"locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security setti
is free, it only takes seconds to download and you don’t even need to install it, so you can download Browzar time and time again, whenever and wherever you need it to protect your privacy.
an interactive HTTP/S proxy server for attacking and debugging web-enabled applications. It operates as a man-in-the-middle between the end browser and the target web server, and allows the user to intercept, inspect and modify the raw
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
Having only the services you need running will make your system faster, more stable and secure. So the first thing you need to do after installing a Linux distribution is to manually edit the list of enabled services.
Encryption Toolkit that provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details that make the encryption or authentication work.
lets you instantly set up secure conversations. It's an open source encrypted, private alternative to WEB chat systems. Messages are encrypted inside your own browser using AES-256. Encrypted data is securely wiped after one hour of inactivity. Runs as a Tor hidden service.
The Campaign to Eliminate DRM. There is no more important cause for electronic freedoms and privacy than the call for action to stop DRM from crippling our digital future.
social bookmarks manager; allows you to easily add sites you like to your personal collection of links, to categorize those sites with keywords, and to share your collection not only between your own browsers, but also with others.
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
automatically hardens software applications against a wide range of bugs. These bugs — known as memory errors — often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior.
a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.
Disposable temporary e-mail address which expire after 15 minutes. You can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame.
(Mostly HP JetDirects, but a little info on the Ricoh Savins), This article will attempt to point out some of the more interesting things that can be done with a network based printer to make it reveal information about its users, owners and the network i
page will generate a HTML encoded mailto link that is reasonably 'spambot' proof. Spambots crawl over websites looking for email addresses, when they find one they add it to their database for junk email.
special access codes prepared by the US National Security Agency have been secretly built into Windows (logical and expected this is why China and other states stay away of windows, even some tastes of Linux must have been compromised)
by Zubair Alexander - author of this article looks at how Windows stores passwords and discusses why pass phrases are a better option than passwords and how to determine the strength of our passwords.
in Uninformed Vol1 2005.May by Nikos Drakos, Computer Based Learning Unit, University of Leeds. + Ross Moore, Mathematics Department, Macquarie University, Sydney.
will check if your computer has the latest version of Java Runtime Environment (JRE) and allows you to remove all possible older versions, cleaning also the regestry.
a free, open-source, light-weight and easy-to-use password safe for Windows. You can store your passwords in a highly-encrypted database locked with one master key or key-disk.
a free, open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. (there is also a freakish .net version)
KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.
a platform for people seriously interested in anti-virus research, network security and computer security to communicate with each other, to develop solutions for various security problems, and to develop new security technologies.
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
a URL based identity system. An OpenID identity is simply a URL, and all the OpenID specification does is provide a way to securely prove that you own that ID on that URL. Unlike most identity systems, OpenID is completely decentralized.