![]() Security
tools
|
AUTOWIPE | |||||
Download the version for your operating system
here:
|
|||||
Description: | Quite simply, this program guarantees that any file deleted from your system is permanently deleted. It does this by writing and rewriting repeatedly over the disk sectors, totally removing any chance of recovery. It runs quietly in the background, and even removes temporary files. The freeware version only works on the drive on which it has been installed, but the shareware version can span more than one drive. | ||||
Requirements: | Freeware and Shareware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.softclub.net/~mahabit/ |
BigSecret | |||||
|
Download the version for your operating system
here:
|
||||
Description: | BigSecret 4.2 is a handy utility for the Mac that allows you to alter the visibility of files and folders on your system. You can even make these files and folders invisible within other applications, and can password protect access to BigSecret to protect them. Should you wish to you can use the option to record minute-by-minute usage of these protected files. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www3.sk.sympatico.ca/tinyjohn/ |
BlackBoard Netscape Privacy Interface | |||||
|
Download the version for your operating system
here:
|
||||
Description: | This program was designed for the paranoid Netscape user. Anyone opening your browser can see a detailed history of where you’ve surfed, how long you spent on a site, what newsgroups you were reading/posting to, and what email you’ve received, read, deleted, or sent. BlackBoard Netscape Privacy Interface lets you securely edit and delete this information, including all cookies on your system. | ||||
Requirements: | 30-day trial. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.dimensional.com/~dalin/iprivacy.html |
Bug Sprayer | |||||
|
Download the version for your operating system
here:
|
||||
Description: | Not as thorough as the larger Hook Protect or PC Security Guard, Bug Sprayer checks your hard drive for Trojan Horses. If it finds one it checks where it's writing its information and then prompts you with the location and filename of both, before deleting. It is a tiny program, but quite effective. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://come.to/rtools/ |
Burn | |||||
|
Download the version for your operating system
here:
|
||||
Description: | Fully configurable and scriptable, Burn 2.5 erases files thoroughly by writing and rewriting over a hard drive’s sectors. The pattern in which it writes and rewrites, as well as the amount of times it does so, is user configurable. Not only can you use this to ensure complete deletion, but you can use it to totally remove any file remnants in your drive’s existing free space. Burn 2.5 is completely compatible with all variants of System 7 and works with Mac OS 8.5 and the Mac OS Extended file system. | ||||
Requirements: | Freeware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.thenextwave.com/ |
Desktop Surveillance 98 | |||||
|
Download the version for your operating system
here:
|
||||
Description: | With Desktop Surveillance 98, you can monitor exactly what is happening on a system, by either recording the activity or watching it in real-time over a network or the Internet. You can do this stealthily, or inform the user that they are being monitored. You can set ‘triggers’ to begin recording or monitoring -- when a user logs onto a certain IRC channel or opens a certain Web page, or merely when a certain user logs onto the system. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.omniquad.com |
Hook Protect | |||||
Download the version for your operating system
here:
|
|||||
Description: | In among all these monitoring programs, it would be unfair if we didn’t include a few detection programs as well. Hook Protect is one of these. It searches for and detects monitoring programs, Trojan programs, keyloggers and interceptors. It not only detects them while they are running, but is also adept at finding them hidden on your hard drive when they are inactive. It can list all open programs and modules, monitors all file activity (in user-defined folders or directories) and checks for strange or unusual functions (it may also detect these in ordinary programs, so browse through the results carefully). | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.geocities.com/SiliconValley/Hills/8839/hookprot.html |
Investigator | |||||
Download the version for your operating system
here:
|
|||||
Description: | This is one of the more powerful monitoring and logging programs we’ve seen. Investigator captures all keyboard activity and displays it an extremely user-friendly log -+B13 both the full activity plus the final edited copy. Not only does it log the keyboard input, but it checks for running programs, captures the user’s name, tracks the time, mouse movements and logs periods of inactivity. Like most of these products, it runs silently in the background. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.winwhatwhere.com/investigator/index.htm |
I-SeeU | |||||
Download the version for your operating system
here:
|
|||||
Description: | I-See U monitors activity both in and out of stealth mode, including the logging of all open programs and time usage. Its biggest plus is the ability to take screen captures of a user’s screen. These can be either be one-off shots, or set to take ‘time-lapsed’ screen shots of all activity. For each screen shot it saves the date and time, plus lists all other open programs at that time. These screen shots are also compressed to save hard-drive space. All screen shots can be searched and browsed by application, and also printed out. Another function is the ability to block access to certain programs. It requires the VB5 run-time files to work. | ||||
Requirements: | 30-day trial. 16 MB of RAM, VB5 Runtime Files | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.faxtastic.com/i-seeu.htm |
Mouse Trap | |||||
Download the version for your operating system
here:
|
|||||
Description: | A tiny and simple program more suited to home than the office, Mouse Trap is used simply for locking all mouse activity and certain keyboard keys. To lock your mouse inside Mouse Trap you just click a button. It can then only be released by entering the password. The keystrokes that are locked are the Alt-Tab, Ctrl-Alt-Delete and Ctrl-Esc. This should be more than enough to dissuade most kids. If you forget your password it can also display a hint for you. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.homeonthewww.com/ryan/ |
NukeNabber | |||||
Download the version for your operating system
here:
|
|||||
Description: | NukeNabber is a potentially very handy tool to have. It listens to UDP and TCP ports and in the event of an attack can grab the information you may need to track the attacker down (including a feature to find out an attacker’s IRC nickname). It can listen on up to 50 ports for attacks including click-based (ICMP dest_unreach) attacks. | ||||
Requirements: | Freeware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://dynamsol.ulink.net/ |
Outlines 98 | |||||
|
Download the version for your operating system
here:
|
||||
Description: | This is a mix of Internet monitoring, blocking and filtering software, and provides system security on a variety of levels. Firstly, Outlines 98 monitors and logs all PC activity with time and date stamping as well as recording who was using what application, what they did and for how long. Secondly, it records what Internet sites are being visited and for how long. These reports can then be used to create a banned list of Internet sites, and also restrict access to certain programs. Effective either in the home or the office, Outlines 98 can provide the comfort you need. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.omniquad.com |
PassGen Suite | |||||
Download the version for your operating system
here:
|
|||||
Description: | PassGen Suite contains two password-generation utilities - PassGen for single password generation, and MultiPassGen for generating of up to 1 million passwords. You can specify a maximum and minimum amount of characters in each password, as well as choosing between alphabetical, numerical and alphanumerical passwords. You may also mix upper and lower-case letters. You can copy passwords to the clipboard or save in a text file format. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.sanderssw.com/index.htm |
Password Policy Enforcer (PPE) | |||||
Download the version for your operating system
here:
|
|||||
Description: | Password Policy Enforcer (PPE) for Windows NT enforces your company’s password policy by warning users against using easily cracked passwords. NT already has a policy enforcer, but this is limited to small things, such as minimum password length and the like. PPE takes things further by letting you specify password conditions like minimum and maximum length, whether or not it should contain only alphabetical or numerical characters, or if it should be alphanumerical. You can even specify minimum amounts of characters of type in the password, such as ‘Password must contain a minimum of three special characters’. PPE is totally configurable, and can be overridden by the system administrator. It ensures that the password is compatible with other OSes with more stringent password policies, and can be administrated from a single PC on the network. | ||||
Requirements: | Shareware. 16 MB of RAM | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.tpis.com.au |
Passwords Plus | |||||
|
Download the version for your operating system
here:
|
||||
Description: | Passwords Plus is a potentially handy program. It contains multiple users’ passwords for programs and applications in a list that is, you guessed it, password protected. Each password and list can have an expiry date set against it, and can be browsed, printed and encrypted. You can even generate new passwords. The passwords can be cut and pasted into other applications from the clipboard. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.dlcwest.com/~sorev/password.htm |
PC Activity Monitor (PC Acme) | |||||
|
Download the version for your operating system
here:
|
||||
Description: | If you're looking for a competent PC monitoring program, then you can’t go past PC Activity Monitor (PC Acme). It runs silently in the background and logs all forms of activity on your PC, including DOS sessions and Internet browsing. The program is configurable - you let it monitor what you want. It can catch every key-press and mouse-click and record what programs are open and for how long. The results are saved every time the PC is shut down, and a new log opens upon startup. It can also encrypt the log files and can be scheduled to run at different times. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.geocities.com/SiliconValley/Hills/8839/products.html |
PC Security Guard (PC Guard) | |||||
|
Download the version for your operating system
here:
|
||||
Description: | We’ve included a lot of monitoring programs here, many of which run stealthily in the background. Are you being watched? PC Security Guard (PC Guard) can allay your fears. It digs deep through your system to find any hidden monitoring programs such as keyloggers, interceptors, Trojans and capturers. It searches the INI files, system Registry, batch files, VxD drivers and ActiveX folders and checks for changes. It then reports any changes to you and saves the information in a log file. With this shareware version, it will only tell you what it has found but won’t let you delete it. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
N/A |
RedHand Security Monitor | |||||
|
Download the version for your operating system
here:
|
||||
Description: | RedHand Security Monitor is another fine monitoring program that runs quietly in the background and logs PC activity. It records exactly what happened on your system, when it happened, and how long it took. You can use the program to lock your desktop or restrict access to your system, and it can also AutoSave to a log file. Both the 16 and 32-bit versions require the Visual Basic DLLs included here. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.pavillion.com/harddrive/ |
Swap File Overwriter | |||||
|
Download the version for your operating system
here:
|
||||
Description: | OK, you’ve
deleted files, erased logs and shut down your PC - nothing left to clear up, right? Wrong.
The Windows swap file contains many things, including potentially sensitive data,
clipboard contents, passwords and RAM contents. Swap File Deleter erases this information
- but be warned, the Windows swap file is an extremely important file containing a lot of
important system information. Use this program at your own risk. |
||||
Requirements: | Freeware. | ||||
Install instructions: | Download to your local drive, then unzip it and run the EXE file. | ||||
![]() |
http://www.kagi.com/vfstudio/sfo.htm |
The Block | |||||
Download the version for your operating system
here:
|
|||||
Description: | A powerful password protection program for the Mac, the Block restricts access to your system when it is enabled. It works differently to other password protection programs - it will not accept a normal password. It gives the illusion that a real password is needed, where in reality you need to enter a key combination on the keyboard followed by clicking on the screen dialog or shutdown. The key combination - or password key - can be any combination of the Command, Alt, Ctrl and Shift keys, plus another key on the keyboard, including the cursor keys, page navigation keys and F-keys. | ||||
Requirements: | Shareware. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.kagi.com/mennigmann/blockhome.html |
⌐ Australian Consolidated Press 1999. All rights reserved.