This Windows-only app uses the incredibly popular ClamAV engine to detect viruses and spyware. It includes a scanning scheduler, automatic downloads, and a Microsoft Outlook plug-in. However, it does not provide real-time scanning; you'll need to scan your files manually in order to be protected. Operating System: Windows.
Numerous commercial and open-source products are based on the Clam Antivirus engine. Designed for protecting e-mail gateways, Clam AV offers automatic updates, a command line scanner, and more. Operating System: Unix, Linux, BSD.
Moon Secure is currently based on ClamAV, but the developers are working on an antivirus engine of their own that will enable real-time scanning. Operating System: Windows.
As you might expect from its name, Rootkit Hunter searches your system for rootkits and other unwanted tools. It does not provide live or scheduled scanning, but the Web site contains instructions for setting up your system to run Rootkit Hunter daily. Operating System: Linux, Unix.
Short for "A Mail Virus Scanner," AMaVis acts as a go between for your anti-virus software and your mail transport agent so that incoming e-mails can be scanned for viruses. The site contains the complete--and very extensive--list of supported applications. Operating System: OS Independent.
6. ClamMail ClamMail combines a POP3 e-mail proxy with the ClamAV engine. The result is free antivirus protection for messages accessed via Outlook, Thunderbird, Eudora, or other POP3 apps. Operating System: Windows.
This e-mail proxy server scans both incoming and outgoing messages for viruses, worms, trojans, spam, and other malware. Like most open-source anti-virus tools, it's based in part on the ClamAV engine. Operating System: Linux.
Still getting the occasional network virus even after you install anti-virus software? Viralator supplements the existing anti-virus software on your proxy server to block malware that might otherwise slip in when users access free webmail accounts. Operating System: Linux, Unix.
This tiny program (less than 60KB), improves security, improves performance, and closes some of the flaws which opens up Windows to spyware. It disables the Windows "calling home" features, disarms Internet Explorer, disables Windows Media Player, and more. Operating System: Windows.
Nixory is designed to protect Firefox users from unwanted cookies and spyware. And unlike most similar programs, you won't need to delete your previously installed anti-spyware or anti-malware programs in order to use it. Operating System: OS Independent.
Communication and File Sharing
Using routing mechanisms inspired by ants (yes, the insects), Mute provides completely anonymous file transfer and file sharing that is virtually impossible to trace. In addition, messages passed on the network are protected by military grade encryption. Operating System: OS Independent.
Waste allows small groups of users to chat and download files securely and anonymously. Transmissions are encrypted using RSA and Blowfish algorithms. Operating System: Windows, Linux, BSD, OS X.
13. ANts P2P
This third generation peer-to-peer network hides your identity and encrypts all transmissions for completely secure communication. And as you might expect, it's also inspired by the behavior of ants. Operating System: OS Independent.
Want to make sure that file you deleted can never be retrieved? Eraser writes over your files with random data so that no one can snoop into your private files. Operating System: Windows and DOS.
Also known as "DBAN," Darik's Boot and Nuke completely eliminates all of the data on a hard drive. It's an ideal way to clean up an old computer before you donate or recycle it. Operating System: OS Independent.
Wipe erases all traces of deleted files from your hard drive so that they can't be retrieved. It relies heavily on the work of Peter Gutmann, one of the foremost experts in the field. Operating System: Linux.
One of the ways around the issues of security and control that make some businesses wary of cloud computing is to build a private cloud -- one that remains within the corporate firewall and is wholly controlled internally. Private clouds also increase the agility of IT an organization's IT infrastructure and make it easier to roll out new technology projects. Download this eBook to get the facts behind the private cloud and learn how your organization can get started.