Category Archives: Tools & Reviews

7 zip for Windows 7

7z is a new and open architecture archive format developed by Igor Pavlov and based on LZMA compression algorithm. Both LZMA and the utility for handling 7z archives, 7-Zip utility are released under GNU LGPL license which mean is free for commercial or personal use on any computer. A few of the most important features of 7z format are: High compression ratio Strong AES-256 encryption Open architecture Unicode file names Supporting files with sizes up to 16000000000 GB The utility created for handling 7z archives, 7-Zip is an open source software created aswell by Igor Pavlov assuring a high compression ratio for processed files and supporting many archive formats: Packing …

Continue reading

Posted in Selected Software.

Process Hacker

Process Hacker deserves the label of “Software of the week” because it’s the most advanced and powerfull tool I ever tested for manipulating or managing computer processes. Here are included applications processes, running services, hidden processes, all revealed highly detailed. For example for a given process, the tool will display to the user the handles, modules loaded, threads, the services associated with it if any, the memory map, the token, the DEP (Data Execution Prevention) status, the permissions and pretty much everything, all easily accesible via context menu. The analysis can be deeper, you can even view the stack of a process thread. The Services tab include a complete list …

Continue reading

Posted in Selected Software.

Privatefirewall 7.0

With its computer security approach, behavioral based and signature-less, Privatefirewall 7.0, a Privacyware product is the perfect complement to any antivirus software you may running. Beeing a firewall though advanced, it can not remove malware, otherwise it would be the perfect defense solution for a Windows based system. The program monitor the whole system activity and alert user about any presumably malicious modification or anomaly detected to the applications, protected registry area, protected objects, emails, Windows services, running processes, DNS requests or outgoing TCP traffic blocking any known or unknown malware. Privatefirewall 7.0 is able to intercepts the calls of WinAPI functions, initialization of new unknown processes, attempts to access …

Continue reading

Posted in Selected Software.

NANO Antivirus review

Searching today on twitter.com for tweets regarding computer security, I’ve found a twitter account, NANOantivirus associated with a new russian security software company,  NANO Security. To be honest, I never heard of this company before so I made a little research  on Google.com for his product NANO AntiVirus and surprisingly enough the first search results on Google.com are dominated by links to sites talking about a fake antivirus with the same name, NANO AntiVirus. According to these sites, the NANO AntiVirus rogue software has the same behaviour as all the fake antiviruses, it displays false alerts and pop-up warnings about a false computer massive infection. Displaying a lot of fake …

Continue reading

Posted in AntiVirus reviews.

Data Loss Prevention Systems

In the past, the data loss or data leakage was a big concern for big or medium companies but nowadays when we are witnessing an exponential growth of commercial espionage and the fight for “the market” become so intense between competitors, the data loss prevention is of utmost importance for absolutely all the companies, bigger or smaller. A  data leakage from within the company has direct and indirect consequences, direct as  data usage by your competitors and indirect as loss of the credibility with your customers. Nobody wants their personal data as addresses, phone numbers, Social Security number or credit card details being compromised by a company with neglectful employees …

Continue reading

Posted in Tools & Reviews. Tagged with , , , .

How data recovery programs works

Have you ever wonder, how data recovery software works ? I mean, everybody knows, when you delete files them are going to a special folder Recycle Bin, but what is happening when you empty Recycle Bin ? To understand this we must first understand how data are stored on storage devices e.g. hard drives. I don’t want to write a very “technical” article, instead I will try to keep it as simple as I can. The most commonly file system formats used in modern Microsoft Windows based systems are FAT (File Allocation Table) and NTFS (New Technology File System). The FAT and FAT32 is used predominantely by systems running earlier …

Continue reading

Posted in Tools & Reviews. Tagged with .

IObit Security 360 Free — the review

Browsing today Yahoo Answers, I saw someone recommendation for the users to try IObit Security 360 as an advanced spyware and malware removal tool. Quickly I’ve done a Google search and I found the official site of the program http://www.iobit.com/, a site with a few interesting and useful freeware and commercial tools. …removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers… they say in the official site. Good, let’s try it then. I’ve downloaded 8.78MB and installed the application. The first impression was of a simple and intuitive interface, nothing to do with “advanced users” features found in other …

Continue reading

Posted in AntiSpyware reviews.