Top 15 Lightweight Portable Security Alternative and Similar Softwares | May 2024

Lightweight Portable Security (LPS) is a Linux LiveCD developed and publicly distributed by the United States Department of Defense’s Software Protection Initiative that is designed to serve as a secure end node. It can run on almost any Intel-based computer (PC or Mac). LPS boots only in RAM, creating a pristine, non-persistent, end node. It is capable using Common Access Card (CAC) software for authentication into DoD networks.LPS-Public turns an untrusted system (such as a home computer) into a trusted network client. No trace of work activity (or malware) can be written to the local computer hard drive. As of September 2011 (version 1.2.5), the LPS public distribution includes a smart card-enabled Firefox browser supporting DoD's CAC and Personal Identity Verification (PIV) cards, a PDF and text viewer, Java, a file browser, remote desktop software (Citrix, Microsoft or VMware View), an SSH client, the public edition of Encryption Wizard and the ability to use USB flash drives. A Public Deluxe version is available that adds OpenOffice and Adobe Reader software. ...

1. Pentoo

Pentoo Pentoo is a security-focused livecd based on Gentoo. It's basically a Gentoo install with lots of customized tools, a customized kernel, and much more.Put simply, Pentoo is Gentoo with the pentoo overlay. This overlay is available in layman so all you have to do is layman -L and layman -a......

2. Whonix

Whonix Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor, and more come pre-configured with security in mind.It is a complete operating system, designed to be used inside a host operating system. It is Free Software and based......

3. Toolsley PGPigeon

Toolsley PGPigeon PGPigeon is a simple but powerful OpenPGP-compatible message encryption webapp based on the openpgp.js library.You can encrypt and decrypt messages, sign and verify signatures (of signed plaintext messages as well as encrypted ones). The encrypted message can be sent over email or any other channel. Fetching keys from key servers......

4. Anonimo VPN

Anonimo VPN Anonimo VPN aims to provide a completely free, high-privacy virtual private network service to anyone and everyone without logging any user information!......

5. Freepto

Freepto Freepto is a Linux-based operating system on USB stick. This means you can bring it with you and use any computer as it was your own. Also, data you save on the USB stick will always automatically be encrypted (i.e. nobody else will be able to access them).The idea behind......

6. Steganos Password Manager

Steganos Password Manager Do you leave your front door unlocked? Do you have the same key for your house, your car, and your office? Would you trust a complete stranger with your keys? Of course not!Passwords are the keys to your digital life, and the variety and quality of your personal passwords is......

7. victims

victims The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......

8. PatrolServer

PatrolServer Welcome to PatrolServer. We scan your server real-time for outdated software and exploits. All delivered by mail and an easy to use dashboard.......

9. KEEP PROTECT

KEEP PROTECT KEEP PROTECT is an automated vulnerabilities and security breaches detection platform for websites and web apps (XSS, SQL injection,etc).......

10. CipherShed

CipherShed A fork of the now-discontinued TrueCrypt . CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.After creating an encrypted......

11. Tokenlock

Tokenlock TokenLock - The ultimate Mac Locking App. Automatically Lock your computer using USB, Bluetooth (iPhone) Proximity or your Apple Remote, from the menu, by clicking the icon or using a Hotkey. Check out www.map-pin.com for demos and......

12. Reason Core Security

Reason Core Security Security Software that Removes Malware and Adware Your Anti-virus Will Miss.Free, Fast and Simple.......

13. TeleSign

TeleSign TeleSign delivers account security and fraud prevention with two-factor authentication based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data.TeleSign solutions address the full spectrum of account security – registration, access, usage and recovery – while it......

14. Retire.js

Retire.js The goal of Retire.js is to help you detect use of a JavaScript library version with known vulnerabilities.......

15. ApexSQL Audit

ApexSQL Audit ApexSQL Audit can audit all SQL Server activities such as data and objects access and changes, failed logins and security changes. It helps SQL DBAs to meet SQL Server audit compliance requirements by using many built-in audit reports. Use ApexSQL Audit to manage auditing across multiple SQL Server instances from......