February 22, 2017
The majority of home based computer users use the same passwords (or easy to remember passwords) for nearly every account that they are subscribed to. Hacker’s (or criminals) know this and take advantage of these facts. If your password is easy to remember, then it is easy to hack.
To make your accounts secure, it is HIGHLY RECOMMENDED that you use a password manager to manage your accounts and the passwords associated with them. The “go to” password manager that I use (on all my computers and devices); and, have used since its’ inception is the “S10 Password Vault”. It has never let me down… The main feature I like about this software is that I have total control over my password information at the local level.
There are so many features to the S10 Password Vault that I encourage you to visit the developer’s site by clicking the source link below.S10 Password Vault is available for Windows as a standard installer and as a portable version that allows you to run directly from a USB drive (which then also contains your data file). There is also an “S10 Vault” mobile companion app for iPhone/iPad (in the App Store) and for Android devices (in the Google Play Store and Amazon App Store).
Source: S10 Software – S10 Password Vault
February 21, 2017
I have found that using synchronization software is a very easy way for the home based computer user to backup data vs. the full blown backup type software (which can hard to understand for the home computer user). I am currently messing around with the FREE synchronization program called SyncFolders; that, so far in my testing, could end up being my default (go to) backup software for my computers here at home. If you are interested in giving SyncFolders a try, the source link is reflected below. SyncFolders is also available as a portable app.
Features of SyncFolders
- Supports two-way synchronization of files and folders.
- Can easily be used as backup tool.
- Shows a preview before the actual synchronization takes place. You can override actions if desired.
- Detects conflicts or file collisions when a file has changed in both locations since the last sync operation. Therefore, SyncFolders tracks file modifications and deletions in a local database.
- Propagates deletions and detects file renames.
- File comparison by date and size or by content.
- Default actions can be defined in case of synchronization conflicts.
- Integrates with Windows’ Task Scheduler to support scheduled synchronizations.
- Supports file and folder filters.
- Can handle long file names and files of any size.
- Synchronization from or to UNC paths is supported.
- Supports multiple synchronization rules in a single rules file.
- Deleted or overwritten files can be moved to the recycle bin or to a time-stamped history folder.
- History files can be deleted after a user-defined period.
- Unlimited number of files.
- Synchronization from command line.
- Can ignore one-hour timestamp differences caused by DST switch for synchronization to FAT file systems.
- Unrestricted freeware.
- No spyware, adware or malware.
- Portable, although .NET Framework is required.
February 17, 2017
If you are concerned about file (and folder) security, AxCrypt 2.0 is good choice in protecting what matters to you. In addition to the full install version, there is a portable version, as well as, a mobile app (for Android and iOS).
AxCrypt works as a separate program in it’s own window, but it’s also fully integrated into the Windows Explorer – the part of Windows where you browse your folders and files. Here is a quick video tutorial on how to use the basic functions of AxCrypt 2.0.
AxCrypt is a simple file encryption software for Windows. It integrates seamlessly with your workflow to encrypt, decrypt, store, send and work with files.
New and Updated Features
- 256 bit encryption
- Mobile App for iOS
- Mobile App for Android
- Passwordless sharing
- Portable app for Windows
- Secured Folders
- Cloud Service Awareness
- Password Manager
- Single sign in for encryption / decryption
Source: AxCrypt – File Security Made Easy
February 16, 2017
There has been quite a few occasions where I had to drill down, using data recovery software, to find deleted files for people. I can’t say I have had to do this on an Android device yet; however, if the occasion does arise, MiniTool Mobile Recovery may be the software option I will be using. This free Android data recovery tool provides 2 recovery modules (recover from phone and recover from SD-Card) to restore Android data regardless of the reasons for data loss. The recovery process requires connecting to the Android device via your computer.
MiniTool Mobile Recovery for Android Free is the best Android data recovery software which can effectively recover data from Android Phones and Tablets.
Source: MiniTool Mobile Recovery for Android Free | Best Free Android Data Recovery Software for Android Phones and Tablets
January 30, 2017
Many of us at home rely on Google’s Gmail, as our email service provider. Gmail, for me, has been a very reliable service; however, I do often think, what would happen if my account was hacked and I lost years and years of accumulated emails???
To give some level of comfort there is a software solution called “Upsafe Gmail Backup” that gives you the ability to backup your email and even the option to restore email(s) that you may have deleted. All backups are stored local to a folder on your computer. The first time you run the software, the backup may take awhile depending on the amount of emails you have stored in your Gmail account. Subsequent backups are incremental and are much faster.
To get a feel how “Upsafe Gmail Backup” works, check out the video below. If further interested in taking a look at this and trying, click on the source link below.
Backup your mailbox with our free Upsafe solution. Restore your Gmail emails even when you deleted them from your trash box. Download it for free now!
Source: Upsafe Free Gmail backup
January 19, 2017
This Gmail Phishing attack (see source link below) has been making tech news and is very important that you are made aware. It has been known by Google since March of 2016. This deceptive sneaky attack is currently only targeting Gmail accounts. The cybercriminals trick you into giving away your Google or Gmail Login Credentials. It is even fooling those who are tech-savvy and very familiar with phishing schemes.
Once an account has been compromised, the attackers immediately access it and start targeting the victim’s contacts.
Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts
Source: Phished Gmail Accounts Immediately Accessed by Hackers | SecurityWeek.Com
January 5, 2017
Looking for a method to protect sensitive files and folders? If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…
One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…
By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.
Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.
With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.
Source: Hyper Crypt | Portable Encryption Software
December 17, 2016
AOMEI is an excellent software package that will assist you with backing up your files. The newest version now includes a live syncing option. Read more at Betanews (source link below).
AOMEI has released AOMEI Backupper Standard 4.0, the second major update of its freeware Windows backup, imaging and cloning tool in 2016. Version 4.0 adds an additional arrow to the tool’s bow …
Source: AOMEI Backupper Standard 4 adds real-time file sync, supports backup to cloud
December 14, 2016
If you have an account with Yahoo, you need to change your password NOW. Reportedly a 1 Billion account breach has occurred. Better yet, based on past security issues with Yahoo, you may want to consider other options.
Source: It’s new and it’s bad: Yahoo discloses 1B account breach
December 7, 2016
AdwCleaner is a “must have” security software tool that will search for and delete Adware, PUPs (Potentially Unwanted Programs), Toolbars, Hijackers and MORE… This program is by Malwarebytes, the maker of the famous Malwarebytes Anti-Malware…
December 1, 2016
Found this directory (and a removal tool) on the ESET website that may be a valuable resource to you. ESET is a leading IT security company that specializes in various antivirus and security products. If you are interested on trying ESET, there is some good deals on their products (click here)The directory on their support site is what jumped out at me, which outlines various antivirus and security software brands with links to those sites to access instructions and/or tools to uninstall their antivirus software.
Why is this important? Prior to switching to other brands of antivirus or security products it is HIGHLY RECOMMENDED that you uninstall the older version to prevent conflicts, system slowdowns; and even system failures. You may think, “OK, no problem, will use the Windows Program Uninstaller applet in the control panel to do this”. You are on the right track, but the problem with that is the Windows Uninstaller may not capture and uninstall everything; and could leave remnants of files behind that can cause problems. This is where the directory on the ESET website will really come in handy to assist you with the removal of antivirus and security products.
ALSO, on the same note, I noticed ESET also has a removal tool on the same page that my do the heavy lifting for you in removing an old software product. The ESET AV Remover tool will remove almost any antivirus software previously installed on your system. ALSO, you will find a link for a list of available malware removal tools.
Source: ESET Support – Uninstallers (removal tools) for common Windows antivirus software
November 30, 2016
Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.
To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…
November 26, 2016
Malwarebytes Junkware Removal Tool is a portable tool that removes all traces of Adware, Potentially Unwanted Programs, Toolbars, Crapware from Windows PC. This tool is a portable app (just download and run). Read more about how to use this tool (see source link below).
Source: Malwarebytes Junkware Removal Tool removes Adware and PUPs
September 11, 2016
ZHPCleaner is a portable app that has been developed to identify and remove those unwanted browser add-ons (hijackers) that compromise the security of your computer…. As with any app of this type, it is best you have knowledge of what is safe to remove and what is not.
READ MORE @ Nicolas Coolman
September 11, 2016
If you think you are immune from malware in Android Apps; “Think Again”…
“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…
“Once installed on the device, DressCode initiates communication with its command and control server,”
READ MORE @ BGR
The following video also explains how DressCode works: