Windows NT, 2000, and XP hide an hidden Internet server that is running by default. It receives and accepts, among other things, unsolicited network messages that cause pop-up dialog boxes to appear on the desktop. Internet Spammers have discovered this and are spraying pop-up Spam across the Internet. The Windows Messenger server should never have been running by default, and Microsoft has finally fixed that in Windows 2003, but users of previous Windows need to take responsibility for this themselves
Disable WinXP and 2000 raw sockets
As part of my struggle to convince Microsoft not to ship Windows XP with full raw sockets, I created this "SocketLock" utility. It easily enables and disables the system's raw socket capabilities to show that, contrary to Microsoft's claims, raw sockets are not, and never were, needed by any applications or users.
Quick and simple NetBIOS disabler
When the ShieldsUP! system was first created, I had not discovered how to safely "rebind" network transports as a means for closing the NetBIOS TCP/IP vulnerabilities. So I wrote the LetShare & NoShare utilities to do this quickly and easily (although in a non-standard fashion). Today, the manual rebinding described on the ShieldsUP! pages is the preferred method. LetShare & NoShare still work and can be useful for allowing quick NetBIOS on/off testing.
Hier kun je de
gratis Foxit PDF Reader
Het programma wordt aangeboden door foxitsoftware.com
In tegenstelling tot ADOBE Reader, is deze maar 1MB groot en behoeft geen installatie.
geschikt voor Windows 98/me/NT/XP/2003
At the end of 2001, Microsoft revealed a critical defect in Windows XP and ME: Windows' Universal Plug and Play service (UPnP) would allow a malicious hacker to remotely take over any system that was running and exposing the UPnP service to the Internet. This UnPlug n' Pray utility lets anyone check for the presence of the dangerous UPnP service in their system, then easily and safely enable and disable it as needed