. The Windows Live OneCare safety scanner is a free service which allows you to scan and remove viruses and spyware from your computer. It can also help you get rid of junk on your hard disk and improve your computers performance.
Read moreProtect Your Web Browser with Free Bitdefender TrafficLight
The Internet is full of attack web sites that distribute and drop malware on your computer, steal your identity and turn your computer into a zombie. The only way to protect yourself online while browsing the web sites, is to check the safety of a site before you visit it. The Bitdefender TrafficLight is a free cross-browser web threat control which helps you prevent all the phishing and malware websites from being opened in your browser.
Read moreScan Suspicious Files Using avast! Online Scanner
If you download a suspicious looking file over the internet, or you suddenly find a strange program on your computer, then you can always scan it using the free avast! online scanner and find out if it is infected. The avast! online scanner lets you upload a single file and gives you the results in few seconds.
Read moreTransparent Disk Encryption Using FreeOTFE
The FreeOTFE is an on-the-fly transparent disk encryption open-source program for Windows PC and PDA. Using FreeOTFE, you can create one or more virtual-disks on your computer which act like regular disk drives. Anything copied to these virtual disk drives is automatically and securely encrypted.
Read moreCheck if Your Chrome Browser has Outdated Plugins
Most of the time, hackers and malicious sites are able to attack a person through browsers because you are using an outdated browser plugin, for example, an outdated Adobe Flash plugin. But how would you know if you have an outdated browser plugin installed. The Secbrowsing Chrome extension for the Google Chrome web browser allows you to check if your Chrome browser plugins are up-to-date.
Read moreBlock Malicious Sites with G-Data CloudSecurity Add-on
Everyday more and more phishing and other malicious web sites are reported. The only way to protect yourself from these is to block them in real-time. You can use the free G-Data CloudSecurity plugin for web browsers to block such dangerous and suspicious web sites. It effectively blocks access to known malware distribution and phishing websites – in realtime.
Read moreLockNote for Storing Confidential Information
LockNote is a portable program that lets you store all your confidential data inside its notepad like interface using the AES-256 cipher. You can store your serial numbers, passwords, and other types of text notes in an encrypted form. It is truly portable in the sense that all your data is encrypted and stored in the program itself – without needing any extra files. It is just a single file and can be placed on a portable media like a USB flash drive.
Read moreFind Updates to Installed Software Using FileHippo Update Checker
Most of the security related problems arise because you have been using older software. The new updated versions come patched for many security vulnerabilities and loaded with new features. Now you can use the FileHippo Update Checker to find out if the updates to the software installed on your computers are available. The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.
Read moreSecurely Shred Files Using Moo0 FileShredder
Even after a file is deleted from the hard disk, Windows only removes its entry from the file table but the actual data remains there. This data can be recovered easily by using a specialized tool like Recuva. If you want to completely shred you documents and files so they become completely unrecoverable, then you can use Moo0 File Shredder. Moo0 FileShredder lets you easily erase your private, secret files perfectly off your HDD.
Read more