SYSTEM SECURITY
This section lists software to encrypt information, securely erase files and filter and control internet usage.
INFORMATION
No extra information available at this time
|
Rohos Rohos Mini Drive creates a hidden and encrypted partition on any USB flash drive memory stick. You can then work with the files on this hidden partition as normal, you don't have to open a special program before hand. Those who have megabytes of sensitive
files on their USB drive and are serious about data
security should not hesitate to use this tool.
|
|
|
True TrueCrypt
is a software system for establishing and maintaining an
on-the-fly-encrypted volume (data storage device).
On-the-fly encryption means that data are automatically
encrypted or decrypted right before they are loaded or
saved, without any user intervention. No data stored on
an encrypted volume can be read (decrypted) without
using the correct password/keyfile(s) or correct
encryption keys. Entire file system is encrypted (e.g.,
file names, folder names, contents of every file, free
space, meta data, etc).
|
|
Windows XP or above |
SafeSpace SafeSpace eliminates the problem of malware by creating a secure barrier between your computer and the internet, protecting you and your personal information against known and unknown malware threats. SafeSpace isolates internet facing applications in a virtual sandbox, which protects your system files and settings from unwanted changes, and blocks unauthorized access to your private files and data Free for Home use. |
|
|
K9 Web K9 Web Protection is a free Internet filtering and control solution for the home. K9 puts YOU in control of the Internet so you can protect your kids. Free for Home use.
|
|
|
Access Access Manager is a FREE software
solution that keeps all your passwords in one, simple
to use list. It offers fast, easy and secure password
management. |
|
|
KeePass
KeePass is a free/open-source password manager or safe
which helps you to manage your passwords in a secure way.
You can put all your passwords in one database, which is
locked with one master key or a key-disk. So you only
have to remember one single master password or insert the
key-disk to unlock the whole database. The databases are
encrypted using the best and most secure encryption
algorithms currently known (AES and Twofish).
|
|
|
HD Eraser is an advanced security tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Files that are erased using this program can not be recovered using undelete or any other recovery software.
|
|
|
Disk Disk Cleaner is a free open source tool to quickly and easily clean your hard disk from temporary files like those in the system temporary folder, the Internet Explorer Cache and Cookies folder, and the Recycle Bin. |
|
|
CCleaner CCleaner is a freeware system optimization and privacy tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. But the best part is that it's fast |
|
VMWare Environment |
McAfee (VMware Analyzer)
VIDigger is a tool designed to help VMware Virtual
Infrastructure administrators harden their environment.
Though the core technology of VMware is designed to be
secure, there are many configuration settings and
deployment considerations that can severely impact the
overall security of the deployed Virtual Infrastructure.
VIDigger is designed to help administrators check the
configuration of ESX server and the virtual machines
hosted on ESX server against the VMware Infrastructure
Hardening guide and other best practices. |
|
|
Microsoft (Windows Analyzer) Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. |
|
Listed prices are correct at date of publication but are subject to availability or change without notice WARNING Click here to report a broken or incorrect link All images and trademarks remain the property of their respective owners E&OE |