Today's Best Tech Deals
Picked by PCWorld's Editors
Top Deals On Great Products
Picked by Techconnect's Editors
Cleaning Your Traces
As you surf, your web browser leaves traces of your travels on your PC. Web sites can look into some of those traces. And if other people use your PC, they can easily look at those traces as well. Luckily, there are tools that can get rid of the tracks you leave behind.
Another privacy problem relates to Microsoft Office documents containing private information (unbeknownst to the sender) that get sent out via e-mail. A download helps here, too,
Free Internet Window Washer
Worried that Web sites may snoop on your Internet activities, or that someone else who uses your PC can see where you've been and what you've done? If so, you need an Internet washer--a tool that will delete your Internet Explorer browsing history, recently typed URLs, browsing history, and so on.
That's what Free Internet Window Washer does--for free. Click Wash Settings, then click Browsers, and then select what you want the program to clean. Back on the main screen, click Wash Now and the program will remove everything you've asked it to. If you prefer, click Test Now to see a preview of what the program will do.
Besides cleaning Internet Explorer, Free Internet Window Washer also cleans traces from instant messengers, including AIM, ICQ, MSN Messenger, Skype, and Yahoo Messenger. It also cleans traces from a wide array of other programs, including Microsoft Office and Adobe Acrobat.
Free Internet Window Washer | Price: Free
Here's another great tool--and a longtime favorite of ours--for cleaning up all traces of your Internet activities. CCleaner cleans Internet Explorer and Firefox, of course, but also Adobe Acrobat, Adobe Flash Player, Google Toolbar, and Windows Media Player. It even picks up after major applications such as
Download CCleaner | Price: Free
A lesser-known privacy problem may be among the most dangerous: hidden information in Microsoft Office documents that becomes exposed after the documents are made public.
This problem has struck some of the best-know enterprises in the world. In 2006, for example, Google publicly posted a PowerPoint presentation that contained notes disclosing highly sensitive financial projections to the world. Even worse, in 2003, Alistair Campbell, top communications aide to then-Prime Minister Tony Blair of the UK,
Google and Blair found out the hard way that Office documents contain lots of private information that the sender might prefer that the world not see, such as hidden text, names of author documents, revision history, markup, hidden cells, and hidden spreadsheets. When such information hitchhikes along with the visible text of a document, people can find it without much effort.
What to do? Get SendShield, an excellent, well-designed freebie. Whenever you send a Microsoft Office document via Outlook, SendShield looks inside the document for private information--and shows you what it finds. You can then delete all of the information if you wish. The deletion affects only
Download SendShied | Price: Free
Rootkit and Malware Killers
Even the best antivirus and antispyware tools can't keep you completely safe. Rootkits often escape detection, and once they lodge on your PC, they give an outsider the power to take control of your system and help themselves to whatever private information they want. These two rootkit and malware killers, though, tip the odds in your favor.
F-Secure Blacklight Rootkit Eliminator
One dangerous type of malware that might infect your system
Some antivirus tools, such as Avast, claim to detect and kill rootkits. Many do not. But even if you use an antivirus tool that claims to detect them, you'd do well to download, install, and use F-Secure's Blacklight Rootkit Eliminator, too.
The program inspects your PC's folders, files, and hidden processes for signs that you've been infected with a rootkit. It then tells you whether your system is rootkit-free or may be infected, listing every sign of infection that it found. Double-click on each listed entry, and you'll see more information, such as a description of the item, the company that made it, and its file location. You can then use Blacklight Rootkit Eliminator to quash the threat, which the program accomplishes by renaming the file and giving it a .ren extension so that it can't do any further damage. Before taking that step, though, it's a good idea to search for the file name on Google and make sure that the file is a rootkit and not some legitimate file. If your PC continues to function well after you've renamed the file, you can eventually delete the renamed files.
If you aren't
Download F-Secure Blacklight Rootkit Eliminator | Price: Free
Unlike most other antimalware software, HijackThis doesn't automatically detect dangerous software. Instead, it looks deeply into your system's Registry and into other nooks and crannies that are likely to be infected, and then saves its results to a log file. You then post the log file to the HijackThis Web site for experts to examine; they take a look, let you know if your system is infected, and then tell you how to fix the problem. There are plenty of similar discussion areas where experts congregate on the Internet; to find them, run a Google search.
Download HijackThis | Price: Free
Walmart Promo Code
Additional $10 off grocery app orders with Walmart promo code
Additional 10% off bath & bedding - Target coupon code
Home Depot Coupon
Home Depot coupon: Extra 10% off 4-star+ kitchenware
Receive $5 off eBay promo code on your first order
Overstock coupon: $40 off $500
Spend $75+ and save 30%: JCPenney coupon