Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htm

Geek Superhero watches your computer for changes, immediately notifying you when a change is made to confirm you want to keep or reject the change. This saves you from lots of headaches. (A "Computer Setting Firewall" is an excellent description.)

2. CleverCrypt Enhanced http://www.deprice.com/clevercryptenhanced.htm

Using the latest developments in information security, CleverCrypt has been designed to use the best encryption technology legally available. The product uses 4 encryption layers to protect your data. Using just one of CleverCrypt's encryption layers it has been mathematically calculated that the famous "DES Cracker" machine, if sped up several thousand times, would still take over 149 trillion years to crack a CleverCrypt secure drive. And that's if your using just one of CleverCrypt's four layers.

3. Clean Disk Security http://www.deprice.com/cleandisksecurity.htm

Clean Disk Security gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the Window's swap file, and can optionally clean unneeded temporary files from your hard disk, such as your Internet browser cache, files in your system's Recycle Bin, and can clear the "recent files" list.

4. Cryptainer PE http://www.deprice.com/cryptainerpe.htm

Phenomenally easy to use, Cryptainer PE's encryption works on all versions of Microsoft Windows and works with all known file types. You can protect your files and folders and ensure total privacy with Cryptainer PE. Simply drag and drop the files and folders you want to hide and voila! your files are hidden. With Cryptainer PE you can hide the very existence of your confidential files and folders. Additionally, Cryptainer PE allows you to send encrypted email files. The recipient need not have a copy of Cryptainer PE installed to decrypt the files.

5. Desktop Armor http://www.deprice.com/desktoparmor.htm

Desktop Armor watches dozens and dozens of important settings on your computer and warns you if any program has changed them. This catches many of the changes a virus, worm, or trojan program will make to your computer and lets you immediately fix them back! Plus Desktop Armor includes a lot of other useful features like a Popup blocker, checks to help you avoid Phishing scams and much more.

David D. Deprice reviews top encryption and security solutions at http://www.deprice.com

In The News:

A game changer in IT security  MIT Technology Review

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More