Top 10 Best Sellers – Antivirus and Security Software

March 17, 2017

Antivirus software, now often referred to as security (suite) software, due to the innumerable threats, come in a variety of different brands. To get an idea, check out the top ten sellers at Amazon (see source links below).

I personally use a FREE antivirus program called Bitdefender Antivirus Free Edition; however, you may feel more comfortable using one of the paid commercial versions such as reflected below.

Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.[2] Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks. [source: Wikipedia]

#1: Norton Security Deluxe 5 Device PC/Mac

#2: McAfee 2017 Total Protection – 5 Devices [Online Code]

#3: Norton Security Premium – 10 Devices [Download Code]

#4: Norton Security Deluxe – 3 Devices [Download Code]

#5: Kaspersky Internet Security 2017 | 1 Device | 1 Year | Download [Online Code]

#6: Norton Security Standard – 1 Device [Download Code]

#7: Norton Security Deluxe – 5 Devices [Key Card]

#8: McAfee 2017 Total Protection-5 Devices [Key Code]

#9: Webroot Internet Security Complete 2017 | 5 Devices | 1 Year | PC [Download]

#10: Webroot Antivirus 2017 | 3 Devices | 1 Year | PC [Download]


A TIP To Protect Privacy (When sending email to multiple recipients, use “Bcc”.)

March 13, 2017

The article reflected below I have posted several times since its’ original posting (back in 2010). What prompted me to dust this off and bring it back out of the archives is that today I received a local government generated email to advise recipients of other government agencies of an impending snowstorm.  What caught my attention was that as this email was sent to a very large body of people.  I was able to see every name and email address to folks I am guessing would not want their email address and name made that public. As this email get’s forwarded, more and more email addresses will be revealed. To protect the privacy of others, it is best practice to use “Bcc” when sending email to multiple recipients.

Bcc = Blind Carbon Copy

Did you know that if you use the Bcc field in your email client to address and send an email or want to send a copy of an email to multiple users, the recipients will not see whom you sent the email to?

Many know this trick; however, I still find that many do not. When using the Bcc field to send your emails, the people receiving the email will not know who the other recipients are. It is not a trick of hidden magic. It is that the addresses of the other recipients are simply not shared.

I often receive forwarded chain emails; usually consisting of jokes, humorous movies, prayer requests, etc… Occasionally I will find one these emails humorous or important enough that I will pass it on; HOWEVER, prior to doing this I perform some housecleaning steps.

I will remove any “FWD” text (usually in the subject line) and will remove any email addresses I find in the body of the email that reflects the email addresses of recipients who have already received the email. After performing these housecleaning steps, I will enter into the the Bcc field, in my email client, the recipient’s email addresses, from my address book, to send (or forward) the email. If the email client requires at least one entry in the “To” field, I simply enter my own email address.

The benefits of using the Bcc field is simply this. You are protecting the privacy of other people. Currently I have approximately (5)-five email accounts that I use for specific purposes, from a variety of email services, with one of those accounts being my primary email account. I am very protective of that primary email account address and do not want it thrown about for the spammers to get hold of or for strangers to see. For example, I have found people’s email addresses in forwarded emails that I know and have not seen for years. They are very surprised when I contact them; and, will often ask, “How did you get my email?”. I explain that I simply pulled it from a forwarded email.

Be courteous to others and learn to use the Bcc field in your email; AND, when possible avoid chain emails all together.


Did you know that Google knows almost everything that you do on their services?

March 11, 2017

You need to see this article that Phandroid has posted (see source link below) that will show you what Google knows about you, how this information is collected, where you can find this information and how you can opt out. Google collects this information, as a form of profiling, in order to better improve their products and services.

You may have already opted out of this collection of information; but, my guess is, you did not.

Did you know that Google knows almost everything that you do on their services? Find out what they know and how you can do something about it.

Source: Here is everything Google knows about you


S10 Password Vault – A Hidden Gem Of A Password Manager

February 22, 2017

The majority of home based computer users use the same passwords (or easy to remember passwords) for nearly every account that they are subscribed to. Hacker’s (or criminals) know this and take advantage of these facts. If your password is easy to remember, then it is easy to hack.

To make your accounts secure, it is HIGHLY RECOMMENDED that you use a password manager to manage your accounts and the passwords associated with them. The “go to” password manager that I use (on all my computers and devices); and, have used since its’ inception is the “S10 Password Vault”. It has never let me down… The main feature I like about this software is that I have total control over my password information at the local level.

S10 Password Vault

There are so many features to the S10 Password Vault that I encourage you to visit the developer’s site by clicking the source link below.S10 Password Vault is available for Windows as a standard installer and as a portable version that allows you to run directly from a USB drive (which then also contains your data file). There is also an “S10 Vault” mobile companion app for iPhone/iPad (in the App Store) and for Android devices (in the Google Play Store and Amazon App Store).

Source: S10 Software – S10 Password Vault


A FREE Synchronization Program That I Am Messing Around With

February 21, 2017

I have found that using synchronization software is a very easy way for the home based computer user to backup data vs. the full blown backup type software (which can hard to understand for the home computer user). I am currently messing around with the FREE synchronization program called SyncFolders; that, so far in my testing, could end up being my default (go to) backup software for my computers here at home. If you are interested in giving SyncFolders a try, the source link is reflected below. SyncFolders is also available as a portable app.

SyncFolders

SyncFolders main window...

Features of SyncFolders

  • Supports two-way synchronization of files and folders.
  • Can easily be used as backup tool.
  • Shows a preview before the actual synchronization takes place. You can override actions if desired.
  • Detects conflicts or file collisions when a file has changed in both locations since the last sync operation. Therefore, SyncFolders tracks file modifications and deletions in a local database.
  • Propagates deletions and detects file renames.
  • File comparison by date and size or by content.
  • Default actions can be defined in case of synchronization conflicts.
  • Integrates with Windows’ Task Scheduler to support scheduled synchronizations.
  • Supports file and folder filters.
  • Can handle long file names and files of any size.
  • Synchronization from or to UNC paths is supported.
  • Supports multiple synchronization rules in a single rules file.
  • Deleted or overwritten files can be moved to the recycle bin or to a time-stamped history folder.
  • History files can be deleted after a user-defined period.
  • Unlimited number of files.
  • Synchronization from command line.
  • Can ignore one-hour timestamp differences caused by DST switch for synchronization to FAT file systems.
  • Easy-to-use.
  • Unrestricted freeware.
  • No spyware, adware or malware.
  • Portable, although .NET Framework is required.

AxCrypt – File Security Made Easy

February 17, 2017

If you are concerned about file (and folder) security, AxCrypt 2.0 is good choice in protecting what matters to you. In addition to the full install version, there is a portable version, as well as, a mobile app (for Android and iOS).

AxCrypt works as a separate program in it’s own window, but it’s also fully integrated into the Windows Explorer – the part of Windows where you browse your folders and files. Here is a quick video tutorial on how to use the basic functions of AxCrypt 2.0.

AxCrypt is a simple file encryption software for Windows. It integrates seamlessly with your workflow to encrypt, decrypt, store, send and work with files.

New and Updated Features

  • 256 bit encryption
  • Mobile App for iOS
  • Mobile App for Android
  • Passwordless sharing
  • Portable app for Windows
  • Secured Folders
  • Cloud Service Awareness
  • Password Manager
  • Single sign in for encryption / decryption

Source: AxCrypt – File Security Made Easy


Hyper Crypt | Portable Encryption Software

January 5, 2017

Looking for a method to protect sensitive files and folders?  If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…

hyper-crypt

One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…

By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.

Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.

With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.

Source: Hyper Crypt | Portable Encryption Software