|Get Organized and download TreePad|
|Free File Encryption|
|AES Crypt||Freeware, open-source file encryption program for Linux, Windows, MAC, JAVA.|
|AxCrypt||Freeware open-source file-encryption software for Windows.|
|Cryptainer LE||Cryptainer creates a secure archive (= an encrypted container or a vault) to store any type of data. It uses 128 bit encryption. Files can be added to or extracted from the archive through a simple drag and drop operation. It also functions on removable disks such as USB drives. The archive you create is self extracting. This means that the recipient does not have to have any special software to decrypt the files. Freeware, for Windows.|
|CrypTool||CrypTool is a freeware educational program which enables you to apply and analyze cryptographic mechanisms. CrypTool has implemented almost all state-of-the-art crypto functions and allows you to learn about and use cryptography from within a single environment.|
|File Vault||You can create a secure archive of files with this utility. Ideal for sending secured information over the internet or on disks. The archive you create is self extracting. This means that the recipient does not have to have any special software to decrypt the files!!|
|FreeSecurity||Freeware 128bit AES file encryption program. It is created using Java, so it runs on: Linux, MAC, Windows and Solaris.|
|GPGee||A shell extension for Windows explorer that acts as an assistant for using GnuPG/GPG. It integrates itself into the context menu that appears when you right-click on a file and adds a new menu with functions to allow you to sign and/or encrypt any file.|
|MEO||Free file encryption software for Mac and Windows to encrypt and decrypt files and directories and create self-extracting encrypted files.|
|Free Disk Encryption|
|TrueCrypt||Freeware, open-source disc encryption software for Linux, MAC and Windows.
TrueCrypt can create a virtual encrypted disk inside a file and mount it as a real disk.
It can also encrypt an entire partition and start an operating system from inside the encrypted partition.
You can even create a hidden encrypted disk inside a regular virtual encrypted disk.
If at one point you are forced to give others access your computer
(in whatever situation), they might see the file of the regular encrypted disk, and pressure you for its password.
However, you can deny the existence of the hidden encrypted disk, because they will not be able see the hidden disk.
This is called the principle of plausible deniability.|
TrueCrypt is also fully portable, meaning that you can run it directly off a USB drive without installing it.
|Bestcrypt traveller||Freeware zero-install program for Windows to create and access virtual encrypted virtual disks.|
|CryptoExpert Lite||Freeware for Windows. Creates encrypted virtual disks and these disks are visible as usual disks with drive letters The data stored on a CryptoExpert disk is stored inside a container file.|
|Dekart Private Disk Light allows you to create a secure space for all your work, exchange encrypted data with others, It creates one or more secure virtual disks on your hard drive. Information stored in this secure area is automatically encrypted and may only be decrypted by entering the correct password. Without the password, the information from a secure disk cannot be accessed and decrypted. Freeware for Windows.|
|ScramDisk||Free, open-source Linux driver to create and use virtual encrypted and password protected scramdisk and truecrypt containers.
These containers can be accessed like normal harddisk drives.|
|Non-free Disk Encryption|
|BestCrypt||Software for creating and using encrypted drives which can be accessed like any other disk-drive on Windows.
The encrypted volume is simply a file which resides on your local harddisk but it can also be located on a USB stick.
You can only access the volume after entering a password.
Suitable for Windows 32-bit and 64-bit. Uses AES, Blowfish, Twofish, CAST and other encryption algorithms.|
Registration fee: $ 59.95 / EU 59.95.
|DriveCrypt||Creates encrypted drives which can be accessed through a drive letter. Like with Bestcript, the encrypted drive is a regular file which can also be located on a USB stick. Suitable for Windows 32-bit and 64-bit. Uses AES, Blowfish, Tea 16, Tea 32, Des, Triple Des, Misty 1 and Square. $ 59.95.|
|Free Email Encryption|
|gnuPG||Freeware and open source replacement for PGP. Does not use any patented algorithms.|
Algorithms supported: AES, ElGamal, DSA, 3DES, Blowfish, Twofish, CAST5, MD5, SHA-1, RIPE-MD-160 and TIGER.
Runs on Windows, Linux, Free BSD, Open BSD, Net BSD, etc.
|Freeware PGP versions||Freeware PGP file/email encryption editions for a variety of platforms.|
|The software in this section enables you to hide (insert) data inside images (and other files)
so that the presence of the information becomes invisible to others.|
In general: "Steganography" enables the creation messages in such a way that the existence of the message is hidden to anyone but the recipient.
|BitCrypt Free||Freeware program for Windows, allowing encryption of plain text within bitmap image. What it does is to modify the individual pixel shadings of the image, and in this way to incorporate the information related to the text being encrypted. The modifications of the image are so small that the effect is not perceptible to the human eye.|
|OutGuess||Can hide information in JPEG and PNM images. OutGuess preserves statistics based on frequency counts. As a result, statistical tests based on frequency counts on JPEG images are unable to detect the presence of steganographic content.|
|wbStego||Encrypts and hides information in bitmaps, text files, HTML files and PDF files.|
|Free Checksum utilities|
File Checksum Tool
|A free utility for Windows that can generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash (= checksum) from a file.|
|MD5||A command line utility for Linux/Unix or MS-DOS/Windows, which generates and verifies message digests (digital signatures) using the MD5 algorithm.|
|WinMD5Sum||Freeware program for Windows to verify data integrity using the MD5 128-bit cryptographic hash.|
|Free Password Managers|
|RoboForm||A free password manager for Windows, which can also fill in Web forms. Many features, such as: auto-fill passwords in login form, click Login button for you, fills in personal info into online forms, etc.|
|AppArmor||Security suite for Linux, freeware, open-source. AppArmor is also very useful for preventing scripts and programs running on Webservers from being hacked and exploited.|
|AS3 Personal Firewall||Free firewall for Windows (32bit).|
|Ashampoo||Offers a free firewall for Windows.|
|Comodo||Free firewall + anti-virus for Windows.|
|Core Force||Open-source firewall, packet-sniffer and security framework for Windows.|
|Firestarter||Freeware open-source firewall for Linux with graphical user-interface.|
|FortKnox Personal Firewall||Free firewall for Windows.|
|GhostWall||Free firewall for Windows (both 32bit and 64bit).|
|Home PC Firewall Guide||Independent reviews of Internet security and privacy-related products.|
|IPCop||A Linux distribution which can turn an old or a new PC into a dedicated firewall.|
|Iptables-tutorial||Tutorial for the Linux iptables firewall configuration program.|
|Linux/BSD firewalls||A list of free firewall software which runs on Linux, FreeBSD and/or OpenBSD.|
|MoBlock||Freeware for Linux. A linux console application that blocks connections from/to hosts listed in a file.|
|Netdefender||Freeware open-source firewall for Windows.|
|Free firewall for Windows. Although the site looks like it has been abandoned you can still download the firewall.|
|Outpost Firewall Free||Free firewall for Windows.|
|PC Tools Firewall Plus||A free personal firewall for Windows.|
|PeerGardian OS X||Freeware open-source firewall for MAC OS X.|
|PeerGuardian for Windows||Small yet powerful firewall. Freeware, open-source for Windows 98, ME, 2000, XP, and 2003, in 32-bit and 64-bit.|
|R-Firewall||Freeware firewall for Windows, with many features.|
|SoftPerfect||Free personal firewall for Windows.|
|Sunbelt Personal Firewall||Free firewall for Windows. The version offered for download is the full 30-day trial version as well as the feature-limited free version.|
|Vista Firewall Control||A freeware application which makes the configuration of the built-in firewall of Windows Vista and Windows 7 easier.|
|Free basic PC desktop firewall for Windows.|
|AVS Firewall||Firewall for Windows (32-bit only) with registry protection, ad-blocking, parental control. rules, view/control traffic, alerts, multilingual support.|
|Jetico Personal Firewall||Firewall for Windows XP, Vista and 200X (32-bit and 64-bit). One-time registration fee: $ 39.95 / EU 39.95. Since the registration fee is not a subscription, this firewall is actually quite reasonably priced compared to the other non-free firewalls listed here.|
|ESET Smart Security||Firewall for Windows. The subscription fee is around $ 60 per year.|
|Kerio WinRoute Firewall||Multi-user firewall suite for companies starting at around $ 200.|
|Lavasoft||Firewall for Windows, subscription fee $29.95 per year. There does not seem to be an evaluation version available though. It would be nice to be able to try it out before deciding to subscribe to it or not.|
|Online Armor||Firewall for Windows. Subscription fee: $39.95 per year.|
|K9 Web Protection||Free Internet filter and parental control software for Windows and MAC. Features: block certain Web sites, safe search, set up time restrictions, configure lists for allowing or blocking Web sites, and more.|
|Anonymous Web Surfing|
|Privax||A network of free web proxy sites. It enables anyone in the world to surf anonymously online. By using any of the affiliated sites, you can surf the net under an anonymous IP address.|
|Ultrasurf||A free portable program for Windows which enables you to surf the net anonymously. No installation necessary!|
|Site Surf||Free anonymous Web surfing.|
|the Cloack||Free anonymous Websurfing.|
|Tor||Tor = "The Onion Router Network". Helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.|
|HideMy.Info||Free anonymous Websurfing.|
|Free Hide IP||A free Windows program, which enables you to hide your IP address while being online.|
|Anonymous Web Search|
|DuckDuckGo||This Web search engine does not collect any information that can identify you.|
|GoogleSharing||Search Google anonymously through a Mozilla FireFox addon.|
|ixquick||This search engine does not record your IP address.|
|Scroogle||Uses google to generate search results. Scroogle shields you from any Google cookies, and prevents Google from seeing your IP address.|
|Startpage||Offers Google Web results while removing all identifying information (such as your IP address, cookies).|
|Stealth||Stealth does not collect your IP address, does not use any cookies, it encrypts your search terms and does not store your search history. Also: any advertisements which might appear on the Stealth site will not be based on your search history.|
|Free Network Security Tools|
|Shields Up!||Website which tests your computer ports for vulnerabilities from outside attacks through the Internet. Navigation is rather cumersome on this site. To access the 'Shields up' service, first click on the 'Shields up' logo, then scroll to the paragraph 'Hot Spots', click on the entry 'Shields up!', finally click on the 'proceed' button. In the 'Shields up' screen, click on 'All Service Ports', or 'Common Ports'.|
|Free Port Scanner||For Windows. Scans ports and port ranges by using TCP packets. It can determine available hosts and open ports and other important characteristics.|
|Free Anti-Rootkit Software|
|A rootkit is a set of utilities which can run hidden on a computer system, often with the intention of providing secret access to (and control over) the computer's operating system. Usually hackers, viruses, worms and other malicious entities use rootkits to hide their presence on infected systems.|
|Sophos Anti-Rootkit||Free rootkit detection and removal tool for Windows.|
|chrootkit||Free anti-rootkit program for Linux, MAC, BSD, Solarix and other Unix versions.|
|Rootkit Hook Analyzer||Identifies all processes which are 'hooked' into the operating system kernel ('kernel hooks').
Some of these hooks may be legitimate, some might be malicious.|
Suitable for Windows XP, 2000 and 2003.
|RootkitRevealer||A free root kit detection utility for Windows NT 4 and higher which detects all persistent rootkits.|
|Rootkit Hunter||A free rootkit scanner for Linux and BSD.|
|GMER||A free application that detects and removes rootkits. For Windows.|
|Free Security Tools|
|Processsquicklink||Free program that integrates with the Windows taskmanager. After installation, near each process inside the Windows taskmanager you will see an 'information' button. If you click on this button you will be taken to an online page describing the process.|
|Nmap||A "Network Mapper", which can be used to create a map of a computer-network. Nmap can be used as a diagnostics tool to make your network more secure, but it can also be used for hacking purposes. For Linux, Windows and MAC.|
|FREE CompuSec||Free suite of security solutions designed to protect desktops and notebooks:
pre-boot access control with password, hard disk encryption, file encryption,
encryption of removable disks, SafeLan. It can be deployed as single user
installation or centrally managed.|
Freeware for Linux and Windows.
|Data Wiping Tools|
| If you need to remove sensitive data totally from your harddisk, simply deleting these files is not enough!
Using advanced methods, it is even possible to recover data that's been overwritten, unless it has been
overwritten using carefully selected platterns! |
Operating systems usually do not totally delete the file, but just mark the file as being 'deleted' so it can not be accessed when you view the contents of a directory. This means that you can not see the file anymore with normal tools, but specialized recovery tools can still access your data.
To prevent this from happening, you need to totally erase your files, using one of the specialized data removal tools you can find in this section. These removal tools totally erase your data by replacing the contents of your files with effective data-patterns before deleting them the normal way.
|After Work||Free Windows utility which can be used to wipe sensitive data from your computer, such as: temporary internet files, IE history, visited sites, opened documents, started programs, temporary registry values.|
|CleanDisk||Non-free. Total deletion of files, clean the Windows swap file, clean temporary files. Contains disk viewer to view the real contents of your disk including 'deleted' entries. Suitable for Win95, Win98, WinME, WinNT, Win2000, WinXP.|
|Eraser||Freeware for Windows. Eraser can remove sensitive data from your hard drive by overwriting it with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.|
|Free Security Soft:|
|Erases files by overwriting the contents with random bytes before deleting them. Freeware for Windows.|
|HandyBits file shredder||Freeware for personal, non-profit use. Can overwrite files with random data up to 15 times. Multi-language support, integration with Windows Explorer, with icon on desktop to use as recycle bin, etc.|
|How to destroy a CD or DVD||Don't just throw away your CD's and DVD's when they contain personal or sensitive data. First you need to make sure that the data is unretrievable.|
|KillDisk||Harddisk, floppy and partition eraser. Free and non-free editions are available.|
|No File Recovery||Free disk wipe utility for Windows.|
|Security related Websites & Resources|
|All Internet Security||Directory which is aimed at both PC and Macintosh users and security professionals.|
|Discussion forum on security and privacy-related matters.|
|Essays on security|
|A large number of essays on security and encryption written by Bruce Schneier, who is one of the top encryption specialists in the world. He has has also written many useful books on the subject.|
|Gruyere||Google codelab which shows how Web application vulnerabilities can be exploited and how to defend against these attacks.|
|The Hackers Choice||Papers, research and other resources related to computer security.|
|HackingAlert.com||Expert Tips to Deal with Hacking.|
|Krebs on Security||Articles related to: online crime investigations, the latest threats, security updates, data breaches and cyber justice.|
|NewOrder||Computer security and networking portal.|
|Offensive Computing||Malicious code research, information and analysis|
|ProcessLibrary.com||A free online library of processes is for everyone who needs to know the exact nature and purpose of every process that should, and should not, be running on their PC.|
|SecurityFocus||This Website is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide a comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list.|
|Top 100 Network Security Tools||Lots of free network-related security tools.|
|Related Freebyte Pages|
|Free Anti-virus Software||Believe it or not, there are many good anti-virus programs you can download and use for free! Also: free firewalls, very useful trial anti-virus program versions, anti-virus software tests, links to specialized anti-virus sites, etc.|
|Free Anti-Spyware||Free utilities to detect and remove spyware.|
|Free Anti-Spam Tools||Free spam-filter services, free anti-spam software, free spam-reporting services, free anti-spam email services, free server-side anti-spam tools, etc.|
|Anonymous Internet||Anonymous Web search, anonymous Web surfing, anonymous email and anti-spam email.|
|Free File and|
|Disk catalog programs; backup, compression, split and zip programs; disk search engines, disk management utilities, remote file storage services, data recovery tools, data wipe tools, downloadable boot disks and more.|
|Free System and|
|Free process viewers, system analysis tools, network monitoring tools, registry tools, task schedulers.|
created by Freebyte
|Free Personal Information Managers, free File and Disk Utilities, free Address Books, free eBook Software and more. All created by Freebyte.com.|
|Free Technical Support||Free technical support for all computer-related issues: Hardware, software, PC, Windows, MAC, PDAs, Linux, drivers, Modems, dll's, virus.|
|Free drivers, dll's,|
and bios upgrades
|Find your missing system file (dll, vxd, ocx, driver, etc.) or BIOS upgrade, and download it for free.|
|Free Operating Systems||Free operating systems, such as: Linux, FreeBSD, Windows clones, emulators and much more. Also: interesting alternative commercial operating systems.|
|Free Programming Tools||Free programming tools for Windows, Linux, etc. Free C++, C, Delphi, Basic, Assembler, Cobol, Pascal, Java, SQL, Databases; links to free compilers, databases, interpreters, IDE's, installers, components, libraries, languages, helpfile generators and more.|
|Software sites||A large list of freeware sites, freebie sites, shareware sites and software search engines.|
|If you know of any good programs, utilities or services be listed on this page, please let us know!|
|About this page|
|Last updated on March 02, 2012
If you have any comments about this page,
Copyright © 1995-2012 Freebyte.com.|
All rights reserved.
Freebyte.com is hosted by HostGator