ContentsTo the Buttons...

Freeware Protection Suite

               What to have handy when the chips are down       

       Note: This suite is meant for beginners, or those confused by the variety of protection methods required by today’s standards. It is not meant to detail   the various patches and security updates needed by Microsoft Windows, Internet Explorer or MS Office Applications such as Outlook and  Word, for which the MS website is the best source.

    Most of the applications listed are free for personal use on a single computer only. Some are specifically barred from use over LANs. Others are treated in more detail elsewhere (see buttons below). To cover all areas  by buying programs would be costly. Fortunately there are numerous Freeware solutions as listed here. Many do a decent job and are more than adequate for the home desktop or laptop.

    There are 7 main areas  where you will  need to protect your system from, amongst others : unauthorised access to files, stealing of data and corruption of your hard disc. Some are also included in other Tables or on other pages.

a.   Virus Protection 1.11 AVG 6 Virus Scanner   identifying and sanitising the self-replicating programs known as viruses.
b.   Code Restriction Avoiding Worms  stopping Worms and malicious code from running (including that in email).
c.   File Protection 2.16 : File Checker  stopping installing applications altering or replacing files already on your system.
d.   Access Protection   Firewall Functions  thwarting intruders who hack into your system through open ports or drop Trojans.
e.   Disposal Protection Shredding (Wiping) Files  destroying sensitive material that is no longer needed so it cannot be recovered.
f.   Data Protection Encryption  coding and concealing personal data that you want to keep.
g.  Confidentiality  Email Encryption  sending email that can only be read by those it was meant for.
         Table 1                 Freeware Protection Suite                                                                       

Program / Version

Category   (a - g) &  Function

URL

Notes  

1.1    BCWipe 2.0

e.  Shreds (wipes) data in files & folders and in the Windows swap-file.

Resides on the Rclick Menu

1.2    DestroyIt 3.5c e.  As BC Wipe, but more elaborate. Can be used to zap whole drives.

Drag and Drop, with an option to add a RClick Menu item

1.3    Cryptext 3.40

f. Encrypting files so that their  contents cannot be understood, unless  files are Decrypted using the password.

Resides on the Rclick menu. 

1.4    Registry Protection

c. Warns when an entry to the Registry is about to be made. You can accept or refuse the alteration.

Can be run in the background. Same as #2.1

1.5    UltraFunk Popcorn  d1

d. Lets you view your email headers before you download the messages.

Protects you from script that runs as you open an email. See also #3.7

1.6    Zone Alarm PE

b,d.  Personal Firewall. Warns of any attempt to hack into your system, or to identify it. You can make yourself invisible to intruders.

The Pro version (to buy) also has, amongst others, an ad blocking capability, email scanning and program protection.

1.7    Zone  Log Analyzer  1.01

d. Analyses Zone Alarm warnings, lets you identify hackers and lets you report them.

Can be updated. Free trial version

1.8    AdAware  6.181

d. Finds and removes known adware and  pests such as Remote Access Trojans that scan your system and return data to their originators.

Only works for software it knows about, so frequent updating is necessary. Some free programs that rely on adverts will not work if you remove their adware (eg Go!Zilla).

1.9    Spy Checker

d.  Allows access to an on-line database that lists known spyware

 

1.10  SpyBot S & D 1.3

d. Searches your hard disk for different kinds of internet threats - including spy- and adware, key loggers and your usage tracks (for example your browsers page history), and Destroys it. It can also fix certain system problems. It sets its own Restore Points in case things go wrong.

Scroll past the nag...

Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. Please check the privacy statements of a product in question. 

1.11  AVG Virus Scanner 6.0

a. Fully-featured Virus Scanner. Free updates and Virus Signature files. Can be configured to scan incoming email. Can be upgraded to commercial version.

Registration required (free). Latest version is XP compatible. Not recognised by Zone Alarm as being present on your system. 

1.12  Ensured mail

g. Allows you control over who reads your email and local files; you can send and receive encrypted email

Recipients need to download copies as well.

1.13  Script Sentry b. Halts any attempt to run a script  or to add to the Registry with a .reg file.. Runs invisibly in the background. Can be configured to allow safe script. 
1.14  MoOutlook Security

b. Stops Outlook, OE, Winzip etc from running dangerous script files with extenders it recognises.

Does not affect the running of these script files outside of the programs listed.

It needn't cost you a penny...

Top of SectionTo the Buttons...

 

 

 

As far as I know all files are compatible with Windows 98SE, Windows 2000 and Windows XP.

This is a very personal collection, and no doubt there will be those who swear by programs not listed here. If you have a particular favourite, or if there is a protection category I have omitted, or indeed any comment at all, please email me. Any worthwhile suggestions may be incorporated.  

 

             

 

 

 

 

 

ContentsTo the Buttons...Interactive Index

  The Question of Spyware 

       Spyware, or Who's Been Eating My Porridge?     

                   Most of us have a deep-seated objection to snoopers discovering things about ourselves we would rather keep private. We lock our doors and windows, keep documents in a safe or a secure cabinet, and may even shred bank statements, credit card receipts, utility bills and the like before disposal : matters of common sense rather than paranoia. When it comes to opening up a connection to the Internet we are, in effect, inviting millions of other surfers into our lives - should they know the way in. Many of them we'd rather not have any truck with, in cyberspace or in real life. This applies especially to those after a fast buck trying to sell us things we haven't asked for. Email spamming is sufficiently a nuisance to warrant legislation and prosecution. A more insidious approach is to attach to seemingly innocent downloads a means of gathering information about our habits, and passing on such by unauthorised use of the connection through which they reached the system in the first place (see Trojans). Visiting rogue websites can add Cookies that result, rather like cold-calling, in adverts popping up without warning and for inappropriate merchandise. Our browser can be hijacked with commercial additions that serve no useful purpose - except as advertisement for the perpetrators. All these amount to  a perversion of our resources to someone else's money-grubbing. 

                    We do not, however, have to sit and take it in silent frustration. There are programmers out there (dare I call them philanthropists?) who have spent time and effort to provide protection against the trackers and hackers, the crackers and smackers, and who are willing to distribute the results of their endeavours freely. In some cases you are invited, without obligation, to donate towards their expenses. Table 2 below lists some of these and provides an integrated suite that can help protect you. There are several  approaches : 

A. Check if a particular piece of software is spyware or not.

B. Check  your system to remove any known instances of spyware and adware.

C. Check  incoming programs, and if recognised as inimical, to stop them being installed and run.

D. Check  incoming  files before they are opened to see what they might conceal.

E. Check your system for information your OS keeps, but which you'd rather not.

F. Warning of  changes to the Registry or Browser settings by external agents.

G. Check important files to warn of attempted changes.

H. Reading of lists (logs) your system keeps of Cookies and the like, so that you can modify them where necessary.

I. Check Browser Helper Objects to see what is affecting your browser, and reverse Browser Hijacking.

J.  Place known malware in the Restricted Zone of Internet Explorer.

K. Fix certain settings in IE so they cannot be changed by external agencies.

Note that other protective measures, such as firewalls, Email and virus scanning are dealt with in the Freeware Protection Suite.

 

Top of SectionTo the Buttons...Interactive Index

     Table 2                              Spyware Protectors 

Program / Version

Category (A - I) & Function 

URL 

Notes  

2.1   RegistryProt

F.  Warns when an entry to the Windows Registry is about to be made. It is a real-time registry monitor and protector. It monitors  important locations and keys in the Registry, and will alert whenever a key is added or changed, and then give you the option of accepting the key change, reverting to the original key setting, or deleting the key. Runs in the background.

RegistryProt's most useful attribute is that it will detect most  Trojans at the exact moment that they  try to install themselves on to your system. 

2.2   AdAware 6

B.  Finds and removes Trojan-style proglets that scan your system and return data to their originators (‘spyware’)

Only works for software it knows about, so frequent updating is necessary

2.3   Spy Checker

A.  Access to an on-line database that lists known spyware, so you can fid out if a particular title is safe or not.

 

 

2.4   SpyBot  S&D 1.3

B.  Searches your hard disk for different kinds of internet threats - including spy- and adware, key loggers and your usage tracks (for example your browsers page history), and removes them.  It can also fix some system problems.

Maintains its own signature files on your system so updating is necessary. Sets its own Restore Points for use in case things go wrong.   

2.5    IE-SpyAd

J.  IE-SpyAd uses a mergeable registry file (IE-Ads.reg) that adds a long list of known advertisers, marketers, and  pushers to the Restricted Zone of Internet Explorer. Once it is  merged, they will not be able to utilise  cookies, scripts, popups, etc. in order to monitor and track your surfing behaviour. 

It  will not block banner ads in IE.
2.6   IE Restrictions 1.0

K.  Allows you to fix certain settings in  Internet Explorer and stops them being changed.  Many of these settings are commonly abused by invasive web sites, that for example change your home page settings, modify the toolbar, or open pages in full-screen mode. 

You can also disable the registry editor, page source viewing and other settings. 

2.7      BHO Captor 0.5 t2

         BHO Demon 2.0.0.17

I.  Both these let you control the Internet Explorer Browser Helper Objects (BHOs) that are installed on your system. They enable you to see what BHOs are installed and  to deactivate them. BHO  Demon monitors their status from the SysTray.

See  also   Browser Hijacking
2.7a  HijackThis 1.98 B. This brings up a list of Registry Settings for your browser. In this list, as well as the parasites there will be things you want to keep. Make sure you know which is which.  
2.8   BH  Blaster 1.0 

I.  Protects your system from browser hijackers and spyware that alters your Internet Explorer settings. It runs in the system tray and silently monitors the settings for IE Homepage, IE Default Page, IE Search Page, and BHOs (Browser Helper Objects). If any of these settings are changed, it will intercept and warn you, giving you the option to undo the changes.

 
2.9  Win Patrol  7

E.  WinPatrol gives you  control over what permission you give for programs  to run on your machine. It can be set  to display information about Start-up programs, and lets you approve  programs set to Auto Run. An alert pops up when new cookies are added to your system, and you can see what information is being stored there

 Ignore the adverts on the page. Click to start the download.
2.10  Spyware Blaster 3.2

C. Prevents spyware from  being installed. It targets items used by spyware and browser hijackers to embed themselves into your system. Detects changes and additions and alerts them. Provides a list of changed/added items - so the user has full control. Will also disable, or prevent the loading of Macromedia Flash controls, which advertisers have begun to exploit.

Has an XP-like feature in that it can take a 'snapshot' of your system settings, and should you be infected by spyware, you can restore important browser and system settings to their previous states. A really useful  and essential donation ware (ie. basically  free)  application. 

2.11  Spyware Guard 2.2

D.  An anti-virus program scans files before you open them and prevents execution if a virus is detected - Spyware Guard does the same thing  for spyware.  It prevents spyware from being downloaded and stops Browser Hijacking - both in real-time.

Stops those nuisance changes to your browser (such as Home Page or toolbar hijacking)  and scans downloads - all in real-time. An excellent '2nd layer'  protection when used with Spyware Blaster.

2.12  Scrub XP 1.1

E.  ScrubXP is a one-click cleanup tool, that runs in your system tray. As soon as you click it, it will delete and clean the following items: IE History, IE Temporary Files, IE Cookies, Recent Documents List, Recycle Bin,  and Auto-complete Entries (which it also turns off. It also cleans the Recent File Lists for Run, Common Dialogs, Recent Documents, Search Assistant, Typed URLs, Paint, Find Computer, Printer Ports, Find Files, Media Player, Previous Tasks, and Real Player. The program runs automatically on boot up. Session cleanups can be performed by double-clicking the tray icon. 

 There is no configuration, the program cleans all of the listed MRUs every time it is run.

2.13  MRU Blaster

E.  Detects and cleans MRU (most recently used) lists on your computer. These  lists contain information such as the names and/or locations of the last files you have accessed. They are located all over your registry, and for almost any file type. By examining them,  someone could determine what files you opened, saved or looked at, and what their file names were. In many cases, the lists are automatically displayed in drop-down menus.  

     

Plug-ins are included that can be set to clear Temporary Internet Files and Cookies  -  both fully configurable. Very useful. Includes the option to empty the 'Run' (Open) typed command list.

2.14  iiSystem Wiper 2.2 

E.  iiSystem Wiper is a highly configurable system cleaner that enables you to erase internet tracks, as well as temporary files, recent document list, cookies, browser cache and so on. It also offers support for popular P2P file sharing programs (Morpheus, Gnucleus etc.) as well as Windows Media Player, Netscape, MS Office, and Plug-ins.

                     
2.15  IE Privacy Keeper 2.3

E.  Automatically cleans up all traces of your Internet activity when the last window of Internet Explorer is closed. You can select to clean the URL history, typed URLs, Temporary Internet Files, Cookies, Recent Documents, Auto-complete history, Windows Temporary files and the Recycle bin. IE Privacy Keeper can perform the cleanup automatically, or manually from the Tools menu in Internet Explorer

 
2.16  File Checker 1.7

G.  Notifies and logs modifications to  files you have specified.  It runs in the background and can be minimized to the system tray.

Has configurable pop-up notification options  -  you can choose to have pop ups for all detected changes, just for checksums, just for file deletions, or any combination. 

2.17 Cookie Jar 1.0.1

H.  Some of the Cookies (small text files) are for sites you've logged into and visit regularly. These you'd want to Allow. Others are Tracking Cookies which hold information - such as last page visited - that you do not want kept. These would be Banned. Some you might keep as Undecided. Cookie Jar gives you simple control over this procedure. 

Jason's Toolbox  

A firewall like Zone Alarm has Privacy settings which allow you to decide what type of Cookies, Ads and code you want to run. Unfortunately, aggressive settings usually mean that websites will not wholly load or will be missing features. (eg. the blinking buttons on this site). A workaround  is to allow all Cookies and manually separate those you can trust from those you can't.  

  Spyware Info ForumsSpyBot S&D  siteSpyware ListSpyware - Classified listPest PatrolSpyware Guide - includes free on-line sanner 

                             Click the buttons for  Spyware Protection Forums and lists of known parasites. Mouse over for info. 

Table 2 Top                                           Don't  let them near you

Top of SectionTo the Buttons...Interactive Index

 

ContentsTo the Buttons...Interactive Index

Protection Against Spam

                  How Monty Python's Flying Circus  Started  It All Off        

                In case anyone is still wondering, 'Spam'  is the trademark of a pink canned meat product consisting of compressed chopped pork and cereal. Even in its original form it is a product of pigs.  Without the capital, spam is unsolicited email, usually of a commercial nature, sent indiscriminately to mailing lists, individuals, newsgroups or, indeed, anything or anyone capable of receiving it. It is the cyber equivalent of junk snail-mail. The term comes from  a comedy routine in the British TV series 'Monty Python's Flying Circus', in which the canned meat is freely handed round  and the word is repeated incessantly.  

            The computing world is divided into two kinds of people : us (the spammed) and them (the spammers). One of these groups is the salt of the earth, the other is scum in spades. The first things to realise is that spam is nothing personal. They really do not have any idea of the size of any of your body parts,  of problems with your sex-life, or of your financial status. It seems to me pointless to try to bounce  (return to sender) such mail, or indeed, to even bother reporting it. Spammers are usually too fly to get their own mailboxes full of junk and will use a variety of  largely untraceable source addresses.  Indeed, to bounce unsolicited mail may well defeat its own object. Consider this not uncommon scenario : you receive a number of junk  emails  from people you may or may not know, but who have been  victims of one of the Sobig virus variants. Since anywhere on their system that holds email addresses has  been plundered, then their contacts' details have, in effect, been stolen, and they only appear  to have sent you the  mail. If you bounce it, as well as offending friends,  you could well end up with a number of justified complaints, filling your mailbox with even more unwanted messages. Gradually, legislation is being widely introduced to make spam illegal, though detection of the culprits and enforcement of such laws are knotty problems.  

            As with other forms of commercial intrusion, there are precautions that can be taken to nip it in the bud, or, once it has flowered, to wither it on the stem. We can use a variety of freeware packages  (Table 3 : Spam Blockers) and we can get into habits which reduce the likelihood that the spammers' infernal engines will pick us up in the first place (Table 4 : Privacy Protection Procedures). However, always balance the time and effort required for blocking it against the time it takes simply to delete it as it arrives. You should also note that there are trial versions of many commercial packages, some of which might even be worth paying for...

            Table 3                              Spam Blockers

Program / Version

Function

 URL

Notes  

3.1  Bounce Spam Mail

Sends a fake bounce message back to the spam mailers, making their targeted mailing list manager think your address was invalid. The program works (sometimes) even when you can't get to the real sender of the message. 

Ignore the advert...just click

Should you want to try...

Although this program still works, it is no longer supported by the vendor. Take note...

3.2  Sam Spade 1.14

Many server-finding tools, such as nslookup, whois, and traceroute, were run from the command line. Sam Spade lets you use these tools from a user-friendly  interface. Information found with one tool can be queried using another. HTTP packets are sent  to your ISP's Web server every minute or so, to keep a dial-up link active. A web-browser is included.

Ignore the advert...just click

Its SMTP Verify tool helps you check on the validity of an email address, which is good for finding out if mail is being sent from that address or forwarded from another. An abuse.net query will identify the email addresses listed at a database maintained by abuse.net. 

3.3 Spam Buster 1.9.5

Spam Buster includes filters more than 15,000 known spammers. It runs from your system tray and queries your email server every few minutes to check new messages against a blacklist of known spammers and subject lines. If it finds a match, it deletes the email before the message ever gets to your in-box, though you can opt to preview intercepted files before deleting them. Configurable to filter up to 12 mailboxes. If a spammer gets through, you can report the event. 

Requires a POP3 email account, such as one provided by a local ISP. Does not support AOL, MSN, Juno, or Web-based mail accounts, such as Yahoo Mail or Hotmail.

The main screen carries banner ads. These  do not communicate with any outside agency or third-party ad server. If you want to get rid of them, you can register the program for a fee.

3.4 Junk URL 1.1.0.0

Microsoft Outlook  has a Rules Wizard that helps you filter junk and adult-content emails. You can add  me@dodgysite.com  to your spam list, but you could  then get a similar email from them@dodgysite.com. Junk URL helps you overcome this limitation by blocking all emails from a domain. Once set up, you can forget it.

Ignore the advert...just click

The downside : some Outlook 2002 users have reported problems. 

Outlook XP is not supported at all. Take note...

3.5 Spam Pal 1.5

 SpamPal sits between your email client and your mailbox, checking your mail as you retrieve it. Any  messages that SpamPal considers to be spam will be tagged. You configure your email client to filter anything with this tag  into a separate folder, so your spam won't be mixed up with the rest of your email. 

Uses  "DNSBL" information, which lists servers that facilitate spam. Any email from these systems have an increased probability of being spam but, of course, it may not be...

3.6 Spam Net 1.0 Beta 6f

Filters email for spam by adding three buttons to your Outlook client toolbar : Block, Unblock, and the Cloudmark button, the last of which lets you check for updates, since they are the suppliers. SpamNet also records details about your spam and sends the data to Cloudmark, who add the information to a database they use to further fight spam.

And now for something completely different : one that works with Outlook 2000 and XP - but only with them. Take note...

3.7 Mailwasher 4.1 d2

                   

MailWasher is a powerful email checker with effective spam elimination. An additional email client is a  safe way to stop unwanted viruses and emails before they get to your computer. 

See also : #1.5

 Contents Page                                                                                Spammers are meatheads

Top of SectionTo the Buttons...Interactive Index