top of page

Comodo Internet Security
Comodo - (Freeware)

Comodo claim that their firewall is unique in that it passes all known leak tests to ensure the integrity of data entering and exiting your system. Comodo has put firewall through all kinds of sophisticated tests to ensure its firewall powerful enough to ward off these attacks with default settings. No other firewall has had to work this hard. •PC Magazine Online's Editor's Choice
•Secures against internal and external attacks
•Blocks internet access to malicious Trojan programs
•Safeguards your Personal data against theft
•Delivers total end-point security for Personal Computers and Networks

PeerGuardian
Phoenix Labs - (Open Source)

Outpost Firewall gives peace of mind from any virtually every Internet danger. Unlike other personal firewalls, Outpost starts protecting against all kinds of internal and external attacks as soon as it's installed.


This is the first firewall with an open architecture and support for plug-ins, so its capabilities can easily be extended by thousands of developers worldwide.


Key Benefits:
•Basic Firewall Protection - Standard packet and application filtering safeguard your computer from unwanted communications.
•Connections Monitoring - Lets you see network activity in real time, to help define inappropriate connections and close them right away.
•Surfing Protection - Maintains your privacy on the Internet, keeps browser protected from Internet dangers.

PeerBlock
PeerBlock, LLC - (Open Source)

PeerBlock lets you control who your computer "talks to" on the Internet. By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries!


They can't get in to your computer, and your computer won't try to send them anything either.


And best of all, it's free!
PeerBlock is a continuation of PeerGuardian.

PeerGuardian 2 is Phoenix Labs' premier IP blocker for Windows. PeerGuardian 2 integrates support for multiple lists, list editing, automatic updates, and blocking all of IPv4 (TCP, UDP, ICMP, etc), making it the safest and easiest way to protect your privacy on P2P.


PeerGuardian 2 is Open Source, meaning the program code is available online for anyone who wants it. Not only does this allow you to make modifications or even branch off into your own project, but it encourages peer review of the code making sure any bugs are eliminated swiftly. Because PeerGuardian 2 is Open Source, you can rest assured there are no backdoors or spyware included.


Development of this title has been discontinued by the original authors, but has been continued by a new team under the name of  PeerBlock

Outpost Firewall Free
Agnitum Ltd - (Freeware)

Title. Double click me.

Just Click on LOGO for Download

Free for personal use, Sygate Personal Firewall provides best of breed security in a user friendly interface, protecting your PC from hackers, trojans and DoS attacks.


Features include full-ICS support, protocol driver level protection, enhanced logging, and more.


Sygate Personal Firewall delivers unobtrusive, highly configurable, enforceable rule-based security policy by constantly operating in the background of your PC. Policies regarding applications, trusted IP addresses, ports, protocols and scheduling can be customized to support and secure any network configurations or requirements. Designed with high performance in mind, it delivers top-notch security without sacrificing your computing power.


Note that from November 30th, 2005 all Sygate consumer firewall products have been discontinued but this versions is available here for free use.

Protect yourself from hackers. Secure your PC with a 100% free firewall download. Sunbelt Personal Firewall (SPF), previously known as Kerio Firewall, was called "our favorite" by PC Magazine.


The Windows Firewall (both XP and Vista) is worse than useless, it gives you a false sense of security. Why? It only filters incoming traffic. That means if malware has compromised your PC, it is able to send out all your personal info. That's right; the Windows "firewall" does not stop that! But SPF...


•Supports Windows XP and Vista
•Filters both ingoing and outgoing traffic!
•Keeps hackers out and your private info inside.
•Works great with VIPRE Antivirus + Antispyware
•Easy to use and does not slow down your PC!

Sunbelt Personal Firewall
Sunbelt Software
(Non-Commercial Freeware)

Sygate Personal Firewall
Sygate Technologies - (Freeware)

ZoneAlarm Free Firewall blocks hackers from infiltrating your home PC by hiding your computer from unsolicited network traffic. By detecting and preventing intrusions, ZoneAlarm Free Firewall keeps your PC free from viruses that slow down performance, and spyware that steals your personal information, passwords, and financial data.


•Essential firewall protection
•Be invisible to others online
•New interface makes it even easier - smaller size keeps it light
•Systematically identifies hackers and blocks access attempts

ZoneAlarm Free
Zone Labs
(Non-Commercial Freeware)

KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).
 

KeePass is really free, and more than that: it is open source (OSI certified). You can have a look at its full source and check whether the encryption algorithms are implemented correctly.

AxCrypt is used to share and work with stored documents, and e-mail attachments, in a secure manner.
If your documents reside on a document sharing service, intranet or file server AxCrypt is especially well suited and will usually seamlessly integrate, and make sharing and storing sensitive data as easy as not protecting it.


AxCrypt is great for protecting your documents such as private letters, correspondence, job information, medical information, financial details stored on a local hard disk or network server.


Just right-click any document file and encrypt it with AxCrypt. Viewing and opening for update is just as convenient as before encryption due to AxCrypt's automatic decryption/open/re-encryption function.


If you use a Key-File on a diskette or USB thumb drive, your files will be encrypted to the highest level of protection as long the Key-File is kept secret.


To encrypt a file, right-click it in Windows Explorer, select 'AxCrypt > Encrypt' and enter a pass phrase plus the path to an optional strong key file.


To edit or view an encrypted file - just double-click it.

AxCrypt
Axantum Software - (Open Source)

KeePass
KeePass - (Open Source)

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space).


This software is highly recommended for securing data on laptops.


TrueCrypt performs the following tasks:
•Creates a virtual encrypted disk within a file and mounts it as a real disk.
•Encrypts an entire partition or storage device such as USB flash drive or hard drive.
•Encrypts a partition or drive where Windows is installed (pre-boot authentication).
•Encryption is automatic, real-time (on-the-fly) and transparent.
•Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
•Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.

Password Safe allows you to manage your old passwords and to easily and quickly generate, store, organize, retrieve, and use complex new passwords, using password policies that you control. Once stored, your user names and passwords are just a few clicks away.


Using Password Safe you can organize your passwords using your own customizable references - for example, by user ID, category, web site, or location. You can choose to store all your passwords in a single encrypted master password list (an encrypted password database), or use multiple databases to further organize your passwords (work and home, for example). And with its intuitive interface you will be up and running in minutes.

Password Safe
Rony Shapiro - (Open Source)

TrueCrypt
TrueCrypt Foundation

(Open Source)

Firewalls Downloads

Data Encryption Downloads

Diagnostics Downloads

Microsoft Baseline Security Analyzer (MBSA) 2.0 is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.


Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS) and Microsoft Operations Manager (MOM).

Event Log Explorer™ is an effective software solution for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. Event Log Explorer greatly extends standard Windows Event Viewer monitoring functionality and brings many new features.
•Multiple-document or tabbed-document user interface depending on user preferences.
•Favorites computers and their logs are grouped into a tree.
•Event descriptions and binary data are in the log window.
•Quick Filter feature allows you to filter event log in a couple of mouse clicks.
•Compatibility with well-known event knowledgebases (EventID.com and Microsoft knowledgebase).
•Color coding by Event ID.
•Print and export to different formats.

Event Log Explorer
FSPro Labs - (Freeware)

Microsoft Baseline Security Analyzer
Microsoft Corporation -(Freeware)

Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
 

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.

Nmap
Gordon Lyon - (Open Source)

bottom of page