Tag Archive for Security

10 Free Software Services to Store and Manage your Passwords

Today you need to remember so many passwords that your memory would get filled trying to remember a password for the Windows network logon, password for e-mail account, your website’s FTP password, online passwords (like website member account) and so on. The list goes endless. Also, you should use different passwords for each account because of obvious reasons- one password everywhere will give easy access to hackers to all your account effortlessly. To make your life easy, here are 10 free software services via which you can manage your passwords with easy. You may have to remember just one master password to your password manager and leave the rest to the software to manage.

image

1. Clipperz

clip_image002

Clipperz is a secure and simple password manager that provides an effective single sign-on solution. It’s a digital vault for your password data that you can use to store secret instead of storing them on the PC or paper.

Clipperz provides security by encrypting locally by the browser before uploading to Clipperz. Its free and completely anonymous. Create your account with a free signup here.

2. LastPass

clip_image004

LastPass is a password manager that makes web browsing easier and more secure. With LastPass, all you need to do is just remember one master password. Then on, you can easily logon to websites seamlessly with single click on the mouse button. It provides synchronization of password across browsers and accessible across all devices.

There are loads of features in the free edition here.

3. KeePass

clip_image005

KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). For more information, check here.

4. RoboForm

clip_image006

RoboForm is a proprietary software password management program that syncs passwords between multiple computers. It offers a web form filler that automates password entering and form filling on Internet Explorer, Firefox, Chrome, and Safari, as well offering manager apps on mobile platforms like iOS, Android, Blackberry, Palm, and Symbian. The free version of Roboform limits you to saving 10 passwords. The pro version allows for unlimited passwords. You can try the free version here.

5. KeePassX

clip_image008

KeePassX is an application for people with extremely high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License.

KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database. You can download the software here.

6. Universal Password Manager

clip_image010

Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and security (uses 128bit AES encryption). UPM is available on Android, Windows, OS X & Linux.

You can download the software here.

7. Yadabyte Password

clip_image012

Yadabyte Passwords is very secure AES 256 encryption that works from any USB Key, floppy, hard drive with a simple minimal interface with “Nokia” browsing. Unencrypted data is never stored anywhere. For more information, check here.

8. OpenSimSim

With OpenSimSim, all you need to do is to just remember only one master password. OpenSimSim will generate strong passwords for each one of your accounts. No more using the same password everywhere or using bulky password managers. Your passwords are just a few quick key-strokes away. For more information, click here.

9. Mitto

clip_image014

Mitto is a safe and secure online password manager. The free service lets you add the passwords to all of your favorite sites in one place, then logs you in to each one of them by simply clicking a button. No need to remember or retype your passwords anymore! You can access your passwords securely from any computer, organize them with tags, securely share them with trusted friends, and more… It’s easy, secure, and it’s just what you need. Sign up for free here.

10. Password Safe

clip_image015

Password Safe is a password database utility. Password Safe protects passwords with the Twofish encryption algorithm, a fast, free alternative to DES. The programs security has been thoroughly verified by Counterpane Labs under the supervision of Bruce Schneier, author of Applied Cryptography and creator of the Twofish algorithm. For more information, check here.

How to manually remove Spywares?

We reviewed some of the best free Anti-Spyware software programs that are there for your rescue and how to protect yourself from fake/rouge Anti-Spyware programs earlier. In this article we will cover some of the best freeware tools that will help you manually clean the infected spyware. If you are not fully protected or you try to install anti-spyware software post a spyware infection, sometimes there are chances that the spyware would have already done the damage and done the sufficient ground work so that the Anti-Spyware may fail to remove them. Usually, what these spywares do is that they keep multiple secret copies of them and once you scan your PC with the downloaded Anti-Spyware program, chances are there that they will resurrect from the secret copies again and again! So, you must be aware of manual cleaning of spywares too. Here is a beginners guide to do that. Please be aware that all these steps can cause serious issues, if not done properly.

computer-repair

Image Source: http://www.elithecomputerguy.com/services.html

We mainly need to have access to Registry Editor and Windows Task Manager to start with. There are chances that these spywares would have disabled them too. They can be easily enabled.

  • Cannot Access Regedit, How to Fix It? Read here.
  • Task Manager Has Been Disabled, How to Fix It? Read here.

Unfortunately, you will need to carefully examine the running process list. This is a tedious but essential step. You may see a lot of processes that may be unfamiliar but that’s fine. You can Google such process name and get more information whether it is harmful or not. We must admit that Windows Task Manager is not that good in listing all the running processes. So, we recommend using Process Explorer from Microsoft (again).

Step 1: Download “Process Explorer” from Microsoft.

Step 2: Unzip the archive and run ProcExp.exe and you will see something like below; color coded process list.

ProcessExplorer

Step 3: Windows processes will be colored Pink, Applications will be in Grey blue etc.

Step 4: Add a column “Command Line” by right clicking on the bar with column names. This will bring in a new column that provides the full path of the processes running. Now, it is easier to examine the running processes. Usually, suspicious processes will be running with a weird looking file names and thing like that. Study them and see if they are problem creators. Uniblue’s process library has some good list of documented processes that could help you. Sometimes, legitimate processes will be tagged as Spyware, so please verify properly.

Step 5: Once you identify such suspicious processes, you would want to delete them. Head over to HijackThis and download it. It is a very neat tool that can assist you in deleting or removing spywares but it is not for average users. It will list the processes running and let you delete them easily by deleting all corresponding entries in registry, executables etc. But, one should be very careful while doing so as it could affect critical windows services. Thankfully there are many forums where you could post the HijackThis report and helpful volunteers will analyse the report for you and suggest what to do. Here is some of them.

Whatthetech, Geeks on the Go. Also check post of HijackThis – How to analyze logs here.

Step 6: Rootkits are hard to find spywares. They may not be visible in HijackThis log too. There is a tool called IceSword which is capable of removing many rootkit threats. However, be aware that any wrong move with this may cause you lot of pain.

References and further reading:

Related Posts with Thumbnails