Saturday, August 21, 2010
Secure your PC from Internet browsing risks
Learn more about it, and download at http://www.kace.com/products/freetools/secure-browser/
Download now, its free.
Tuesday, August 10, 2010
Windows Application Blocker : Block Any Application With One Click
How to block an application:
- Run the tool.
- When it asks for the password, click OK.
- Type the application’s executable name in the Application Executable Name textbox (Add the extension also).
You can find the application’s executable name with the following tutorial:
- Right-click on the application’s shortcut.
- Select Properties.
- The application’s executable name will be in Target textbox.
- Click Block.
How to unblock an application:
- Run the tool.
- When it asks for the password, click OK.
- Select the application that you want to unblock from the Blocked Applications list.
- Click Unblock.
How to change password:
- Run the tool.
- When it asks for the password, click OK.
- Click Change Password.
- Type your new password in the Enter new password textbox.
- Click OK.
Tuesday, March 3, 2009
Updating BitDefender 2008
MANUAL METHOD
Click on this link : http://download.bitdefender.com/updates/bitdefender_2008/x86/weekly.exe
download the file and run it.
AUTOMATIC METHOD
To configure the automatic update do the following:
1. Open BitDefender and click Update to open the Update module.
2. Click Settings.
3. Configure the Update location settings.
BitDefender 2008 includes two update locations, allowing one of them to point to a local mirror. The default update location is http://upgrade.bitdefender.com/. This is the location recommended for normal users.
BitDefender checks for updates every 1 hour. You can change the period BitDefender updates from Time interval. By changing the number displayed in the box you will modify the number of hours after which a check for updates is performed.
Leave the Confirm update to Silent update unless you desire to be prompted before downloading the updates or before installing them. A similar option is available for the manual update under the Manual update settings.
5. Configure the Advanced settings.
To prevent prompts asking for reboot, select Wait for reboot, instead of prompting.
7. Click Default to restore the default settings.
Occasional updates can be perfomed at any time, even when the product is set to update automaticaly:
1. Open BitDefender and click Update.
Click also Update at the top of the window if the Settings are displayed
2. Click Update now to start the update process.
If the option Prompt before downloading updates was selected in the Settings, and when updates are available, a list of the updates available for download is displayed. Select the product to install and click Details to see the file download details. Select Switch to silent update (don't ask me again) to stop being prompted on manual update. Click Ok to download and install the new files or Cancel to postpone the update.
For more help, follow the following links :
http://kb.bitdefender.com/KB233-en--Updating-BitDefender-9.html
http://www.bitdefender.com/site/view/Desktop-Products-Updates.html
Wednesday, July 2, 2008
Coreflood Trojan Infects Thousands of Corporate Computers
The trojan works by infecting a particular work station and then laying there dormant until the network admin accesses that computer. The trojan remembers all usernames and passwords so, by grabbing the admin's log-in data, it can spread throughout the entire network. SecureWorks has already come up with security solutions for the Afcore trojan and has announced all its collaborators to do the same. Law enforcement agencies have also been briefed about the current situation.
The trojan has so far been able to infect thousands of individual PCs belonging to all kinds of corporations. The purpose of the trojan is to gather the user's personal and bank information and then deliver it to the hacker. Besides user names and passwords, the virus also stores the text content of the web page the user visits, so the hacker can be able to better determine if the info is valuable or not. For example, if an employee goes online to check their bank balance or make an e-payment, the trojan will detect their username, password and all other text info. The hacker can then take a look at said text and determine if it is worth accessing the user's bank account or not. He saves huge amounts of time by accessing only certain accounts and not all of them.
SecureWorks researchers say that getting an exact figure regarding how much money the trojan has access to is a laborious and lengthy task. Keeping in mind that thousands of computers were infected, that amount could easily surpass a few million dollars.
Thursday, June 26, 2008
Kaspersky Anti-virus 7.0 Genuine License free...
Monday, June 23, 2008
Security Flaw Tarnishes Firefox Download Record
But the success was tempered by reports from a software security company that Firefox 3.0 contained a serious security flaw that potentially lets an attacker take over a PC if a user clicks on a booby-trapped link.
According to the Mozilla foundation that released the new browser, the software was downloaded 8.3 million times in its first 24 hours of release starting Tuesday morning.
The downloads were so popular that they initially crashed the servers running the operation.
At their busiest, the servers were handling more than 9,000 downloads per minute and within five hours had surpassed the initial daily download of 1.6 million set by Firefox 2.0 in October 2006.
DV Labs/Tipping Point did not release details of the security flaw except to Mozilla, but news of the glitch was damaging to the browser which was claimed to be much more secure than the previous version.
Firefox 3.0 offers faster web browsing than the previous versions, along with lower memory use and nifty features like a built-in search application that automatically combs your web history.
Tech critics greeted the new browser and recommended users to adopt it.
"Firefox 3 is the best Web browser I've ever seen. And I've been using the Web since before there were Web browsers," said ComputerWorld's Steven J. Vaughan-Nichols.
Firefox has been rapidly attracting users since its 2004 launch and now has approximately 18 percent of the market, compared to the 72 percent share enjoyed by Internet Explorer which has the advantage of being pre-installed on the vast majority of computers.
Firefox is mainly downloaded by individual users and as of February 2008 it had been downloaded over 500 million times. However, since one user may download the software several times, the best estimate for regular Firefox users is around 140 million.
Thursday, June 12, 2008
Israeli co invents see through device
"The idea of seeing through walls has been around since the 1960s, but modern technology is now ripe enough to enable it to happen," Camero's technology director Amir Beeri said. "When we established the company in 2004, we intended to develop sufficiently high vision resolution to allow an untrained user to see through a wall," Beeri said.
Camero's unique radar utilises Ultra Wide Band (UWB), a technology that has come of age recently and with the use of special algorithms can process data picked up by the detector to give a reasonable image of anything behind the wall.
The system made by its competitor, Time Domain, lacks imaging algorithms and is able to reveal only whether there is someone on the other side of the wall, the report said.
The firm's earlier version of the system weighed about 10 kgs and was too clumsy for use, but the new system is smaller, light in weight and meant for use as a quick-to-use tactical tool. The system is capable of penetrating various types of walls, but not solid metal ones like the walls of shipping containers.
The firm's CEO, Aharon Aharon, is optimistic about the future of the technology and says, "Like the Israeli army's night vision system, which was once an expensive product and eventually came into broad, general use, we hope that our radar too will become standard issue for all military units."
Opera 9.5 RC 1 Now Download-able
Opera 9.5 RC 1 attempts to bolster security with anti-phishing and anti-malware technology. For instance, Opera users will now get warning messages upon visiting hacked Web sites carrying Trojans and malicious code as part of the 'Fraud Protection' feature that draws on the likes of Haute Secure, Netcraft, PhishTank, and Google. Meanwhile, Firefox 3 RC 2 downloads an updated blacklist of malicious Web sites provided by Stopbadware.org, a group co-founded by Google.
Apart from enhanced security, Opera 9.5 RC 1 includes a new skin for Windows and Mac platforms along with a fix for all POP accounts to download email messages. There's also a new 'Opera Link' feature in RC 1 that enables easy synchronization of bookmarks between different devices running different versions of Opera.
Wednesday, June 11, 2008
McAfee names Hong Kong most dangerous domain on the Web
"Just like the real world, the virtual threats and risks are constantly changing. As our research shows, Web sites that are safe today can be dangerous tomorrow. Surfing the Web based or conventional wisdom is not enough to avoid risk online," said Jeff Green, Senior Vice President of Product Development...
Microsoft Warns Against Using Safari
Good news is that according to Redmond there aren't yet any known attacks against the flaw. Bad news is that if anyone does create such an attack, a crook could install any software he wished - such as 'bot' malware that allows for complete remote control - on a victim PC.
The threat targets two separate flaws, one in Safari and one in IE, and you'd have to first browse a malicious site with Safari. Doing so would download unwanted software onto your desktop, which could then be executed without your permission by triggering a separate flaw in IE (and you wouldn't have to start IE to get hit). In its security advisory, Microsoft acknowledges the critical risk of 'remote code execution,' which is as bad as it gets.
Apple, on the other hand, says "we are not treating this as a security issue," according to a quoted e-mail posted by stopbadware.org. Not a good move, if you ask me.
If you do use Safari, Microsoft says you can apply a workaround to protect yourself. Change the default download location (normally the desktop) in Safari with the following steps:
Launch Safari. Under the Edit menu select Preferences.
At the option where it states Save Downloaded Files to:, select a different location on the local drive.
Source : http://www.pcworld.com/
Monday, June 9, 2008
Blackmail ransomware returns with 1024-bit encryption key
The biggest change in this variant of the ransomeware is the use of RSA encryption algorithm with a 1024-bit key, making it impossible to crack without without the author’s key. Here’s the explanation:
We recently started getting reports from infected victims, analysed a sample, and added detection for Gpcode.ak to our antivirus databases yesterday, on June 4th. However, although we detect the virus itself, we can’t currently decrypt files encrypted by Gpcode.ak – the RSA encryption implemented in the malware uses a very strong, 1024 bit key.
The RSA encryption algorithm uses two keys: a public key and a private key. Messages can be encrypted using the public key, but can only be decrypted using the private key. And this is how Gpcode works: it encrypts files on victim machines using the public key which is coded into its body. Once encrypted, files can only be decrypted by someone who has the private key – in this case, the author or the owner of the malicious program.
After Gpcode encrypts files on the victim machine, it adds ._CRYPT to the extension of the encrypted files and places a text file named !_READ_ME_!.txt in the same folder. In the text file the criminal tells the victims that the file has been encrypted and offers to sell them a “decryptor”:
«Your files are encrypted with RSA-1024 algorithm.
To recovery your files you need to buy our decryptor.
To buy decrypting tool contact us at: ********@yahoo.com»
There are three Yahoo e-mail addresses associated with the new version of the ransomware.
Saturday, June 7, 2008
Sneaky Blackmailing Virus That Encrypts Data
How Laptops in Education Can Help Dictators, Hurt Learning
-
Tuesday, June 10, 2008 2:10 PM PDT A leak on a Microsoft Web site referring to a product in the Office suite hints at a 2009 release for the...
-
Another week, another quantum computing story. Quantum computing is a very hot topic in the world of physics at the moment because, for the...
-
holy_calamity writes "New Scientist reports on worries that the OLPC's BitFrost security protocols could hand a ready-made surveil...