April 20, 2012

Special Security Weekend

All the GOTD community and those new ones who recently joined us,

here is some good news for the upcoming giveaway weekend! The Giveaway of the SecurityKISS Tunnel Jadeite is going to be on for the whole weekend (till 4/22/2012). Thus the security giveaway package is available for download and installation for 3 days in a row, which is indeed a generous offer from the developer.

During the weekend the offer will be featured as second giveaway and be avaliable on the main version only. Make sure not to miss this fortune weekend, download now!

By the way, it also means 2 extra days to try your luck in idea contest. Give some thought to your suggestions to increase your chances to win a 3-year licence for SecurityKISS Premium plan JADEITE.


Best Regards,
GOTD Project Team

6 Comments »

  1. Maybe the program could be used internationally on the same computer while on holiday or on business.

    Comment by Thomas Hardy — April 20th, 2012 at 2:47 pm
  2. Although risky… One might want to put an employee full time on the next GAOTD. This way SecurityKiss can really prove its customer value – and can take away a lot of ignorance or questions.

    And thank you for extending my license to a full year! So much appreciated :)

    Peace!

    Devvie

    ~~~ notemail@facebook.com ~~~

    Cuisvis hominis est errare, nullius nisi insipientis in errore persevare
    ——
    All spelling mistakes are my own and may only be distributed under the GNU General Public License! – (© 95-1 by Coredump; 2-012 by DevNullius)

    Comment by devnullius — April 23rd, 2012 at 4:50 pm
  3. FAQ on their site:
    Do you keep logs of traffic through your tunnel?
    For security reasons we collect information about user’s IP address and connection time.
    No thanks. Looking to be completely anonymous.

    Comment by Maureen — April 30th, 2012 at 7:51 am
  4. @3 : Maureen

    Thanks for the heads-up. Bad news – a company and its web site specializing in security software that spys on visitors. They are not talking about e-mail or other visitor transmissions.

    I don’t see how keeping IP addresses increases security to a web site. If a website is hacked the hacker will not be leaving their true IP.

    A normal web site log maintained on the web site’s server keeps more personal information than needed. Add the IP to the logged information and you have got it all.

    Comment by Bigun — May 6th, 2012 at 2:06 am
  5. @Maureen and Bigun: While the IP may be masked via proxy, it is a clue if one is interested in tracing a malicious user. You can match the IP to the originating IP but ONLY if you have the connection time as well (and the proxy keeps logs of the connections, which many do).

    Eventually, you will be able to trace back the IP to the ISP and possibly ascertain who the individual is via legal means. Welcome to the world of internet security.

    P.S.: Almost all sites log IPs and connection times automatically.

    Comment by Anon — June 18th, 2012 at 11:21 pm
  6. Is this SecurityKISS Tunnel Jadeite software still available? I am seeing this blog on 7/16/2012, and it is dated April, 2012.

    Comment by Tamela Barbee — July 16th, 2012 at 2:25 am

Leave a comment

© 2006 - 2024 giveawayoftheday.com. All rights reserved. Patent Pending. Powered by WordPress.