Uncategorized Free information security software – when is it allowed and when is it not allowed to use them?