Tuesday, November 17, 2009

Free Hide Folder 2.3

free Hide Folder is a free computer security software to hide your private folders. It is very useful to keep your personal data away from others. Others will not know where your personal files exist and they will not be able to accidentally view them. You can hide folders simply with a few mouse clicks. Free Hide Folder is protected by a password that you can change or remove at any time.

Download: 740KB

Sunday, November 15, 2009

Stealing History Without Javascript

Making The Web has a demonstration of a neat trick to display your browser history even without the use of Javascript.

The trick is that it's not really scanning your history. The technique works by using CSS attributes which display whenever a site is visited. They use this in combination with a large list of popular web addresses. They display all of these addresses in an IFRAME with CSS attributes such that they will display only if visited, so the ones you've visited show up.

The main hole in the technique is that if a site is not in their list it won't show up in the history list they display. The other hole is that it's not clear that they can do a whole lot with the information if Javascript is not enabled, although the demo site claims to collect some data and display what it claims to be a "most visited pages" list. I'm not saying this is a lie, but I couldn't figure out from the source how they collected it.

There has been some controversy over whether the technique works with NoScript installed, as the author insists it does. I didn't test it with NoScript, but I did disable Javascript in the Firefox and confirmed that it was disabled, and the demo worked well.


Saturday, November 14, 2009

Kaspersky Anti-Virus & Internet Security 2010 KEYS



Kaspersky Anti-Virus & Internet Security
2010 KEYS







Friday, November 13, 2009

NOD32 Antivirus 4.0.437 Home & Business


NOD32 Antivirus 4.0.437 Home & Business







Saturday, October 17, 2009

ArzooSoft USB Threat Defender v1.0

USB Threat Defender - Ultimate USB Anti-Virus, maximumprotection guaranteed.USB Threat Defender is not just another autorun.inf virus remover, it takes more than that to provide maximumprotection guarantee.USB Threat Defender is the ultimate USB Anti-Virus, its unique Proactive and Definition scan Technology combined together unleashes a new security stronghold level to give rock-solid protection against any USB threat, guaranteed.This new protection level detects and removes both known and unknown threats missed by your Anti-Virus to give maximum protection against any USB threat attack. It also removes pre-existing installed viruses from your system.USB Threat Defender is designed to work without regular updates, hence it protects both Online and Offline computers of Home and Business effectively.

Download: 4.97MB
Kewlshare

Thursday, October 15, 2009

Spyware HelpDesk - FREE with SpyHunter

Automated custom fixes for specific unsolved Malware

Spyware HelpDesk (included with SpyHunter) is an interactive feature that is dedicated to providing a personalized one-on-one technical support service to help you with your malware-related needs. With Spyware Helpdesk, if you have a spyware problem that SpyHunter cannot automatically fix, our technicians will create a unique custom fix for your system.

Wednesday, October 14, 2009

PC Advisor: Group test: what's the best security software?

Nine 2009 internet security suites compared

PC Advisor staff
March 21, 2009

A run-of-the-mill internet security suite will protect your PC from most web threats, but that simply isn't good enough for discerning users. In our ultimate security group test, PC Advisor and independent lab AV-Test assess nine of the best suites.

2009 security suites: what's the best security software?

With attacks on your PC increasing in frequency and sophistication, it's more vital than ever that you use effective security software. The best protection, as our tests of the latest all-in-one suites show, can thwart the nastiest viruses, spy- and adware and phishing schemes.

In the early days of computer malware, you could get by without antivirus software simply by surfing carefully. Today's crooks love nothing more than to discover a nasty zero-day security flaw, for which there's no defence, then infiltrate otherwise benign and popular websites with hidden, malicious programming designed to attack that flaw. While relatively uncommon, such tactics can ensnare even the most cautious surfer. Today, you need protection.

PC Advisor got respected independent testing lab AV-Test.org to put nine comprehensive internet-security suites through the ringer. Its researchers poked and prodded, surfed and scanned, until one of the contenders - Norton Internet Security 2009 - came out on top.

Symantec's suite did an excellent job, starting with an overall malware-detection rate just short of 99 percent. It has an attractive and well laid-out interface, and its automatic updates send new malware signatures to your PC every few minutes.

More internet security product reviews

The designers also incorporated cloud computing, with on-the-spot online checks to supplement local scans. Yet another feature compares new programs on your PC against a database of known apps, a step meant to improve the suite's performance by preventing it from scanning safe programs.

Harnessing the immediacy of the internet is a trend this year. The F-Secure, McAfee and Panda packages all use online checks to detect new malware more quickly, without waiting for a scheduled signature update.

Although Norton deserves its top spot, it isn't for everyone. Norton can't perform backups, for instance, while four other suites here can. And while its detection rate is very good, it isn't the best - Avira wins that accolade. It's also pretty pricey.

2009 security suites: how we test

To evaluate the suites, PC Advisor partnered with AV-Test. This independent testing laboratory pits each suite against its ‘zoo'
of 654,914 backdoor apps, bots, worms, Trojan horses and password stealers, as well as 46,246 adware samples. Each suite was allowed to connect to the internet to use online checks, where available. Tests also determined each suite's ability to clean up malware infections.

Each suite had to detect and remove active and inactive rootkits - stealth malware that hides criminal software on your PC. Heuristic and behaviour-detection tests determined how well a suite could spot malware for which it didn't yet have a signature.

The heuristic tests used two- and four-week-old signature files to simulate encounters with new malware, while the behaviour tests examined how well a suite can identify malware based solely on the way it acts. AV-Test also assessed scan speed, both on demand (scans initiated manually or on a schedule) and on access (scans of files as the PC opens or accesses them).

More internet security product reviews

We then assessed design and interfaces: determining how well each suite handled alerts and phishing blocks, whether default settings were appropriate and how easy it was for advanced users to change them.

For security apps, performance and effectiveness are more important than aesthetics. As a result, our scoring depended largely on each suite's malware-detection and disinfection rates, along with the scan speed. We also considered price, support and features in the final rankings. Unless otherwise stated, prices given are for a one-year, single-user licence.

2009 security suites: in-depth reviews

* Avira Premium Security Suite 8.2 review
* BitDefender Internet Security 2009 review RECOMMENDED
* F-Secure Internet Security 2009 review
* Kaspersky Internet Security 2009 review
* McAfee Internet Security Suite 2009 review
* Panda Internet Security 2009 review
* Symantec Norton Internet Security 2009 review BEST BUY!
* Trend Micro Internet Security Pro 2009 review
* Webroot Internet Security Essentials review

Tuesday, October 13, 2009

Kaspersky Anti-Virus & Internet Security 2010


Kaspersky Anti-Virus & Internet Security 2010



DOWNLOAD

Sunday, September 13, 2009

Avira AntiVir Premium 9.0.0.441


Avira AntiVir Premium 9.0.0.441



DOWNLOAD

Friday, August 14, 2009

ZDNet Reviews: Internet Security & Firewall

Find The Right Internet security and firewall

Thursday, August 13, 2009

Avira Premium Security Suite 9.0.0.376


Avira Premium Security Suite 9.0.0.376




DOWNLOAD

Tuesday, August 11, 2009

WordPress For Internet Marketers

The Domain Secrets Book.

Monthly Commissions $$- How To Build Website Videos With Help Desk!

My Instant Cover! Create Your Own Professional E Cover In A Flash!

Diy Website Creation- Video Training To Build Your Site With Wordpress

The Guru Network Security Consultant - Home Study Course.

Warning: Hackers are gaining access to your site, ruining all your hard work, and destroying your bottom line!

They're all around us... hackers who would take from hard-working internet marketers like you and me; breaking into our sites, and destroying all those hours of hard work...

Internet Most Trusted AntiSpyware

Make sure your PC is protected 24 hours a day with theaward-winning AntiSpyware software.

THE BEST ANTI SPYWARE






SECURE BROWSING

REMEMBER DAYS WHEN YOU DIDNT HAVE TO BE SCARED TO BROWSE THE WEB?

Your PC is probably infected with adware & spyware :

NOT LIKE ANY SCANE.. TRY IT


FREE SCANE




Kaspersky Virus Removal Tool 7.0.0.290 04.08.2009


Avira AntiVir Premium 9.0.0.446


DOWNLOAD:Size: 32.1 MB




Avira AntiVir Rescue System 05/08/2009


Download




bitdefender 2009


DOWNLOAD:250 MB

RapidShare



Thursday, July 23, 2009

ESET Smart Security 4.0.437 Business&Home


ESET Smart Security 4.0.437 Business&
Home



DOWNLOAD
==================
Business
==================
==================
==================
Home
==================


Conficker Removal Tool - FREE!


Free tool to remove Conficker Worm

Conficker Removal Tool is a FREE tool for the removal of the infectious Conficker Worm. Conficker is a computer worm that, when it first appeared, exploited the MS08-067 vulnerability in the Windows Server service. The Free Conficker Removal Tool is specifically designed to automatically assist you with the removal of Conficker Worm from your PC. Try our Free Conficker Removal Tool to remove Conficker Worm safely and with confidence.

Wednesday, July 22, 2009

The Latest Facebook Western Union Scam

Read here for the latest variation on the 419 scam, utilized through chat on hijacked Facebook accounts, as detailed by the famous Meng Wong, author of the SPF specand other helpful technologies.

Wong includes a full transcript of a chat with a "friend" of his who tells him that he is traveling in London, was robbed at gunpoint and needs Wong to wire him money. Wong is not fooled for a second and plays with the guy, even sending him the URL toa TechCrunch story picked up by the Washington Post about this exact scam.

In the end Wong gets him to view a URL on one of his servers; then from the logs he pulls out the address of the scammer, a Nigerian address. The very least you can say about the Nigerian address is that it's not in London.

All of this proves the general rule that identity is a fuzzy thing on the Internet. Even when you have an established relationship with someone through an online channel you need to be skeptical of everything you see, especially when patterns of behavior change.

Anti-Trojan Elite 4.5.1


Anti-Trojan Elite 4.5.1



DOWNLOAD

Tuesday, July 21, 2009

Bifrost in Action

watch this>>>>

Microsoft fixes 9 vulnerabilities, but leaves one open to attack

Microsoft on Tuesday, July 14th, as part of its monthly patch procedure, released 6 new bulletins, repairing 9 security vulnerabilities. While the patch addressed two of the "zero-day" exploits -- Microsoft's DirectShow & Video ActiveX Control -- it left a third exploit vulnerable to hackers.

The bulletins fixed vulnerabilities in Windows, Microsoft Office, Virtual PC and Virtual Server and the Internet Security and Acceleration (ISA) server.

Of the 6 vulnerabilities, 3 were rated critical, while the remaining bulletins were marked as important. 8 of the 9 exploit codes were at the top of Windows' Exploitability Index, meaning that a hacker could consistently exploit those vulnerabilities.

While the patch fixed exploits in Microsoft Video's ActiveX Control -- a vulnerability which allowed for remote code execution when using Internet Explorer -- no correction was made for the vulnerability in the Office Web Components that allows hackers the ability to gain user rights to a computer.

To prevent exploit, Microsoft suggests users keep Office Web Components Library from running in Internet Explorer. Users can use Microsoft's "
Fix it" to disable Office Web Components, or they can fix it themselves by configuring the kill bit for control in the registry.

Does Google's OS decrease or increase security risks?


Wednesday's two big technology stories--Google's Chrome-based operating system and cyberattacks against U.S. and South Korean government Web sites are oddly related. The stories are connected because if Google does well at gaining market share for its browser, we could see fewer successful attacks. Or maybe we'll see more attacks.

The reason hackers succeeded in launching denial-of-service attacks against government computers in the U.S. and South Korea is because they were able to enlist an army of "zombie" computers to carry out the attack. And what do those computers likely have in common? The vast majority of them likely run Microsoft Windows.

Whether Windows is inherently less secure than Mac OS X or Linux is debatable, but one thing is for sure--it's more popular and therefore a more attractive target to hackers. Indeed with nearly 90 percent of the world's PCs running Windows, it's something of a "single point of failure." Figure out how to infect Windows PCs and you can stage a very successful attack.

Linux--which is the underpinning of Google Chrome--is not entirely exempt from malicious software but historically Linux machines are less likely to be infected. So it stands to reason that the more machines running non-Windows software, the safer we'll all be.

But there's another side to this story. The Chrome OS will be far more Web-centric than Windows, which means that many--if not most--of its applications will be running over the Internet. What's more, people's data will be stored "in the cloud," much of it on servers run by Google. So while Google may help reduce Microsoft's potential as a single point of failure, it increases its own. If hackers were successful in launching an attack on Google, that would affect not only people's ability to use Google apps, but the integrity of their data.

Although there weren't any reported data breaches, there was a day in May of this year when Google sites were partially inaccessible as a result of a technical glitch. On that day, millions of people were unable to use Google services, including Google Docs and Spreadsheets. Say what you want about Microsoft, but even if the company totally shut down its Web operations, its operating system and PC applications would still run.

Personally, I'm a big believer in competition and like cloud computing, so I welcome Google's entry into the operating system arena. But like almost anything worthwhile, it's not without risk.

Hackers Stole $415,000 from Bullitt County Coffers

Cyber criminals from Ukraine reportedly filched $415,000 from Bullitt County's coffers in Kentucky (USA) during the end week of June 2009. Over 24 accomplices in the US aided the crooks along with a string of harmful codes that were designed to bypass the security measures installed by the banks.

Attorney of Bullitt County said that the problem started on June 22, 2009 when an unknown person had begun wiring money amounted $10,000 from the payroll of the county to 25 individuals' accounts across the country.

Attorney further stated that First Federal Savings Bank froze an account of the county on June 29, 2009 after the bank had found that the sum had already been transferred to a number of banks in the country. When First Federal became suspicious of something wrong, it started requesting those banks getting the transfers to begin reversing them.

Moreover, the county's bank told Attorney's office that by July 2, 2009, the bank's authorities would likely know the number of banks make the reversals of money. The bank officials also added that they thought part of the county's money might be recovered though it was not certain exactly how much.

Meanwhile, it appears that some type of PC virus made the illegal transfers, as attorney of Bullitt County said that employees of the county received e-mails carrying a password-stealing virus.

The virus enabled the culprit to gain access to extremely sensitive bank details and change passwords; thus, allowing him enter the account. The miscreant then carried out the transactions from Ukraine and distributed the sum to several US banks.

Besides, a BBB agent said that it didn't surprise him that anyone had become victim of a phishing fraud. He said the incident at Bullitt County should be an alert to all the government organizations owning bank accounts through online services.

Meanwhile, an investigation by the FBI has started and Bullitt County Attorney stated that finding the perpetrator could take some time. While an FBI spokesman suspected that the theft had worldwide connections, he couldn't say if any criminal had been identified.

Monday, July 20, 2009

The Month of Twitter Bugs

About 3 years ago there were a series of vulnerability research campaigns for various targets: the Month of Apple Bugs, the Month of PHP Bugs, the Month of Kernel Bugs...

Aviv Raff is a pen-testing veteran of the Month of Browser Bugs. Now he has proposed bringing the bug-month method into the modern era with...

July 2009 will be the Month of Twitter Bugs—this sounds like it will be heavy with cross-site scripting problems of the sort Raff has blogged on recently.

The bugs will focus on the Twitter API and third party sloppy use of it. Raff will warn these services in advance and give them time to fix their problems before he parades them in public. He adds that bugs of this sort are common on Web 2.0 mashup sites. Perhaps it takes something like this to raise awareness of a problem.

Sunday, July 19, 2009

Folder lock 6.2.5

Folder Lock® is a fast data encryption and password protection software for Windows. It can simultaneously encrypt, lock and password protect your files, folders, drives, USB drives and even CD/DVD-RW.You can treat Lockers just as you would treat them in physical world. Each user can have their own Lockers. However, a single user can create multiple Lockers with different passwords as well. With Folder Lock, you can choose either to encrypt using 256-bit AES on-the-fly encryption or lock files, folders and drives anywhere on your computer. Each Locker can contain your encrypted files as well as your personal list of locked items.


Download: 24.56MB
Kewlshare

Default Password Use Opened Telephone Networks to International Hacking Scheme

An international telephone network hacking scheme resulted in $55 million of hijacked calls,

Federal authorities in New Jersey have indicted three individuals in the Philippines who must now either be extradited or volunteer to come to the US to face charges. Cheap international calling time was sold through call centers in Italy. Italian authorities have also arrested 5 Pakistani nationals in connection with the scheme. Authorities indicate that the plan was somehow connected to funding terrorist plots.

The calls were made through corporate networks that the suspects hacked into using a brute force attack, finding access through PBXs that had default passwords.The indictment says that Pakistani operators of the Italian call centers paid the Philippine hackers $100 for each open PBX they found.

Default passwords are a common and easy way for hackers to attack systems. It's important for you to use strong passwords to protect your systems.

Saturday, July 18, 2009

PC Tools Internet Security Suite 2009 6.0.1.441


PC Tools Internet Security Suite 2009 6.0.1.441



PC SECURITY
---------------------
PC Security Software: FREE (DOWNLOAD)

PC Security Product Reviews - Tests

Hacking NEWS

SECURITY NEWS


SeePassword v2.5 + Serial

When a password appears on screen as a series of asterisks or dots, you simply view it through SeePassword's magnifying glass to reveal the actual password text. See-Password has no problems with passwords stored by Internet Explorer— all the sites will yield their secrets. SeePassword provides users with an easily applied retrieval tool for forgotten passwords.
Download: 431KB

ZoneAlarm Pro 8.0.298.004

ZoneAlarm protects your sensitive personal and financial data from hacker attacks. It keeps your private information safe from the outside world, and can even track the source of intrusion attempts and map their whereabouts instantly, without exposing your identity or location. For iron-clad firewall protection, choose ZoneAlarm.Network and Program FirewallDelivers proactive firewall protection with multiple layers of security that stop inbound, outbound, and program attacks while remaining completely invisible to hackers.* Guards the network perimeter from inbound and outbound threats with the world's #1 firewall* Prevents spyware and other malicious programs from sending your personal information across the Internet* Full stealth mode to keep you concealed from anyone on the Internet* Protects your programs from malware


Download: 31.72Mb
Rapidshare

Anti-Trojan Elite

Anti-Trojan Elite™ (ATE) is a malware remover, it can detect and clean malware in disk or memory. Malware is software designed specifically to damage or disrupt a system, such as a trojan horse, a spyware or a keylogger. ATE contains a Real-Time File Firewall, it monitor system and clean malwares immediately. It is also a system security tools, you can view and control processes and TCP/IP network connections.Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time. The ATE can detect more than 35000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time.
Download: 7.18MB

PCMAV 2.0d Valkyrie (Portable AV)

PC Media Antivirus (PCMAV) 2.0d - ValkyrieCopyright (c) 2006-2009 Majalah PC MediaPinpoint Publications GroupFEATURESa. The Best Antivirus in Indonesiab. Made in Indonesia.c. Fast Detection.d. Documents Safe.e. System Recovery.f. Totally Clean.g. Accurate.h. Pro-Active Protection.



Download: 24.55MB
Kewlshare

Sophos AntiVirus 7.3

Sophos Anti-Virus protects your network, desktop and even remote laptop computers from the latest viruses, Trojans, worms and spyware. The quality of its award-winning technology has been confirmed time and time again by independent bodies such as West Coast Labs, ICSA Labs and Virus Bulletin.




Download: 35.64MB
Kewlshare

Loaris Trojan Remover 1.1.6.7

Are you bombarded with popup ads, seeing new toolbars in your browser, is your home page changing to unwanted destinations or are you bombarded with irritating spam? Perhaps strange software loads on startup or your favorites have new entries that YOU DONT WANT. If So.. Your PC is most likely infected with adware, spyware, spybot, trojans or another internet parasite. These programs have the ability to track your browsing habits and even steal such personal information as bank account numbers and passwords. Spyware has the power to install more parasites on your computer without your consent. Everything you do and everything you type is being recorded right now! Companies know what your interests are! Hackers will access your PC and do anything they wish. They can even steal your Identity and You would never be the wiser! The Solution: Download the latest version of Loaris Trojan Remover right now. You will be able to completely clean your computer of all these invasive threats! Your computer will be clean and will run alot faster - Your Privacy will be Protected!

Download: 7.40MB
Kewlshare

Outpost Security Suite Pro 2009

Outpost Security Suite Pro 2009






Outpost Security Suite
Pro 2009 Build 6.5.3(2518.381.0686.327) Multilingual
Outpost Security Suite Pro 2009 (6.5.2514.381.685.326.204) Final (32 bit)

McAfee Total Protection 2009 Pre-Cracked

McAfee Total Protection 2009 Pre-Cracked

DOWNLOAD

Zshare

New--Simplified Set-up
Installation is now easier and faster with improved detection and removal of malware that tries to halt the set-up

New--Enterprise-class Anti-spam
Powerful industry-grade spam protection helps keep your inbox free from unwanted, fraudulent, offensive, and phishing emails.

New--QuickScan
Checks for threats in the areas of your computer that are most often attacked

New--Network Monitoring
+++++s you when intruders connect to your home network

New--Age Appropriate Searching
Automatically sets the proper content filtering levels of popular search engines

New--Friendly +++++s
Provides you with easy to understand +++++s regarding your protection

Key Product Highlights

Anti-virus/Anti-spyware
Detects, blocks, and removes viruses, spyware, and adware

Anti-phishing
+++++s you to web sites that may try to steal your identity

Identity Protection
Helps you to shop, bank, and trade online safely

Two-way Firewall Protection
Confidently use the Internet 24/7 knowing +++++++ can't get access to your PCs

Web Site Safety Advisor
A powerful web site guide and shield, McAfee SiteAdvisor Plus technology helps you to safely search and transact online by providing you with color-coded ratings to warn you about and actually prevent you from visiting risky web sites that can compromise your identity and your PC