While its title “DesertFighter” sounds like a PC game, it is actually a small network security tool of its own kind. It does not do […]
Read moreTag: Security
GiliSoft Secure Disc Creator Makes Password Protected Discs
GiliSoft Secure Disc Creator is a software for creating secure CD/DVD discs or ISO images. These secure discs are password protected and can be used […]
Read moreWhy “MASK ID” Can Cause Problems in Long Term?
Mask ID is a new web app that purports to defeat the facial recognition technology used by some European nations. Using facial recognition, government agencies […]
Read moreHollows Hunter Detects Code Injection in Windows Processes
Code injection is one of the techniques used by malicious programs to hijack your running programs. When you run a program, its code is copied […]
Read moreThisIsMyFile : Easily Delete Locked Files in Windows
So you were working with some of your files and after finishing up the work, you want to delete them or move to another location […]
Read moreFind Which Countries Allow Visa Free Travel for Your Passport
When you visit a foreign country for tourism, education or business, you have to get a travel visa to enter that country. Visa is an […]
Read moreScratchboard : Secure Vault for All Your Information
Scratchboard can be used to store all kinds of information that you would usually write on any slips of paper or scribble down on your […]
Read moreHow to Enable Fingerprinter and Cryptominer Protection in Mozilla Firefox
Mozilla is always busy adding newer protections in the Firefox web browser for the privacy and security of the Firefox users. This is whenever people […]
Read moreHow to Run Programs Sandboxed with Comodo Cloud Antivirus
Comodo Cloud Antivirus is a lightweight antivirus product for computers running Windows. It is an ideal security product for the gamers who want security from […]
Read moreHow to Check if ASUS ShadowHammer Hack Affected Your Device
ZDNet reported recently that ASUS computers running Windows 10 were targeted by APT (advanced persistent threat) attacks being called Operation ShadowHammer. These APT attacks are […]
Read more