Sunday, 1 January 2017

Some Useful Software Utilities and Websites We should Always Know

The netizens should always ensure the legitimacy of any programs/utilities/software(s)
before downloading them from the Internet – in particular, he/she should be vigilant while downloading any software(s) that is available “free of cost.” Netizens should always refer to software reviews available
on the blogs/websites before downloading any such software(s). Some review websites are as follows:

1. http://reviews.cnet.com/software/

2. http://www.top-software-reviews.com/

3. http://www.toptenreviews.com/

4. http://www.softsea.com/

5. http://www.softwaremango.com/

6. http://www.lifehacker.com/


I
Browsers
1
Fire Fox
http://www.mozilla.com/en-US/firefox/ie.html
2
Chrome
http://www.google.com/chrome
3
IE (Internet Explorer)
http://www.microsoft.com/windows/internet-explorer/default.aspx
4
Opera
http://www.opera.com/
5
Safari
http://www.apple.com/safari
6
Maxthon
http://www.maxthon.com
7
Flock
http://www.flock.com
8
Avant
http://www.avantbrowser.com
9
Deepnet
http://www.deepnetexplorer.com
10
Phaseout
http://www.phaseout.net
II
Search Engines
1
Google
www.google.com
2
Cuil
www.cuil.com
3
Yahoo
www.yahoo.com
4
Microsoft
www.bing.com
5
Alta vista
www.altavista.com
6
Ask Jeeves
www.ask.com
7
All the Web
www.alltheweb.com
8
Excite
www.excite.com
9
Lycos
www.lycos.com
10
Welluma
www.welluma.com
III
Search Engines Popular in India
1
Rediff
www.rediff.com
2
Guruji
www.guruji.com
3
Khoj
www.khoj.com
4
Search India
www.searchindia.com
5
Jadoo
www.jadoo.com
6
123India
www.123india.com
7
India Search Engine
www.indiansearchengine.com
IV
Antivirus Software(s)
1
Bit Defender
www.bitdefender.com
2
Kaspersky
www.kaspersky.com
3
Webroot
www.webroot.com
4
Eset
www.eset.com
5
F-secure
www.f-secure.com
6
AVG
www.avg.com
7
McAfee
www.mcafee.com
8
GData
www.gdata.de
9
Norton
www.symantec.com
10
Trendmicro
www.trendmicro.com

V

Antivirus Software(s) Popular in India

1
Quick Heal
www.quickheal.com

2
Net Protector
www.indiaantivirus.com

3
Avast
www.avastindia.com

4
eScan
www.msspl.co.in

VI

Anti-Spyware Software(s)

1
Spy Sweeper
http://www.webroot.com

2
Counterspy
http://www.sunbeltsoftware.com

3
STOPzilla
http://www.stopzilla.com

4
Malwarebytes Anti-
http://www.malwarebytes.org


Malware


5
Spyware Doctor
http://www.pctools.com/spyware-doctor

6
SUPER Anti-
http://www.superantispyware.com


Spyware



Professional


7
Ad-Aware Pro
http://www.lavasoft.com

8
AntiSpy
http://www.omniquad.com

9
Spyware BeGone
http://www.spywarebegone.com

10
CA Anti-Spyware
http://www.ca.com/us


VII

Antispam Software(s)

1
SpamEater Pro
http://spameater.com

2
CA Anti-Spam Plus
http://shop.ca.com/spam/spam_blocker.aspx


CA Website



Inspector


3
SPAM fighter
http://www.spamfighter.com

4
ChoiceMail One
http://www.digiportal.com

5
Spam Killer
http://www.spamkiller.com

6
Spam Buster
http://www.contactplus.com/Spam-Buster.html

7
SpamNet
http://www.cloudmark.com/en/home.html

8
Spam Agent
http://www.anti-spam-software.com

9
iHateSpam
http://www.sunbeltsoftware.com/home-home-office/ihatespam

10
MailWasher Pro
http://www.mailwasher.net

VIII


Anti-Trojans Software(s)


1

Anti-Trojan Shield
http://www.atshield.com



(ATS)







2

Anti-Trojan Elite
http://www.remove-trojan.com



(ATE)







3

Emsisoft Anti-
http://www.anti-trojan.net/en



Malware







4

Emsisoft Mamutu
http://www.emsisoft.com/en


IX

Personal Firewall

1
ZoneAlarm Pro
http://www.zonealarm.com

2
Outpost Firewall
http://www.agnitum.com


Pro


3
Norman Personal
http://www.norman.com


Firewall


4
eConceal Pro
http://www.mwti.net

5
Webroot Desktop
http://www.webroot.com


Firewall


6
Injoy Firewall
http://www.fx.dk

7
F-Secure Firewall
http://www.f-secure.com

8
Net Firewall
http://www.ntkernel.com

9
ESET Smart
http://www.eset.com/smartsecurity


Security 4




3




X

Intrusion Detection System (IDS)
1
Snort
http://www.snort.org
2
Untangle
http://www.untangle.com
3
Bro NIDS
http://www.bro-ids.org
4
Prelude Hybrid IDS
http://www.prelude-ids.com
5
OSSEC HIDS
http://www.ossec.net
6
Flowmatrix
http://www.akmalabs.com
7
Fragroute /


Fragrouter

8
BASE (Basic
http://sourceforge.net/projects/secureideas

Analysis and


Security Engine)

9
Sguil
http://sguil.sourceforge.net
10
Packet fence
http://www.packetfence.org
XI

Intrusion Prevention System (IPS)
1
Snort
http://www.snort.org
2
Untangle
http://www.untangle.com
3
Lokkit (GNOME)
http://www.redhat.com
4
Winpooch
http://winpooch.en.softonic.com
XII

Parental Time Control Software(s)
1
KidsWatch Time
http://www.kidswatch.com

Control

2
WatchDog
http://www.watchdogpc.com
3
iNet Protector
http://www.blumentals.net/inetprot
4
ENUFF PC
http://www.enuffpc.com
5
ComputerTime
http://www.softwaretime.com
6
iProtectYou
http://www.softforyou.com
7
EyeTimer
http://www.eyetimer.com
8
PC-Time Manager
http://www.virtualsoftwareltd.com/products/pctimemanager
9
Aye Parental
http://www.fileguru.com/Aye-Parental-Control/info

Control

10
Win Nanny
http://www.blue-lizard.net
XIII

Mobile Security Software(s)
1
Kaspersky Mobile
http://www.kaspersky.com/mobile_downloads

Security

2
SMobile Security
http://www.smobilesystems.com

Shield Parental


Control Edition

3
BullGuard Mobile
http://www.bullguard.com/why/bullguard-mobile-antivirus.aspx

Antivirus

4
Norton Smartphone
http://www.symantec.com/norton/smartphone-security

Security

5
F-Secure Mobile
http://www.symantec.com/norton/smartphone-security

Security

6
Trend Micro
http://us.trendmicro.com/us/products/mobile-security

Mobile Security

7
Airscanner Mobile
http://www.airscanner.com/products/av

Security Combo

8
McAfee VirusScan
http://us.mcafee.com/root/product.asp?productid=mobile_info

Mobile

9
SimWorks Anti-
http://www.simworks.biz/sav/AntiVirus.php?id=home

Virus

10
avast! PDA
http://www.avast.com/pda-edition


Resourceful Websites, Magazines and Books

At the end of each chapter, there are URLs in “References” and “Further Reading.” In addition to those URLs, this section presents a consolidated list of resourceful websites, magazines and books, which provides “wealth of knowledge” about cybersecurity, IT security and Information Risk Management to the readers. This part has been developed in consideration with the discussions on the numerous topics covered in Chapters 6–10 in the book. As you read, you will find that a list of such websites, magazines and books are mentioned in the following tables:

1.       Table B.2 is about encyclopedias/wikis.

2.       Table B.3 is about useful websites.

3.       Table B.4 is about a list of well-known information security magazines.

4.       Table B.5 is about a list of well-known computer magazines.

5.       Table B.6 is about known Indian hackers.


6.       Table B.7 is about well-known books on the topic of hacking.
Table B.2 Encyclopedias/wikis

Sr. No.
URL
About the Website


1
http://en.wikipedia.org/wiki/Main_
Wikipedia is a multilingual, web-based, free-content

Page
encyclopedia, founded as an offshoot of Nupedia, a


now-abandoned project.


2
http://www.webopedia.com
Webopedia  is  a  free  online  dictionary  for  words,


phrases and abbreviations that are related to computer


and  Internet  technology.  Webopedia  is  a  part  of


“internet.com”  network  of  websites  owned  and


managed by “WebMediaBrands Inc.”
3
http://www.softpedia.com
Softpedia  is  the  encyclopedia  of  free  software


downloads.



4
http://www.theriskipedia.com
Riskipedia is not only a website, but also a platform


where anyone in the world can access information on


risk and risk management.


5
http://www.forensicswiki.org/wiki/
Forensics Wiki is devoted to information about digital

Main_Page
forensics. (Refer to Chapters 7 and 8.)



6
http://cybercrime.wikia.com
The wiki is about cybercrime that anyone can edit.
7
http://www.computerlanguage.com
Computer   Desktop   Encyclopedia   (CDE)   offers


straightforward definitions of all major hardware and


software technologies.





8
http://www.wikihow.com
WikiHow is a collaborative writing project aimed at


building (world’s) largest and highest-quality “how-


to” manual.



Table B.3 Useful websites










Sr. No.
URL
About the Website


1
http://www.howstuffworks.com
HowStuffWorks  is  a  wholly  owned  subsidiary  of


“Discovery   Communications”   –   award-winning


source
of
credible
and
easy-to-understand


explanations of how the world actually works.
2
http://www.ehow.com
“eHow.com”
is  an  online
community dedicated  to

5




provide  ability  to  research,   share  and   discuss


instructional solutions.



3
http://whatis.techtarget.com
“WhatIs.com” is a knowledge exploration and self-


education   tool   about   Information   Technology;


especially  about  the  Internet  and  computers.  It


contains   about   4,500   individual   encyclopedic


definitions/topics,  a  number  of  “Fast  Reference”


pages and learning tools.  The topics contain  about


12,000
hyperlinked
cross-references
between


definition in topics and to other websites for further


information.




4
http://it.toolbox.com
“Toolbox.com” is the network of online communities


that   enables   anyone   to   access   the   collective


knowledge of a worldwide audience of experienced


professionals.
Through  “Toolbox.com,”  executives


and  professionals  can  help  aspirants  to  resolve


problems more efficiently, make better decisions by


leveraging best practices and lessons learned as well


as increase their efficiency at the workplace.

5
http://www.bitpipe.com
“Bitpipe.com”  is  the  IT  professional’s  guide  to


Information
Technology
resources.
Anyone   can


browse this online library for the latest technical white


papers, webcasts and product information to enable


anyone  to  make  intelligent  IT  product  purchasing


decisions.





6
http://www.knowledgestorm.com
KnowledgeStorm  is  one  of  the  top-ranked  search


resource on the Internet for technology solutions and


information.
It   provides   most   opportunities   to


technology   vendors   to   reach   business   and   to


technology professionals conducting research on the


Internet.





7
http://cybercrime.planetindia.net
It is a largest database of cyberlaw, cyber news and


cases  related  with  cybercrime  in  India.  (Refer  to


Chapter 6.)




8
http://www.naavi.org
“Naavi” is an eBusiness consultant who operates out


of Chennai  and  Bangalore  in  India.  Though  not  a


lawyer, he is an acknowledged expert in the field of


cyberlaws. (Refer to Chapter 6.)


9
http://www.cyberlaw.com
“CyberLaw.com” is the space on the Internet at the


intersection  of technology,  risk  and law.  (Refer  to


Chapter 6.)




10
http://www.cyberlawindia.com
“Cyberlaw  India”  is  a   voluntary  platform   for


discussion,   debate   and   analysis   of   prevailing


cyberlaws in India. It is also the platform where the


necessities  of  having  new  kinds  of  cyberlaws  and


cyberlegal  provisions  in  the  Indian  context  are


discussed. (Refer to Chapter 6.)


11
http://www.gahtan.com/cyberlaw
Cyberlaw Encyclopedia. (Refer to Chapter 6.)

12
http://www.cyberlaws.net
“Cyberlaws.Net” is a consultancy that addresses all


the  cyberlaw  needs  and  problems.  It  is  aimed  to


provide a precise analysis of existing and developing


trends in cyberlaw. (Refer to Chapter 6.)


13
http://www.indlawnews.com
“Indlaw” is a part of the “Indianlawonline” project


that was launched in April 1997 as a collaborative


exercise
between  professionals  and
academicians


6









based in UK and in India to build an electronic legal


library to enable solicitors,  advocates,  students and


clients  to  have  access  to  information  on  various


primary and secondary legal documents such as the


constitutional texts, parliamentary debates, case law,


Parliamentary  and  State  enactments  and  delegated


legislation in both countries (India and UK). (Refer to


Chapter 6.)

14
http://www.cybercrime.gov
This website is hosted by CCIPS (Computer Crime


and   Intellectual
Property   Section).   CCIPS   is


responsible   for   implementing   the   Department’s


national strategies for the US in combating computer


and  intellectual  property  crimes  worldwide.  The


Computer   Crime  Initiative  is  a   comprehensive


program designed to combat electronic penetrations,


data  thefts and cyberattacks on  critical  information


systems. CCIPS prevents, investigates and prosecutes


computer crimes by working with other government


agencies, the private sector, academic institutions and


foreign counterparts. (Refer to Chapter 9.)
15
http://www.cert.org
Computer   Emergency   Response   Team   (CERT)


program is a part of “Software Engineering Institute”


(SEI), a federally funded research and development


center at Carnegie Mellon University in Pittsburgh,


Pennsylvania.



CERT is not an acronym; it is a name and a registered


service  mark.  “CERT’’  and  “CERT  Coordination


Center’’  are  registered  with  the  US  Patent  and


Trademark  office  as  service  marks  of  Carnegie


Mellon University. (Refer to Appendix D – Part II:


Incidence  Handling  Checklists  and  Templates  for


Organizations   and
Part   III:   Computer   Incident


Reporting Formats and Templates.)
16
http://www.nist.gov
National  Institute  of  Standards  and  Technology


(NIST)  promotes  US  innovation   and  industrial


competitiveness by advancing measurement science,


standards  and  technology  in  ways  that  enhance


economic security and improve our quality of life.
17
http://csrc.nist.gov
“CSRC” (Computer Security Resource Center) has a


CSD (Computer Security Division) mission to provide


standards  and  technology  to  protect  information


systems  against  threats  to  the  confidentiality  of


information, integrity of information and processes,


and availability of information and services to build


trust and confidence in IT (Information Technology)


systems.

18
http://www.nsa.gov
“NSA/CSS”   (National   Security   Agency/Central


Security  Service)  is  associated  with  US  defense,


which   provides   products   and   services   to   the


Department of Defense, the Intelligence Community,


government agencies and industry partners.
19
http://www.securityfocus.com
“SecurityFocus”  is  the  trusted  source  of  security


information  on  the  Internet.  It  is  a  vendor-neutral


website   that   provides   comprehensive   security


information to the entire community.


7


20
http://www.cylab.cmu.edu
“CyLab”  is  one  of  the  largest  university-based


cybersecurity education and research centers in  the


US. It is multidisciplinary, university-wide, research


center and has involved six colleges from Carnegie


Mellon University.
21
http://www.cybersecurityinstitute.b
“CyberSecurity  Institute”  is  a  full-service  digital

iz
forensics organization.
22
http://www.esecurityplanet.com
“esecurityplanet”  is  hosted  by  “The  Internet.com”.


The internet.com network is a comprehensive source


for the latest global news and information about IT


(Information Technology) and the Internet. It allows


users  to  evaluate,  compare  and  purchase  IT  and


Internet-related products and services.
23
http://www.cybersafe.my/home.ht
“CyberSAFE”   (Cyber   Security   Awareness   For

ml
Everyone)  is  Malaysia’s  initiative  to  educate  and


enhance the awareness of the general public on the


technological and social issues facing Internet users,


particularly on the dangers of getting online.
24
http://www.data64.cc
This is a  search  engine,  which  explores through  a


compiled  database  of  websites  and  provides  most


relevant information to the users in the fields of:


1.
Cybercrime.


2.
Cybercrime investigation.


3.
Cyberforensics.


4.
Computer security.


(Refer to Chapters 7 and 8.)
25
http://www.bugs.ms
This is a  search  engine,  which  explores through  a


compiled  database  of  websites  and  provides  most


relevant information to the users about bugs, hacks,


exploits and security for Microsoft Products.
26
http://www.wisegeek.com
“wisegeek”  is  a  team  of  researchers,  writers  and


editors dedicated to providing short, clear and concise


answers  to  common  questions.  In  the  “wiseGEEK


features’’ menu available on every article page, there


is  an  option  to  “comment  on  this  article.”  Every


comment  is  researched  and  implemented  where


appropriate.
27
http://www.crime-research.org/
“crime-research” – Computer Crime Research Center


(CCRC)  is  a  non-profit,  non-governmental  and


scientific research organization. CCRC was created in


2001  to  conduct  research  in  legal  criminal  and


criminological  problems  of  cybercrime  with  the


purpose   to   render   scientific   and   methodical


consulting.
28
http://www.ibls.com/
“IBLS”  is  one  of  the  leaders  on  global  laws  and


regulations that affect online experience. It empowers


business and legal professionals to design successful


Internet  strategies  by  bringing  them  the  global


knowledge of Internet business rules and regulations


written by legal experts around the world. (Refer to


Chapter 6.)
29
http://www.hacking-news.com/
“hacking-news” provides  daily news and editorials on


security-related topics, along with a  comprehensive


database  of  security knowledge.  (Refer  to  Chapter


10.)


8

30
http://www.sciencedaily.com/news
“ScienceDaily” is one of the Internet’s most popular


/computers_math/hacking/
and
award-winning
science
news
website.



ScienceDaily  generates  nearly  approximately  15



million   page   views   a   month   and   receive



approximately more than 3 million hits each month.



(Refer to Chapter 10.)




31
http://www.computerworld.com/
“Computerworld” has been one of the leading source



of technology news and information for IT influencers



worldwide. It is an award-winning website, focused



on conference series and custom research from the



hub of the world’s largest global IT media network.

32
http://www.ccmostwanted.com/
“ccmostwanted” (Cyber Criminals Most Wanted) is a



website   dedicated   to   cybercrime   awareness   –



Prevention  and  safety.  (Refer  to  Appendix  D  –



Protection Checklist for Individuals.)


33
http://www.ciol.com/about
“CIOL”
(CYBERMEDIA
INDIA
ONLINE



LIMITED) is the website that focuses on Information



Technology  with  a  vision  to  provide  quality  and



relevant  IT  information  to  the  growing  Internet



community.  The enduring vision  of leading the IT



revolution  can  be  seen  and  felt  through  the  vast



sections of the CIOL network.



34
http://www.itsecurity.com/
“IT   Security”   is   a   news   and   information






publication covering all aspects of the IT Security



and has been re-launched as the premier source



worldwide  for  IT  Security  information  after



acquired by “Tippit Inc.” recently.


35
http://www.securitypronews.com/
“SecurityProNews” is most popular newsletter and an



article portal for technology professionals.


Table B.4 List of well-known information security magazines












Sr. No.
URL


About the Website



1
http://www.scmagazineus.com


SC  Magazine  is  aimed  at  providing  IT





security  professionals  with  in-depth  and





unbiased information.



2
http://www.csoonline.com


CSO provides news, analysis and research





on  a  broad  range  of  security  and  risk





management topics. Areas of focus include





information
security,
physical
security,





business  continuity,  identity  and  access





management, loss prevention and more.

3
http://www.infosecurity-magazine.com

It is a magazine examining security threats,





solutions  and  developments  for  security





professionals.



4
http://www.infosecuritymagz.com


InfoSecurity is a comprehensive magazine





on IT security. Its mission is to bring the





various  aspects  of IT  security under  one





source, covering the various applications of





security technology used by an individual





at enterprise level.



5
http://hakin9.org


hakin9  is  a  bi-monthly  magazine  about





hacking   and   IT   security,   covering





techniques
of   breaking   into
computer

9







systems,  defense and protection  methods.





(Refer to Chapter 10.)
Table B.5 List of well-known computer magazines






Sr. No.
URL



Magazine (Frequency)
1
http://www.chip.in



Chip
2
http://www.computerjagat.org

Computer Jagat
3
http://www.thinkdigit.com

Digit
4
http://pcquest.ciol.com

PCQuest
5
http://www.pcworld.in

PC World
6
http://www.vintage-



Byte

computer.com/byte.shtml


7
http://www.macworld.com/

MacWorld
8
http://www.cgonline.com/

Computer Games
9
http://pcplus.techradar.com/

PC Plus
10
http://www.linuxforu.com/

Linux For You
Table B.6 Known Indian hackers










Sr. No.
Hacker
URL


1
Ankit Fadia
http://www.ankitfadia.in/
2
Rahul Dutt
http://rahulhackingarticles.wetpaint.com/page/Rahul+Dutt+Avasthy

Awasthy




3
Rafay Baloch
http://rafayhackingarticles.blogspot.com/
4
Rahul Tyagi
http://www.ethicalhacking.do.am/
5
Ashik Ratnani
http://hungryhackers.blogspot.com/
Table B.7 Well-known books on the topic of hacking




Sr. No.
Author

Book(s)
1
Kevin Mitnick


The Art of Intrusion.




The Art of Deception.
2
Ankit Fadia


The Unofficial Guide to Ethical Hacking.




Network Security: A Hacker's Perspective.




Ethical Hacking Guide to Corporate Security.




Hacking Mobile Phones.




E-Mail Hacking.




Windows Hacking.




Google Hacking.




Intrusion Alert.




Encryption.




Software Hacking.




Cracking Admissions in Colleges Abroad.




Tips and Tricks on Linux.
3
Rafay Baloch


A Beginners Guide To Ethical Hacking.




How To Spy and Hack a Webcam.
4
Rahul Tyagi


Hacking Crux.

No comments: