LastAudit is a free Windows security and vulnerability scanner, IT audit and forensic tool.
The program aims to detect and list configuration issues, weak permissions, browsing history, sensitive metadata, previous wifi connections, network resources, and Active Directory OUs, users, servers, shares and services.
ImWatcher is a free Windows application for monitoring and recording webcams. The program is simple, straightforward and easy to use, but it also has one or two more advanced features that we really weren’t expecting.
The good news starts on launch, when you can point the program at any connected webcams, IP cameras, as many as you have.
Every network adapter has a MAC address, a unique value used to identify devices at the physical network layer. Normally this address stays the same forever, which may allow networks to recognize and track you.
This isn’t always a bad thing -- a network could use a MAC address to allow device access without authentication -- but if you’re concerned, most MAC addresses can be changed in a few seconds. Windows 10 comes with MAC randomization built in. Click the network icon in your taskbar, then select Network Settings to begin.
Australian developer SoftPerfect has released SoftPerfect File Access Monitor, a smart tool which logs all file create, read, write and delete actions on a PC.
If you don’t need every detail then filters enable recording only particular actions, by specified processes, on defined file masks and in your chosen paths.
EaseUS has shipped EaseUS Partition Master 11, adding hard drive clean and speedup tools to the regular partition-managing mix.
Both the Free and Professional editions gain a "Cleanup and Optimization" module, which could free up some valuable space before repartitioning. The "Junk File Cleaner" checks for leftover system and application files, as well as selectively wiping your web history.
Feedbro is a versatile feed reading Chrome extension which keeps you up-to-date with RSS/ Atom/ RDF sources, blogs, Twitter, Instagram and more.
The extension is stand-alone, rather than being a front-end for a website, which means there’s no need to sign up, create accounts, log in or anything else.
If you regularly investigate raw databases, executables or other binary files then you might sometimes find "dates" that seem to be random numbers, like 12883423549317375.
This probably means the date is encoded, but there are many different formats, and no obvious way to detect which one has been used.
BlueLife KeyFreeze is a freeware Windows tool which can selectively lock your mouse and/ or keyboard, without hiding the screen.
This is ideal if you’re leaving your toddler to watch a cartoon on your laptop, for example– even if they decide to bash the keyboard or click the mouse, it won’t do any harm.
VirtualBox is a great tool for trying out some new Linux distro, but you’ll usually have to spend a while finding a download and setting up your VM and operating system, first.
OSBoxes.org makes life easier by providing 40+ prebuilt VirtualBox (VDI) and VMware images for Android x86, CentOS, Debian, Fedora, FreeBSD, Gentoo, Linux Mint, Remix OS, Ubuntu and many more.
Secure Lockdown ($14.95-$29.95) is a quick and easy way to turn your computer into a "kiosk PC", a system which runs only the applications you specify.
If you run a business and would like customers to be able to browse some demonstration software, for instance, you probably don’t want them to be able to close that program, Alt+Tab to something else, log out or otherwise mess things up -- and that’s where Secure Lockdown can help.
Distributed Denial of Service (DDoS) attacks that are carried out by a botnet (a network of compromised computers) to overwhelm the processing power of the victim computer, effectively taking it out of commission, have been around for a while.
Peaking in 2000 with high profile attacks against Yahoo, eBay, CNN.com, Amazon.com and other e-commerce sites, they evolved in 2010 to be used by Hacktivists such as Anonymous in their Operation Payback, which escalated into a wave of attacks on major pro-copyright and anti-piracy organisations, law firms, credit card and banking institutions. Traditionally, DDoS attacks were network‐based. In such volumetric-based attacks, the attacker flooded the victim computer with information, taking up all of the victim computer’s bandwidth and infrastructure, overwhelming the victim computer’s ability to process the volume of information. Scripts for such attacks have become readily available on the Internet, as well as the Darknet. Therefore, it seemed as if DDoS was "old news".
Desktop screenshot tools support many capture types, and sometimes this includes taking an image of a full web page, even when it doesn't fit on the screen.
Sounds great, but it's extremely difficult for a third-party tool to make this happen consistently with all browsers and web pages, and often it just won’t work.