Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions


  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

  1. jerry.chen

    Total Recovery Pro 9.03

    Total Recovery Pro 9.2 Supports Windows 8.1 Download link: http://ppt.cc/MK8z
  2. jerry.chen

    TotalReovery Pro 9.1

    Total Recovery Pro 9.2 Supports Windows 8.1 Download link: http://ppt.cc/MK8z
  3. jerry.chen

    RestoreIT 2014

    Overview RestoreIT S.M.A.R.T. (System Monitoring and Analysis Restore Technology ™) snapshots are automatically created upon Windows files modifications. This patented technology allows users to instantly undo virus infections and fix Windows issues, such as registry corruption, failed software installation, and accidentally deleted files. S.M.A.R.T Snapshot ™ Technology RestoreIT allows users to take S.M.A.R.T event-driven based snapshots and store them in a protected area or so called virtual partition. Any system file modifications and software installations will trigger the program to create a snapshot, effectively securing users' PCs from virus infections. When Windows behaves abnormally, users can roll back and restore hard drive to its previous snapshot state. It takes only a few minutes. Any viruses and malware will be removed. Accidentally deleted files and Windows settings will be recovered. What's new in RestoreIT 2014? New: Windows 8.1 SupportedNew: S.M.A.R.T Event-driven snapshotNew: Performance optimizedNew: Password protectionNew: Support UEFI-based/GPT, >4TB and RAIDNew: 64 bit Recovery EnvironmentNew: Support Software and Hardware RAIDsMain Features S.M.A.R.T snapshot assures virus infection can be undoneRestore Windows even if it won't bootAutomatic, 24/7 Ongoing ProtectionCompletely remove any virusSafety Net secures snapshot created before virus hitsRoll Back to Pre-Virus State & Restore FilesInstant protection after installationRestore entire Windows in 2 minCreate a snapshot in 5 secondsHot key recoveryPreview files in snapshotsRestore individual files or entire hard driveDOWNLOAD LINK: (1) for Win7, 8, 8.1 (28.4MB) new version: http://www.farstone.us/download/RestoreIT/RIT-2014a-GM-ML-20130927-NoPE.exe (2) for WinXP,Vista (323MB) old version: http://www.farstone.us/download/RestoreIT/RIT-2013c-GM-En-20130605.exe User's guide: http://www.farstone.com/resources/manuals/restoreit-usermanual.pdf Support multiple languages; English, Traditional & Simplified Chinese, German, French, Italian, Spanish, Portuguese RestoreIT is for snapshot, fast backup & recovery. If you want a disk imaging program, please use Total Backup Recovery series. http://www.farstone.com/software/network-products.htm If you want to clone your HDD or SSD, please use DriveClone. http://www.farstone.com/software/Drive-Clone.php Currently, there is a non-commercial version of DriveClone. The functions are all open for free, except for mirror drive.
  4. Researchers have found a way to get past Picture Gesture Authentication. Recently during the USENIX Security Symposium, researchers from Arizona State University, Delaware State University and GFS Technology Inc. presented "On the Security of Picture Gesture Authentication," a paper (pdf) showing that most unique picture password gestures used in Windows 8 aren't quite so unique. In fact, it may not really matter what picture the Windows 8 account holder uses: the login screen can still be easily bypassed. "Based on the findings of our user studies, we also propose a novel attack framework that is capable of cracking passwords on previously unseen pictures in a picture gesture authentication system," the paper states. "Our approach is based on the concept of selection function that models users' password selection processes. Our evaluation results show the proposed approach could crack a considerable portion of collected picture passwords under different settings." Through online studies, the researchers analyzed picture gesture authentication on more than 10,000 picture passwords collected from over 800 subjects. They discovered that one of the most common methods used in this authentication process was with a photo of a person and triple tapping on the face, one of which lands on the eyes. The study also discovered that users would rather upload one of their own photos than use an image provided by Microsoft. The study determined that there is a relationship between the background images and the user's identity, personality or interests. Images used in the study ranged from celebrity wallpapers to in-game screenshots, but most users chose pictures of people. Around 60 percent of the users surveyed selected areas on the image where "special objects" were located. Even more, eyes were the most frequently used area followed by the nose, hand or finger, jaw and face. "It is obvious that pictures with personally identifiable information may leak personal information," the paper states. "However, it is less obvious that even pictures with no personally identifiable information may provide some clues which may reveal the identity or persona of a device owner. Traditional text-based password does not have this concern as long as the password is kept secure." At the end of the study, the researchers had gathered enough evidence to develop an attack framework capable of cracking passwords on previously unseen pictures in a picture gesture authentication system. The researchers want this framework to serve as a picture password strength meter so that users can better protect their systems. Microsoft could impose a no three-tap rule to help ensure a better tap-based password, but rule-based passwords typically are ineffective for traditional text-based versions, the researchers said. "The cornerstone of accurate strength measurement is to quantify the strength of a password," the paper states. "With a ranked password dictionary, our framework, as the first potential picture-password-strength meter, is capable of quantifying the strength of selected picture passwords. More intuitively, a user could be informed of the potential number of guesses for breaking a selected password through executing our attack framework." Original Article: http://www.tomshardware.com/news/picture-gesture-authentication-windows-8-security,24560.html
  5. The National Security Agency has been trying to crack the online anonymity provided by Tor, a US-funded Internet tool designed to keep Net activity private and said to be widely used by dissidents in oppressive countries, as well as by terrorists. That's according to the latest secret intelligence documents drawn from the cache leaked by Edward Snowden and published by the UK's Guardian newspaper. The NSA hasn't been able to crack Tor outright, but through various means it's been able to "de-anonymize a very small fraction of Tor users," says an internal NSA document quoted by the Guardian. The news of the agency's interest in Tor follows a report last month on the NSA's efforts to circumvent privacy-ensuring encryption of all kinds. The New York Times said the agency has sidestepped common Net encryption methods in a number of ways, including hacking into the servers of private companies to steal encryption keys, collaborating with tech companies to build in back doors, and covertly introducing weaknesses into encryption standards. The revelations are all part of the outcry over surveillance that's been kicked up by the Snowden leaks. Tor -- originally TOR, or "The Onion Router" -- was first developed by the US Naval Research Laboratory and is currently funded in part by the US State Department and Department of Defense. To put it simply, Tor facilitates anonymous Web surfing, forum posting, instant messaging, and other Internet communication by wrapping signals in layers of encryption and then sending them on an unpredictable path through a network of routers. Each router peels off one "skin" of encryption to send the signal along, but no one router has access to all the details -- thus the signal can't be traced back to its sender. US government funding is based, in part, on the desire to help Internet users in a country like China, say, access restricted sites or communicate about prohibited subjects without fear of reprisal. But Tor might also be used by journalists (in the US and elsewhere; Americans use Tor as well) -- who are looking to protect communications. It might even be used, the Tor Project site says, "for socially sensitive communication: chat rooms and Web forums for rape and abuse survivors, or people with illnesses." Law enforcement agencies say Tor is also used by terrorists, drug dealers, and child pornographers. The newly published NSA documents say the agency will "never be able to de-anonymize all Tor users all the time" and that it's also had "no success de-anonymizing a user in response" to a specific request. But the Guardian reports that the agency secretly tries to "direct traffic toward NSA-operated servers," that it measures "the timings of messages going in and out of the [Tor] network to try to identify users," that it "attempts to degrade or disrupt" Tor so people will stop using it, and that it has implanted "malicious code on the computers of Tor users who visit particular Web sites." One NSA technique, code-named EgotisticalGiraffe, took advantage of a flaw in a version of the Firefox browser that was packaged by the Tor Project with other software designed to let people easily get up and running with the service. If people using that software bundle visited particular Web sites, the NSA placed malware on their machines that let the agency access their files and monitor their keystrokes and Web activity. That flaw has since been fixed in more recent versions of Firefox. The NSA justified its actions, in general terms, in a statement sent to the Guardian: In carrying out its signals intelligence mission, NSA collects only those communications that it is authorized by law to collect for valid foreign intelligence and counter-intelligence purposes, regardless of the technical means used by those targets or the means by which they may attempt to conceal their communications. NSA has unmatched technical capabilities to accomplish its lawful mission. As such, it should hardly be surprising that our intelligence agencies seek ways to counteract targets' use of technologies to hide their communications. Throughout history, nations have used various methods to protect their secrets, and today terrorists, cybercriminals, human traffickers and others use technology to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that. But a representative for the Electronic Frontier Foundation, a past Tor Project funder and a self-described defender of free speech and privacy in the realm of technology, was troubled by the revelations. Citing the example of a battered woman who might use Tor to hide her visits to an online help service from her attacker, as well as uses by dissidents, EFF Legal Director Cindy Cohn told CNET, "Of course the government should get to go after bad guys, but they shouldn't be able to break the security and trust promises of the Internet to do that." You can read the Guardian's package of stories about the NSA and Tor here. Update, 1:21 p.m. PT: The Director of National Intelligence has responded to the Tor news. In a post on the "IC on the Record" blog James Clapper says, in part, "the articles fail to make clear that the Intelligence Community's interest in online anonymity services and other online communication and networking tools is based on the undeniable fact that these are the tools our adversaries use to communicate and coordinate attacks against the United States and our allies." You can read Clapper's statement in full here. Original Article: http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/
  6. ORLANDO -- Eric Schmidt, Google's executive chairman, put a question to an audience Gartner's Symposium ITxpo here on Monday. "Raise [your] hand if you're sure the Chinese are not inside your corporate network." Many of the 8,500 attendees were in the hall to hear the question, but only five hands were raised. "Congratulations," Schmidt said from the stage. Getting more serious, Schmidt lamented the open pathways in corporate networks, letting hackers slip in via NT servers. Schmidt suggested a better network would eliminate the corporate intranet. "We're going to have just a network. We're going to make sure that gaining access is application to application," he said. In an interview on stage with Gartner analysts David Willis and Drue Reeves, Schmidt was asked whether he's sure that Chinese hackers haven't penetrated Google's corporate network. "We're quite sure they are not right now," said Schmidt of the Chinese, "although every second we check." The audience chuckled. "I can be quite sure that the Chinese are visiting the U.S. government at the moment because no one is there," said Schmidt, a reference to the federal government shutdown. Major vendors, and other companies, have faced attacks from China. Meanwhile, when asked about the security of mobile devices running the Google built Android operating system, Schmidt said "it's more secure than the iPhone." Original Article: http://www.arnnet.com.au/article/528475/chinese_hackers_miss_google_network_checks_go/
  7. There will be a new version supporting more languages, including English, German, Spanish, French, Italian, Traditional & Simplified Chinese..
  8. You can try the latest non-commercial version. Only function is limited. The rest functions are open. :D http://www.farstone.us/Download/Ronnie/DC-10-GM-En-20130726(NC).exe
  9. I've had some exchanges with other folks because I've got some gripes with SBIE - and the biggest gripe: Even when SBIE is made portable it STILL puts files & folders into the C: drive. VERY NOT COOL. I keep the C: drive as much for the OS as possible, and as clean as possible. PERIOD. (And exceptions to this are very, very rare.) Many times I've been asked why I'm such a PITA about isolating the OS in it's own partition - keeping programs, downloads, data and most any&everything OUT of the C: partition. Here's a very current example: Today I installed Trojan Remover (not in C: !!!) and after updating it, started a scan of just C:. It's been scanning almost an hour now, scanned 20,000 files so far, and found just one thing that appears to be part of the stooopid .NET stuff (and renamed the file for me). Based on how long it's taken to sacn under 10GB here's the 1st good reason for isolating the OS=> If I let it scan my entire HDD, it might take several whole days !!! Now here's some more generally correct info: - When malware of whatever sort attacks, it is generally aimed at the OS as well as the C: drive. - If something harms a system, it is usually the OS that is targetted most often. - If the C: drive becomes inaccessible, the system cannot boot. In regards to ongoing security and the ability to repair some such problems: - If the system is not bootable it is possible to gain access to files on other partitions quite easily via other boot media (even if C: cannot be accessed). - If C: is totally messed up beyond repair then it is easier to restore an isolated, smaller C: alone from an image than to restore the whole contents of a system based entirely upon having one huge partition. - Even if the space occupied by C: is somehow corrupted beyond re-use, if an empty space is reserved then the image of a smaller C: can easily be restored and made bootable from that other space. I've been using windows this way for a very long time - and largely avoid win-rot this way too. If/when any program is so poorly made as to REQUIRE using the C: drive, and it is not any sort of device driver s/w or system service - I will generally find a better way to do whatever that program is for. (IMO it is usually best to just completely avoid badly made s/w rather than trying to tweak it to be better.) Any programmer who fails to allow their s/w to be custom-installed to where ever the user wishes it to be is not someone whose code I am inclined to trust inside my PC. BTW, the malware scan completed while I typed this and did take just over an hour to do my small C: partition alone.
  10. Hello buddy.. i would like to ask to you how to : 1. Lock and give the password to the folder in Sharing / Network / small office 2. Setting the Sharing Folder in Permission in order to Editable folder for my self not for everyone So, i can feel save about my folder from the other's reach. Thank before buddy... i'm really need this tutorial.....
  11. rudrax

    Baidu Antivirus 2014

    I was searching for an free antivirus for one of my friend's old resource conscious tin-box and ended up at Baidu antivirus. Really, it is very calm on that Celeron D, 1GB DDR box. It has multiple antivirus engine and has many more premium tools. It is, indeed a feature rich product for free. One of it's inbuilt feature that has drawn my attention is "protection against USB mass storage drive". When you insert a pen drive, it immediately scans it, provides you an option to "safe open" it and remove it through a gadget like interface. The whole interface is also pretty appealing. If you want to give it a try, it's just below - Online installer - 1.2M Offline installer - 110M Homepage
  12. Website: http://www.mcafee.com/us/downloads/free-tools/stinger.aspx Downlaod x32: http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe Downlaod x64: http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe Portable: Yes Stealth: No Build Number: Build Date: 31-Oct-2013 Stinger 32bit MD5: eb026fccc234651930df09abe48e94e1 Stinger 64bit MD5: 8329a0c090dc12bdcc56ed4d0d7a55e0 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications. New Detections: • Adware-SaveShare • BrainInstall Enhanced Detections: • BackDoor-FHI • Exploit-PDF.sb.gen • FakeAlert-FRM • FakeAlert-SecurityTool • PWS-ZBot.gen.aux • PWS-Zbot.gen.oj • Vundo.gen.cg • W32/Autorun.worm.dq • W32/Autorun.worm.h Synopsis: Great light-weight portable security tool.Efficient at what it does.Only drag is the required manual daily update.. but don't worry.. i have a remedy :) Remedy: An Online installer for both x32, x64, or USB Mode which installs & updates both versions :)McAfee Stinger is updated daily.. simply re-run the Online installer to update.StingerPortable_x.x_32bit_64bit_English_online.paf.exe Makes application stealthCRC32: 09BC8A80Size: 393 KB (402,676 bytes)Usage Tips Go into Advanced > Settings > select "Report" for "On threat detection".Go into Quarantine > Quarantine Settings > Move location to StingerPortable > Data > Quarantine.
  13. Does anyone have a recommendation on a good hard drive wiping software that boots from CD/USB drive? I recently swapped out my parents' aging Athlon XP system to something from this decade and before I take their old machine to the local Goodwill, I want to be sure their data can't be read.
  14. sweeper240

    Hello Hello

    Hi nsane forums! I just found you because I was looking into different internet security options. Came upon this site with lots a great information. I am very interested in virtualization and security right now because I am building up a new website with wordpress... I know its not the most secure way to do it, but wordpress is easy to develop with and input content so the trick is making it as secure as possible. any help, tips/tricks would be greatly appreciated Thanks -sweeper240
  15. Just wanted to let you know about the discount of HitmanPro. :) 1 Year license 12,49 USD instead of 25,99 USD Till 02.12.2013 Link: https://www.cleverbridge.com/747/uurl-i7q2528af1
  16. TDSSKillerPortable_x .x_English_o nline.paf.exe PortableApps.comFormatMakes application portableMakes application stealthDependencies: Administrative PrivilegesUNC: YesCompatible: WinAllCRC: 70AD6C73Size: 253 KB (259,642 bytes)Note: when an update is released, simply re-run installer to update. Why post an app. that's already posted by PortableApps.com? Because their version is faulty, leaves trash behind in the registry & file system.
  17. The Full Disclosure security mailing list, which has been one of the main discussion forums for vulnerability and exploit information for 12 years, is shutting down because “‘one of our own’ would undermine the efforts of the last 12 years”, one of the creators said. John Cartwright, one of the creators of the Full Disclosure list, posted a message on the list saying that he was suspending the list immediately because someone in the security community had asked that a large number of messages be removed from the list’s archive for an unspecified reason. Cartwright did not name the person who made the request, but said he was unwilling to take a “virtual hatchet to the list archives on the whim of an individual”. When it began in 2002, Full Disclosure was an alternative to the Bugtraq list, which was moderated, something that annoyed some of the members. The new list was meant to be a more free-form discussion and it often included information on zero day vulnerabilities, along with exploit code, especially in the early days. Many software vendors were not too happy to have data on bugs in their products published on a mailing list, but in 2002, most of those vendors didn’t have established security response processes, bug-reporting guidelines or even email addresses to accept vulnerability advisories. Full Disclosure was a valuable source of information on vulnerabilities in all manner of software and hardware and many vendors over the years began posting their own advisories to the list. The list had more than its share of trolls and troublemakers and it got the occasional legal threat from vendors. But Cartwright said he never thought that the reason he’d have to shut Full Disclosure down would be the actions of a member of the list and not a vendor. “I never imagined that request might come from a researcher within the ’community’ itself (and I use that word loosely in modern times). But today, having spent a fair amount of time dealing with complaints from a particular individual (who shall remain nameless) I realised that I’m done,” Cartwright wrote in his message. “I’m not willing to fight this fight any longer. It’s getting harder to operate an open forum in today’s legal climate, let alone a security-related one. There is no honour amongst hackers any more. There is no real community. There is precious little skill. The entire security game is becoming more and more regulated. This is all a sign of things to come, and a reflection on the sad state of an industry that should never have become an industry.” Full Disclosure appeared on the scene at a time when many vendors were not paying a whole lot of attention to security and security researchers who found flaws in their products. Posting full details of a new bug for the world to see on the mailing list was one of the few methods researchers had to get vendors to pay attention and fix their software. Now, most major vendors have formal security response processes and deal directly with researchers on a regular basis, and some have lucrative bug bounty programs to reward them for their work. And, for researchers who would rather go another route, they can simply post a link on Twitter or write a blog post and get the word out more quickly than sending a message to a mailing list. “Most people I know unsubscribed from Full Disclosure a long time ago. The signal-to-noise ratio is very low, and these days vulnerability researchers have no need for traditional mailing lists to publish their findings. We have blogs and Twitter, not to mention hundreds of security conferences. I think many will be nostalgic about the early days of Full Disclosure, but closing the list will have no noticeable impact on the industry or our ability to share information,” said Chris Eng, VP of security research at Veracode. The end of Full Disclosure puts a period at the end of that chapter in the security industry. “I’m suspending service indefinitely. Thanks for playing,” Cartwright wrote. Source
  18. Source: http://malwaretips.com/threads/limited-time-betanews-offer-get-6-free-months-of-bitdefender-mobile-security.24507/ Giveaway page link: http://www.bitdefender.com/media/html/betanews-bms/ p.s. you have to activate your license within 7 days of getting the mail.
  19. Anvi Smart Defender Pro Malware are bad and Anvi Smart Defender is big to defend against mushrooming threats including trojans, rootkits, spyware, rogueware, ransomware and more. "A clean and nice GUI. Very good and eary to use.It takes low system usage resources and lowmemory RAM usage. That's really good. And finally, it really blocks all malware! It keeps to update database daily.." All-round Positive GuardTo enable your computer system immune to mushrooming threats, Anvi Smart Defender v2.0 integrates all-round positive guard including file system guard, network guard and the newly added anti-hacker and anti-exploit. It can not only protect your PC system from damages and loss due to infections but can also prevent your computer getting infected via remote access guard, remote execute guard and anti-exploit. Anti-hackerVarious hacking activities flood the cyberspace. And the newly added Anti-hacker in this version will check all related system services and settings to ensure the computer system is safe from potential hacker attacks. If any risky items detected, one-click solution is provided to help fix all, while you can also choose the item to ignore as per your personal needs. Features of Pro Version: Anvi Smart Defender v2.0 Released Website: http://www.anvisoft.com/ OS: Windows XP / Vista / 7 / 8 (x86-x64) Language: ML Medicine: Key Size: 31,88 Mb.
  20. Bausch

    Nulled Boards.

    Hello everyone, I was wondering about the risks if one opts for using nulled php software on a forum, is it really safe, or there are known cases of backdoors and other risks involved? I am not sure about what is being said that the teams who do the nulling may insert code of their own that would compromise the security of the forum, such could be scare tactics to discourage many from using a nulled board. Also, are there trusted sources for such releases, or if one group is better than another in any way? Thank you.
  21. The Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform.The new EMET 4.0 also provides a configurable SSL/TLS certificate pinning feature that is called Certificate Trust. This feature is intended to detect man-in-the-middle attacks that are leveraging the public key infrastructure (PKI). What's new in this version: Minor UI and stability improvements: Expired Certificate Trust rules are now highlighted in the user interface (UI).Expired Certificate Trust rules no longer trigger notification.Resolves an issue in which CTRL+A (Select All) on any table cannot be undone.Resolves a rare issue in which an exception is thrown when you open the support link on the Help menu.Application compatibility issues: Enables MemProt, SimExecFlow, and CallerCheck mitigations with Google Chrome Canary Edition, Adobe Acrobat, Adobe Reader, Apple iTunes, and other programs.Resolves a deadlock issue that is caused by the incorrect use of missing reporting functionality in Windows XP.Configuration and deployment improvements: By default, enables the DeepHooks global flag as part of the Recommended Settings configuration.Extends the expiration date for all default Certificate Trust rules to 8/1/2015.Resolves an issue in which the GPO application configuration is parsed incorrectly. This results in AuditMode being unintentionally enabled for the configured applications.Resolves an installer issue in which EMET_Agent cannot start when it is deployed in silent mode.Download: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Update 1 | 8.2 MB (Freeware) Download: EMET User Guide | 1.9 MB View: EMET Homepage
  22. Note: x64 guide in link near the bottom of the article.. Microsoft's official support for the Windows XP operating system ended more than a month ago. While some companies and organizations are still receiving updates for the operating system, end users do not. These companies pay Microsoft for that, usually because they were not able or willed to migrate computer's running Windows XP to another operating system before the extended support phase for the system ended. There is another exception to the end of support rule: Windows Embedded Industry, formerly known as Windows Embedded POSReady, operating systems continue to receive updates. What makes this interesting is the fact that Windows Embedded POSReady 2009 is based on Windows XP Service Pack 3, and that the security updates released for that system are identical with the ones that Microsoft would have released for XP systems. The extended support for Windows Embedded POSReady 2009 systems ends on April 9th, 2019 which means that you can use the trick to get another five years of security patches for XP. What you cannot do is go ahead and install those updates as you will get a version mismatch error when you try to do so. There is however a trick that you can use to bypass those checks so that you can install those updates on your version of Windows XP. Note: The trick works only for 32-bit versions of Windows XP SP3 and not 64-bit versions. While POSReady systems are very similar to Windows XP systems, it is recommended to back up the system before you make any changes as differences between the systems may result in issues after installing updates designed for it. All you need to do is add the following to the Windows XP Registry: Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady] "Installed"=dword:00000001 I have uploaded a Registry file for you that you can use for that purpose. You can download it here: xp-security-updates.zip (112 downloads) If you prefer to create one on your own do the following: Create a new plain text document. Paste the contents displayed above into it. Save the new document as xp.reg. Double-click the Registry file afterwards to add the contents to the Registry. Alternatively, open the Registry Editor manually: tap on Windows-r, type regedit and hit enter. Navigate to the key listed above and create a new Dword with the value listed there as well. (via Desk Modder and Sebijk) Both source sites are in German. If you open the Sebijk site, you will also find instructions on how to get this to work on 64-bit Windows XP systems. It involves running a batch file that replaces original update files with temporary ones that bypass the restrictions set in place. Closing Words If you are running Windows XP and do not want to switch to a new system or cannot, then you may want to try this trick to install security patches designed for the POSReady 2009 operating system on your PC. I recommend highly that you create a backup before you update the system as there is no guarantee that all updates will work properly on XP PCs. While POSReady 2009 uses the same core, some things are different after all. Nevertheless, this is better than not installing any security updates. Source
  23. How you participate is up to you, but be ambitious! Sites: promise to add HTTPS, HSTS, and PFS this year. Mobile apps: add SSL & cert pinning, including for third party code like ad networks and analytics. Large companies should follow the Encrypt all the Things Data Security Action Plan. Everyone else: promote the privacy pack on June 5th to spread privacy tools! https://www.resetthenet.org/
  24. I'm using an online service that provides a tool to convert my audio files http://www.etyn.com/tools/audio-converter but I know nothing about the safeness of the tool. the site looks good but how can I make sure that it's secure and if it's not how can it harm my PC?? Any help would be greatly appreciated.
  25. Giveaway Extended for Bitdefender Internet Security 2015 The giveaway ends in 7 hrs.! UPDATE: The giveaway is over As you may or may not know, Softpedia and Bitdefender have put together a giveaway promo over this past weekend for the new av tool, Bitdefender Internet Security 2015. However, the developer's website had some server issues last night that prevented users from claiming their free key for the application. Therefore, Bitdefender has decided to provide extra time for those unlucky ones who haven't got a chance to obtain a license. In other words, there are a few more hours added to the timer, more specifically until today, Monday 21 at 16:00 UTC (9:00 a.m. PDT/PST). Giveaway page
  • Create New...