bn_feat.jpg (3045 bytes)

Security tools

Protection for your sensitive data.

 

Section Index
Products in this section: AUTOWIPE, BigSecret, BlackBoard Netscape Privacy Interface, Bug Sprayer, Burn, Desktop Surveillance 98, Hook Protect, Investigator, I-SeeU, Mouse Trap, NukeNabber, Outlines 98, PassGen Suite, Password Policy Enforcer (PPE), Passwords Plus, PC Activity Monitor (PC Acme), PC Security Guard (PC Guard), RedHand Security Monitor, Swap File Overwriter, The Block

 

AUTOWIPE

  autowip1.GIF (4576 bytes)

Download the version for your operating system here:

Shareware
Windows 95/98

Freeware
Windows 95/98
Description: Quite simply, this program guarantees that any file deleted from your system is permanently deleted. It does this by writing and rewriting repeatedly over the disk sectors, totally removing any chance of recovery. It runs quietly in the background, and even removes temporary files. The freeware version only works on the drive on which it has been installed, but the shareware version can span more than one drive.
Requirements: Freeware and Shareware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://www.softclub.net/~mahabit/

 

BigSecret

 

Download the version for your operating system here:
applicon.gif (1219 bytes)
Any variant of System 7 Mac OS 8, Mac OS 8.1, Mac OS 8.5
Description: BigSecret 4.2 is a handy utility for the Mac that allows you to alter the visibility of files and folders on your system. You can even make these files and folders invisible within other applications, and can password protect access to BigSecret to protect them. Should you wish to you can use the option to record minute-by-minute usage of these protected files.
Requirements: Shareware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://www3.sk.sympatico.ca/tinyjohn/

 

BlackBoard Netscape Privacy Interface

 

Download the version for your operating system here:

Windows 95/98/NT
Description: This program was designed for the paranoid Netscape user. Anyone opening your browser can see a detailed history of where you’ve surfed, how long you spent on a site, what newsgroups you were reading/posting to, and what email you’ve received, read, deleted, or sent. BlackBoard Netscape Privacy Interface lets you securely edit and delete this information, including all cookies on your system.
Requirements: 30-day trial.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.dimensional.com/~dalin/iprivacy.html

 

Bug Sprayer

 

Download the version for your operating system here:

Windows 95/98/NT
Description: Not as thorough as the larger Hook Protect or PC Security Guard, Bug Sprayer checks your hard drive for Trojan Horses. If it finds one it checks where it's writing its information and then prompts you with the location and filename of both, before deleting. It is a tiny program, but quite effective.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://come.to/rtools/

 

Burn

 

Download the version for your operating system here:
applicon.gif (1219 bytes)
System 7, Mac OS 8.5
Description: Fully configurable and scriptable, Burn 2.5 erases files thoroughly by writing and rewriting over a hard drive’s sectors. The pattern in which it writes and rewrites, as well as the amount of times it does so, is user configurable. Not only can you use this to ensure complete deletion, but you can use it to totally remove any file remnants in your drive’s existing free space. Burn 2.5 is completely compatible with all variants of System 7 and works with Mac OS 8.5 and the Mac OS Extended file system.
Requirements: Freeware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://www.thenextwave.com/

 

Desktop Surveillance 98

 

Download the version for your operating system here:

Windows 95/98/NT
Description: With Desktop Surveillance 98, you can monitor exactly what is happening on a system, by either recording the activity or watching it in real-time over a network or the Internet. You can do this stealthily, or inform the user that they are being monitored. You can set ‘triggers’ to begin recording or monitoring -- when a user logs onto a certain IRC channel or opens a certain Web page, or merely when a certain user logs onto the system.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.omniquad.com

 

Hook Protect

  hookpro1.GIF (4617 bytes)

Download the version for your operating system here:

Windows 95/98/NT
Description: In among all these monitoring programs, it would be unfair if we didn’t include a few detection programs as well. Hook Protect is one of these. It searches for and detects monitoring programs, Trojan programs, keyloggers and interceptors. It not only detects them while they are running, but is also adept at finding them hidden on your hard drive when they are inactive. It can list all open programs and modules, monitors all file activity (in user-defined folders or directories) and checks for strange or unusual functions (it may also detect these in ordinary programs, so browse through the results carefully).
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.geocities.com/SiliconValley/Hills/8839/hookprot.html

 

Investigator

  invest1.GIF (2174 bytes)

Download the version for your operating system here:

Windows 95/98/NT
Description: This is one of the more powerful monitoring and logging programs we’ve seen. Investigator captures all keyboard activity and displays it an extremely user-friendly log -+B13 both the full activity plus the final edited copy. Not only does it log the keyboard input, but it checks for running programs, captures the user’s name, tracks the time, mouse movements and logs periods of inactivity. Like most of these products, it runs silently in the background.
Requirements: Shareware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://www.winwhatwhere.com/investigator/index.htm

 

I-SeeU

  iseeu1.GIF (5208 bytes)

Download the version for your operating system here:

Windows 95/98
Description: I-See U monitors activity both in and out of stealth mode, including the logging of all open programs and time usage. Its biggest plus is the ability to take screen captures of a user’s screen. These can be either be one-off shots, or set to take ‘time-lapsed’ screen shots of all activity. For each screen shot it saves the date and time, plus lists all other open programs at that time. These screen shots are also compressed to save hard-drive space. All screen shots can be searched and browsed by application, and also printed out. Another function is the ability to block access to certain programs. It requires the VB5 run-time files to work.
Requirements: 30-day trial. 16 MB of RAM, VB5 Runtime Files
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.faxtastic.com/i-seeu.htm

 

Mouse Trap

  mtrap1.GIF (1318 bytes)

Download the version for your operating system here:

Windows 95/98/NT
Description: A tiny and simple program more suited to home than the office, Mouse Trap is used simply for locking all mouse activity and certain keyboard keys. To lock your mouse inside Mouse Trap you just click a button. It can then only be released by entering the password. The keystrokes that are locked are the Alt-Tab, Ctrl-Alt-Delete and Ctrl-Esc. This should be more than enough to dissuade most kids. If you forget your password it can also display a hint for you.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.homeonthewww.com/ryan/

 

NukeNabber

  nukenab1.GIF (2847 bytes)

Download the version for your operating system here:

Windows 95/98/NT
Description: NukeNabber is a potentially very handy tool to have. It listens to UDP and TCP ports and in the event of an attack can grab the information you may need to track the attacker down (including a feature to find out an attacker’s IRC nickname). It can listen on up to 50 ports for attacks including click-based (ICMP dest_unreach) attacks.
Requirements: Freeware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://dynamsol.ulink.net/

 

Outlines 98

 

Download the version for your operating system here:

Windows 95/98/NT
Description: This is a mix of Internet monitoring, blocking and filtering software, and provides system security on a variety of levels. Firstly, Outlines 98 monitors and logs all PC activity with time and date stamping as well as recording who was using what application, what they did and for how long. Secondly, it records what Internet sites are being visited and for how long. These reports can then be used to create a banned list of Internet sites, and also restrict access to certain programs. Effective either in the home or the office, Outlines 98 can provide the comfort you need.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.omniquad.com

 

PassGen Suite

  passgen1.GIF (2521 bytes)

Download the version for your operating system here:

Windows 95/98/NT
Description: PassGen Suite contains two password-generation utilities - PassGen for single password generation, and MultiPassGen for generating of up to 1 million passwords. You can specify a maximum and minimum amount of characters in each password, as well as choosing between alphabetical, numerical and alphanumerical passwords. You may also mix upper and lower-case letters. You can copy passwords to the clipboard or save in a text file format.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.sanderssw.com/index.htm

 

Password Policy Enforcer (PPE)

  passwor1.GIF (2907 bytes)

Download the version for your operating system here:

Windows NT 4.0
Description: Password Policy Enforcer (PPE) for Windows NT enforces your company’s password policy by warning users against using easily cracked passwords. NT already has a policy enforcer, but this is limited to small things, such as minimum password length and the like. PPE takes things further by letting you specify password conditions like minimum and maximum length, whether or not it should contain only alphabetical or numerical characters, or if it should be alphanumerical. You can even specify minimum amounts of characters of type in the password, such as ‘Password must contain a minimum of three special characters’. PPE is totally configurable, and can be overridden by the system administrator. It ensures that the password is compatible with other OSes with more stringent password policies, and can be administrated from a single PC on the network.
Requirements: Shareware. 16 MB of RAM
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.tpis.com.au

 

Passwords Plus

 

Download the version for your operating system here:

Windows 95/98/NT

Windows 3.1
Description: Passwords Plus is a potentially handy program. It contains multiple users’ passwords for programs and applications in a list that is, you guessed it, password protected. Each password and list can have an expiry date set against it, and can be browsed, printed and encrypted. You can even generate new passwords. The passwords can be cut and pasted into other applications from the clipboard.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.dlcwest.com/~sorev/password.htm

 

PC Activity Monitor (PC Acme)

 

Download the version for your operating system here:

Windows 95/98
Description: If you're looking for a competent PC monitoring program, then you can’t go past PC Activity Monitor (PC Acme). It runs silently in the background and logs all forms of activity on your PC, including DOS sessions and Internet browsing. The program is configurable - you let it monitor what you want. It can catch every key-press and mouse-click and record what programs are open and for how long. The results are saved every time the PC is shut down, and a new log opens upon startup. It can also encrypt the log files and can be scheduled to run at different times.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.geocities.com/SiliconValley/Hills/8839/products.html

 

PC Security Guard (PC Guard)

 

Download the version for your operating system here:

Windows 95/98
Description: We’ve included a lot of monitoring programs here, many of which run stealthily in the background. Are you being watched? PC Security Guard (PC Guard) can allay your fears. It digs deep through your system to find any hidden monitoring programs such as keyloggers, interceptors, Trojans and capturers. It searches the INI files, system Registry, batch files, VxD drivers and ActiveX folders and checks for changes. It then reports any changes to you and saves the information in a log file. With this shareware version, it will only tell you what it has found but won’t let you delete it.
Requirements: Shareware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: N/A

 

RedHand Security Monitor

 

Download the version for your operating system here:

Windows 95/98

Win 3.1
Description: RedHand Security Monitor is another fine monitoring program that runs quietly in the background and logs PC activity. It records exactly what happened on your system, when it happened, and how long it took. You can use the program to lock your desktop or restrict access to your system, and it can also AutoSave to a log file. Both the 16 and 32-bit versions require the Visual Basic DLLs included here.
Requirements: Shareware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://www.pavillion.com/harddrive/

 

Swap File Overwriter

 

Download the version for your operating system here:

Windows 95/98
Description: OK, you’ve deleted files, erased logs and shut down your PC - nothing left to clear up, right? Wrong. The Windows swap file contains many things, including potentially sensitive data, clipboard contents, passwords and RAM contents. Swap File Deleter erases this information - but be warned, the Windows swap file is an extremely important file containing a lot of important system information.
Use this program at your own risk.
Requirements: Freeware.
Install instructions: Download to your local drive, then unzip it and run the EXE file.
Links online: http://www.kagi.com/vfstudio/sfo.htm

 

The Block

block1.GIF (2122 bytes)

Download the version for your operating system here:
applicon.gif (1219 bytes)
Mac
Description: A powerful password protection program for the Mac, the Block restricts access to your system when it is enabled. It works differently to other password protection programs - it will not accept a normal password. It gives the illusion that a real password is needed, where in reality you need to enter a key combination on the keyboard followed by clicking on the screen dialog or shutdown. The key combination - or password key - can be any combination of the Command, Alt, Ctrl and Shift keys, plus another key on the keyboard, including the cursor keys, page navigation keys and F-keys.
Requirements: Shareware.
Install instructions: Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file.
Links online: http://www.kagi.com/mennigmann/blockhome.html

⌐ Australian Consolidated Press 1999. All rights reserved.