Archive for the ‘Computer Security’ Category

Proven Security and Free Tools You Need Now


An article by PC World caught my eye, “Tools for the Paranoid” .  So I went and downloaded the Security Tools for passwords and encrypting data.

KeePass is Free and comes highly recommended by PC World.  A brief description: “You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily. The program supports password groups, in which you can sort your passwords into. You can drag-n-drop passwords into almost any other window. The auto-type feature types your login information into other windows automatically (just press a hot key). Fast copying passwords or user names to the Windows clipboard is possible by just double-clicking on the specific field in the password list.

The last part of the description is important, because you may have a malware key logger on your computer and not even know it.

TrueCrypt is another security tool highly recommended with 5 star ratings. Please read PC World’s full TrueCrypt Review here.

Free TODAY Kindle eBook 50 Ways to Protect Your Identity in a Digital Age: 2nd edition $25.99 value!



Free Today Only! Head over to Amazon and get this free ebook today only! Make double sure that the price is $0 before you buy it!

50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them (2nd Edition)



Free Anti Malware Tool



If your computer is running slow you may have downloaded Malware somewhere along the lines. For Windows 7, Microsoft Windows Vista, and Microsoft Windows XP you can download for FREE, Malwarebytes Anti-Malware Free. <click here<

I scanned my computer, and from normal every day web browsing, there were TONS of Malware loaded on it. This program removed them! The PC is now running smoothly.


From PC World “Whether you know it or not your computer is always at risk of becoming infected with viruses, worms, trojans, rootkits, dialers, spyware, and malware that are constantly evolving and becoming harder to detect and remove. Only the most sophisticated anti-malware techniques can detect and remove these malicious programs from your computer. Malwarebytes’ Anti-Malware is considered to be the next step in the detection and removal of malware.”


Any links within our posts that are blue are clickable hot links that take you to the referenced material. When you go to download the Anti Malware, don’t click on the “sponsored link” that is just an ad. Click below it, where it says “TRY IT FREE” right below their sponsored ad.

Wipe Sensitive Data from your Hard Drive


There are many reasons why you would want to download and use Eraser!

To remove sensitive data you wouldn’t want seen, or if you’re selling your computer, or recycling. Before you get rid of your data drives, you should for FREE, download from CNET Download Eraser. This program allows you to overwrite any files and they can not be recovered!

CNET’s Description:
“Eraser is an advanced security tool for Windows that allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. The patterns used for overwriting are based on Peter Guttmann’s paper Secure Deletion of Data from Magnetic and Solid-State Memory and are selected to effectively remove magnetic remnants from the hard drive.
Other methods include the one defined in the National Industrial Security Program Operating Manual of the U.S. Department of Defense, and overwriting with pseudorandom data. You can also define your own overwriting methods.”



EZShield Identity Protection or Correction!


312155_Carousel Checks 88x31

Protect yourself against Identity Theft! You can and should do so for a minimal cost. Even if your checks are stolen, paying $2 per box of checks will help you get your credit report and all records cleared in the case of fraud. Sure, the bank does insure your funds will be returned, but try getting your credit report corrected without a service such as EZShield Identity Protection; it won’t be easy. They also offer to advance funds to you within 72 hours  up to $25,000 in the case of Stolen Funds while the bank investigates.


EZShield guarantees to cover you in the case of Check Fraud, Forged Signatures, and Altered Checks!

They offer monthly services as well.

Some facts from EZShield:


  • Check fraud is one of the most damaging forms of identity theft
  • In addition to wiping out your account, it can tarnish your credit report
  • Identity theft has topped the list of Federal Trade Commission complaints
  • The average loss per fraud incident is $2,412

Make sure your checks bear the EzShield Logo! Offered to personal as well as business checks!

Click Here to See More Info at Carousel Checks on EzShield Check Fraud Identity Protection and order checks with the EZShield Logo to prevent headaches in case of Fraud!



Facebook Google Password Security



This info graphic demonstrates the importance of Password Safety. Are you safe online?

Think of a good password, something that is not related to your Private Information such as your Birthday or Anniversary, Address etc. That information is readily available online; unless you’ve taken the precaution of hiding that information from Facebook and Google, of course.
Once you have a good password, don’t use all lower case letters! Use a capital letter somewhere in it and use some numbers in the mix. Some websites even require that you use a special character such as ! @ # $ % ^ & * ( ).

Online Safety with Passwords

Free Child Safety Kit

Free Child Safety Kit


Go get a Free Child Safety Kit, even if you have one already you should update it with your child’s growth development!

Also, we wanted to let you know we have in our SavIsa Solutions, LLC Security, Spy Gear and Self Defense Products store under the Family Safety & Security Category, a new product Intellispy Ultimate Child Internet Safety Kit

Knowing what your children are doing, and who they are talking to on the internet=PRICELESS!

While on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they hit the road exploring the information highway. Advances in computer and communication technology allow your children to connect with complete strangers in a countless number of ways. The IntelliSpy COMPUTER ACTIVITY TRACKING SOFTWARE gives you the ability to track what your child does everytime they get on the computer. You have a right to know and to protect your child.

Works with Windows 2000, XP, Vista, and 7

Key Logging: see everything typed onto the keyboard…this includes emails, instant messages, social networking activity
Screenshots: see snapshots of the screen taken at 1 minute intervals
Block web sites: limit access to web sites that you feel are inappropriate for your child
Completely Stealth: and if someone unknowingly closes the program or shuts down the computer, the program will restart.



Remotely view your properties with IP Cameras


Wireless Camera

Security is available to us in our high tech devices. The IP Cameras are great for security and being able to view your personal and commercial properties.

Today’s smart phone, tablets and computers provide the ability to log on remotely and view your properties from any location.

Wireless IP cameras are generally used for surveillance purposes. They can be set up in or around your home or place of business to provide security from burglary or theft.

An IP camera or IP Network Video Camera is a specialized camera that has a built in web server and computing functions to handle network communication and that can be controlled, monitored and viewed from virtually any location generally via High-Speed internet access using network built high bandwidth enabling standard equipments such as ISDN Modems, DSL Modems, Cable TV Modems, T1 Connections, Gigabit Ethernet Connections etc.

In order to install an IP camera, the main components that are required are as follows:


  •     A Broadband or High-Speed Internet Connection for fast downloads as well as video streaming
  •     A Wired or Wireless Router, depending on the technology and configuration of the camera
  •     A personal computer as a server so as to configure the IP camera
  •     A personal computer or smart phone as a tool that can be a remote viewing station
  •     A Static IP Address or a Dynamic Domain Name Server (DNS) Provider


Some of the brands that manufacturing the IP cameras are D-Link , Vivotek  Sony,   Panasonic, Axis Communications, JVC Americas Corp., AVIOSYS , LinkSys (a division of Cisco) , and  Foscam

Browse the latest IP Camera Technology by clicking this link:  ip cameras
Click here for a Good Android App


Urgent Patch for Microsoft Windows

Published by Crystal on June 5th, 2012 - in Computer Security, Home Safety



Microsoft has informed us via its Security Tech Center that there is an Urgent Update to protect your system.

From that link is the information below:


Microsoft Security Advisory (2718704)

Unauthorized Digital Certificates Could Allow Spoofing



Version: 1.0


General Information

Executive Summary


Microsoft is aware of active attacks using unauthorized digital certificates derived from a Microsoft Certificate Authority. An unauthorized certificate could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue affects all supported releases of Microsoft Windows.

Microsoft is providing an update for all supported releases of Microsoft Windows. The update revokes the trust of the following intermediate CA certificates:

  • Microsoft Enforced Licensing Intermediate PCA (2 certificates)
  • Microsoft Enforced Licensing Registration Authority CA (SHA1)

Recommendation. For supported releases of Microsoft Windows, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service. For more information, see the Suggested Actions section of this advisory. For affected devices, no update is available at this time.”


What you need to do: Go to the Microsoft Support Center , find your system and click to download the patch. You will need to find out which Operating system you are running. To do this, right click on “my computer”, then click on “Properties”. There you should see the OS and any service packs you currently have installed. Find the same name operating system update and click on that link in the support center. You will then need to verify that your copy of Windows is Genuine. Just download, install and run the file. It will then give you a code you copy and paste into the link above. Proceed to download the patch. Run and install. You will need to then update your Windows system AFTER you do the install the patch.

Use your Start menu to check for updates

Windows Update is included in Control Panel. In the future, to check for updates (or if this webpage doesn’t open Windows Update automatically):

  Click the Start button, click All Programs, and then click Windows Update.


Computer Monitoring Software



Guardanis The Guardian Eye Software, creates and provides a wide array of both personal and employee monitoring softwares. With this software, you can increase your business’ productivity, protect your children from online threats, uncover cheating spouses, and So Much More!

Protect Your Family From Online Threats

Monitor All Of Your Employees

Uncover Deceitful Cheaters

Know What’s Really Going On

Computer monitoring software

spy on your computer

© SavIsa Solutions, LLC. 2013