This CD contains 648MB of freeware programs that you can copy, give away, and use to protect yourself against the latest threats on the Internet, including viruses, worms, Trojan horses, and spyware.
While the programmers who wrote these programs tried to do the best job possible, there’s still a chance that bugs could cause various problems with your computer. If in doubt, test these programs on a computer that you can afford to mess up before installing them on a machine that contains valuable data. Neither the author nor No Starch Press takes any responsibility for the way these programs may work or behave.
All files on this CD are designed to run under Windows unless specifically labeled otherwise, such as (Mac OS X) or (Linux).
Many of these programs are compressed, as indicated by their extensions. You must expand or uncompress these programs before you can run them.
.zip files are Windows files which may be “unzipped” with StuffIt Expander or WinZip.
.exe files are program files; double-click them from within Windows to extract them and run the application.
.sit and .sitx files are Macintosh StuffIt files which may be “unstuffed” with StuffIt Expander.
.dmg files are Mac OS X disk image files that you can double-click to access their contents.
.gz and .tar are gzipped or tarred Linux files, which may be uncompressed with LinZip or tar.
Beginner | Text file containing “The Beginner’s Guide to Hacking and Phreaking.” |
Cracker | White paper from Network Security Solutions entitled “Techniques Adopted By ‘System Crackers’ When Attempting To Break Into Corporate or Sensitive Private Networks.” |
Hacknov | Text file containing “A Novice’s Guide to Hacking.” |
Att_ccg.zip | AT&T credit card calling number generator. |
CA_setup | Cain & Abel password recovery program that can sniff a network for data and listen in on voice over Internet protocol (VoIP) phone calls. |
Ccnum.zip | Credit card number generator, includes source code written in Pascal. |
Cphreak.zip | Phone boxing program for Windows. |
Hackvmb | Text file explaining how to hack voice mail systems. |
Phonetag.zip | War dialer. |
Phreakmaster.zip | Blue box program. |
Pgpfone10b2.zip | Turns your computer into a secure, encrypted telephone. |
Redpalm++.zip | Red box program for the Canadian telephone network, designed to run on Palm OS 3.0 handheld computer. |
Shittalker.zip | Gag program that lets your computer make crank calls. |
Switchboard.zip | Mimics different telephone color boxes. |
Vmbhackr.zip | Program for hacking voice mail systems. |
Vmbhaq | Text file explaining how to hack a voice mail system. |
(Linux) Vomit-0.2c.tar | Converts an intercepted VoIP phone call into a WAV audio file. |
Winphreak.zip | Telephone boxing program. |
Artoflockpick | Text file explaining the basics of lock picking. |
Basictrashing | Text file explaining the fine art of Dumpster diving to retrieve useful items or information. |
Carlocks | Text file explaining how car locks work and how to pick them. |
Combolocks | Text file explaining how to pick and open combination locks. |
Hemp_for_victory_1942 | Department of Agriculture documentary encouraging farmers to grow hemp to support the war effort. |
jPodder-Setup | jPodder program for retrieving podcasts. |
Juice22setup | Juice program for capturing and listening to iPod podcasts. |
(Mac OS X) Juice_2.2_install.dmg.gz | Juice program for capturing and listening to iPod podcasts on a Macintosh. |
Lockpicking | Another text file that explains how to pick combination locks. |
Podifier_v2.1_setup | Program for creating your own podcasts. |
(Mac OS X) Podifier_v2.1.hqx | Program for creating podcasts on a Macintosh. |
Social | Text file explaining how to use social engineering. |
Socialfaq | Text file that answers the most common questions regarding social engineering. |
Sparks | BlogMatrix Sparks! Program for creating your own podcasts. |
Trash | Another text file explaining how to dumpster dive. |
Trashing | One more text file explaining how to dumpster dive. |
Trashingguide | Yet another text file explaining dumpster diving. (By reading a variety of dumpster diving tutorials, you can learn which techniques work best for different problems.) |
Ansibomb | Text file explaining how ANSI bombs work. |
Bombansi | Text file containing the source code to a sample ANSI bomb that will format your hard drive. |
Chaos07 | Text file explaining how to make ANSI bombs. |
Clamwin-0.87.1-setup | Open-source Clam antivirus program. |
(Mac OS X) ClamXav_1.0.1.dmg | Open-source Clam antivirus program for the Macintosh. |
Darkangel | Text file explaining how to write viruses. |
Removeit_pro | RemoveIT-Pro program for detecting and removing viruses. |
Sdefendi | Script Defender protects against all forms of malicious code (such as macro viruses) that run scripting languages such as VBScript or JavaScript. |
Strap | ScripTrap program for stopping viruses from running scripts. |
Asviewer.zip | Monitors all the programs that start and run automatically whenever you boot up Windows. Can be used to detect Trojan horses or spyware running in the background without your knowledge. |
Comp_trojans | Text file explaining the different types of Trojan horses and how they can infect your computer. |
Errsource.zip | Delphi source code for a simple Trojan horse that displays a Fatal Network Error message on the screen and then prompts the user to type a user name and password. |
Fake_freeav.zip | Trojan horse that displays a fake AltaVista login screen that tricks people into typing their a valid user name and password. |
HoneyPotv1.0-Download2.zip | HoneyPot program that watches out for hacker activity accessing ports on your computer. |
Irclean | Stops worms from spreading through IRC chat rooms. |
Jammer17f | Defensive program for guarding against the Back Orifice and NetBus remote access Trojans. |
LameBus | Delphi source code for the LameBus program designed to stop the NetBus remote access Trojan. |
Morris Internet worms source code.zip | C source code to the famous Internet worm that took down the Internet in 1988. |
Netbuster 1.31.zip | NetBuster program for detecting and stopping the NetBus remote access Trojan. |
Nps16.zip | NetBus Protection System to protect your computer from the NetBus remote access Trojan. |
Remover | Detects and removes worms and Trojan horses. |
Slap | Allows you to send messages back to any hackers trying to sneak through a port on your computer. |
StartUpMonitor.zip | Monitors all programs that start up automatically. Useful for catching Trojan horses or spyware running without your knowledge. |
(Mac OS X) Zebrascanner3.0.2.zip | Zebra Scanner for detecting Trojan horses. |
Kf141.zip | Key Finder program for recovering the Microsoft product keys from the Windows registry. |
RockXP3 | Retrieves product keys from all installed Microsoft products and saves the Windows XP product activation file. |
Hacker Sites | Web page listing different computer security and hacker websites. |
Netirc | NetIRC program for participating in IRC chat rooms. |
Virc200 | Visual IRC program for communicating in IRC chat rooms. |
(Mac OS X) CrackAirport01.dmg | Cracks WEP encryption to wireless networks. |
(Linux) Cst1_41.tar | CUM Security Toolkit that includes a port scanner and a script scanner for foiling Intrusion Detection Systems (IDS). |
eMmyIP20 | Email My IP program that identifies a computer’s IP address and emails it to you. |
Honeyd-0.5a-win32.zip | Honeyd program for creating “honeypots” on ports to detect and track hacker activity. |
Iploc17.zip | Atelier Web IP Locator program for tracking down the physical location of an IP address. |
(Mac OS X) IPLocator.wdgt.zip | Dashboard widget that can provide the physical location associated with an IP address or URL domain. |
Ipscan | Angry IP scanner that can scan a range of IP addresses. |
(Mac OS X) KisMACR65.zip | KisMAC program for sniffing data from wireless networks. |
Lanspy.zip | Lets you remotely examine another computer on a local area network. |
NBrute10 | NetBrute program for scanning and detecting open ports and testing websites for password security. |
Netscan | NetScan program to scan for open ports on another computer. |
Netstumblerinstaller_0_4_0 | NetStumbler program for detecting WiFi networks. |
PCscanner | Scans a computer for open ports. |
SimpleScan.zip | Visual Basic 5 source code to a simple port scanner. |
Spade114 | Sam Spade Internet tool that offers ping, nslookup, WHOIS, IP block, dig, traceroute, and finger commands. |
Tjping.zip | Ping, traceroute, and lookup utility. |
(Mac OS X) WAP_Map.dmg.gz | Wireless network mapping tool that locates access points in a wireless network. |
(Mac OS X) whatPorts.dmg.sit | whatPorts program for scanning ports. |
Wups | UDP port scanner for Windows. |
Actualkeylogger | Actual Keylogger program for capturing keystrokes. |
Creating a VB Keylogger | Text file explaining how to capture keystrokes using Visual Basic. |
Freekgbkeylogger-193 | Unique keystroke logger that can also capture foreign characters. |
Freelogger | Free Key Logger program for capturing keystrokes. |
Homekeylogger.zip | Home Keylogger for capturing keystrokes. |
John-16w.zip | John the Ripper password cracker. |
Kbhook.zip | Explains how to capture keystrokes using Visual C++ source code. |
Keylogger.zip | Keystroke logging program. |
Keylogger-king-free-13 | Keylogger King program for capturing keystrokes. |
Kreview.zip | Compares and lists information about different keystroke logging programs. |
Logger.zip | Adiscon Logger keystroke capturer. |
(Mac OS X) Logkext.dmg | Keylogger program for capturing keystrokes. |
(Mac OS X) Mkrack.dmg | MacKrack password cracking program. |
PeekaBoo | Retrieves a password hidden behind asterisks. |
PWReveal10setup | Password Revealer that can “peek” behind passwords, masked by asterisks, and reveal the actual password hidden underneath. |
RevelationV2.zip | Displays passwords hidden behind asterisks. |
Screenlog.zip | ScreenLog Version 1 program that takes snapshots of the computer screen periodically to record what appeared there. |
SnoopyPro-0.22.zip | Snoopy Pro program for sniffing data over a USB connection. |
(Linux) Snort-2.4.3.tar.gz | Snort network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. |
Tkey-setup.zip | Tiny Keylogger program. (Requires Microsoft .NET framework 1.1.) |
Unmaskit.zip | Reveals any password hidden on-screen by asterisks. |
Wssetup | Super WinSpy program for monitoring activity on your computer. |
AriesRemoverInst | ARIES Rootkit Remover that gets rid of the rootkit developed by First4Internet and used on certain Sony CDs to hide its Digital Rights Management (DRM) software. |
Fmbb_404 | FileMap program for detecting when unknown files suddenly appear on your hard disk. |
RootkitRevealer.zip | Scans the Windows registry for signs of kernel-mode rootkits lurking on your computer. |
Anonymous Proxy Servers | Web page that lists several free sites that allow you to surf the Internet anonymously. |
Bmppacker.zip | Hides data in BMP graphic files. |
CameraShy.0.2.23.1 | Camera/Shy tool for downloading steganography images off web pages automatically. |
Cameleon.zip | French steganography program for hiding data in GIF files using AES encryption. |
(Mac OS X) Ciphire-mail-01.1.015-osx-ppc.dmg | Ciphire Mail program for encrypting your email. |
Dpt32 | Data Privacy Tools encryption program that can hide data in graphic files. |
GhostzillaCD-1.0.1-free-v1.zip | GhostZilla program that allows you to browse the Internet from within another program. |
Handbook_bloggers_cyberdissidents-GB | PDF file of a blogging handbook with guidelines for sharing information without getting caught by government authorities. |
How to bypass Internet censorship | Web page that explains different techniques for overcoming Internet censorship. |
ImageHide.zip | ImageHide program for hiding data in graphic images. |
Infostego3 | Info Stego Personal 3.0 program for hiding data in BMP graphic files. |
Kidlogger | KidLogger program for recording keystrokes, capturing websites visited, and storing chat room conversations. Includes Visual C++ source code. |
MP3Stego_1_1_17.zip | MP3Stego program for hiding data in MP3 audio files, includes Visual C++ source code. |
Netdogv1.1.10 | NetDog Internet filter for blocking access to porn sites. |
(Mac OS X) PictureSpy.sit | PictureSpy program for hiding data in graphic images. |
(Mac OS X) Proxify.wdgt.zip | Dashboard widget for surfing anonymously using the Proxify proxy server. |
S-tools4.zip | S-Tools steganography program for hiding data in graphic and audio files. |
Setup_en | Naomi filtering program for blocking sites unfit for children. |
Setupex | Gif-It-Up program for hiding data in GIF graphic files. |
Stegdetect-0.4.zip | StegDetect for detecting hidden messages in graphic files. |
Verdict_Shi_Tao | PDF file containing the criminal verdict of a journalist sentenced to 10 years in prison after Yahoo! revealed his email address to Chinese authorities. |
Binjet-107 | BinJet program for retrieving large files (music, movies, software, etc.) off Usenet newsgroups. |
Einstein10 | Filesharing program designed for students to share homework, term papers, and tests. |
File Sharing | Flash movie describing how a typical filesharing program works. |
Grabit153b | GrabIt program for finding and retrieving audio, video, and program files off Usenet newsgroups. |
IRC example | Flash movie that shows how to download files from an IRC chat room. |
Ksr.zip | Deletes all spyware installed by the Kazaa filesharing program. |
Newsgroups | Flash movie that shows how to download files from newsgroups. |
(Mac OS X) PeerGuardian_1.2.zip | Macintosh Peer Guardian program for blocking IP addresses of the police and music labels who might try to see what type of files you’re sharing. |
Pg2-050918-nt | Windows Peer Guardian program for blocking IP addresses of the police and music labels who might try to see what type of files you’re sharing. |
Tribalweb_setup | TribalWeb program for creating your own private filesharing network with friends. |
Web site example | Flash movie that shows how websites share files that people can download. |
CallingID | Uses up to 52 different verification tests to identify bogus phishing websites. |
Megahack.zip | Program designed to subvert the online chain letter scam Mega$Nets. Includes Visual Basic 3.0 source code. |
PhishGuard-1-2-186 | Detects bogus phishing websites designed to trick you out of passwords, account numbers, or credit card numbers. |
TrustToolbar | Internet Explorer add-in that can alert you when you’re visiting a suspected phishing website. |
Stalking Fact Sheet | PDF file of stalking facts and information produced by the Stalking Resource Center. |
Stalking Investigation Guide | PDF file of a British guide that helps police investigate stalking crimes. |
Newspk21.zip | Newspeak program for translating ordinary text into politically correct language. |
NewsraiderP.zip | NewsRaider program that yanks news articles from different newspapers and magazines and collects them for your viewing convenience. |
NewzieSetup | Retrieves news from multiple sources. |
Online News Sources | Web page listing worldwide news sources, including newspapers, magazines, and news services. |
Search Engine List | Web page listing different search engines, including specialty and international search engines. |
Pakistan Zindabad hack | Flash movie that shows a politically motivated website defacement. |
September 12th | Flash movie that shows how the September 12th political activist video game works. |
Ztps.zip | Zapatista Port Scanner. |
(Mac OS X) CostOfWar.wdgt.zip | Dashboard widget that estimates the current cost of the war in Iraq. |
Fallout Meter | PDF file explaining how to create your own fallout meter for measuring radiation. |
FBI Law Enforcement Bulletin | PDF file that describes the seven-stage model that characterizes hate groups. |
Terrorism News Links | Web page containing links to different sites offering news about terrorism and hate crimes. |
Threat-1.0.4.zip | Displays the color of the current terrorist threat level. |
CoffeeSpamBlocker41R | Spam filter. |
Ellafree_full | Ella for Spam Control program for filtering spam with Microsoft Outlook. |
EmC817 | EmC spam filter. |
Extractor.zip | Email extractor program for ripping out email addresses stored in text files. |
(Mac OS X) isafe.zip | The iSafe program for storing passwords, credit card contact information, and other valuable information in one convenient location. |
MailWasherFree | Spam filter that can bounce spam back to the sender with an “address unknown” message. |
Mbdisp2 | Mail Box Dispatcher program for filtering spam. |
Spamhilator_0_9_9_9 | Spam filter. |
SpamAware-Setup | Spam filter for Microsoft Outlook and Outlook Express. |
SpamExperts Home Installer | SpamExperts spam filter. |
(Mac OS X) Spam_UCE_1.0_scpt.zip | Works with the Mac OS X Mail program to forward spam automatically to the Federal Trade Commission and bounce it back to the sender. |
SpoofMail v1-1-7.zip | SpoofMail program that shows how to forge email headers. |
(Mac OS X) TheObfuscator.wdgt.zip | Dashboard widget that converts the text of an email address into its equivalent ASCII code representation. |
Vengine | Verification Engine that examines websites and alerts you to fraudulent ones that may be phishing for your password or credit card number. |
Ad.htm, Fileshare.jpg, Home.htm, and HTML.gif | Sample JavaScript code that shows how websites create pop-up ads. |
PopUpStopperFree | Pop-Up Stopper program for blocking pop-up ads. |
Seosurfsetup | SEOSurf program for helping you to optimize your website for the highest possible rankings on different search engines. |
Sfg800c | SafeGuard Popup Blocker. |
SmartPopupBlocker101 | Smart Popup Blocker program that kills pop-up ads and protects your home page from being changed by spyware. |
A2freesetup | Scans and removes worms, Trojan horses, and spyware. |
A2hijackfree | Removes browser helpers (spyware) and monitors active programs to help detect spyware. |
Aawsepersonal | Ad-Aware Standard Edition Personal spyware remover program. |
Ashield_1_setup_314 | Arovax Shield program that detects spyware that tries to change the Windows registry or install itself as a browser toolbar. |
ASRSetup—Advanced Spyware Remover | Scans and removes spyware. |
Assassin.zip | Wipes out spyware without having to reboot Windows into Safe Mode. |
BHODemon20setup_2022 | Browser Helper Object (BHO) Demon program for removing browser toolbars installed by spyware programs. |
BHR4.1 | Browser Hijack Retaliator program that warns you when spyware tries to change the home page setting of your browser. |
Cwshredder | CoolWebShredder program for removing CoolWeb, one of the most insidious and difficult-to-remove spyware programs currently infecting computers. |
D3tr | Runs the Internet traceroute command but displays the results in a colorful 3D graph. |
DisspySetupLITE | Spyware removal program. |
Enough | Enough is Enough! program for locking down Internet Explorer to prevent it from allowing spyware. Note: may also block IE from browsing valid sites. |
Eulalyzersetup | EULAlyzer analyzes the end user license agreements (EULA) that come with programs for signs of spyware or adware. |
HijackThis | Prevents spyware from redirecting your browser and taking over your home page. |
Iespyad2 | Locks down Internet Explorer to prevent spyware from sneaking onto your computer. |
Regprot.zip | Monitors the Windows registry and notifies you when programs (such as Trojan horses or spyware) try to change it without your knowledge. |
Spybotsd14 | Spybot spyware remover. |
Spywareblastersetup351 | SpywareBlaster program that tries to prevent spyware from being installed on your computer in the first place. |
Spywareguardsetup | Spyware Guard program that scans files for spyware. |
StartupList | Lists all the programs that start automatically when Windows boots up. Useful for catching traces of spyware and Trojan horses. |
Winmaid.zip | WinMaid program that detects spyware. |
Wpsetup | WinPatrol program that detects suspicious programs (such as spyware) running without your knowledge. |
(Mac OS X) Backup_Files.zip | Macintosh Backup & Restore program for backing up your data. |
Computing on a Shoestring | Web page listing links to popular freeware programs, including Microsoft Office look-alikes and antivirus programs. |
Framxpro.zip | Free RAM Pro program for optimizing and managing memory to make your computer run more efficiently. |
Ntregopt-setup | Optimizes the Windows Registry to make your computer work faster. |
SpeeDefrag.zip | Program for defragmenting your hard disk. |
Bciview.zip | Browser Cache Index Viewer program that reads the contents of the Internet Explorer URL cache and tracks websites you’ve visited. |
Ccsetup126 | Crap Cleaner program that clears out your browser cache and Windows registry. |
CoffeePrivacyCleaner20R | Wipes out all traces of what you’ve been looking at on the Internet. |
Cryle | Cryptainer LE program that creates “vaults” where you can store files and folders that will get encrypted automatically. |
Cshred110 | CyberShredder program for overwriting and deleting data securely. |
(Mac OS X) DashShredder.wdgt.zip | Dashboard widget for shredding files securely. |
(Mac OS X) DashCrypt.wdgt.zip | Dashboard widget for encrypting files using the AES government standard. |
Dban-1.0.6_i386.iso | Disk image of Darik’s Boot and Nuke program for wiping out data stored on a hard disk. |
Dclean157_all.zip | Disk Cleaner program for securely deleting temporary files. |
(Mac OS X) DestroyerX.dmg | DestroyerX program for securely deleting data. |
(Mac OS X) DisApPeAr.zip | DisApPeAr program for selectively hiding files and folders. |
Diskzapr.flp | Floppy disk image of the Disk Zapper program, which can wipe out and overwrite your hard disk with random data. |
Diskzapr.iso | CD disk image of the Disk Zapper program, which can wipe out and overwrite your hard disk with random data. |
Dskinv | Disk Investigator program for viewing and recovering previously deleted data. |
Eraser57setup | File shredder program. |
Free-hex-editor | Hex editor program for examining sectors on a disk. |
Krlite | Kryptel Lite file encryption program. |
Pci_filerecovery.exe | PC Inspector’s File Recovery program. |
PrivateSurf | Clears out your browser cache so nobody can see which sites you’ve visited. |
RawCopy.zip | Raw Copy program for copying disks by sector rather than by file. |
Security-toolkit | Encrypts and securely deletes data from your hard disk and other removable media. |
Sfs.zip | Simple File Shredder for securely deleting your files. |
TracesViewer | Displays the contents of the Internet Explorer cache. |
Unlocker1.7.6 | Program that unlocks files and folders so you can access them. |
Unstopcp.zip | Unstoppable Copier program for recovering data from scratched CDs or defective floppy disks. |
Xcleaner_free | Free version of the X-Cleaner program that cleans your Internet cache. |
Xvi32.zip | XVI32 hex editor. |
Although this CD includes several different firewalls, you only need to run one at a time. Installing two or more firewalls won’t make your computer any more secure, and multiple firewalls can confuse and conflict with each other.
AntiHookProSetup25.msi | AntiHook program that can prevent keystroke loggers, spyware, Trojan horses, and rootkits from intercepting operating system function calls. |
Autopatcher_xp_dec_2005_lite_english | Automatically patches Windows XP based on Microsoft’s latest recommendations. |
Dlpnpauditor.zip | Device Lock Plug and Play Auditor keeps track of any devices connected to your computer through USB ports. |
(Mac OS X) Dtd-200.dmg | Deny Thumb Drivers program that prevents anyone from accessing your computer through a USB portable storage device. |
English_Free_CompuSec.zip | CompuSec program that encrypts your hard disk and prevents others from logging on without your authorization. |
Firewall | Firewall 2004 program. |
Firewall_setup | SoftPerfect firewall program. |
FileShield Encryption | Encrypts individual files or entire folders. |
Ghostwall_setup | Ghost Wall firewall program. |
Hardenit | Examines your network and shuts down vulnerabilities automatically. |
(Mac OS X) Hide-Out! v2.1.sitx | Hide-Out program that conceals folders on your Mac OS X computer. |
Ipig-setup | iPIG security program for protecting your computer on a Wi-Fi wireless network. |
Jpfwall | Jetico firewall. |
Patchwrk | PatchWork program checks for vulnerabilities identified by the FBI and, if any are found, points you to the Microsoft patches that can fix them. |
Pcsecuritytest.zip | PC Security Test program that tests your computer’s defenses to determine how safe (or insecure) your computer may be against common types of hacker attacks. |
Preview-setup | Preview program that analyzes and rates how secure your computer may be against hacker and malware threats. |
Pshld100.zip | SnoopFree Privacy Shield detects keystroke loggers and other activity monitoring programs that may be spying on your computer. |
Qpassgen | Quicky Password Generator that helps you create unique and difficult-to-guess passwords (which may also be difficult to remember). |
Secretmakersetup | Secret Maker program for blocking pop-up ads, filtering spam, cleaning your Internet cache, and blocking banner ads. |
Secure-It | Examines your Windows computer and shuts down vulnerabilities automatically. |
Securepoint_pcfirewall_setup_3.6 | SecurePoint firewall. |
(Mac OS X) sunShield1.02.sit | SunShield program for configuring the built-in Mac OS X firewall. |
Xp-AntiSpy_setup-english | Locks down Windows XP to prevent it from sending suspicious information back to Microsoft. |
Xpy-0.9.4-bin.zip | Shuts down known vulnerabilities in Windows XP. |