Jump to content

Search the Community

Showing results for tags 'Security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. UPDATE 1 UPDATE 2 ------------------------------------------ 1) - Spycar What is Spycar? Spycar is a suite of tools designed to mimic spyware-like behavior, but in a benign form. Intelguardians created Spycar so anyone could test the behavior-based defenses of an anti-spyware tool. Spycar runs only on Windows, the same platform most targeted by spyware developers. What does Spycar do? The following links are Spycar. Clicking on each of the links will make Spycar try to take some benign action on your system. When you first run it, Spycar will ask you to name a test profile, a small file where we'll store state information about a given series of Spycar tests you perform. Then, when you click on each link, Spycar works by pushing a Windows executable to your browser. Currently, Spycar runs only on Windows, and its browser-centric alterations focus on IE, although it can be triggered by any Windows browser (Firefox-altering Spycar modules will be released soon!). Spycar does not include any exploits, so you must click "OK" in the message that appears in your browser to run the given Spycar function. If, after you click "OK", your anti-spyware tool blocks the given Spycar action, good for you! If not, this benign alteration will occur. Then, when you have clicked each of these links, you can click on the Results/Clean-Up link to have the Spycar tool called TowTruck automatically measure how your anti-spyware tool did, and to restore your machine to the pre-Spycar settings. Note that we designed Spycar as a series of different links and associated executables. We did not make it a monolithic one-click-to-conduct-all-actions programs, because an anti-spyware tool may shut down a given program early on in its cycle, without letting Spycar accurately test later modules. That's why you have to click on each link, giving your anti-spyware tool a fair shot at stopping each individual action. Spycar Tests Spycar Homepage 2) -Shields UP Without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet may be offering some or all of your computer's data to the entire world at this very moment! GRC Shields UP Test 3) - DNS Nameserver Spoofability Test Can you trust your Domain Name Servers? You and your web browser would believe you were at your banking site. You entered the URL correctly, or used a reliable link or shortcut. Everything would look right. But you would be logged onto a malicious foreign web site which was ready and able to capture your private banking information. DNS Spoofability test 4) -Symantec Security Check Symantec Security Test 5) -PC Security Test PC Security Test is a free program for Windows that checks computer security against viruses, spyware and hackers. With a few mouse clicks, users can easily control the efficiency of their protection software (anti-virus programs, spyware scanners and firewalls). PC Security Test simulates virus, spyware and hacking attacks and monitors the responses of your protection software. Don't worry, no real viruses are involved !After the tests are complete, PC Securtiy computes a security index and provides tips on improving PC security. Download PC Security Test Homepage 6) -PC Flanks Battery of Tests PC Flanks Tests 7)- Security Scan from Audit My PC scans done - Firewall Scanner , Privacy Scanner , Exploit Scanner Audit My PC 8 ) -Test My PC Security Battery of Tests . Test My PC Security has a wide range of downloadable firewall leak and HIPS tests so you can find out just how good your security software is. Firewall Leak Tests – Firewall leak tests are written to test how effective the firewall component of your security software is at detecting and blocking outgoing connection attempts. If a program is able to connect to the internet without your knowledge then it is capable of transmitting any private data you may have on your machine. The techniques used by these programs are sophisticated but are representative of real world threats – so your firewall needs to block them. HIPS Tests – Tests designed to check how well your security software protects your internal system from attack by malicious executables such as viruses. A good HIPS system will restrict access to your critical operating system files, registry keys, COM interfaces and running processes. It should block untrusted processes from modifying the memory space of other programs and stop malware whenever it tries to install itself. Firewall Leak and HIPS tests – These tests are designed to test both of the above at the same time (both the Firewall and Host Intrusion Prevention components of your software). Download Complete Set of tests (Zip ) Individual Tests Home Page 9) -Belarc Advisor - Free Personal PC Audit The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, CIS (Center for Internet Security) benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Download BelArc Security Advisor BelArc Home Page 10) - Qualys Browser Check Perform a security analysis of your browser and its installed and missing plug ins and / or any other security patches or any other security issues . Qualys Browser Check 11) - Browser Spy BrowserSpy.dk is a collection of online tests that shows you just how much personal information can be collected from your browser just by visiting a page. BrowserSpy.dk can tell you all kinds of detailed information about you and your browser. Information ranging from simple stuff like the name and version of your browser to more detailed stuff like what kind of fonts you have installed and what hardware you're running on. You name it, BrowserSpy.dk shows it! When you surf around the internet your browser leaves behind a trail of digital footprints. Websites can use these footprints to check your system. BrowserSpy.dk is a service where you can check just what information it's possible to gather from your system, just by visiting a website.Privacy to the ultimate test! Browser Spy 12) - Eicar Test File The Eicar Test file , your anti virus should alert you to both the files when you click on them . if it doesnt , let them download , and then extract them or use them or scan your pc with your AV scanner . if working , your AV scanner should alert you this ( FAKE ) threat ... Eicar2com test Zip eicar.com 13) - Firewall Leak Tester Download Firewall Leak Test Leak Test Home Page 14) - Zemana Logging Tests . These test programs simulate the activities of different loggers. If your security software is protecting you proactively, then the simulation should trigger a warning message. No warning means no proactive protection... and probably no protection at all! If the simulation does not trigger a warning, then your current security software does not protect you . http://zemana.com/SecurityTests.aspx 15) - Spy Shelter Security Test Tool Download Spy Shelter Test Spy Shelter Home Page 16) - BufferZone Security Test Tool In the following demo, we will simulate what will happen when you receive a malicious file. It could come in through any number of ways: browsing, as an email attachment, from a USB storage device, just to name a few. We will attempt to prove that none of your security system's defense layers will identify or alert you to our intrusion attempt. Note: This is only a demo and no actual damage will be caused to your PC. Download Test File BufferZone Test Homepage 17) - Matousec Security Software Testing Suite Security Software Testing Suite (SSTS) is a set of tools used for testing Windows security software that implement application-based security – i.e. most of the Internet security suites, HIPS, personal firewalls, behavior blockers etc. SSTS is based on the idea of independent programs that attempt to bypass various features of the security software. Each test of SSTS is directed against a single feature or against a few closely connected features of the security software. Download SSTS. Matousec SSTS Homepage 18) - RUBotted - Test if your PC is Acting like a BOT . RUBotted monitors your computer for potential infection and suspicious activities associated with bots. Bots are malicious files that enable cybercriminals to secretly take control of your computer. As more bots secretly take control of computers and use these infected machines in malicious activities, bot networks are becoming more resilient. The emergence of new bot families and the continued proliferation of some of the threat landscape's most notorious botnets only reinforce the need for a reliable solution against botnets. It is capable of detecting known and unknown variants of known botnet families including some of the most notorious botnets today: ZBOT/ZeuS – bank information stealerKOOBFACE – most successful Web 2.0 botnetWALEDAC – infamous spamming botDownload RUBotted RUBotted Homepage 19) Comodo Tests ( Thanks to Alienforce1) Comodo Parent Injection Leak Test Suite (contains 3 Tests) The CPIL suite contains three separate tests especially developed by Comodo engineers to test a firewall's protection against parent injection leak attacks Download CPIL -- -------------------- Comodo HIPS and Firewall Leak Test Suite (contains 5 tests) Comodo's latest suite of tests cover a wider range of exploits and will tell quickly inform you if your computer is vulnerable to Root kits, Background Intelligent Transfer attacks and process injection attacks. Download HIPS and Firewall Test 20) Phish Test Verify the authenticity of a URL with this online live tool . suspect a link to be Phishy test it here . and see if its been reported a web forgery or not . other way to use the tool is to check your system for Phishing safety . copy a link from the website which has already been reported to be a web forgery . open it in your browser and see if you get any alerts . PhishTank PS-- please read all the instructions on a tests web site thoroughly and completely before running or performing a test . the post can not be held responsible for any loss of data , loss of system stability , system crashes , BSOD, system failures or for that reason , any thing that may arise while or after performing a test .!! nothing serious , just a random precautionary statement , all tests are safe . go ahead and try them and test your system ...
  2. selesn777

    SpyHunter 4.15.1.4270

    SpyHunter 4.15.1.4270 ML + Patch SpyHunter is a powerful, real-time anti-spyware application certified by West Coast Labs’ Checkmark Certification System and designed to assist the average computer user in protecting their PC from malicious threats. SpyHunter is automatically configured out of the box to give you optimal protection with limited interaction so all you need to do is install it for immediate and ongoing protection. Here are some key features of "Spy Hunter": Removes spyware, adware, keyloggers, cookies, spyware registry keys, toolbars, internal popup programs, memory resident spywareRemove spyware programs that may be slowing down your computerDatabase of 500 spyware and adware threatsFree Updates when available for new spyware parasitesFastest Scanner on the marketplace (timed vs other products)Rollback Capabilities, to undo the spyware you removed.Easy to use interface, (designed to be as simple as a child's toy)How SpyHunter can Benefit You Detect, remove and block thousands of spyware, rootkits, adware, keyloggers, cookies, trojans, worms and other types malware.New! Integrated SpyHunter Compact OS to aid in removal of rootkits and other stubborn malware parasites.New! System Guards will identify and stop any processes that attempt to secretly auto-start malware entries by exploiting the Windows registry.New! Exclusions feature allows you to exclude certain programs from being detected in future SpyHunter scans.Interactive one-on-one customer support service called Spyware HelpDesk.New spyware definitions updates added daily to ensure complete protection from the latest malware trends.Easy to use interface with intelligent automatic protection.Custom malware fixes specific to your computer’s spyware problems. SpyHunter’s Spyware HelpDesk creates a diagnostic report that is analyzed by our technicians, and an automated custom fix generated from the report is sent back to you via SpyHunter.Website: http://www.enigmasoftware.com Year: 2013 OS: Windows XP / Vista / 7/8 Language: Ml Medicine: Patch Size: 43,24 MB
  3. SUPERAntiSpyware Professional 5.6.1032 ML Datecode 09.02 2013 + Keygen SUPERAntiSpyware Pro - professional version of the program for scanning and destroying various types of malicious software. The program scans your computer and removes the following malware: spyware, adware, Trojans, dialers, worms, keyloggers and other types of computer infection. In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program scans your memory, registry and files on your hard drive for spyware modules, and then deletes the malware found. The built-in scheduler will help organize the verification of the computer at a specified time. Together with the recent change in ownership, the program has received a major upgrade in the history of its existence. Processing and improvement were almost all components and functions of the program from the interface engine to scan. SUPERAntiSpyware is now faster, more functional and more comfortable. Features: Quick, Complete and Custom Scanning of Hard Drives, registry, memory, and otherDetect and remove spyware, adware, trojans, dialers, worms, keyloggers, etc.Repair broken Internet Connections, Desktops, Registry, etc.Blocking malware in real-timeBuilt-in scheduler system scan at the specified timeDetailed scan logs with complete information about each pestWeak loads the computer and does not conflict with existing anti-virus softwareNew features and changes SUPERAntiSpyware 5: Greatly improved scan engine;Improved real-time protection to prevent contamination;Improved reports on the work program for a better analysis of the system;Added support for scanning files in the format of ZIP;Improved scheduler scans and updates;Improved handling of resources representing a conflict with other antivirus programs;The redesigned and improved user interface for easier access to key features of the program;Added a new scan mode for gaining control over the heavily infected system;Added a new mode Critical Areas Scan, which provides validation of critical areas in just 20 seconds;New tools recover after the actions of malicious programs.In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program scans your memory, registry and files on your hard drive for spyware modules, and then deletes the malware found. The built-in scheduler will help organize the verification of the computer at a specified time. Website: http://www.superantispyware.com/ OS: Windows XP / Vista / 7 / 8 Language: Ml / Russian / English Medicine: Keygen Size: 28,16 Mb.
  4. HomeGuard Activity Monitor 1.7.3 Eng + Crack / Serial HomeGuard Activity Monitor - an advanced tool for monitoring user activity on the Internet and offline. Allows you to select a specific user and time monitoring. Automatically block all pornographic and objectionable web content based on keywords. Writes detailed information on the website, including visits and time spent on each site time, keeping the "white" and "black" lists. It also controls and if necessary blocks the removable media such as USB flash drives, external hard drives, etc. Opportunities HomeGuard: Built keystrokes. It records all keystrokes while typing the title bar while typing.Record activity through screenshots.Lock and time limit of programs and games.Monitoring and blocking IM (Yahoo and MSN / Windows Live messengers) and Email.Limiting the time of the Internet and the computer.Web monitoring and blocking of search in search engines Google, Yahoo and Bing (MSN).E-mail notifications.Maintain statistics regarding use of the programs: the general and the actual time of each program, how many times the mouse was clicked in each program, the total number of bytes sent and received by each program, and othersMonitoring and blocking of individual internet connections by port and IP-address.Monitoring and lock for deleting and moving files.Monitoring of the printer.Automatic cleanup of old records.Website: http://veridium.net/ Year: 2013 OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Crack / Serial Size: 9,97 Mb
  5. James Duane explains in practical terms why citizens should never talk to police under any circumstances. James Duane is an American law professor at the Regent University School of Law, former criminal defense attorney, and Fifth Amendment expert. He received some viral online attention for his "Don't Talk To Police" video of a lecture he gave to a group of law students with Virginia Beach Police Department Officer George Bruch. Using former Supreme Court Justice Robert Jackson as support of his "Don't Talk to Police" advice, Duane says, inter alia, that: even perfectly innocent citizens may get themselves into trouble even when the police are trying to do their jobs properly, because police malfeasance is entirely unnecessary for the innocent to convict themselves by mistake; talking to police may bring up erroneous but believable evidence against even innocent witnesses; and individuals convinced of their own innocence may have unknowingly committed a crime which they inadvertently confess to during questioning. Link: Backup link: http://www.sockshare.com/file/52821CC375D143BCEnjoy.
  6. NETGATE Spy Emergency 12.0.605.0 ML + Keygen Spy Emergency - software that quickly and safely detects and removes spyware, adware and other malicious programs from your computer. Are you afraid of hackers or spyware, then install the program and make sure that you are protected from interference in your personal affairs associated with the computer. The program scans the system memory, registry, individual directories and files, cookies in the search for malware and spyware. Utility in real-time analyzes and protects the computer's memory. The program interface is unobtrusive and easy, and the functionality and performance program simply dazzling. There is a multilanguage support, including the Russian language. Features: Scan of your system memoryScan your entire registryScan your hard drive and system-wideBuilt-in anti-spam moduleScanning system foldersTracking and scanning CookiesScan the elements of hackingHeuristic malware detectionCommand line supportPreventive protection, which blocks the installation of malicious softwareBrowser security, including protection of the home (home page)Protecting CookiesAutomatic database updatesSimple and easy setupUser-friendly interfaceSupport for SkinsMulti-language, including Russian languageParticular attention is paid to developers compatible with other antivirus programs, such as: NOD32,Avast,BitDefender,Kaspersky,Avira, McAfee,DrWeb,Ad-Aware,Spybot Search Destroy,Spyware Doctor,Spy Sweeper,CounterSpy.Spy Emergency provides excellent functionality, performance, and high detection rates of malicious software has a simple and intuitive interface. Homepage: http://www.spy-emergency.com OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Keygen Size: 23,12 Mb.
  7. IObit Malware Fighter Pro 2.3.0.16 IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique "Dual-Core" engine and the heuristic malware detection, IObit Malware Fighter detects the most complex and deepest spyware and malware in a very fast and efficient way. Here are some key features of "IObit Malware Fighter": One-click Solution and Very Easy to Use: Traditional advantages of IObit products. We love simple and automatic styles.Complete PC Security Care: Anti-malware, anti-spyware, anti-adware, anti-trojan, anti-bots, and more. IObit Malware Fighter can assist your antivirus to defend any tricky and complex threats.Finds the Deepest Infections: Using DOG (Digital Original Gene), a novel heuristic malware detection method, while IObit Malware Fighter can find the most complex threats.Very Fast and Light Thanks to the improved, unique "Dual-Core" anti-malware engine, complicated analysis can be made faster now.Work with All Antivirus Products Everyone needs a qualified antivirus software, and IObit Malware Fighter will surely be the best mate for your current antivirus.Automated Working in the Background Just install it and forget it. This powerful utility works continuously, automatically and quietly in the background on your PC. You can set it as your schedule or just let it work automatically when your PC is idle.Automatic and Frequent Updates By the new-generation malware analysis system and our professional database team, IObit Malware Fighter catches the emerging dangerous malware in the Internet.Website: http://www.iobit.com OS: Windows XP / Vista / 7 / 8 / 8.1 Language: ML Medicine: Keygen / Key Size: 26,62 Mb.
  8. Loaris Trojan Remover 1.3.0.8 Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always good at effectively removing it. The majority of Anti-Malware Scanners are well able to detect malicious software - Trojan Horses, Internet Worms, Adware/Spyware etc. - but are not always efficient in removing them once they have been triggered. Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Two types are available. The Standard scan quickly scans the system with no need for further configuration of the scan parameters.The Custom scan… allows the user to select any of the folders for scan. Are you bombarded with popup ads, seeing new toolbars in your browser, is your home page changing to unwanted destinations or are you bombarded with irritating spam? Perhaps strange software loads on startup or your favorites have new entries that YOU DONT WANT. If So.. Your PC is most likely infected with adware, spyware, spybot, trojans or another internet parasite. These programs have the ability to track your browsing habits and even steal such personal information as bank account numbers and passwords. Spyware has the power to install more parasites on your computer without your consent. Everything you do and everything you type is being recorded right now! Companies know what your interests are! Hackers will access your PC and do anything they wish. They can even steal your Identity and You would never be the wiser! The Solution: Download the latest version of Loaris Trojan Remover right now. You will be able to completely clean your computer of all these invasive threats! Your computer will be clean and will run alot faster - Your Privacy will be Protected! Additional Tools: Software requirements Loaris Trojan Remover supports all 32-bit and 64-bit Windows families including XP, 2003, Vista, Windows 7 and Windows 8 (32-bit/64-bit)1 GB RAM60 MB free hard drive spaceMinimum 800 x 600 screen resulutionWebsite: http://loaris.com/ Language: English Tablet: Crack / RegKey Size: 63,02 MB
  9. By NIV ELIS 01/26/2014 21:06 Intel is already one of the most important players in Israel's economy, touting a cumulative investment of $10.8 billion in the state. Man analyzes computer code Photo: Jim Urquhart/Reuters When Israel’s first international cyber security conference opens in Tel Aviv on Monday, international superstar corporations like Microsoft, Cisco and IBM will mingle with local online security companies such as Check Point and Cyber Ark to explore areas of cooperation. The conference is a culmination for Prime Minister Binyamin Netanyahu, who for months has been pushing the concept of Israel becoming a “Cyber Nation,” a state that could lead the world in cyber security technology. At the Davos World Economic Forum last week, he attended a special meeting on the subject, declaring Israel at the forefront of cyber security technology. “In the information age information must be protected, otherwise there will be chaos, the jungle,” he said at Sunday’s cabinet meeting. “The assessment is that Israel, due to our special circumstances could offer various solutions in this area.” But it is possible that the company leading the way in Israel one seldom associated with cybersecurity: Intel. In 2011, Intel closed a deal to acquire Mcafee, a leading anti-virus company, for $7.68 billion. Though the move seemed somewhat baffling at the time, the company laid out a compelling reason just three weeks ago, when it announced that it was dropping the Mcafee name in favor of Intel Security. “With the Internet of Things becoming a reality, security must be embedded on every architecture and every device,” Intel’s Vice President of Global Consumer Marketing Gary Davis wrote at the time, referring to the increasing connectedness of everyday objects to wireless networks and the Internet. “We intend to make a new mobile security solution freely available later this year with the goal of providing digital security to everyone on every mobile device around the world,” he said. In other words, Intel believes that as chips move from computers phones and tablets to thermostats, washing machines, and cars, security has to be endemic to its hardware. “It’s not just a computer chip, it’s the Internet of things,” Intel Israel Spokesman Guy Grimland explained. “That means everything is more vulnerable as well. The moment the security is built in to the hardware, it’s much better.” What does that mean for Israel’s cyber scene? Intel is already one of the most important players in Israel's economy. On Sunday, the chip-maker celebrated 40 years of work in Israel, touting a cumulative investment of $10.8 billion in the Jewish state, and $35 billion worth of exports, over 10% of which were accounted for in 2013 alone. Thus far, however, Intel has shown limited interest in Israel’s cyber expertise. “Has there been leverage of Israeli abilities? No,” Intel Israel CEO Maxine Fassberg told The Jerusalem Post on Sunday. "The work we do with Mcafee affects all of Intel, but it’s not local.” That may change, however. “It’s a direction we have to explore to see what added value we can have,” Fassberg said. Intel Israel President Mooly Eden said that Israel’s security infrastructure, such as its elite army units and successful cyber security companies, make it worth looking at. “We definitely look at the opportunity of cyber in Israel and see how we can leverage it,” he said. As the Cyber conference unfolds in the coming days, the role Israel can play in shaping the global cyber security market will become clearer. Other big chip companies may follow Intel's lead. In the meantime, tech-watchers will remain focused on whether Intel will decide to build its new 10 nanometer chip factory--which could bring billions of dollars of investments and create or preserve hundreds of jobs--in Israel or a competing nation, such as Ireland. Intel executives remained tight-lipped on the status of negotiations, but said the announcement was sure to take place in 2014. http://www.jpost.com/Business/Business-News/Could-Intel-become-Israels-largest-cyber-security-firm-339425 Also see: Intel expects to make decision this year on next new chip plant By Tova Cohen TEL AVIV Sun Jan 26, 2014 8:50am EST Jan 26 (Reuters) - U.S. chip manufacturer Intel Corp expects to make a decision this year on the location of a new multi-billion dollar semiconductor plant using new 10 nanometre technology, executives at its Israeli unit said on Sunday. http://www.reuters.com/article/2014/01/26/intel-israel-plant-idUSL5N0L003O20140126
  10. Thirty-four nuclear missile launch officers have been implicated in a cheating scandal and have been stripped of their certification, and three others have been implicated in a drug probe, in what the Air Force believes is the largest such breach of integrity in the nuclear force, Air Force Secretary Deborah Lee James said Wednesday. The officers apparently texted to each other the answers to a monthly test on their knowledge of how to operate the missiles. The number includes who did the cheating as well as those who may have known about it but did not report it. The cheating, which was discovered during a drug investigation that included two of the 34 officers, is the latest controversy involving the service members who maintain and operate the nation's 450 nuclear missiles. In all, the drug scandal encompassed 11 Air Force officers across six bases in the U.S. and England. Of the three missile launch officers involved in the drug scandal, two were at Malmstrom Air Force Base in Montana and one was at F.E. Warren Air Force Base, Wyo. The two at Malmstrom were among those implicated in the cheating scandal. James told a Pentagon news conference that 600 missile crew members across the Air Force were retaking the test, including nearly 200 at Malmstrom. She said that the missile force needs attention and that while immediate corrective action is being taken, Air Force leaders are planning to address some longer-term initiatives. The Air Force said the alleged cheating took place late last summer. "Earlier today, Secretary of the Air Force Deborah Lee James briefed Secretary of Defense Chuck Hagel on allegations that several dozen ICBM officers cheated on their proficiency tests," Pentagon press secretary Rear Admiral John Kirby said in a statement. "Secretary Hagel was deeply troubled to learn of these allegations, and he strongly supports the aggressive steps the Air Force is taking in response to them." Last week the Pentagon disclosed the original drug probe of a total of 10 officers — nine lieutenants and one captain — at six bases. It provided few other details beyond saying the officers were suspected of possessing "recreational drugs." That has now expanded to 11 officers. The matter is being probed by the Air Force Office of Special Investigations. The Associated Press has reported that the Air Force's nuclear arm has been weighed down by a series of problems involving security lapses and morale-related issues, leading one officer to complain of "rot" in the force. The original disclosure of a drug investigation said the officers alleged to be involved were at Edwards Air Force Base, Calif.; Schriever Air Force Base, Colo.; Royal Air Force base Lakenheath in England; Vandenberg Air Force Base, Calif., and two bases that operate intercontinental ballistic missiles — F.E. Warren and Malmstrom. First word of the investigation came last Thursday moments before Defense Secretary Chuck Hagel appeared at F.E. Warren to deliver a pep talk to members of the 90th Missile Wing, which operates 150 ICBMs. Hagel did not mention the drug probe but praised the missile force for its dedication and professionalism. Source
  11. 15 Jan 14 Last weekend, Target finally disclosed at least one cause of the massive data breach that exposed personal and financial information on more than 110 million customers: Malicious software that infected point-of-sale systems at Target checkout counters. Todays post includes new information about the malware apparently used in the attack, according to two sources with knowledge of the matter The seller of the point-of-sale memory dump malware allegedly used in the Target attack In an interview with CNBC on Jan. 12, Target CEO Gregg Steinhafel confirmed that the attackers stole card data by installing malicious software on point-of-sale (POS) devices in the checkout lines at Target stores. A report published by Reuters that same day stated that the Target breach involved memory-scraping malware. This type of malicious software uses a technique that parses data stored briefly in the memory banks of specific POS devices; in doing so, the malware captures the data stored on the cards magnetic stripe in the instant after it has been swiped at the terminal and is still in the systems memory. Armed with this information, thieves can create cloned copies of the cards and use them to shop in stores for high-priced merchandise. Earlier this month, U.S. Cert issued a detailed analysis of several common memory scraping malware variants. Target hasnt officially released details about the POS malware involved, nor has it said exactly how the bad guys broke into their network. Since the breach, however, at least two sources with knowledge of the ongoing investigation have independently shared information about the point-of-sale malware and some of the methods allegedly used in the attack. BLACK POS On Dec. 18, three days after Target became aware of the breach and the same day this blog broke the story, someone uploaded a copy of the point-of-sale malware used in the Target breach to ThreatExpert.com, a malware scanning service owned by security firm Symantec. The report generated by that scan was very recently removed, but it remains available via Google cache. According to sources, ttcopscli3acs is the name of the Windows computer name/domain used by the POS malware planted at Target stores; the username that the thieves used to log in remotely and download stolen card data was Best1_user; the password was BackupU$r According to a source close to the investigation, that threatexpert.com report is related to the malware analyzed at this Symantec writeup (also published Dec. 18) for a point-of-sale malware strain that Symantec calls Reedum (note the Windows service name of the malicious process is the same as the ThreatExpert analysis POSWDS). Interestingly, a search in Virustotal.com a Google-owned malware scanning service for the term reedum suggests that this malware has been used in previous intrusions dating back to at least June 2013; in the screen shot below left, we can see a notation added to that virustotal submission, 30503 POS malware from FBI. The source close to the Target investigation said that at the time this POS malware was installed in Targets environment (sometime prior to Nov. 27, 2013), none of the 40-plus commercial antivirus tools used to scan malware at virustotal.com flagged the POS malware (or any related hacking tools that were used in the intrusion) as malicious. They were customized to avoid detection and for use in specific environments, the source said. That source and one other involved in the investigation who also asked not to be named said the POS malware appears to be nearly identical to a piece of code sold on cybercrime forums called BlackPOS, a relatively crude but effective crimeware product. BlackPOS is a specialized piece of malware designed to be installed on POS devices and record all data from credit and debit cards swiped through the infected system. According the author of BlackPOS an individual who uses a variety of nicknames, including Antikiller the POS malware is roughly 207 kilobytes in size and is designed to bypass firewall software. The barebones budget version of the crimeware costs $1,800, while a more feature-rich full version including options for encrypting stolen data, for example runs $2,300. THE ATTACK Target has yet to honor a single request for comment from this publication, and the company has said nothing publicly about how this breach occurred. But according to sources, the attackers broke in to Target after compromising a company Web server. Somehow, the attackers were able to upload the malicious POS software to store point-of-sale machines, and then set up a control server within Targets internal network that served as a central repository for data hoovered by all of the infected point-of-sale devices. The bad guys were logging in remotely to that [control server], and apparently had persistent access to it, a source close to the investigation told KrebsOnSecurity. They basically had to keep going in and manually collecting the dumps. Its not clear what type of software powers the point-of-sale devices running at registers in Targets U.S. stores, but multiple sources say U.S. stores have traditionally used a home-grown software called Domain Center of Excellence, which is housed on Windows XP Embedded and Windows Embedded for Point of Service (WEPOS). Targets Canadian stores run POS devices from Retalix, a company recently purchased by payment hardware giant NCR. According to sources, the Retalix POS systems will be rolled out to U.S. Target locations gradually at some point in the future. WHO IS ANTIKILLER? A more full-featured Breadcrumbs-level analysis of this malware author will have to wait for another day, but for now there are some clues already dug up and assembled by Russian security firm Group-IB. Image: Securityaffairs.co Not long after Antikiller began offering his BlackPOS crimeware for sale, Group-IB published an analysis of it, stating that customers of major US banks, such as such as Chase (Newark, Delaware), Capital One (Virginia, Richmond), Citibank (South Dakota), Union Bank of California (California, San Diego), Nordstrom FSB Debit (Scottsdale, Arizona), were compromised by this malware. In his sales thread on at least one crime forum, Antikiller has posted a video of his product in action. As noted by Group-IB, there is a split second in the video where one can see a URL underneath the window being recorded by the authors screen capture software which reveals a profile at the Russian social networking site Vkontakte.ru. Group-IB goes on to link that account to a set of young Russian and Ukranian men who appear to be actively engaged in a variety of cybercrime activities, including distributed denial-of-service (DDoS) attacks and protests associated with the hackivist collective known as Anonymous. One final note: Dozens of readers have asked whether I have more information on other retailers that were allegedly victimized along with Target in this scheme. According to Reuters, smaller breaches on at least three other well-known U.S. retailers took place and were conducted using similar techniques as the one on Target. Rest assured that when and if I have information about related breaches I feel confident enough about to publish, you will read about it here first. http://krebsonsecurity.com/2014/01/a-first-look-at-the-target-intrusion-malware
  12. By Derek Klobucher, SAP 1/09/2014 9:15AM The combination of FireEye’s cloud-based systems and Mandiant’s forensic investigators could dominate the cyber-security industry going forward. Page 1 Both hackers and antivirus makers were put on notice last week when two shining stars in the $67 billion worldwide cyber-security universe announced their merger. Milpitas, Calif.-based global network security company FireEye has acquired Washington, D.C.-based cyber-security firm Mandiant, which released a famous report last year about a Chinese military unit that allegedly pilfered data from at least 115 companies across major U.S. industries. FireEye and Mandiant Merger 01-08-2014-Forbes The combination of FireEye’s cloud-based systems and Mandiant’s forensic investigators could dominate the cyber-security industry going forward. “There is an accelerating awareness that just wasn’t there a year ago,” FireEye CEO David G. DeWalt said in FT last week, citing NSA surveillance and Chinese hacking. “A lot of companies, organizations and governments said ‘look how pervasive these superpowers are in monitoring and stealing from these companies.’” Beyond Antivirus FireEye’s cloud-based systems work differently than traditional — and declining — antiviruses, which look for known cyber-threats that have already struck other targets. FireEye solutions quarantine inbound traffic, scanning for shady characters, be they from hackers, competitors or even nation states. The merger makes sense to a lot of experts because Mandiant often handles the shady characters caught by FireEye. Mandiant’s technology helps identify the origin of a cyber-attack, and then bolster defenses against follow-ons. “Companies are spending tens of billions of dollars of their money on a model that doesn’t work,” FireEye’s DeWalt said of antivirus software in The New York Times last week. “It’s going to take people and products working together.” FireEye and Mandiant started collaborating last year on joint product deployments, something that many of their shared customers were already doing. The companies later started discussing a merger. Everybody Wins “It is absolutely generally accepted that you cannot solely rely on preventive services,” Mandiant founder Kevin Mandia said in FT last week. Those services used to take months to uncover a breech. “On the front line of the cyber battlefield you have to be able to say … it is these guys in St. Petersburg who normally use these 18 pieces of malware.” The merger will extend Mandiant’s scope to FireEye’s broad customer base of more than 1,000, and FireEye will gain access to Mandiant’s hallmark forensic investigators. Once integrated, the companies could inform customers of abnormal behavior immediately after detection, installing a temporary fix until one of Mandiant’s emergency team can take more permanent action. “Documents [released to the public by Edward Snowden] have made it evident to companies that the United States monitors allies as well as adversaries, including friendly governments, international organizations and the networks of some Internet companies,” The New York Times stated last week. “Some of them could turn to companies like FireEye and Mandiant for protection, an interesting twist since many of Mandiant’s employees come out of the American intelligence world.” Audacious Differentiator In addition to intelligence, these companies know a thing or two about the waning antivirus industry — and how to beat it. DeWalt, once CEO of antivirus titan McAfee, will preside over a combined company that security experts predict will enjoy strong growth, according to Reuters. But FireEye’s success will depend on more than its cloud-based systems and newly acquired software. Mandiant gained notoriety outside the cyber-security industry by specifically naming the Chinese People’s Liberation Army Unit 61398 as its suspect in a rash of industrial espionage hacks, an audacious move given that other security companies don’t usually name culprits. Page 2 would also consider naming names with Mandiant under its wing, according to DeWalt. “You will probably see us continue to do it when it is appropriate,” DeWalt said in Reuters last week. “There is some incredibly egregious behavior.” http://www.forbes.com/sites/sap/2014/01/09/the-future-of-global-cyber-security-is-in-the-cloud/
  13. By DAVID E. SANGER and THOM SHANKERJAN. 14, 2014 The headquarters of the National Security Agency at Fort Meade, Md. We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies, an N.S.A. official said. Jim Lo Scalzo/European Pressphoto Agency WASHINGTON The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. President Obama spoke to reporters before a cabinet meeting at the White House on Tuesday morning. Mr. Obamas speech on spying guidelines is scheduled for Friday. The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. The N.S.A. calls its efforts more an act of active defense against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls computer network exploitation. Whats new here is the scale and the sophistication of the intelligence agencys ability to get into computers and networks to which no one has ever had access before, said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window its never had before. No Domestic Use Seen There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to Chinas. N.S.A.s activities are focused and specifically deployed against and only against valid foreign intelligence targets in response to intelligence requirements, Vanee Vines, an agency spokeswoman, said in a statement. We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of or give intelligence we collect to U.S. companies to enhance their international competitiveness or increase their bottom line. Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran. President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services. Embracing Silicon Valleys critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants. Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the groups reasoning in an email last week, saying that it is more important that we defend ourselves than that we attack others. Holes in encryption software would be more of a risk to us than a benefit, he said, adding: If we can find the vulnerability, so can others. Its more important that we protect our power grid than that we get into Chinas. From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located. A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables it calls them covert, clandestine or cooperative large accesses not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted more than 50,000 worldwide implants, and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000. That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor or disable before they could be used to launch a cyberattack. A Focus on Defense In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States. How do you ensure that Cyber Command people are able to look at those that are attacking us? a senior official, who compared it to submarine warfare, asked in an interview several months ago. That is what the submarines do all the time, said the official, speaking on the condition of anonymity to describe policy. They track the adversary submarines. In cyberspace, he said, the United States tries to silently track the adversaries while theyre trying to silently track you. If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese. The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australias help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit. Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China perhaps through front companies from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems and they have, on systems like those at the Pentagon and at The Times the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out Americas complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June. At that session, Mr. Obama tried to differentiate between conducting surveillance for national security which the United States argues is legitimate and conducting it to steal intellectual property. The argument is not working, said Peter W. Singer of the Brookings Institution, a co-author of a new book called Cybersecurity and Cyberwar. To the Chinese, gaining economic advantage is part of national security. And the Snowden revelations have taken a lot of the pressure off the Chinese. Still, the United States has banned the sale of computer servers from a major Chinese manufacturer, Huawei, for fear that they could contain technology to penetrate American networks. An Old Technology The N.S.A.s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions. In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bonds technology supplier. One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer through a covert channel that allows data infiltration and exfiltration. Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer either in the field or when they are shipped from manufacturers so that the computer is broadcasting to the N.S.A. even while the computers user enjoys the false confidence that being walled off from the Internet constitutes real protection. The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer from as far away as eight miles under ideal environmental conditions. It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet. Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese. Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries computer systems. The N.S.A. refused to talk about the documents that contained these descriptions, even after they were published in Europe. Continuous and selective publication of specific techniques and tools used by N.S.A. to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies, Ms. Vines, the N.S.A. spokeswoman, said. But the Iranians and others discovered some of those techniques years ago. The hardware in the N.S.A.s catalog was crucial in the cyberattacks on Irans nuclear facilities, code-named Olympic Games, that began around 2008 and proceeded through the summer of 2010, when a technical error revealed the attack software, later called Stuxnet. That was the first major test of the technology. One feature of the Stuxnet attack was that the technology the United States slipped into Irans nuclear enrichment plant at Natanz was able to map how it operated, then phone home the details. Later, that equipment was used to insert malware that blew up nearly 1,000 centrifuges, and temporarily set back Irans program. But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the countrys underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as the remains of a device capable of intercepting data from computers at the plant. The origins of that device have never been determined. On Sunday, according to the semiofficial Fars news agency, Irans Oil Ministry issued another warning about possible cyberattacks, describing a series of defenses it was erecting and making no mention of what are suspected of being its own attacks on Saudi Arabias largest oil producer. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?partner=rss&emc=rss&smid=tw-nytimesworld
  14. Not sure if this is the right place to post this, but does anyone on nsane uses Kali Linux? Much appreciated.
  15. GridinSoft Trojan Killer 2.1.8.7 Ml + Patch GridinSoft Trojan Killer - advanced program to clean your computer of all malicious threats! If you - a permanent internet user, you should take steps to protect your personal information against cyber-criminals. Trojan Killer can help you in this matter! The program quickly identify (recognize) and immediately remove dangerous malicious Trojans - spyware and adware, malware blocking and restricting the activities of tools, keyloggers, etc. before irreversible painful events will come in the form of stolen accounts, passwords, credit card numbers, personal, corporate and other information. Trojan Killer is designed specifically to disable / remove Malware without the user having to manually edit system files or reestr.Programma also removes the additional system modifications that are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time, Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in a security system for providing security in computer systems. The program will help you get rid of annoying adware, malware and other rough tools. It is very important to restore control over your computer, and do not let anyone use your data. Additional tools:Reset Home Internet Explorer / Start / Search Page Settings Some Malware programs make changes to the main page of Internet Explorer, Start and Search Page settings, in order to redirect the web browser to different websites. This utility will reset the Home / Start / Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default). Restore the HOSTS fileWindows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name to its address DNS, web browser can find the website more quickly as it does not have to query a DNS-name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related Web sites or antivirus company), or re-direct access to websites of their choosing. Reset Windows Update, politicianSome Malware programs attempt to prevent Windows Update, from running, and inhibit access to resetting Windows Update, by blanking out the Windows Update options on the Configure Update. Website: http://www.gridinsoft.com OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Patch Size: 47,91 Mb.
  16. What is Shadow Defender ? Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activities and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activities and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened. With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot. If you want to make a maintenance-free computer, Shadow Defender will be your best choice. Shadow Defender Features 1. Prevent all viruses and malwares.2. Surf the internet safely and eliminate unwanted traces.3. Protect your privacy.4. Eliminate system downtime and maintenance costs.5. Reboot to restore your system back to its original stateShadow Defender Users 1. Maintain a system free from malicious activities and unwanted changes.2. Test software and game installations in a safe environment.3. Protect against unwanted changes by shared users (suitable for workplaces and educational institutions).Changelog Version 1.3.0.457 - September 13, 2013 What's New: Supports Windows 8.1. What's Fixed: A GUI bug related to Registry Exclusion List. Screenshots System requirements Operating System: Windows 2000 / XP / 2003 / Vista / Windows 7 / Windows 8/Windows 8.1* Memory by OS: 2000: 128MB, XP: 256MB, 2003: 256MB, Vista: 512MB, Windows 7: 1GB, Windows 8: 1GB Hard Disk: 3 MB for program files, 10MB or more free space for each partition in Shadow Mode Homepage;http://www.shadowdefender.com/index.html Download link for 32/64 bit:http://www.shadowdefender.com/download/SD1.3.0.457_Setup.exe Official Forum for SD:http://www.shadowdefenderforum.com/ See review for SD :http://malwaretips.com/Thread-Review-Shadow-Defender Guide for setting up SD from MTPS:http://malwaretips.com/Thread-How-to-set-up-Shadow-Defender-for-convenience-max-protection Note:Don't use this software if you already use AX64 Time Machine on your PC...it causes corruption problems. *Support for Windows 8.1 has been added from this version onwards.See the changelog.
  17. Password Door v9 There are a lot of fine software installed on your computer, you know them well: MS-Office, WinZip, Windows Media Player, Real Player, AcdSee. Most of them have no password protection, so anyone who shares your workstation can launch one of these applications and use it to browse or modify your data that was created by it. You don't want to have to learn to use new software that have the password protection feature, but you do want the password protection feature for your existing software. Password Door can add password protection to any program on your computer. It will not modify the original programs, so it will never destroy the programs and you will never lose data. Features : Password protects programs on your computer Add passwords to programs on your computer.Users must enter passwords to use protected programs.Protect your privacy by adding passwords to Outlook, Word, WinZip, Media Player, AcdSee..Password Protect Programs You can password protect any of the programs on your computer with Password Door. When a user tries to use a password protected program, it asks for the password first. If the user can not provide the password, the program terminates and the user won't be able to use it. Protect Programs Anywhere Password Door provides strong protection and will always apply the protection to a protected program, the following actions will NOT bypass a protection: Move/Copy the protected program to another folder.Rename the protected program.Install and use second instance of the protected program.Delete & reinstall the protected program.With its unique exe identity technology, Password Door keeps protecting the target programs even those programs have been moved to other location, or renamed. Easy to Use It's easy-to-use and doesn't require special computer knowledge, Password Door has configured everything automatically after you installed it, the only thing you need to do is starting to protect programs. Don't want to protect a program all the time? Password Door supports schedule options, you can protect any program daily, weekly or monthly. Examples: Protect a program every day 8:00 AM - 5:00 PM.Protect a program every Sunday.Any combination for protecting a program daily, weekly or monthly.With schedule options, it is possible to protect a single program in different ways or with different passwords, by using multiple protection items. Password protecting is never the only option. Password Door supports different protection modes. In addition to "Password Protect", there are other protection modes can be used to protect programs. Password Protect - The target program asks for password first before anyone can use it.Deny - The target program is totally blocked, it terminates itself when anyone tries to use it.Allow - Allow the target program. It is for allowing a program under special condition while the program is blocked or password protected all other time, when use multiple protection items .Filter and filter logic. A filter can be specified for any protection item, to protect programs with the file name, class name, or window title. A filter can protect multiple programs in one single protection item. By using different filter logic, you also can deflate the protection range, or exclude special programs. A program can be protected by multiple protection items. With different settings and schedule options, multiple protection items can protect a program in different ways or with different passwords. Consider to control a program like this: allow the program directly every Sunday, and password protect it all other time, but you also want it to be fully blocked 9:00 PM - 8:00 AM every day. The task can be done by using multiple protection items for that single program. Password Door introduces matrix password. A new type of password, matrix password, has been designed for Password Door. The admin password or passwords for protected programs can be matrix passwords instead of the normal passwords. A matrix password is defined by the highlighted buttons and the order the buttons were clicked. Protect Password Door itself. Protection will be pointless if the software can be uninstalled easily, or the settings can be changed freely. Password Door protects itself with the admin password and other features. The admin password protects the main program of Password Door, and the uninstaller. Users will not be able to change the settings or uninstall Password Door without the admin password. It also has built-in features to avoid being removed by 3rd party uninstaller, and ensure that it will always be there to provide maximal protection until you uninstall it with admin password. Even more features: Recheck allowed programs when the system is idle.Recheck allowed programs when the schedule is in disabled hours.Limit use time of a program per day.Enhanced protection mode.Multiple languages.Color scheme, font.... Sceenshots : Main window Protect a Program Protection manager Protection item - Standard Protection item - Advanced Protection item - Schedule Password dialog box Software Info : Version: 9.0.1 Size: 594 KB Home page :http://www.toplang.com/passworddoor.htmDirect Download link :http://www.toplang.com/pdsetup.exe Platforms: Windows 2000, XP, 2003, Vista, 7Note : It should works on Windows 8 too but I haven't tested it yet ! :unsure: Download program + proper crack (by Me! :D ) http://rghost.net/49201029 VirusTotal :0/48 Norton : clean Kaspersky: clean Bitdefender : Gen:Variant.Kazy.116352 (don't worry it's a false positive ;) )
  18. selesn777

    Zemana Antilogger 1.9.3.506

    Zemana Antilogger 1.9.3.506 ML + Keygen Zemana Anti-Logger - developed to deal with different kinds of malware threats, protects your banking passwords, private emails & chat conversations from spying proactively without needing a signature-based algorithm and includes powerful, anti-action methods.AntiLogger prevents all known forms of malwares which intend to carry out information theft. As AntiLogger uses a proactive and a unique way to detect potentially harmful applications which have not already been recognized or identified by any anti-virus programs consequently, it protects your 'Information Security' from a range of threats.Modules: Anti-SSL Logger, Anti-WebCam Logger and Anti-ClipBoard Logger are the first security solutions developed in the world. Also, you will realize that these modules have the best features if compared to similar applications.Anti-KeyLogger Module provides a new powerful protection against keyloggers which have not been even caught by known, the most popular security softwares in the world. Here are some key features of "Zemana AntiLogger": Anti-SSL Logger Module that provides protection against SSL LoggerAnti-WebCam Logger that provides protection against WebCam LoggerAnti-Key Logger Module that provides protection against Key LoggerAnti-Screen Logger that provides protection against Screen LoggerAnti-Clipboard Logger that provides protection against ClipBoard LoggerSystem Defence Module that protects your systemKey Features: SSL Logger ProtectionPrevents theft of data exchanged via secure connections (HTTPS/SSL) Key Logger ProtectionPrevents all harmful applications from logging your keystrokes(thereby stealing your passwords and account info) Screen Logger ProtectionPrevents harmful applications from capturing your computer screen. WebCam Logger ProtectionPrevents any harmful applications from monitoring your Web Camera. ClipBoard Logger ProtectionPrevents harmful applications from taking snapshots of your clipboard. System DefenseTracks down Windows operating system activity in real-time to prevent detrimental actions from various malware and spyware programs. Website: http://www.zemana.com/ OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Keygen Size: 21,99 Mb.
  19. GridinSoft Trojan Killer 2.1.8.2 Ml + Patch GridinSoft Trojan Killer - advanced program to clean your computer of all malicious threats! If you - a permanent internet user, you should take steps to protect your personal information against cyber-criminals. Trojan Killer can help you in this matter! The program quickly identify (recognize) and immediately remove dangerous malicious Trojans - spyware and adware, malware blocking and restricting the activities of tools, keyloggers, etc. before irreversible painful events will come in the form of stolen accounts, passwords, credit card numbers, personal, corporate and other information. Trojan Killer is designed specifically to disable / remove Malware without the user having to manually edit system files or reestr.Programma also removes the additional system modifications that are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time, Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in a security system for providing security in computer systems. The program will help you get rid of annoying adware, malware and other rough tools. It is very important to restore control over your computer, and do not let anyone use your data. Additional tools:Reset Home Internet Explorer / Start / Search Page Settings Some Malware programs make changes to the main page of Internet Explorer, Start and Search Page settings, in order to redirect the web browser to different websites. This utility will reset the Home / Start / Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default). Restore the HOSTS fileWindows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name to its address DNS, web browser can find the website more quickly as it does not have to query a DNS-name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related Web sites or antivirus company), or re-direct access to websites of their choosing. Reset Windows Update, politicianSome Malware programs attempt to prevent Windows Update, from running, and inhibit access to resetting Windows Update, by blanking out the Windows Update options on the Configure Update. Website: http://www.gridinsoft.com OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Patch-XenoCoder Size: 45,72 Mb.
  20. GridinSoft Trojan Killer 2.1.8.1 Ml + Patch GridinSoft Trojan Killer - advanced program to clean your computer of all malicious threats! If you - a permanent internet user, you should take steps to protect your personal information against cyber-criminals. Trojan Killer can help you in this matter! The program quickly identify (recognize) and immediately remove dangerous malicious Trojans - spyware and adware, malware blocking and restricting the activities of tools, keyloggers, etc. before irreversible painful events will come in the form of stolen accounts, passwords, credit card numbers, personal, corporate and other information. Trojan Killer is designed specifically to disable / remove Malware without the user having to manually edit system files or reestr.Programma also removes the additional system modifications that are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time, Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in a security system for providing security in computer systems. The program will help you get rid of annoying adware, malware and other rough tools. It is very important to restore control over your computer, and do not let anyone use your data. Additional tools:Reset Home Internet Explorer / Start / Search Page Settings Some Malware programs make changes to the main page of Internet Explorer, Start and Search Page settings, in order to redirect the web browser to different websites. This utility will reset the Home / Start / Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default). Restore the HOSTS fileWindows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name to its address DNS, web browser can find the website more quickly as it does not have to query a DNS-name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related Web sites or antivirus company), or re-direct access to websites of their choosing. Reset Windows Update, politicianSome Malware programs attempt to prevent Windows Update, from running, and inhibit access to resetting Windows Update, by blanking out the Windows Update options on the Configure Update. Website: http://www.gridinsoft.com OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Patch-XenoCoder Size: 46,72 Mb.
  21. IObit Malware Fighter Pro 2.1.0.18 ML + Keygen + Key IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique "Dual-Core" engine and the heuristic malware detection, IObit Malware Fighter detects the most complex and deepest spyware and malware in a very fast and efficient way. Here are some key features of "IObit Malware Fighter": One-click Solution and Very Easy to Use: Traditional advantages of IObit products. We love simple and automatic styles.Complete PC Security Care: Anti-malware, anti-spyware, anti-adware, anti-trojan, anti-bots, and more. IObit Malware Fighter can assist your antivirus to defend any tricky and complex threats.Finds the Deepest Infections: Using DOG (Digital Original Gene), a novel heuristic malware detection method, while IObit Malware Fighter can find the most complex threats.Very Fast and Light Thanks to the improved, unique "Dual-Core" anti-malware engine, complicated analysis can be made faster now.Work with All Antivirus Products Everyone needs a qualified antivirus software, and IObit Malware Fighter will surely be the best mate for your current antivirus.Automated Working in the Background Just install it and forget it. This powerful utility works continuously, automatically and quietly in the background on your PC. You can set it as your schedule or just let it work automatically when your PC is idle.Automatic and Frequent Updates By the new-generation malware analysis system and our professional database team, IObit Malware Fighter catches the emerging dangerous malware in the Internet. Website: http://www.iobit.com OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Keygen / Key Size: 21,65 Mb.
  22. SUPERAntiSpyware Professional 5.6.1032 ML (Rus/Eng) + Keygen SUPERAntiSpyware Pro - professional version of the program for scanning and destroying various types of malicious software. The program scans your computer and removes the following malware: spyware, adware, Trojans, dialers, worms, keyloggers and other types of computer infection. In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program scans your memory, registry and files on your hard drive for spyware modules, and then deletes the malware found. The built-in scheduler will help organize the verification of the computer at a specified time. Together with the recent change in ownership, the program has received a major upgrade in the history of its existence. Processing and improvement were almost all components and functions of the program from the interface engine to scan. SUPERAntiSpyware is now faster, more functional and more comfortable. Features: Quick, Complete and Custom Scanning of Hard Drives, registry, memory, and otherDetect and remove spyware, adware, trojans, dialers, worms, keyloggers, etc.Repair broken Internet Connections, Desktops, Registry, etc.Blocking malware in real-timeBuilt-in scheduler system scan at the specified timeDetailed scan logs with complete information about each pestWeak loads the computer and does not conflict with existing anti-virus softwareNew features and changes SUPERAntiSpyware 5: Greatly improved scan engine;Improved real-time protection to prevent contamination;Improved reports on the work program for a better analysis of the system;Added support for scanning files in the format of ZIP;Improved scheduler scans and updates;Improved handling of resources representing a conflict with other antivirus programs;The redesigned and improved user interface for easier access to key features of the program;Added a new scan mode for gaining control over the heavily infected system;Added a new mode Critical Areas Scan, which provides validation of critical areas in just 20 seconds;New tools recover after the actions of malicious programs.In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program scans your memory, registry and files on your hard drive for spyware modules, and then deletes the malware found. The built-in scheduler will help organize the verification of the computer at a specified time. Website: http://www.superantispyware.com OS: Windows XP / Vista / 7 / 8 Language: Ml / Russian / English Medicine: Keygen Size: 26,2 Mb.
  23. SecurityCam 1.6.0.5 Eng + Keymaker SecurityCam is a powerful monitoring and motion detection software that monitors web camera, connected to computer, and enables users to keep an eye on their properties from a local location or remote location via the Internet. The program stays out of way in system tray area, and waits for a movement at the front of the camera. Once movement is detected, SecurityCam starts either video recording or makes a snapshot of a picture. The program can optionally do some other functions like playback a warning sound. Homepage: http://www.wolfcoders.com/securitycam/index.php OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Keymaker Size: 2,65 Mb.
  24. SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware that other products miss! SUPERAntiSpyware will remove ALL the Spyware, NOT just the easy ones! SUPERAntiSpyware features our unique Process Interrogation Technology (PIT) that allows threats to be detected no matter where they are hiding on your system. Many new types of threats utilize "Rootkits" or "Kernel Drivers" to hide themselves to avoid detection by standard anti-spyware applications. SUPERAntiSpyware's Process Interrogation Technology locates even the toughest of threats. SUPERAntiSpyware is a next generation scanning system that goes beyond the typical rules based scanning methods. Our Multi-Dimensional Scanning system detects existing threats as well as threats of the future by analyzing threat characteristics in addition to code patterns. Features: • Quick, Complete and Custom Scanning of HDD, Registry, Memory and more • Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers and many other threats • Repair broken Internet Connections, Desktops, Registry Editing, Task Manager and more • Real-Time Blocking of threats • Schedule either Quick, Complete or Custom Scans Daily or Weekly • Quarantine items detected and removed for complete protection • Detailed scan logs with complete information about detected and removed threats and their locations DOWNLOAD SUPERAntiSpyware Professional Keygen http://www.tusfiles.net/54tjtq2xn9la *please uncheck their download accelerator before you download it !
  25. sundown

    WinPatrol PLUS 28.6.2013

    WinPatrol allows you to control the installation of malicious programs on your computer. The program monitors important system areas (area load, system folders, register), which usually vary malicious programs. Through the program, you can stop the process and disable / enable starup program. The program also allows you to control cookies, delete them based on keyword. WinPatrol monitors and deletes the operating system, various modules and malicious spyware programs such as Adware and Spyware, finds and neutralize some types of viruses, Trojans, viruses, and auto programs that threaten the confidentiality of computerized information. WinPatrol monitors changes in the browser and does not allow the installation of the various bars and spyware modules. Of course, it does not protect your computer is completely different from the attack, but a good complement to secure antivirus and firewall redirector. WinPatrol uses a heuristic approach to detecting attacks and violations of your computing environment. Traditional security programs scan your hard drive searching for previously identified threats. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. You'll be removing dangerous new programs while others download new reference files. Here are some key features of "WinPatrol": • Increase Your Speed & System Performance • Detect & Neutralize Spyware. Detect & Neutralize ADware • Detect & Neutralize Viral infections. Detect & Neutralize Unwanted IE Add-Ons • Detect & Restore File Type Changes Automatically Filter Unwanted Cookies • Avoid Start Page Hijacking. Detect HOSTS file changes • Kill Multiple Tasks that replicate each other, in a single step • Stop programs that repeatedly add themselves to your Startup List • Delete and Remove the most Stubborn Infections DOWNLOAD http://www.tusfiles.net/c46zvdi8q2ge *please uncheck their download accelerator before you download it !
×
×
  • Create New...