For websites/apps - Privacy and Cookie Policy Generator.
For websites/apps - Cookie Solution. Manage consent preferences for the ePrivacy, GDPR, and CCPA. Integrated with the IAB TCF and US Privacy Framework.
For websites/apps - Terms and Conditions Generator. Create your terms and conditions in minutes.
IBM Security "IBM X-Force" - “Forschung in der IT-Sicherheit, Erfassung globaler aktueller Bedrohungsdaten und Erstellung von Bedrohungsanalysen für intelligente Sicherheitslösungen”.
On Win7, “Avira AntiVir” asks to deinstall “Microsoft Security Essentials” .
“Avira Free 14.07.306” of 2014-10-14 was still installable and runnable on Windows7 computers PIII CPUs.
“Avira Free 15.10.434” of 2015-05–26 just work on Windows computers with PentiumIV CPU. It crashes on my Windows7 computer with Athlon2400 CPU ( PentiumIII alike ) .
avast! free - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server.
AVG Anti-Virus Free Edition - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server.
BitDefender Free Edition - free antivirus software for Windows. No resident monitoring sentinel. The free edition does not work with Windows 7 (?) and Windows server editions like W2k-Server.
ClamAV / Immunet.
The free ClamAV for Linux and ClamAV/SOSDG for Windows. It does not provide a real-time guard .
EN.Wikipedia "Transport Layer Security", DE.Wikipedia "Transport Layer Security" ( TLS ) - “Seit Version 3.0 wird das SSL-Protokoll unter dem neuen Namen TLS weiterentwickelt und standardisiert, wobei Version 1.0 von TLS der Version 3.1 von SSL entspricht. Bekannte Implementierungen des Protokolls sind OpenSSL und GnuTLS”.
Economy of mechanism: Keep the design as simple and small as possible.
Fail-safe defaults: Base access decisions on permission rather than exclusion.
Complete mediation: Every access to every object must be checked for authority.
Open design: The design should not be secret.
Separation of privilege: Where feasible, a protection mechanism that requires two keys to unlock it is more robust and flexible than one that allows access to the presenter of only a single key.
Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.
Least common mechanism: Minimize the amount of mechanism common to more than one user and depended on by all users.
Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly-
Work factor: Compare the cost of circumventing the mechanism with the resources of a potential attacker. The cost of circumventing, commonly known as the “work factor,” in some cases can be easily calculated.
Compromise recording: It is sometimes suggested that mechanisms that reliably record that a compromise of information has occurred can be used in place of more elaborate mechanisms that completely prevent loss.
I was told in 2023-11 by experts: There will be “soon” ( i.e. in 2024 ) a free web-based software service for registered companies and registered consultants, which interactively asks the questions of the norm.