PC Security Tool
Use this section to request development of a PC Security Tool or to suggest improvements. If you haven’t checked out our firewall test, internet speed test, website monitoring service and most important for those creating sites, our sitemap generator (way more than just a sitemap builder!), then try them out first before leaving a comment.

Have a suggestion for a new tool or service that you would like me to develop and make available online for free? Leave your suggestion below. No project is too big or too small, and anything you think of can be programmed (well, just about anything : )
Many of our tools were suggestions from visitors!
If something didn’t work or look right, please let me know and I’ll get it fixed. These tools take a LOT of time to develop and there are a ton of them – I’m bound to missing something but with your help, I’ll find out about it – and please – don’t worry about offending me! I want to hear what you have to say!
Comments need to be approved before going live so if you want your comment private, just let me know that in the message and I’ll make sure not to publicize it. Note: you’ll see your comment appear as though it’s live, but only you can see it, if you close your browser and revisit the page, you’ll see it’s not there. Why do I do this? I get a TON of spam and it’s the only way to make sure the site stays family friendly and safe! By the way, I have a free tool I designed to make a spammer’s miserable, it’s called anti spam :)


Have a suggestion for a new tool or service that you would like me to develop and make available online for free? Leave your suggestion below. No project is too big or too small, and anything you think of can be programmed (well, just about anything : )
Many of our tools were suggestions from visitors!
If something didn’t work or look right, please let me know and I’ll get it fixed. These tools take a LOT of time to develop and there are a ton of them – I’m bound to missing something but with your help, I’ll find out about it – and please – don’t worry about offending me! I want to hear what you have to say!
Comments need to be approved before going live so if you want your comment private, just let me know that in the message and I’ll make sure not to publicize it. Note: you’ll see your comment appear as though it’s live, but only you can see it, if you close your browser and revisit the page, you’ll see it’s not there. Why do I do this? I get a TON of spam and it’s the only way to make sure the site stays family friendly and safe! By the way, I have a free tool I designed to make a spammer’s miserable, it’s called anti spam :)

Web Security Resources
Below you will find a list of free software applications that you can download and use without paying a cent. Many of these applications are open source and can be modified to fit your needs should the default setting not work for you.
Some are not open source, but are completely free, such as antivirus and spyware removal software. As we come across applications that we think you would find useful, we’ll review and list them below.
Some are not open source, but are completely free, such as antivirus and spyware removal software. As we come across applications that we think you would find useful, we’ll review and list them below.
- Audio Recording SoftwareAudio Recording Software you can freely use to record and edit sounds.
- Audit SoftwareAudit Software that not tells you what is running on your PC but your network as well.
- Bandwidth MeterBandwidth meter and tools to monitor and shape the data traveling across your lines.
- Check Open Ports - Port MonitorThere are three ways to check open ports, the first being a port monitor for your PC, second a port sniffer and third, a remote security scan and here are the free applications you need.
- CMMS SoftwareList of CMMS Software that you can download and use for free including source code.
- Data Replication SoftwareReview of free Data Replication software that you can download and start using to secure your information!
- Free CMMSFree CMMS software that you can download and start using right now!
- Free CRM SoftwareFree CRM software that you can download and start using right now!
- Free Document Management SoftwareA comprehensive list and review of free document management software that you can download and start using today.
- Free Popup BlockerFree Popup Blocker and other software you can download to stop those annoying popups!
- Group Meeting OnlineLooking to hold a group meeting online? Here is a list of software of which most can be downloaded and used for free.
- Home Automation SoftwareHome automation software that you can download and install free of charge to automate and remotely control your appliances.
- Home Security Monitoring SoftwareHome Security Monitoring Software that can be used to track activity around your house.
- Internet Monitoring SoftwareInternet Monitoring Software that you can download and install free of charge right now.
- Keyboard SniffersKeyboard Sniffers that you can download plus what a hardware keylogger is better than the software recorders.
- List Running ProcessesList Running Processes and find programs that are running in the background with this free software.
- Network AnalyzerReviews of the best Network Analyzer that is completely free and easy to have up and running within minutes.
- Network ManagementNetwork Management software and tools that you can download and use free of charge.
- Offsite Backup Software - Remote BackupOffsite Backup Software to help you with remote backup and storage or your important files for free.
- Parental Control SoftwareParental Control Software that you can can have up and running right now for free without paying a cent!
- Password Hacking Programs Password hacking programs that work and available for download free of charge.
- Personal AntivirusComprehensive list of Personal Antivirus that you can download and use for free.
- Raid Data RecoveryRaid Data Recovery and software you can use to restore files from your hard drive.
- Spam BlockerSpam Blocker you can use to protect your email free of charge!
- Speed Up ComputerHow to speed up computer using free software that can find and eliminate bottlenecks.
- Spyware RemovalSpyware Removal programs that you can download and use to help you fix your computer.
- Web Content Management SoftwareAn excellent list of Web Content Management Software that is completely free including my favorite package!
- Wipe and CleanWipe and Clean your files and internet history forever without fear of recovery!
How to Protect Yourself Against Hackers
One of my servers was recently hacked — and although I don’t want to alarm you, you should know that your sites could be subject to attack at any time.
To help you protect your sites and your data, in this article I share what happened to my sites and why.
More importantly, I’ll tell you what I learned about defending my server, sites and computer against hackers.
What do hackers want?
Although some hackers get their thrills from breaking into and vandalising your property, most hackers are thieves. They may be identity thieves looking for credit card information, or they may want access to copyrighted works or sensitive intellectual property either for their own use or for the purpose of resale. Still other hackers are hijackers, who want to use your computer or server to send out spam email in phishing schemes.
Lucky me, I got a multi-purpose hacker(s) who demonstrated talent in 2 of the 3 categories above.
When Steve of DataWebPro discovered the problem, 250,000 of the spammer’s emails were ready to be delivered from my server — and we have no idea how many were sent.
While the hackers were having their jollies, the sites on that server slowed to a crawl and crashed a few times.
It’s nearly a month after the attack and we are still discovering that email sent to our customers with product download information, or to which they’ve subscribed in order to receive update notices from the forum, is being rejected by certain ISP’s, i.e. black-listed.
A bigger problem that was discovered during the episode was that one of our customer databases had been corrupted. Worse, it had been down and out for so long that the server backups couldn’t be used to rectify the problem.
Although both the blacklistings and database problems are resolvable issues, they have been a HUGE hassle and neither the incantation that Steve offered, nor the prayer sent by Andrew have been of much help.
So far, rebuilding the database has involved hour after hour of mind-numbing multi-platform data mining and entry which promises to continue for at least another 2 weeks.
How do hackers gain access to your account?
You’ve probably heard of worms, viruses and Trojan horse programs that can seriously damage or make your computer vulnerable to remotely controlled exploits.
Hackers like to look for ‘security holes’ through which they can gain entry without much trouble. These holes frequently exist in the programs and plugins that we install on our sites.
Hackers also use programs that are designed to figure out the passwords to your accounts. Typically known as brute force password attacks, these programs run through letter and number combinations until it gets a match and gains access to your account. When your server is being bombarded by one of these attacks, the sites may become interminably slow.
Perhaps the ugliest type of hack is the one to whom you gave your password willingly because he or she is doing some programming work on your site.
How to foil a hacker
At very least, we should protect our computers and data with routers, firewalls, anti-virus software and external hard-drives.
Remember, it is not enough to install these programs and hardware, we actually have to use them. For example, set up your anti-virus software to download updates automatically. Likewise, program your external hard-drive to automatically back-up your data on a regular basis.
If you are on a managed server, such as a BlueHost hosting account, login into your cPanel and Fantastico interfaces regularly and update your installed programs as the upgrades become available.
If you want to install programs and plugins that don’t come with Fantastico, research them for known ‘security holes‘. Better yet, ask the technical people at your ISP if they have information about the program. Because they are just as keen as you are to stop hackers, in many cases, they will research the software for you.
Too, don’t leave unused WordPress themes on your server, and un-install unused plugins.
Stay alert for unusual activity on your accounts. If you have trouble logging into any of your accounts and you sure the username and password is correct – alert your ISP right away and send the account name with logins.
If you are running a membership software such as Amember, you can prevent bruteforce attacks by setting an incorrect login attempts limit. That allows a user to make a mistake in entering their username or password only a set number of time times, i.e. 3 or 4. If the user exceeds these attempts the system will either lock them out of the system or prevent any future attempted logins.
If you need a programmer to tweak a particular piece of software, go first to the developer and find out whether they will either do the work or if they know programmers who are experts with that software. Otherwise, ask your friends if they can recommend a programmer whom they trust.
When you hire a programmer for a small tweaking job, set them up with their own password which you then cancel as soon as the work is finished.
Do NOT use duplicate passwords, i.e. use different passwords for your affiliate accounts and server access. For your best defense against bruteforce password attacks, be sure your passwords are comprised of numbers as well as uppercase and lowercase letters and change your passwords regularly.
Last but not least, backup your sites’ data! Although they probably do, it is not enough to count on your ISP to back up your site regularly. You can generate your own full site backups manually from cPanel.
A alternative that may be preferable however, is to install software that does automated backups and has a quick and easy restore process such as Affiliate Backup. At the time of the hacker attack, I had Affiliate Backup set up on only one site — now it is set up to run on all of my sites. And yes, I AM kicking myself for wasted a pile of cash on weeks worth of data entry, when I could have had another instance of the program installed for $57. DUH!!!
Although there is no way to completely eliminate hacker attacks, there is plenty you can do to prevent them from gaining access to your site. DO make the time and effort to protect yourself, because doing so after the fact takes 100 times more time and effort.
THINGS YOU NEED TO DO WHEN YOUR PC IS INFECTED
For those who are facing the challenge of malware removal, here's a basic guide on what to do when the system is infected.
But I strongly recommend posting a question for there are times when ComboFix and MalwareBytes are unable to remove the infection. For malware that patched system files we need to determine which file is patched and replace it before we can continue the cleanup process and run diagnostic tools.
" ISOLATE THE INFECTED SYSTEM:
The very first thing you should do is to isolate the infected system from the network to stop the spread of infection.
Turn off the internet connection except while you're downloading the tools to use which shouldn't take long. Or you can use another pc with internet access to download the files into a USB. Unplug the network cable, turn off wireless connections of the infected system. Do not share removable media device.
" LEAVE SYSTEM RESTORE TURNED ON:
DO NOT disable System Restore, you need to keep those restore points intact in case you need it later, you can disable it afterwards when the PC is clean and stable.
Any viruses in the System Restore (if there are any) are harmless so they pose no threat while in that folder.
For further information about viruses in System Restore check out below link --> http://www.experts-exchange.com/articles/Software/Internet_Email/Anti-Virus/Viruses-in-the-System-Volume-Information-System-Restore.html
" BACKUP YOUR DATA:
As a precaution, you need to back up your important files now while you still can just in case something goes wrong during the cleanup and you have no choice but to reformat. Bear in mind that you MUST scan the backup before you start using them.
" ERUNT (Emergency Recovery Utility NT):
Some malware will turn off System Restore and other windows features to lessen the PC's functionality. If you noticed that the System Restore had already been turned off or tabs are grayed, use ERUNT to do a complete backup of the registry. Registry export is not good enough. Removing nasties requires making registry changes and if the registry is corrupted it can prevent the pc from booting. The ERUNT backup can then be restored later if needed.
Complete ERUNT tutorial:
http://www.larshederer.homepage.t-online.de/erunt/
If the virus has already disabled SR and you don't have ERUNT backup then the next thing you should do is run ComboFix before you run any other tools so you have a registry backup. Post a question and we'll guide you with its usage.
" DOWNLOAD THE TOOLS AND START THE CLEANUP:
Download the programs needed for the cleanup. There are many free tools out there but these ones below are among the most commonly used, they work well and they are FREE.
Usually MBAM or ComboFix alone will remove most infections but it's good to also clean temp folders.
a). ATF Cleaner or TFC
b). MalwareBytes
c). SUPERAntispyware
d). Combofix(with a Helper's guidance). Post a question if using ComboFix and attach the log file for us to analyse.
" SCAN FOR ROOTKITS:
If the problem is not resolved after scanning with reliable scanners, then scan for rootkits, I prefer using Gmer and RootRepeal. Even if the issue no longer exist it's always a good idea to scan with these tools for the reassurance that nothing is hiding.
" DISABLE SYSTEM RESTORE:
Once the problem is resolved and the system is clean, you can then disable System Restore to purge all those restore points, then turn it back On and immediately create a new and clean restore point.
How to turn Off/On System Restore:
http://support.microsoft.com/kb/310405
" PREVENTION:
Prevention is better than cure so make sure that you have the 3 basic security real-time protections in-place, without doubling each one.
1. Antivirus
2. Firewall
3. Anti-malware
Make sure all your installed programs have regular updates and windows have all the critical security patches. Tighten security features in your browsers, if using Firefox use the 'no-script' add-on.
Install the latest version of java to minimize the risk of vundo threats as lower versions are very vulnerable to vundo exploits.
Use a customized Hosts file to block unwanted nasties. Browse the internet using a limited user account, even though this (LUA) is 'not useful' against the rogue family of antivirus it is still better than browsing online with an Admin account.
NOTE: the best protection is User Education.
For more in-depth info on prevention please read below links:
TonyKlein's article "So how did I get infected in the first place?
miekiemoes' "How to prevent Malware"
Simple and easy ways to keep your compute safe and secure on the Internet: