PC Security
Avast
Anti-Virus
The only requirement of Avast Home Edition is that you must be a home user; this full-featured security app is free for the download. In addition to virus and spyware killing, you also get anti-rootkit detection, which protects you against malware that installs itself and stays hidden on your PC. The app updates itself automatically, has a Web Shield function to monitor the traffic between your PC and the Internet, and also offers protection with e-mail and instant messages.
AVG
Anti-Virus
The Anti-Virus Free Edition from AVG is one of the most popular freeware apps out there, but AVG makes it clear that the software is barebones. You don't get support or additional features, period. But Anti-Virus Free Edition does provide virus and spyware protection, plus virus-definition updates, which is what everyone should have as a minimum. Unlike some virus-protection software, this free application won't hog your system's resources.
Anti-Virus
Anti-Spyware
Theft Deterrent
HijackThis
If persistent spyware is bogging down your computer, you might need HijackThis. The tiny program examines vulnerable or suspect parts of your system, such as browser helper objects and certain types of Registry keys. Pressing the Scan button generates a log of dozens of items, most of which are just customizations. Don't check off an item and hit the Fix Checked button unless you're sure it's malware.
SuperAntiSpyware
Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. Light on System Resources and won't slow down your computer like many other anti-spyware products. Won't conflict with your existing anti-spyware or anti-virus solution!
Malwarebytes
Malwarebytes is a site dedicated to fighting malware. Malwarebytes has developed a variety of tools that can identify and remove malicious software from your computer. When your computer becomes infected, Malwarebytes can provide the needed assistance to remove the infection and restore the machine back to optimum performance.
TigerDirect
Menu
Security Tips
Protect Your Network
Use Google Public DNS - If the bad guys can't get you to go to their phony site, they'll try to do it against your will by 'poisoning' the DNS cache of your your ISP (The DNS server translates URLs into IP addresses). To change the DNS on your PC, go to Network Connections, right click on your connection and double-click the Internet Protocol. Then simply enter the preferred DNS of 8.8.8.8 and alternate of 8.8.4.4 then click OK.
Secure Your Wireless Connection - The weakest encryption used by routers is WEP and can easily be broken into in less than a minute. Set your router to use WPA or WPA2.
Scan Your Network For Intruders - To find out if your neighbor has broken into your network scan your system with the free tool RogueScanner. It will query devices on your network and compare them to an online database of devices to help identify machines on your network (you smartphone will be there if you connect through your wireless). You can also go to your browser's setup screen to see how many IP addresses are assigned (your smartphone will use an IP address if its using Wi-Fi).
BtProx (Bluetooth Proximity) monitors the proximity of your computer to your cell phone (or other Bluetooth device) and locks the computer when the phone goes out of range then unlocks it when you return. In addition, you can arrange for BtProx to launch any application at the same time that it issues the lock command. Your cell phone and computer must both be Bluetooth capable.
BtProx
Sandboxes/Virtual OS
Buffer Zone
Surf the internet without worry. All internet activity (including downloads and chats) are contained within the Buffer Zone. Viruses and malware are kept out of your operating system. If you want to download a program that you KNOW is safe, you'll have to surf outside the Buffer Zone to permanently install it on your computer.
Buffer Zone
Prey
If your laptop or cell phone is stolen, Prey allows you to remotely monitor it, get Wi-Fi hotspot info and take screen shots of the theif (if it has a built in cam). If your laptop has a password protected account, make an unprotected user account (that the theif can use) and install Prey onto it.