Freeware Password Managers

March 31, 2009 at 11:16 pm 1 comment

First of all, we’ve got the S10 Password Vault.  This is from, which is (so far) an excellent source of freeware.  It has a master password (yes, just one), and it will fill in forms without c&p (copy and paste).  To some extent that’s dangerous.  However, we’ve still got that damned “barber” problem–Russell’s paradox, though I’ve seen attribution to Italy and quite a lot earlier.  You have to have a password…in order to remember the password.

Comodo i-Vault is the next.  This piece of freeware has been heavily recommended through a lot of years.  256-bit AES encryption is used as well as protection against keyloggers.  It also allows transmission of sensitive data directly from the program into a web application.  You might have guessed I’m not totally in favor of that.  Oddly enough you have to have a master password.  I’m definitely allergic to storing things like bank account numbers or credit card numbers in such an application.  However, this particular company has an excellent reputation.

Then we have My Security Vault 3.0.  This isn’t just a form-filler and storage for passwords; it helps you guard against sensitive information inadvertently left on your computer.  This also allows encryption of files (I personally have tended to use EncryptOnClick; I also managed to screw up recently on the passwords to a number of files…to which I actually knew I had unencrypted backups).  This used to be used by commercial and government entities.  [One of the advantages you have of reading my blog at times is that I’ve gone places I don’t advise you to go.  There are other programs advertised than My Security Vault, and I’d advise you to ignore them.]

Acerose Password Vault, mind you, specifies Windows XP.  I doubt that Vista will cause a problem here.  I’m going to get just a little bit off the subject and say that–as long as a program doesn’t use a lot of fancy graphics, call on some characteristics of the older Direct-X versions that actually are fairly ancient or–and this really is something you can’t expect even out of a legacy-compatible system–actually require what amounts to a DOS environment–it will generally run on Vista if it did on XP.  They have made a real attempt at random number generation.  The real advantage is that this will actually run in a server-type situation (multiple “personalities” i.e. multiple passwords) and extra steps are taken to preserve the data.  Besides, you can probably use the other program to figure out how to shoot something if your passwords don’t work out.

And we have Cybervault.  This is pretty small, notice; half a meg.  This is cutting things down to essentials, like Oubliette (notice I’ve just sent you to Tranglos because Mr. Jedlinski–no, I’ll not swear I have the name right–has a lot of very cooool software there most particularly including keynote, which I am currently using) does.  Note too that EncryptOnClick can be used quite easily as a password vault, because you can encode the whole document.  I’ve been known to use a *.wps file out of laziness; most word processors can’t begin to handle it.

Let us take another detour through the woods.  In point of fact, the only code I know of that’s unbreakable is the book code in some form.  That means you refer to the physical placement of words and/or characters within a book to transmit a message or in this case to store it.  A common method of making passwords less obvious is to take a word–I like “password”.  Just have this fondness for it, mind.  First of all:  Password.  So our first letter is capitalized.  Make the s’s 5’s (or one of them); could make the “o” a zero.  Mind you, I would not under any circumstances use any variation of the word “password” as a password, since it is absolutely the most common to ever have been used.

I forgot to mention most of the vaults mentioned thus far will happily and quietly produce passwords for you.  I actually don’t have any advice for you should you just lose “it”, the password, and access to files.  Well, except for the advice I took when I lived in Spokane as a kid, right across the mountains from the nuclear testing (and knew about it).  I think that translates into something like “Bend over and kiss” something “goodbye”.

And on.

And now we come to mini-Trezor.  I suppose someone had just had his mouth broken the day before and couldn’t pronounce “treasure”.  One-user, 0ne-computer application, although several storage devices may be used (discs, that is, although things like pens and pencils still do actually work).

The next search result I have is from Tucows, and I strongly advise against visiting that site any more.  I did some investigating, and what made my “mind” up was this; of their top ten recommended downloads…every one of them resolved via whois to the same domain in Russa/UK (oops, Ukraine) [like ISP] that had the scamware (badware that will solve all your problems, most particularly including “”.  One program I began downloading did make me a gift of a Trojan; ZLob, I believe.  So I would give Tucows a firm miss.  This is not a sudden happening; I’ve watched it progress over quite a few years.  So:  FWIW.  I certainly am no guru.  I did have fun removing that Trojan.

…Okay.  I can’t go any more.  My back is really killing me.

This only leaves fifty or so freeware password programs.  The major reason I’m doing this is because almost all have password generation utilities (even though I’ve not mentioned that) and there’s simply no reason for not keeping strong, up-to-date passwords.  There never was, but this is presenting it on silver platter and all.  What I’ve presented thus far is only a small part (though some will doubtless be repetition) from one search engine—desktop–that everyone has pretty well forgotten about.  I have another one.


Entry filed under: computers/tech, freeware, how to, internet, internet security.

The New, Secure Web Important News About Rush Limbaugh

1 Comment Add your own

  • 1. secure_it  |  April 1, 2009 at 12:25 am

    Thanks for this. Very good information!


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Trackback this post  |  Subscribe to the comments via RSS Feed

%d bloggers like this: