Jump to content

Search the Community

Showing results for tags 'Security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. UPDATE 1 UPDATE 2 ------------------------------------------ 1) - Spycar What is Spycar? Spycar is a suite of tools designed to mimic spyware-like behavior, but in a benign form. Intelguardians created Spycar so anyone could test the behavior-based defenses of an anti-spyware tool. Spycar runs only on Windows, the same platform most targeted by spyware developers. What does Spycar do? The following links are Spycar. Clicking on each of the links will make Spycar try to take some benign action on your system. When you first run it, Spycar will ask you to name a test profile, a small file
  2. At 10 AM Pacific time on Thursday, Microsoft will release an update to address the zero day vulnerability recently disclosed in all versions of Internet Explorer. The advance notification of the update lists Windows XP as among the affected platforms, indicating that it will be among the platforms patched, in spite of its support period ending weeks ago. Adrienne Hall, General Manager, Microsoft Trustworthy Computing stated "[T]he security of our products is something we take incredibly seriously. When we saw the first reports about this vulnerability we decided to fix it, fix it fast, and f
  3. Google has fixed 23 security vulnerabilities in Chrome, including three high-risk flaws, and handed out $9,500 in rewards to researchers. Among the vulnerabilities that the company fixed in Chrome 35 are use-after-free flaws and an integer overflow, all of which are rated high. Google didn’t disclose the details of all of the various security vulnerabilities, but of the eight that it listed in its advisory, those three are the most serious. The full list of vulnerabilities patched in Chrome 35 will be published later, but here are the ones that Google has published and received bug bounties: [
  4. The Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform.The new EMET 4.0 also provides a configurable SSL/TLS certificate pinning fea
  5. The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java and Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank), and provides the most powerful Anti-XSS protection available in a browser. NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality... You can enable JavaScript, Java and plugin execution
  6. Ponting

    AppGuard v4.1

    New Generation Protection Against Malware AppGuard is a revolutionary new software product that stops computer viruses and malware – even zero-day malware – from harming you and your PC. Developed by Blue Ridge Networks using patented cybersecurity technology, AppGuard provides advanced protection without scanning and updates. It isolates and contains malicious code, allowing users to work, bank, shop and surf online without concern about exposure to viruses on the public internet or on trusted websites. Numerous studies have confirmed there are literally dozens of new viruses and malicious s
  7. Crystal Security is a cloud-based system that detects and removes malicious programs (malware) from your computer. Its technology provides fast detection against malware and lets you know about the changes on your computer in real time. Anti-Malware Crystal Security is an easy to use application that was created in order to help you quickly detect and remove malware that might affect your computer. Cloud Based The cloud based Crystal Security gathers data from millions of participating users systems around the world to help defend you from the very latest viruses and malware attacks. Freewa
  8. selesn777

    MyUSBOnly 9.7.0

    MyUSBOnly 9.7.0 With MyUSBOnly security software, your USB ports, workstations and network are fully protected from theft of information by unauthorized employees or by recovering data from lost, stolen and misplaced USB storage device. Thanks to the powerful Admin Kit and Report Manager, you can centrally manage all end-points on your network and closely monitor all USB activities in real-time. Solutions for Home Users Easy installation and protect your personal documents, photos, videos...etcFree technical support and user forumSolutions for Business Users Data guardian to protect offic
  9. Nsauditor Network Security Auditor 2.8.9 Nsauditor Network Security Auditor is a network security and vulnerability scanner that allows auditing and monitoring network computers for possible vulnerabilities, checking network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor is a complete networking software package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. http://www.youtube.com/watch?feature=player_embedded&v=Bba-ksiR_nc Nsa
  10. Requirements: 2.2 and up This is a donate version of AFWall+ with exact same functionality except support to Import Droidwall Rules ! ***ROOT REQUIRED*** If you don't know what root is, please search for "How to root android" in the Internet. AFWall+ (Android Firewall +) is an improved version of DroidWall front-end application for the powerful iptables Linux firewall.It allows you to restrict which applications are permitted to access your data networks (2G/3G and/or Wi-Fi and while in roaming). Features added - Supports 2.2 to 4.4 - Import/Export Rules to external storage - Import DroidWa
  11. With the advent of mobile payments and more and more users storing sensitive information on their smartphones, security is becoming a greater concern. That is why the following story is so harrowing: a man’s son was able to reset his Android phone’s password, and all he needed was access to his phone. The following exploit doesn’t require any knowledge of a user’s Google account; all you would need is access to the person’s phone. A Reddit user recounts the process in detail: “I just discovered what seems to me a massive security loophole. Please someone tell me if the following makes any sen
  12. http://www.softether.org/ What is SoftEther VPN SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful and easy-to-use multi-protocol VPN software. It runs on Windows, Linux, Mac, FreeBSD and Solaris. SoftEther VPN is open source. You can use SoftEther for any personal or commercial use for free charge. SoftEther VPN is an optimum alternative to OpenVPN andMicrosoft's VPN servers. SoftEther VPN has a clone-function of OpenVPN Server. You can integrate from OpenVPN to SoftEther VPN smoothly. SoftEther VPN is faster than OpenVPN. SoftEther VPN also supp
  13. Steganos Online Shield VPN 1.4.6.10942 The new Steganos Online Shield 365 protects you extensively and continuously while being on the Internet. It locks hackers out reliably and secures you online when you shop, browse or download -356 days a year. With Steganos Online Shield 365 we created a software which prevents you continuously against attacks against your PC, your data and your online-identity. And all that is possible through just one click of your mouse. Key Features: Protect yourself against snoops in public hotspots, for example while being in a hotel, a cafe, an airport or at th
  14. ViRobot APT Shield 2.0 is the best PC security program to block attacks of vulnerabilities(include Zero-Day vulnerabilities and Drive-by download vulnerabilities) in applications and Windows OS(include Windows XP) in advance, and it is compatible with anti-malware programs.Especially, ViRobot APT Shield 2.0 will be the best choice for PCs which can not be upgraded Windows XP to higher version of Windows. Features 1. Response to variety attacks of application vulnerabilities. It blocks attacks that use vulnerabilities in advance for applications such as document programs(MS Office, Adobe Read
  15. Google has decided to do more in the area of Internet security. To help combat this ever increasing problem, they're offering up Project Zero. Essentially, Google will begin hiring "the best practically-minded security researchers and contributing 100% of their time toward improving security across the Internet." Their work will not be limited to just Google products, but will instead be focused on "any software depended upon by large numbers of people." The idea is that researchers will find the threats, then inform only the software developer. Once the OEM has a patch ready, a public bug rep
  16. Loaris Trojan Remover 1.3.0.8 Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always good at effectively removing it. The majority of Anti-Malware Scanners are well able to detect malicious software - Trojan Horses, Internet Worms, Adware/Spyware etc. - but are not always efficient in removing them once they have been triggered. Trojan Remover is designed specifically to disable/re
  17. By Zach Epstein on Jan 20, 2014 at 11:26 AM The rabbit hole that is the Internet goes much deeper than most people know. In fact, the World Wide Web as we know it represents just 4% of networked web pages the remaining 96% of pages make up what many refer to as the Invisible Internet, Invisible Web or Deep Web. This massive subsection of the Internet is 500 times bigger than the visible Web and is not indexed by search engines like Google. Finding sites on this invisible network of webpages isnt easy as a result, so its often home to nefarious services like Silk Road. Theres plenty more to t
  18. By Naoki Hiroshima January 29, 2014 A story of how PayPal and GoDaddy allowed the attack and caused me to lose my $50,000 Twitter username. My $50,000 Twitter Username Was Stolen Thanks to PayPal and GoDaddy I had a rare Twitter username, @N. Yep, just one letter. I’ve been offered as much as $50,000 for it. People have tried to steal it. Password reset instructions are a regular sight in my email inbox. As of today, I no longer control @N. I was extorted into giving it up. While eating lunch on January 20, 2014, I received a text message from PayPal for one-time validation code. Somebody w
  19. Loaris Trojan Remover 1.3.1.0 Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always good at effectively removing it. The majority of Anti-Malware Scanners are well able to detect malicious software - Trojan Horses, Internet Worms, Adware/Spyware etc. - but are not always efficient in removing them once they have been triggered. Trojan Remover is designed specifically to disable/re
  20. IObit Malware Fighter Pro 2.3.0.16 IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique "Dual-Core" engine and the heuristic malware detection, IObit Malware Fighter detects the most complex and deepest spyware and malware in a very fast and efficient way. Here are some key features of "IObit Malware Fighter": One-click Solution and Very Easy to Use: Traditional advantages of IObit produc
  21. By NIV ELIS 01/26/2014 21:06 Intel is already one of the most important players in Israel's economy, touting a cumulative investment of $10.8 billion in the state. Man analyzes computer code Photo: Jim Urquhart/Reuters When Israel’s first international cyber security conference opens in Tel Aviv on Monday, international superstar corporations like Microsoft, Cisco and IBM will mingle with local online security companies such as Check Point and Cyber Ark to explore areas of cooperation. The conference is a culmination for Prime Minister Binyamin Netanyahu, who for months has been pushing the
  22. NETGATE Spy Emergency 12.0.605.0 ML + Keygen Spy Emergency - software that quickly and safely detects and removes spyware, adware and other malicious programs from your computer. Are you afraid of hackers or spyware, then install the program and make sure that you are protected from interference in your personal affairs associated with the computer. The program scans the system memory, registry, individual directories and files, cookies in the search for malware and spyware. Utility in real-time analyzes and protects the computer's memory. The program interface is unobtrusive and easy, and th
  23. selesn777

    SpyHunter 4.15.1.4270

    SpyHunter 4.15.1.4270 ML + Patch SpyHunter is a powerful, real-time anti-spyware application certified by West Coast Labs’ Checkmark Certification System and designed to assist the average computer user in protecting their PC from malicious threats. SpyHunter is automatically configured out of the box to give you optimal protection with limited interaction so all you need to do is install it for immediate and ongoing protection. Here are some key features of "Spy Hunter": Removes spyware, adware, keyloggers, cookies, spyware registry keys, toolbars, internal popup programs, memory resident s
  24. SUPERAntiSpyware Professional 5.6.1032 ML Datecode 09.02 2013 + Keygen SUPERAntiSpyware Pro - professional version of the program for scanning and destroying various types of malicious software. The program scans your computer and removes the following malware: spyware, adware, Trojans, dialers, worms, keyloggers and other types of computer infection. In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program sc
  25. HomeGuard Activity Monitor 1.7.3 Eng + Crack / Serial HomeGuard Activity Monitor - an advanced tool for monitoring user activity on the Internet and offline. Allows you to select a specific user and time monitoring. Automatically block all pornographic and objectionable web content based on keywords. Writes detailed information on the website, including visits and time spent on each site time, keeping the "white" and "black" lists. It also controls and if necessary blocks the removable media such as USB flash drives, external hard drives, etc. Opportunities HomeGuard: Built keystrokes. I
×
×
  • Create New...