Sunday, July 1, 2007

WinRAR

WinRAR is a powerful archive manager. It can backup your data and reduce size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.
WinRAR is a powerful archive manager. It can backup your data and reduce size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.


Features of WinRAR:
- Using WinRAR puts you ahead of the crowd when it comes to compression by consistently making smaller archives than the competition, saving disk space and transmission costs.
- WinRAR provides complete support for RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives.
- WinRAR offers a graphic interactive interface utilizing mouse and menus as well as the command line interface.
- WinRAR is easier to use than many other archivers with the inclusion of a special "Wizard" mode which allows instant access to the basic archiving functions through a simple question and answer procedure. This avoids confusion in the early stages of use.
-WinRAR offers you the benefit of industry strength archive encryption using AES (Advanced Encryption Standard) with a key of 128 bits.
- WinRAR supports files and archives up to 8,589 billion gigabytes in size. The number of archived files is, for all practical purposes, unlimited.
- WinRAR offers the ability to create selfextracting and multivolume archives.
Recovery record and recovery volumes allow to reconstruct even physically damaged archives.
- WinRAR features are constantly being developed to keep WinRAR ahead of the pack.

Changes in Version 3.61 :
1. Corrected a bug in multithreaded text compression module, which under some circumstances might result in corrupt archived data.
This bug was present only in multithreaded mode and only in WinRAR 3.60. RAR versions for other platforms are not affected.
2. Resolved a compatibility issue preventing WinRAR 3.60 to run in Windows 95.

McAfee Wireless Home Network Security

Proven security that protects your home Wi-Fi network, McAfee Wireless Home Network Security provides industry standard, automatic protection against data theft, unauthorized network access, and broadband “freeloading�? through an easy and intuitive one-click interface. Wireless Home Network Security encrypts your personal and private data as it is sent over Wi-Fi and blocks hackers from accessing your wireless network. Combining ease-of-use features, such as instant network lock-down and the ability to quickly add legitimate users to the network, with robust security features such as automatic encrypted key generation and scheduled key rotation, McAfee Wireless Home Network Security is a “must have�? for any home wireless network.
Proven security that protects your home Wi-Fi network, McAfee Wireless Home Network Security provides industry standard, automatic protection against data theft, unauthorized network access, and broadband “freeloading�? through an easy and intuitive one-click interface. Wireless Home Network Security encrypts your personal and private data as it is sent over Wi-Fi and blocks hackers from accessing your wireless network. Combining ease-of-use features, such as instant network lock-down and the ability to quickly add legitimate users to the network, with robust security features such as automatic encrypted key generation and scheduled key rotation, McAfee Wireless Home Network Security is a “must have�? for any home wireless network.

Product Benefits:
- EXCLUSIVE! Strong automatically configured encryption helps prevent network attacks and protects your data as it sent over Wi-Fi.
- EXCLUSIVE! Automatic wireless security key rotation thwarts even the most determined wireless hackers.
- EXCLUSIVE! Comprehensive protection from all Wi-Fi network vulnerabilities – data theft, unauthorized network access, launching spam or virus attacks, installing unwanted programs, “war driving�?, or illegally downloading copyrighted content using your identity.
- Easy access for trusted computers it just takes a single click to allow your friends and family to connect to your secure wireless network, while blocking others.
- Intelligent alerts notify you instantly of computers trying to connect to your protected wireless network. To avoid gambling with your privacy, McAfee Wireless Home Network Security alerts you before you attempt to log onto an unprotected wireless network.
- Intuitive connection tool provides information about wireless network signal strength and security state so that you can easily connect to the desired network.
- Detailed logging allows you to inspect specific wireless network events on your wireless network.
- Suspend mode allows you to temporarily suspend the scheduled key rotation so that special applications are easily accommodated.
- Industry standard architecture supports the latest and most popular brands of wireless routers and access points from brands including Linksys, NETGEAR, D-Link, Belkin, and others. McAfee Wireless Home Network Security is a software-only solution, so you don’t need to buy additional hardware.
- Automatic updates run silently in the background ensuring you have the most current hardware compatibility modules for new popular wireless equipment.

McAfee Desktop Firewall™ 8.0.493

McAfee® Desktop Firewall 8.0 proactively defends and controls clients to prevent new threats that anti-virus alone cannot. By providing comprehensive network and application firewall capabilities combined with intrusion detection technology. Desktop Firewall prevents clients from sending or receiving hostile threats from unauthorized network traffic or applications. It also prevents authorized applications from being manipulated in order to send or receive threats across the network. McAfee ePolicy Orchestrator provides scalable centralized management, deployment, and reporting on Desktop Firewall. In addition Desktop Firewall provides unparalleled client security and return on investment by integrating with McAfee VirusScan Enterprise and ePolicy Orchestrator.
McAfee® Desktop Firewall 8.0 proactively defends and controls clients to prevent new threats that anti-virus alone cannot. By providing comprehensive network and application firewall capabilities combined with intrusion detection technology. Desktop Firewall prevents clients from sending or receiving hostile threats from unauthorized network traffic or applications. It also prevents authorized applications from being manipulated in order to send or receive threats across the network. McAfee ePolicy Orchestrator provides scalable centralized management, deployment, and reporting on Desktop Firewall. In addition Desktop Firewall provides unparalleled client security and return on investment by integrating with McAfee VirusScan Enterprise and ePolicy Orchestrator.

*****Key Benefits:
-Proactive prevention of threats that anti-virus alone can’t stop – Desktop Firewall filters all incoming and outgoing traffic, and controls applications, ports, and protocols to prevent attacks
-Protection from network-borne viruses – Authorized applications are managed and monitored to prevent their being used to send or receive threats across the network
-Shielding from unwanted applications – Spyware and other potentially dangerous programs can be prevented from running or hooking into other programs
-Exclusion of insecure clients – A quarantine mode keeps unprotected or inadequately shielded clients from communicating over the network
-Protection for mobile users – Desktop Firewall supports a wide range of protocols, including those used by mobile users accessing the corporate network via the Interent.
****Product Features:
-Integrated Client Security.
McAfee Desktop Firewall integrates with McAfee® VirusScan® Enterprise and ePolicy Orchestrator™ offering integrated virus protection, global management and reporting. Integrated client security provides smooth interoperability, complete protection against viruses, hackers and malicious threats, prevention of data theft, and reduced total cost of ownership.
-Packet-Level Firewall.
Desktop Firewall prevents network attacks using traffic-control rules for over 120 IP protocols. Security is further enhanced with support for non-IP protocols including WiFi, NetBEUI, IPX, and AppleTalk.
-Application-Layer Firewall.
Rules are created to restrict network traffic generated by applications; administrators can further strengthen security by controlling the ports and protocols used by authorized applications.
-Application Monitoring.
Application-creation rules prohibit unauthorized applications, stop threats such as Trojans, worms, remote access Trojans, and spyware, and prohibit users from installing or running unapproved software.
-Signature Based Intrusion Detection System.
Attack signatures enable Desktop Firewall to detect traffic behavior or application activity that indicates an attack on the client. These identified intrusions—such as IP spoofing, ping flood, and SYN flood—are blocked, and the client machine is prevented from being used to attack other network resources.
-Quarantine Mode.
This feature enhances security by automatically checking client security policies before permitting full network connection. If the client is unprotected or running out-of-date software or security policies, access is denied.
-Mobile-User Protection.
With support for 120 IP-based protocols, Desktop Firewall can be configured to provide security for mobile users connecting to the enterprise network via the Internet.
-Centralized Management, Monitoring, and Detailed Reporting.
Desktop Firewall integrates with McAfee ePolicy Orchestrator®, the industry’s leading tool for enterprise-class system security management. Administrators can configure and enforce policy and monitor the effectiveness of their security safeguards.
-Graphical Reporting.
ePolicy Orchestrator provides powerful enterprise-wide graphical reporting, including default or customer report templates. Default templates include: All intrusions, Intrusion Target and Source, Top 10 Attack Targets, Top 10 Intruders, and summary of intrusion based on type, year, month, or week.
-Learn Mode.
Desktop Firewall automatically learns incoming or outgoing, network traffic and application activity. In Learn Mode, Desktop Firewall prompts the user or administrator to allow or deny both application and network activity. Learn Mode enables an administrator to quickly build custom rules without preventing legitimate client activity from functioning, ideal for new deployments.
-Virtual Private Network Compatibility.
Desktop Firewall is designed to strengthen virtual private network (VPN) protection and is tested to run with popular virtual private network client software including Checkpoint, Cisco, Nortel and Microsoft. Compatibility ensures that your organization's current VPN clients will interoperate with Desktop Firewall.

Sygate Personal Firewall 5.6.3408.0

Sygate Personal Firewall Pro by Sygate Technologies, Inc. automatically protects your PC from hackers and other malicious attacks. It includes full-ICS support, protocol driver-level protection and enhanced logging. This firewall can stop intruders from hacking into your system, and that’s the point with a firewall. But Personal Firewall Pro doesn’t offer all the perks that our top ranked products do to block ads, popups and other undesirable content online. Sygate Personal Firewall is also a challenge for beginners.
Sygate Personal Firewall Pro by Sygate Technologies, Inc. automatically protects your PC from hackers and other malicious attacks. It includes full-ICS support, protocol driver-level protection and enhanced logging. This firewall can stop intruders from hacking into your system, and that’s the point with a firewall. But Personal Firewall Pro doesn’t offer all the perks that our top ranked products do to block ads, popups and other undesirable content online. Sygate Personal Firewall is also a challenge for beginners.

Sygate Personal Firewall is more than an advanced, user-friendly personal firewall, it's a bi-directional intrusion defense system. It ensures your personal computer is completely protected from malicious hackers and other intruders while preventing unauthorized access from your computer to a network. In essence, it makes your protected machines invisible to the outside world. That makes it a must-have security measure for any PC that connects to a private network or the public Internet. Once you've been compromised, every other network you connect to is at risk; including your home, business and online bank accounts. No matter where you use your computer, whether remote or behind a corporate firewall, whether dial-up or an always-on broadband Internet connection, it gives you complete confidence that your precious business, personal, financial and other data is safe and secure.

Sygate Personal Firewall PRO covers all the bases covered by Personal Firewall, but adds new network layer protection measures, an application-based detection system (IDS), and operating system security protection. It can automatically terminate common attacks, such as known Trojans and Denial of Service Zombies. This firewall's defense mechanisms can also keep malicious code or users from disabling the firewall.

Sygate’s Personal Firewall control panel has an informative graph that details incoming and outgoing traffic as it is blocked. The program also offers an attack history graph, helpful for tracking intrusion trends. Sygate Personal Firewall Pro’s control panel allows you to view and manage running applications so you can instantly stop a data transmission if you want.

Sygate has some advanced firewall features, but these are best suited to experienced computer users since understanding them requires extra reading. For example, Sygate Personal Firewall Pro is one of the only software firewalls that will let you assign specific port rules and time restrictions, but doing so is challenging.

Features:
- Application-Based Intrusion Detection System
- Protocol Driver-Level Protection
- Active Response
- Anti-IP & Anti-MAC Spoofing
- Application DLL Authentication
- Firewall Termination Prevention

SpywareBlaster 3.5.1

Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software. Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. Restrict the actions of potentially unwanted sites in Internet Explorer. SpywareBlaster can help keep your system spyware-free and secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background.
Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software. Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. Restrict the actions of potentially unwanted sites in Internet Explorer. SpywareBlaster can help keep your system spyware-free and secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background.

SpywareBlaster doesn't scan and clean for so-called spyware - it prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage. This allows you to run Internet Explorer with Active-X enabled, but it will never download or even prompt you for any of the known ActiveX controls. All other Active-X controls or plug-ins will work fine. The SpywareBlaster database contains information on these known spyware Active-X controls and can be updated with the click of a button.
The application windows displays a list of all controls that it is able to detect (this is not a list of what was found on your computer). SpywareBlaster cannot detect if you have any of the known objects already installed, but if you do, they will be disabled.

SpywareBlaster provides additional functionality in its "Tools" section. A short description of each of the Tools can be found below:
- Browser Pages: This displays many of the "browser pages" on your system (for example, your homepage, various search pages, etc.) and provides the functionality to change any of them. Pages are displayed for both Internet Explorer and Mozilla.
- Hosts Safe: The Hosts Safe can store encrypted backup copies or snapshots of the Hosts file. These backup copies are stored in the SpywareBlaster folder. Should you ever need to restore a backup copy of your hosts file, simply select it from the displayed list and press the "Restore Saved Backup" button.
- Misc. Internet Explorer Settings: Here you can edit a few Internet Explorer settings that are not readily available through any built-in interface in IE.
- Flash Killer: Macromedia Flash can be used to display animated interfaces on websites, animations, and other "Flash" content. Unfortunately, advertisers have begun to use Flash as a method for creating annoying and distracting content. And some users that wish to keep Flash off of their computers altogether have found it troublesome to prevent every website that uses Flash from installing it. Flash Killer can set the kill bit for the Macromedia Flash control (versions 4.x, 5.x, or 6.x) - preventing the installation completely and disabling it if it is already installed. Reversing this procedure is easy.
- Custom Blocking: Create your own list of ActiveX controls that you want to block. Add search engine toolbars, browser plug-ins, and more - block any ActiveX control you want. You can even download Custom Blocking lists other people have created. (Warning: Please be careful when using a Custom Blocking list someone else has created. Only consider using a Custom Blocking list if you trust the person that created it.)

SpywareBlaster offers two updating options:
1.) AutoUpdate - keep your protection up-to-date automatically!
2.) Check for Updates - manually check for and download the latest updates

SpywareBlaster is freeware for personal and educational use.

Webroot Spy Sweeper 5.0.7 Build 1608

Webroot Spy Sweeper is award-winning anti-spyware software that effectively detects and safely removes spyware and adware from your PC. Spy Sweeper protects you from spyware's negative consequences, which include a slower Internet connection, pop-up advertisement problems, reduced computer performance, or in the worst case, the loss of private information and identity theft.
Webroot Spy Sweeper is award-winning anti-spyware software that effectively detects and safely removes spyware and adware from your PC. Spy Sweeper protects you from spyware's negative consequences, which include a slower Internet connection, pop-up advertisement problems, reduced computer performance, or in the worst case, the loss of private information and identity theft.
Spy Sweeper™ lets you protect your privacy and your computer from a variety of spyware programs, from those that monitor all of your computer's activities (system monitors) to those that can steal or destroy data (Trojan horses). It also detects programs that pop up ads on your computer when the program is running (adware) and cookies that may contain and may transmit personal information (tracking cookies).

Spy Sweeper™ "sweeps" your computer looking for evidence of these programs, reports its findings, and lets you decide whether to quarantine and remove the program or keep it running on your system. Quarantining and removing programs will disable it until you decide to delete the program completely or restore it.

F E A T U R E S :
* Comprehensive Removal Technology. Using new patent-pending removal technology, Spy Sweeper effectively disables the most sophisticated and debilitating spyware programs, including threats that employ "rootkit" technology to evade detection and removal and continue wreaking havoc with your PC. This advanced and highly effective technology saves you time and effort by removing even the most vicious spyware threats in one sweep.
* Advanced Detection Techniques. Spy Sweeper uses FlexDef technology to identify and defeat emerging spyware threats without having a direct match to an existing spyware definition or signature. Using this technology, Spy Sweeper is able to dynamically defend against threats as they emerge.
* Enhanced Blocking with Smart Shield Protection. Spy Sweeper uses 16 advanced Smart Shields, including ActiveX, Toolbar, and Spy Communications shields that block new spyware installations so you can have the peace of mind you deserve knowing you've got proactive, always-on protection.
* Deepest Detection. Using state-of-the-art spyware research methods that identify new spyware threats before they are widely distributed, Spy Sweeper ensures you have the most powerful and up-to-date protection against new emerging spyware threats.
* Unrivaled Removal. Spy Sweeper's Comprehensive Removal Technology (CRT) is the backbone behind the most advanced spyware removal engine in the industry. CRT deletes the toughest spyware programs in just one sweep - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats.
* Accurate Risk Assessment. Detected spyware programs are rated by risk level to help you understand the danger that each spyware threat poses to your security. Plus, Spy Sweeper gives you a quick overview of each threat, what it does, and its potential danger.
* Continuous Security Updates. Spyware programs morph frequently. Spy Sweeper keeps you protected against these threats with frequent and automated updates to its definition database.
* Protection Made Easy. Spy Sweeper continues to earn wide-spread acclaim for its user-friendly interface and usability. With an easy-to-use console and customizable options, Spy Sweeper makes defeating spyware a breeze.
* Up-to-date News & Information. Webroot regularly provides essential information about spyware - right within your Spy Sweeper application. You can stay informed about the latest online threats.

Works with Windows 98, ME, 2000, XP Pro and XP Home.

Changes in version 5.0
- Even easier to use - redesigned user interface
- Stops spyware instantly - more powerful blocking defenses
- Protection against vicious threats - new keylogger shield and rootkit detection

CONTRAST