"locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security setti
is free, it only takes seconds to download and you don’t even need to install it, so you can download Browzar time and time again, whenever and wherever you need it to protect your privacy.
an interactive HTTP/S proxy server for attacking and debugging web-enabled applications. It operates as a man-in-the-middle between the end browser and the target web server, and allows the user to intercept, inspect and modify the raw
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
lets you instantly set up secure conversations. It's an open source encrypted, private alternative to WEB chat systems. Messages are encrypted inside your own browser using AES-256. Encrypted data is securely wiped after one hour of inactivity. Runs as a Tor hidden service.
social bookmarks manager; allows you to easily add sites you like to your personal collection of links, to categorize those sites with keywords, and to share your collection not only between your own browsers, but also with others.
automatically hardens software applications against a wide range of bugs. These bugs — known as memory errors — often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior.
a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.
Disposable temporary e-mail address which expire after 15 minutes. You can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame.
Hackersh ("Hacker Shell") is a free and open source shell (command interpreter) written in Python with Pythonect-like syntax, builtin security commands, and out of the box wrappers for various security tools. It is like Unix pipeline, but for processing security information and metadata rather than bytes.
page will generate a HTML encoded mailto link that is reasonably 'spambot' proof. Spambots crawl over websites looking for email addresses, when they find one they add it to their database for junk email.
will check if your computer has the latest version of Java Runtime Environment (JRE) and allows you to remove all possible older versions, cleaning also the regestry.
a free, open-source, light-weight and easy-to-use password safe for Windows. You can store your passwords in a highly-encrypted database locked with one master key or key-disk.
a free, open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. (there is also a freakish .net version)
KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-