Chitika

Showing posts with label INTERNET PROTECTION. Show all posts
Showing posts with label INTERNET PROTECTION. Show all posts

Thursday, January 13, 2011

Protect against Internet Attacks - ZoneAlarm Free Firewall

Add caption
ZoneAlarm is a very famous brand in the firewall industry. "ZoneAlarm Free Firewall" provides all basic features to protect your system from internet intrusion.

In this free edition, it provides:
  • Systematically identifies hackers and blocks access attempts.
  • Automatically makes your computer invisible to anyone on the Internet
Platform - Windows XP/2000Pro
Size - 4MB
Cost - Free



Website for download- http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp

Identify Risk with Top Freeware - Computer History Viewer

You may noticed that every time you surf the web, there will be traces of your activities left on your hard disk.
With "Computer History Viewer", you can view all your Window's history, open/save history, recent documents, User Assist History, Internet Explorer's cache, cookies, history, visited URLs, typed URLs, autocomplete memory, index.dat files, and much more.
Double click the displayed item will directly open the URLs stored on your computer. It also can save the found computer history.
 Website to download -  

Protect your USB Thumb Drive with TrueCrypt

With the increase of storage in the USB Thumb Drive, people can keep a lot data in those removable storage. There were a number of incidents recently where people has lost the USB Thumb Drive and leads personal data / video / photos being disclosed to the public.

With TrueCrypt, you can be assured that the data in the Thumb Drive will be encrypted and protected.

Main Features include:
  • Encrypts an entire partition or storage device such as USB flash drive or hard drive.
  • Encrypts a partition or drive where Windows is installed (pre-boot authentication).
  • Encryption is automatic, real-time (on-the-fly) and transparent.
  • Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
    1) Hidden volume (steganography – more information may be found here).
    2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
  • Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Website to download - http://www.truecrypt.org/

JABONG

Zip Cloud