Strategies to Mitigate Targeted Cyber Intrusions
At least 85% of the targeted cyber intrusions that Defence Signals Directorate (DSD) responds to could be prevented by following the first four mitigation strategies listed in our Strategies to Mitigate Targeted Cyber Intrusions:

  • use application whitelisting to help prevent malicious software and other unapproved programs from running
  • patch applications such as PDF readers, Microsoft Office, Java, Flash Player and web browsers
  • patch operating system vulnerabilities
  • minimise the number of users with administrative privileges.

US Naval Safety Center – Approach Flight Safety Magazine

XAMPP is a very easy to install Apache Distribution for Linux, Solaris, Windows and Mac OS X. The package includes the Apache web server, MySQL, PHP, Perl, a FTP server and phpMyAdmin.

Light On The Hill Speech by Ben Chifley

HandBrake is an open-source, GPL-licensed, multiplatform, multithreaded video transcoder.

Remove Empty Directories
RED searches and deletes empty directories recursively below a given start folder and shows the result in a well arranged tree. Further you can create some custom rules for keeping and deleting folders. Empty files in directories can also be ignored.
[Found this to be an extremely useful program – Dale]