Jump to content

Search the Community

Showing results for tags 'Security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. ViRobot APT Shield 2.0 is the best PC security program to block attacks of vulnerabilities(include Zero-Day vulnerabilities and Drive-by download vulnerabilities) in applications and Windows OS(include Windows XP) in advance, and it is compatible with anti-malware programs.Especially, ViRobot APT Shield 2.0 will be the best choice for PCs which can not be upgraded Windows XP to higher version of Windows. Features 1. Response to variety attacks of application vulnerabilities. It blocks attacks that use vulnerabilities in advance for applications such as document programs(MS Office, Adobe Reader, ...), Web brewers(IE, Firefox, Chrome, ...), Media players, Messengers, Compression software, and etc. 2. Blocking vulnerabilities due to the end of Windows XP support. It prevents attacks that use vulnerabilities in advance for Windows which cannot be applied security patches. 3. Complementing in accordance with the limits of Signature-based anti-virus. By behavior-based technology, it blocks creation and execution of malicious code that exploits vulnerabilities, and it also doesn't need pattern update. 4. Blocking the acceleration of document leak for many unspecified targets. Recently, malicious code is using social engineering to exfiltrate important document from companies, but this product blocks it completely. 5. Handling systems which are difficult to update Windows security patches. It's a very light product, because it requires only minimal resources of Hardware. It's suitable for various environments which are difficult to update Windows security patches in enterprise. Functions 1. Enhanced detection for malicious code It can block Zero-Day attacks in advance.It's not necessary to concern about False/Positive, because it detects abnormal behaviors of applications.It's possible to detect malicious code in real time.2. Flexible scalability and low costs It's compatible with anti-malware products all around the world, it ensures flexible scalability.It can save cost compared to network-based detection solutions. (No extra charge excepted license fee)3. Management efficiency It's possible to control security systems by connection with integrated log equipment(e.g. ESM).Monitoring service is provided through installation of Web log server.4. Usability Pattern update is not required.It's simple to install(The installation takes less than 10 seconds.)The portion of end users' direct control is minimized.It uses minimum resource. (e.g. Memory usage : less than 10MB)Screenshots Blocking malicious code that exploits vulnerabilities in applications. Document program -MS office, Adobe reader, Ichitaro, etc. Web browser - IE, Firefox, Chrome, Safari, Opera, Java, Flash, ActiveX, etc. Media player - Real player, QuickTime player, Winamp, etc. Messenger - Skype, Yahoo, Google, . etc. Compression software -WinZip, WinRAR, 7-Zip, etc. Homepage: http://www.aptshield.net/ Download link: http://www.aptshield.net/apt_individual_download.html Requirements: CPU:Intel Pentium III 500MHz or Above RAM:512 MB or Above HDD:Free space more than 500 MB OS: Windows XP / Windows Vista / Windows 7 / Windows 8/Windows Server 2003 / Windows Server 2008 / Windows Server 2012 -x86 and x64.
  2. With the advent of mobile payments and more and more users storing sensitive information on their smartphones, security is becoming a greater concern. That is why the following story is so harrowing: a man’s son was able to reset his Android phone’s password, and all he needed was access to his phone. The following exploit doesn’t require any knowledge of a user’s Google account; all you would need is access to the person’s phone. A Reddit user recounts the process in detail: “I just discovered what seems to me a massive security loophole. Please someone tell me if the following makes any sense. My son was playing on my phone (Galaxy S3). He tried to purchase in app items on Subway Surfer but didn’t know the password. So, he followed the following steps to reset my password from my phone without having to enter any information about the account: Starting from the screen after you click “buy,” 1. Click the question mark next to the password box when asked to confirm password for a purchase.2. Click “forgot password.”3. Click “I don’t know.”4. Leave the selection on the page at “Confirm password reset on my Android Samsung SCH-I535 phone.”5. Click “Yes”6. Click “Allow Password Reset.7. Enter and confirm new Password. And that allowed someone with absolutely no knowledge about my Google account, and access only to my phone, to reset a new password for my entire Google account.”– karcirate (reddit)This exploit has been around for quite some time, however, now that users realize how easy it is, maybe Google should work on beefing up this loophole. What can you do to protect against this? Well, someone would need access to your phone in order to make purchases on it, or rest your password and gain access to your account. Putting a lock-code is probably your best bet against strangers. Hopefully the friends you’d allow access to your phone can be trusted enough to not rack up your cell phone bill or mess with your Google account. Source
  3. http://www.softether.org/ What is SoftEther VPN SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful and easy-to-use multi-protocol VPN software. It runs on Windows, Linux, Mac, FreeBSD and Solaris. SoftEther VPN is open source. You can use SoftEther for any personal or commercial use for free charge. SoftEther VPN is an optimum alternative to OpenVPN andMicrosoft's VPN servers. SoftEther VPN has a clone-function of OpenVPN Server. You can integrate from OpenVPN to SoftEther VPN smoothly. SoftEther VPN is faster than OpenVPN. SoftEther VPN also supports Microsoft SSTP VPN for Windows Vista / 7 / 8. No more need to pay expensive charges for Windows Server license for Remote-Access VPN function. SoftEther VPN can be used to realize BYOD (Bring your own device) on your business. If you have smartphones, tablets or laptop PCs, SoftEther VPN's L2TP/IPsec server function will help you to establish a remote-access VPN from your local network. SoftEther VPN's L2TP VPN Server has strong compatible with Windows, Mac, iOS and Android. SoftEther VPN is not only an alternative VPN server to existing VPN products (OpenVPN, IPsec and MS-SSTP). SoftEther VPN has also original strong SSL-VPN protocol to penetrate any kinds of firewalls. Ultra-optimized SSL-VPN Protocol of SoftEther VPN has very fast throughput, low latency and firewall resistance. SoftEther VPN has strong resistance against firewalls than ever.Built-in NAT-traversal penetrates your network admin's troublesome firewall for overprotection. You can setup your own VPN server behind the firewall or NAT in your company, and you can reach to that VPN server in the corporate private network from your home or mobile place, without any modification of firewall settings. Any deep-packet inspection firewalls cannot detect SoftEther VPN's transport packets as a VPN tunnel, because SoftEther VPN uses Ethernet over HTTPS for camouflage. Easy to imagine, design and implement your VPN topology with SoftEther VPN. It virtualizes Ethernet by software-enumeration. SoftEther VPN Client implementsVirtual Network Adapter, and SoftEther VPN Server implements Virtual Ethernet Switch. You can easily build both Remote-Access VPN and Site-to-Site VPN, as expansion of Ethernet-based L2 VPN. Of course, traditional IP-routing L3 based VPN can be built by SoftEther VPN.
  4. Google has decided to do more in the area of Internet security. To help combat this ever increasing problem, they're offering up Project Zero. Essentially, Google will begin hiring "the best practically-minded security researchers and contributing 100% of their time toward improving security across the Internet." Their work will not be limited to just Google products, but will instead be focused on "any software depended upon by large numbers of people." The idea is that researchers will find the threats, then inform only the software developer. Once the OEM has a patch ready, a public bug report will be filed in an external database accessible to anyone. The database will include information on the issue as well as time-to-fix data, discussion about exploitability, etc. The implications of this are huge considering how much money and resources Google has at is disposal. With a major player such as this throwing its hat in the ring, this really can be nothing but a positive to everyone who uses the Internet and has put sensitive information thereon. These days, that's pretty much all of us. Source
  5. Steganos Online Shield VPN 1.4.6.10942 The new Steganos Online Shield 365 protects you extensively and continuously while being on the Internet. It locks hackers out reliably and secures you online when you shop, browse or download -356 days a year. With Steganos Online Shield 365 we created a software which prevents you continuously against attacks against your PC, your data and your online-identity. And all that is possible through just one click of your mouse. Key Features: Protect yourself against snoops in public hotspots, for example while being in a hotel, a cafe, an airport or at the office.Protects you while surfing, shopping online and secures your personal data by continuously encrypting your data from your PC onwards.It couldn't be easier. Protect your connection with only one click of your mouse.Stay safe - Wether you're online wireless or by cable.The dangers have changed: A virus scanner is not an obstacle for hackers and cyber-criminals anymore. Don't wait until you're the victim of credit card fraud. Until your e-mail is hacked. Until strangers can look into your accounts – or go shopping at your expense.Don't wait until the milk is already spilled. The best protection against hackers is the continuous encryption of your whole connection to the internet - 365 days a year.Note: Steganos Online Shield VPN 1.4.6.10942 incl key (1 year / 2GB traffic a month) Website: https://www.steganos.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Key Size: 32,59 Mb.
  6. selesn777

    MyUSBOnly 9.7.0

    MyUSBOnly 9.7.0 With MyUSBOnly security software, your USB ports, workstations and network are fully protected from theft of information by unauthorized employees or by recovering data from lost, stolen and misplaced USB storage device. Thanks to the powerful Admin Kit and Report Manager, you can centrally manage all end-points on your network and closely monitor all USB activities in real-time. Solutions for Home Users Easy installation and protect your personal documents, photos, videos...etcFree technical support and user forumSolutions for Business Users Data guardian to protect office environmentGovern company IT policyCentralize management on end points and workstationsPrevent unauthorized software, spyware and virusEasy deployment with MSI technologyAffordable volume discounts available, so you can protect the entire office or department.Solutions for Academic/Government End point protector for large scale networkEmail alert and system log notificationMulti-language user interfaceSilent deployment using MSI technologyAffordable volume discounts available, so you can protect the entire enterprise.MyUSBOnly 9.7.0 [2014-06-13] Enhanced: Enabled change admin password and guest password for Standalone EditionEnhanced: Enabled email notification alert for Standalone EditionFixed: Minor bug fixWebsite: www.myusbonly.com/ OS: Windows XP / Vista / 7 / 8 / Server 2003 / 2008 Language: ML Medicine: Crack Size: 8,48 MB.
  7. Requirements: 2.2 and up This is a donate version of AFWall+ with exact same functionality except support to Import Droidwall Rules ! ***ROOT REQUIRED*** If you don't know what root is, please search for "How to root android" in the Internet. AFWall+ (Android Firewall +) is an improved version of DroidWall front-end application for the powerful iptables Linux firewall.It allows you to restrict which applications are permitted to access your data networks (2G/3G and/or Wi-Fi and while in roaming). Features added - Supports 2.2 to 4.4 - Import/Export Rules to external storage - Import DroidWall Rules - Search Applications - Multiple Profiles with custom names - Tasker/Locale support - Select All/None/Invert/Clear applications with single click - Revamped Rules/Logs Viewer with copy/export to external storage - Ability to view the network interfaces - Preferences > Highlight system applications with custom color > Notify on new installations > Ability to hide application icons( faster loading ) > Use LockPattern for application protection. > Show/Hide application ID. - Roaming Option for 3G/Edge - VPN Support - LAN Support - Tether Support - IPV6 Support - Device Admin Support ( Protect AFWall+ from uninstall) - Choose able languages - Choose able iptables/busybox binary - Support x86/MIPS/ARM devices. What's New Version 1.3.2 Added back the old widget for profile switch Fix: Process leak with log and nflog service.Kindly do a clean install if it's not working after update Fix: Filter application's not working for block notifications. Fix: Multiple tasker issues. Fix: Profile status not getting reflected on main view when changed using tasker/widget Fix: New widget not applying rules properly for profiles. Fix: Import rules fails when package not found Fix: User reported NPE & Force close issues. Android 4.3 Users Allow "DNS" and "NTP" from application list. Otherwise internet will be blocked completely ACCESS_SUPERUSER Permission More info on new permission - android.permission.ACCESS_SUPERUSER https://plus.google.com/103583939320326217147/posts/T9xnMJEnzf1 PERMISSIONS & FAQ INTERNET permission is only required for LAN functionality (API limitation) https://github.com/ukanth/afwall/wiki/FAQ This app has no advertisements. More Info: https://play.google.com/store/apps/details?id=dev.ukanth.ufirewall.donate&hl=en Download: http://www.tusfiles.net/aejxm4bxhyrf http://www.indishare.com/pwe2j8h0waht
  8. Google has fixed 23 security vulnerabilities in Chrome, including three high-risk flaws, and handed out $9,500 in rewards to researchers. Among the vulnerabilities that the company fixed in Chrome 35 are use-after-free flaws and an integer overflow, all of which are rated high. Google didn’t disclose the details of all of the various security vulnerabilities, but of the eight that it listed in its advisory, those three are the most serious. The full list of vulnerabilities patched in Chrome 35 will be published later, but here are the ones that Google has published and received bug bounties: [$3000][356653] High CVE-2014-1743: Use-after-free in styles. Credit to cloudfuzzer. [$3000][359454] High CVE-2014-1744: Integer overflow in audio. Credit to Aaron Staple. [$1000][346192] High CVE-2014-1745: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG. [$1000][364065] Medium CVE-2014-1746: Out-of-bounds read in media filters. Credit to Holger Fuhrmannek. [$1000][330663] Medium CVE-2014-1747: UXSS with local MHTML file. Credit to packagesu. [$500][331168] Medium CVE-2014-1748: UI spoofing with scrollbar. Credit to Jordan Milne. Users running Chrome should upgrade as soon as possible in order to avoid attacks against these flaws. Source
  9. Nsauditor Network Security Auditor 2.8.9 Nsauditor Network Security Auditor is a network security and vulnerability scanner that allows auditing and monitoring network computers for possible vulnerabilities, checking network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor is a complete networking software package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. http://www.youtube.com/watch?feature=player_embedded&v=Bba-ksiR_nc Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite! Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning, network connections monitoring and more. Nsauditor Network Security Auditor combines in one product Network Security and Vulnerability Scanning, Network Monitoring and Network Inventory, it allows monitoring network computers for possible vulnerabilities, checking enterprise network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor helps network administrators to identify security holes and flaws in their networked systems. The program also includes firewall system, real-time network monitoring, packet filtering and analyzing. Nsauditor significantly reduces the total cost of network management in enterprise environments by enabling IT personnel and systems administrators gather a wide range of information from all the computers in the network without installing server-side applications on these computers and create a report of potential problems that were found. A network monitor provides some insight into services running locally, with options to dig down into each connection and analyze the remote system, terminate connections, block unwanted network connections with incrusted firewall system and view data on the associated process. Key Features Website: http://www.nsauditor.com OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Crack Size: 11,36 MB
  10. The Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform.The new EMET 4.0 also provides a configurable SSL/TLS certificate pinning feature that is called Certificate Trust. This feature is intended to detect man-in-the-middle attacks that are leveraging the public key infrastructure (PKI). What's new in this version: Minor UI and stability improvements: Expired Certificate Trust rules are now highlighted in the user interface (UI).Expired Certificate Trust rules no longer trigger notification.Resolves an issue in which CTRL+A (Select All) on any table cannot be undone.Resolves a rare issue in which an exception is thrown when you open the support link on the Help menu.Application compatibility issues:Enables MemProt, SimExecFlow, and CallerCheck mitigations with Google Chrome Canary Edition, Adobe Acrobat, Adobe Reader, Apple iTunes, and other programs.Resolves a deadlock issue that is caused by the incorrect use of missing reporting functionality in Windows XP.Configuration and deployment improvements:By default, enables the DeepHooks global flag as part of the Recommended Settings configuration.Extends the expiration date for all default Certificate Trust rules to 8/1/2015.Resolves an issue in which the GPO application configuration is parsed incorrectly. This results in AuditMode being unintentionally enabled for the configured applications.Resolves an installer issue in which EMET_Agent cannot start when it is deployed in silent mode.Download: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Update 1 | 8.2 MB (Freeware)
  11. Crystal Security is a cloud-based system that detects and removes malicious programs (malware) from your computer. Its technology provides fast detection against malware and lets you know about the changes on your computer in real time. Anti-Malware Crystal Security is an easy to use application that was created in order to help you quickly detect and remove malware that might affect your computer. Cloud Based The cloud based Crystal Security gathers data from millions of participating users systems around the world to help defend you from the very latest viruses and malware attacks. Freeware Cloud based malware detection, easy to use, user-friendly interface, automatic/manual updates, no installations, supports multiple languages and many other features. Screenshots Supported OS: Microsoft Windows XP, Vista,7, 8, 8.1, Server 2003, Server 2008 32/64-bit *Requires .NET Framework 3.5 Homepage: http://www.crystalsecurity.eu/ Download Link: http://www.crystalsecurity.eu/downloads/Crystal%20Security%203.2.0.86.zip Discussion thread: http://www.wilderssecurity.com/threads/crystal-security-discussion.317258/
  12. NETGATE Spy Emergency 13.0.305.0 Spy Emergency - software that quickly and safely detects and removes spyware, adware and other malicious programs from your computer. Are you afraid of hackers or spyware, then install the program and make sure that you are protected from interference in your personal affairs associated with the computer. The program scans the system memory, registry, individual directories and files, cookies in the search for malware and spyware. Utility in real-time analyzes and protects the computer's memory. The program interface is unobtrusive and easy, and the functionality and performance program simply dazzling. There is a multilanguage support, including the Russian language. Features: Scan of your system memoryScan your entire registryScan your hard drive and system-wideBuilt-in anti-spam moduleScanning system foldersTracking and scanning CookiesScan the elements of hackingHeuristic malware detectionCommand line supportPreventive protection, which blocks the installation of malicious softwareBrowser security, including protection of the home (home page)Protecting CookiesAutomatic database updatesSimple and easy setupUser-friendly interfaceSupport for SkinsMulti-language, including Russian languageParticular attention is paid to developers compatible with other antivirus programs, such as: NOD32,Avast,BitDefender,Kaspersky,Avira, McAfee,DrWeb,Ad-Aware,Spybot Search Destroy,Spyware Doctor,Spy Sweeper,CounterSpy.Spy Emergency provides excellent functionality, performance, and high detection rates of malicious software has a simple and intuitive interface. Homepage: http://www.spy-emergency.com OS: Windows XP / Vista / 7 / 8 (x86-x64) Language: Ml Medicine: Keygen / Patch Size: 23,26 Mb.
  13. Steganos Online Shield 1.3.0.10622 The new Steganos Online Shield 365 protects you extensively and continuously while being on the Internet. It locks hackers out reliably and secures you online when you shop, browse or download -356 days a year. With Steganos Online Shield 365 we created a software which prevents you continuously against attacks against your PC, your data and your online-identity. And all that is possible through just one click of your mouse. Key Features: Protect yourself against snoops in public hotspots, for example while being in a hotel, a cafe, an airport or at the office.Protects you while surfing, shopping online and secures your personal data by continuously encrypting your data from your PC onwards.It couldn't be easier. Protect your connection with only one click of your mouse.Stay safe - Wether you're online wireless or by cable.The dangers have changed: A virus scanner is not an obstacle for hackers and cyber-criminals anymore. Don't wait until you're the victim of credit card fraud. Until your e-mail is hacked. Until strangers can look into your accounts – or go shopping at your expense.Don't wait until the milk is already spilled. The best protection against hackers is the continuous encryption of your whole connection to the internet - 365 days a year.Website: https://www.steganos.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Key Size: 15,00 Mb.
  14. IObit Malware Fighter Pro 2.1.0.18 ML + Keygen + Key IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique "Dual-Core" engine and the heuristic malware detection, IObit Malware Fighter detects the most complex and deepest spyware and malware in a very fast and efficient way. Here are some key features of "IObit Malware Fighter": One-click Solution and Very Easy to Use: Traditional advantages of IObit products. We love simple and automatic styles.Complete PC Security Care: Anti-malware, anti-spyware, anti-adware, anti-trojan, anti-bots, and more. IObit Malware Fighter can assist your antivirus to defend any tricky and complex threats.Finds the Deepest Infections: Using DOG (Digital Original Gene), a novel heuristic malware detection method, while IObit Malware Fighter can find the most complex threats.Very Fast and Light Thanks to the improved, unique "Dual-Core" anti-malware engine, complicated analysis can be made faster now.Work with All Antivirus Products Everyone needs a qualified antivirus software, and IObit Malware Fighter will surely be the best mate for your current antivirus.Automated Working in the Background Just install it and forget it. This powerful utility works continuously, automatically and quietly in the background on your PC. You can set it as your schedule or just let it work automatically when your PC is idle.Automatic and Frequent Updates By the new-generation malware analysis system and our professional database team, IObit Malware Fighter catches the emerging dangerous malware in the Internet. Website: http://www.iobit.com OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Keygen / Key Size: 21,65 Mb.
  15. SUPERAntiSpyware Professional 5.6.1032 ML (Rus/Eng) + Keygen SUPERAntiSpyware Pro - professional version of the program for scanning and destroying various types of malicious software. The program scans your computer and removes the following malware: spyware, adware, Trojans, dialers, worms, keyloggers and other types of computer infection. In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program scans your memory, registry and files on your hard drive for spyware modules, and then deletes the malware found. The built-in scheduler will help organize the verification of the computer at a specified time. Together with the recent change in ownership, the program has received a major upgrade in the history of its existence. Processing and improvement were almost all components and functions of the program from the interface engine to scan. SUPERAntiSpyware is now faster, more functional and more comfortable. Features: Quick, Complete and Custom Scanning of Hard Drives, registry, memory, and otherDetect and remove spyware, adware, trojans, dialers, worms, keyloggers, etc.Repair broken Internet Connections, Desktops, Registry, etc.Blocking malware in real-timeBuilt-in scheduler system scan at the specified timeDetailed scan logs with complete information about each pestWeak loads the computer and does not conflict with existing anti-virus softwareNew features and changes SUPERAntiSpyware 5: Greatly improved scan engine;Improved real-time protection to prevent contamination;Improved reports on the work program for a better analysis of the system;Added support for scanning files in the format of ZIP;Improved scheduler scans and updates;Improved handling of resources representing a conflict with other antivirus programs;The redesigned and improved user interface for easier access to key features of the program;Added a new scan mode for gaining control over the heavily infected system;Added a new mode Critical Areas Scan, which provides validation of critical areas in just 20 seconds;New tools recover after the actions of malicious programs.In addition, this application allows you to restore the broken record in network connections on your desktop in the registry and improve the overall security of your PC, shutting detected during start-up security holes in Windows. The program scans your memory, registry and files on your hard drive for spyware modules, and then deletes the malware found. The built-in scheduler will help organize the verification of the computer at a specified time. Website: http://www.superantispyware.com OS: Windows XP / Vista / 7 / 8 Language: Ml / Russian / English Medicine: Keygen Size: 26,2 Mb.
  16. NETGATE Spy Emergency 12.0.605.0 ML + Keygen Spy Emergency - software that quickly and safely detects and removes spyware, adware and other malicious programs from your computer. Are you afraid of hackers or spyware, then install the program and make sure that you are protected from interference in your personal affairs associated with the computer. The program scans the system memory, registry, individual directories and files, cookies in the search for malware and spyware. Utility in real-time analyzes and protects the computer's memory. The program interface is unobtrusive and easy, and the functionality and performance program simply dazzling. There is a multilanguage support, including the Russian language. Features: Scan of your system memoryScan your entire registryScan your hard drive and system-wideBuilt-in anti-spam moduleScanning system foldersTracking and scanning CookiesScan the elements of hackingHeuristic malware detectionCommand line supportPreventive protection, which blocks the installation of malicious softwareBrowser security, including protection of the home (home page)Protecting CookiesAutomatic database updatesSimple and easy setupUser-friendly interfaceSupport for SkinsMulti-language, including Russian languageParticular attention is paid to developers compatible with other antivirus programs, such as: NOD32,Avast,BitDefender,Kaspersky,Avira, McAfee,DrWeb,Ad-Aware,Spybot Search Destroy,Spyware Doctor,Spy Sweeper,CounterSpy.Spy Emergency provides excellent functionality, performance, and high detection rates of malicious software has a simple and intuitive interface. Homepage: http://www.spy-emergency.com OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Keygen Size: 23,12 Mb.
  17. Windows Vulnerability Scanner 3.4 Eng Portable Protector Plus - Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system secure. This program is updated regularly by Proland Software to detect all the vulnerabilities discovered. This software is compatible with Windows XP (Home & Professional), Windows 2000 Server & Professional and Windows 2003. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed. Website: http://www.protectorplus.com Year: 2013 OS: Windows XP / Vista / 7 / 8 Language: English Size: 0,875 Mb.
  18. GridinSoft Trojan Killer 2.1.7.8 Ml + Patch GridinSoft Trojan Killer - advanced program to clean your computer of all malicious threats! If you - a permanent internet user, you should take steps to protect your personal information against cyber-criminals. Trojan Killer can help you in this matter! The program quickly identify (recognize) and immediately remove dangerous malicious Trojans - spyware and adware, malware blocking and restricting the activities of tools, keyloggers, etc. before irreversible painful events will come in the form of stolen accounts, passwords, credit card numbers, personal, corporate and other information. Trojan Killer is designed specifically to disable / remove Malware without the user having to manually edit system files or reestr.Programma also removes the additional system modifications that are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time, Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in a security system for providing security in computer systems. The program will help you get rid of annoying adware, malware and other rough tools. It is very important to restore control over your computer, and do not let anyone use your data. Additional tools:Reset Home Internet Explorer / Start / Search Page Settings Some Malware programs make changes to the main page of Internet Explorer, Start and Search Page settings, in order to redirect the web browser to different websites. This utility will reset the Home / Start / Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default). Restore the HOSTS fileWindows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name to its address DNS, web browser can find the website more quickly as it does not have to query a DNS-name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related Web sites or antivirus company), or re-direct access to websites of their choosing. Reset Windows Update, politicianSome Malware programs attempt to prevent Windows Update, from running, and inhibit access to resetting Windows Update, by blanking out the Windows Update options on the Configure Update. Website: http://www.gridinsoft.com/ OS: Windows XP / Vista / 7 / 8 Language: Ml Medicine: Patch-XenoCoder Size: 43,78 Mb.
  19. GridinSoft Trojan Killer 2.1.7.7 ML + Patch GridinSoft Trojan Killer - a very powerful program for cleaning your computer of all malicious threats! If you - the active internet user, you should take steps to protect their personal information against cyber-criminals. Trojan Killer will help you in this matter! The program quickly detect (recognize) and immediately remove dangerous malicious Trojans - spyware and adware, malware blocking and restricting the activities of tools, keyloggers, etc. before irreversible painful events will come in the form of stolen accounts, passwords, credit card numbers, personal, corporate and other information. Trojan Killer is designed specifically to disable / remove Malware without the user having to manually edit system files or reestr.Programma also removes the additional system modifications that are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time, Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in a security system for providing security in computer systems. The program will help you get rid of annoying adware, malware and other rough tools. It is very important to restore control over your computer, and do not let anyone use your data. Additional tools: Reset Home Internet Explorer / Start / Search Page SettingsSome Malware programs make changes to the main page of Internet Explorer, Start and Search Page settings, in order to redirect the web browser to different websites. This utility will reset the Home / Start / Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default). Reset HOSTS fileWindows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name to its address DNS, web browser can find the website more quickly as it does not have to query a DNS-name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related Web sites or antivirus company), or re-direct access to websites of their choosing. Reset Windows Update, politicianSome Malware programs attempt to prevent Windows Update, from running, and inhibit access to resetting Windows Update, by blanking out the Windows Update options on the Configure Update. Website: http://www.gridinsoft.com/ Year: 2013 OS: Windows ® 8/XP/Vista/7/8 Language: Multilingual/Rus/Eng Medicine: Patch-XenoCoder Size: 43.83 MB
  20. HomeGuard Activity Monitor 1.7.2 Eng + Crack / Serial HomeGuard Activity Monitor - an advanced tool for monitoring user activity on the Internet and offline. Allows you to select a specific user and time monitoring. Automatically block all pornographic and objectionable web content based on keywords. Writes detailed information on the website, including visits and time spent on each site time, keeping the "white" and "black" lists. It also controls and if necessary blocks the removable media such as USB flash drives, external hard drives, etc. Opportunities HomeGuard: Built keystrokes. It records all keystrokes while typing the title bar while typing.Record activity through screenshots.Lock and time limit of programs and games.Monitoring and blocking IM (Yahoo and MSN / Windows Live messengers) and Email.Limiting the time of the Internet and the computer.Web monitoring and blocking of search in search engines Google, Yahoo and Bing (MSN).E-mail notifications.Maintain statistics regarding use of the programs: the general and the actual time of each program, how many times the mouse was clicked in each program, the total number of bytes sent and received by each program, and othersMonitoring and blocking of individual internet connections by port and IP-address.Monitoring and lock for deleting and moving files.Monitoring of the printer.Automatic cleanup of old records.Website: http://veridium.net/ Year: 2013 OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Crack / Serial Size: 10,24 Mb
  21. Hitman Pro 3.7.7 Build 202 ML + Patch Hitman Pro - a powerful scanner for detecting other malicious programs. Hitman PRO feature is that it uses when checking the databases of other applications to detect and remove spyware (Ad-Aware SE Personal, Spy Sweeper, Spybot Search & Destroy, CWShredder, SpywareBlaste, Spyware Block List, Sysclean Package, SuperDAT VirusScan) . Features: Detects and removes viruses, Trojans, rootkits, spyware and other malware.Revolutionary innovation in scanning technique distinguishes between malicious and safe software without signatures.Short scan time - within a few minutes.No additional load on the system.Impossible to make false positives on important system files, thanks to "profiling" and "white" list.Automatically restores common system alterations made ​​by malicious software.Check Point creates a System Restore before removing malicious software.Removes resistant threats using native NT boot time Deleter.Removes references to malicious software (like shortcuts and registry entries).Website: http://www.surfright.nl/en Year: 2013 OS: Windows XP / Vista / 7/ 8 (x32-x64) Language: Ml Medicine: Patch Size: 9,92 / 10,63 Mb.
  22. NETGATE Spy Emergency 12.0.505.0 ML + Keygen Spy Emergency - software that quickly and safely detects and removes spyware, adware and other malicious programs from your computer. Are you afraid of hackers or spyware, then install the program and make sure that you are protected from interference in your personal affairs associated with the computer. The program scans the system memory, registry, individual directories and files, cookies in the search for malware and spyware. Utility in real-time analyzes and protects the computer's memory. The program interface is unobtrusive and easy, and the functionality and performance program simply dazzling. There is a multilanguage support, including the Russian language. Features: Scan of your system memoryScan your entire registryScan your hard drive and system-wideBuilt-in anti-spam moduleScanning system foldersTracking and scanning CookiesScan the elements of hackingHeuristic malware detectionCommand line supportPreventive protection, which blocks the installation of malicious softwareBrowser security, including protection of the home (home page)Protecting CookiesAutomatic database updatesSimple and easy setupUser-friendly interfaceSupport for SkinsMulti-language, including Russian languageParticular attention is paid to developers compatible with other antivirus programs, such as: NOD32,Avast,BitDefender,Kaspersky,Avira, McAfee,DrWeb,Ad-Aware,Spybot Search Destroy,Spyware Doctor,Spy Sweeper,CounterSpy.Spy Emergency provides excellent functionality, performance, and high detection rates of malicious software has a simple and intuitive interface.
  23. At 10 AM Pacific time on Thursday, Microsoft will release an update to address the zero day vulnerability recently disclosed in all versions of Internet Explorer. The advance notification of the update lists Windows XP as among the affected platforms, indicating that it will be among the platforms patched, in spite of its support period ending weeks ago. Adrienne Hall, General Manager, Microsoft Trustworthy Computing stated "[T]he security of our products is something we take incredibly seriously. When we saw the first reports about this vulnerability we decided to fix it, fix it fast, and fix it for all our customers." Users with Automatic Updates enabled do not have to do anything, although running Windows Update will apply the fix immediately. In a blog entry, Hall explains Microsoft's approach, which mostly is to urge users to move on from Windows XP. The company decided to move quickly when they were made aware of this vulnerability and to patch Windows XP because of the proximity to its end of support period. Further information on the update may be found at KB2964358. Among the advice there, IE will crash if you install the update on a Windows 7 system whch does not have KB2929437 installed. If you use Windows Update these determinations and appropriate installations will be made automatically. Otherwise, follow the instructions in KB2964358. Source
  24. The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java and Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank), and provides the most powerful Anti-XSS protection available in a browser. NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality... You can enable JavaScript, Java and plugin execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows. Screenshot: Links: Homepage Changelog Download
  25. Panda Cloud Cleaner 1.0.52 Eng Panda Cloud Cleaner - a free virus scanner, as well as a product for the treatment, which works by scanning in the cloud. Now you will be able to scan your system for free to the presence of different types of threats that may miss your main antivirus program. After starting the scanning process will be checked all the critical areas of the system will be using cloud technology. According to the manufacturer Panda Cloud Cleaner is able to find what others miss Antivirus. Thanks to cloud technology, millions of users can share information about various malware. Site: http://www.tusfiles.net Sharecode: /p0n4sx5op22w
×
×
  • Create New...