tag:blogger.com,1999:blog-8066002264443072462024-03-08T13:44:31.841-08:00Antivirus n FirewallA Website to explore the exciting world of Anti-virus & Firewalls...
Here You can get-
Tips & Tricks,Solutions to your Problems,Reviews of New Products,Download links,And anything releted to the topic...Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.comBlogger27125tag:blogger.com,1999:blog-806600226444307246.post-82199052985281903172009-01-28T06:04:00.000-08:002009-01-28T06:09:28.778-08:0015 million PCs infected with VirusA virulent <a href="http://en.wikipedia.org/wiki/Computer_virus">computer virus</a> has infected as many as 15 million computers around the world so far, according to various estimates.<br /><br />The virus -- a self-replicating <a href="http://antivirusnfirewall.blogspot.com/2007/10/what-is-virsuwormtrojan.html">computer worm</a> known as Downadup, Conficker or Kido -- spreads across computer networks<br />using Microsoft Windows software which have not been patched or updated properly. <a href="http://www.microsoft.com/">Microsoft</a> issued a <a href="http://en.wikipedia.org/wiki/Patch_(computing)">patch </a>that fixes the vulnerability the virus exploits last October.<br /><br />The Independent on <a href="http://www.mirror.co.uk/sunday-mirror/">Sunday newspape</a>r said in London at the weekend that more than 3,000 British organizations, including hospitals and the Ministry of Defense, have been hit by the virus. <br />read complete story <a href="http://www.upi.com/Top_News/2009/01/26/Virus_strikes_15_million_PCs/UPI-19421232924206/">here</a>...Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-46134675153341053652009-01-28T05:41:00.000-08:002009-01-28T05:46:59.180-08:00Industrial Computer Security Cabinet<a href="http://find1234.com/computer/industrial-computer-security-cabinets/">Industrial Computer Security Cabinet </a><a href="http://cabinets.apluswhs.com/metal-storage-cabinets/see-through-kingcab-heavy-duty-storage-cabinet/">KING CAB-J </a>protects your computer from physical and technical theft. Amazingly the dimensions are 60 X 24 X 72 and height of 78 and weight of 676. All this at just $ 1745.70 . more details <br /><br />Industrial <a href="http://en.wikipedia.org/wiki/Computer_security">Computer Security</a> Cabinet HSCW-3060<br /><br />This is a completely secured and carefully designed <a href="http://www.webopedia.com/TERM/C/computer_cabinet.html">computer cabinet</a> which protects your computer from any physical or technical theft. Also the dimensions and height and weight are comparatively on the lower side making this product most loved and flexible.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com3tag:blogger.com,1999:blog-806600226444307246.post-91777436131948167872008-12-12T00:44:00.000-08:002008-12-12T01:34:56.106-08:00AntiVirus free to Mac Users.<p class="MsoNormal" style="line-height:12.0pt"><strong><span style="font-size: 9.0pt;font-family:Verdana;color:black">New <a href="http://www.pctools.com/spyware-doctor-antivirus/?ref=google&gclid=CK_rl5rjupcCFQsspAod63jbSA">anti-virus</a> software that clears almost all possible threats against the Mac OS X operating system specifically.</span></strong><span class="verdana13px"><span style="font-size:9.0pt"><o:p></o:p></span></span></p><p class="MsoNormal" style="line-height:12.0pt"><span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; font-weight: bold;"></span></p><p class="MsoNormal" style="line-height:12.0pt"><span style="font-size:9.0pt; font-family:Verdana;color:black"><span class="Apple-style-span" style="font-weight: normal;">Unlike other Mac security products <a href="http://www.pctools.com/spyware-doctor/?ref=google&gclid=CKG_jb7iupcCFQEvpAodFh22SQ">PC Tools'</a> <a href="http://www.iantivirus.com/">iAntiVirus</a> is different due to its unique feature which does not specially contain any unwanted information about Windows-based threats making sure that this product is phenomenal and its memory footprint and system resource usage is kept to a minimum.<br /><br />Pc Tools also claimed for this product to have minimum of system impact as it works at its own without much user interference and is designed to work silently in monitoring mode and also functioned to detect and remove threats automatically. At the same time a small window keeps you informed about threats and the action taken against it. Also the interface is very user friendly and functional to make the scans and carry actions against the scan results.</span> <span class="Apple-style-span" style="font-weight: normal;"><o:p></o:p></span></span></p> <p class="MsoNormal" style="line-height:12.0pt"><span style="font-size:9.0pt; font-family:Verdana;color:black"><span style="mso-spacerun:yes"><span class="Apple-style-span" style="font-weight: normal;"> </span></span><span class="Apple-style-span" style="font-weight: normal;"><br />The best feature is that this software protects a <a href="http://www.apple.com/macosx/">Mac </a>in real time and moves detected infections automatically to quarantine which allows to view them and restore any files which may be important to you. Also an alert is flashed at the system menu bar to inform the user about any detected infection.</span><span class="Apple-style-span" style="font-weight: normal;"><o:p></o:p></span></span></p> <p class="MsoNormal" style="line-height:12.0pt"><span style="font-size:9.0pt; font-family:Verdana;color:black"><span class="Apple-style-span" style="font-weight: normal;"><br />The all new added feature in iAntiVirus is the Smart Update Function which enables the user automatically keeps the software updated as well as automatically notifies about any new necessary enhancements and installs it automatically all through the Smart Update Function. </span></span></p><p class="MsoNormal" style="line-height:12.0pt"><span style="font-size:9.0pt; font-family:Verdana;color:black"><span class="Apple-style-span" style="font-weight: normal;"><blockquote><a href="http://www.softpedia.com/get/Others/Signatures-Updates/Kaspersky-AntiVirus-Update.shtml">Threat signatures</a> are also updated automatically within hours of a high-risk malware outbreak to protect your Mac from the latest online threats.</blockquote></span><span class="Apple-style-span" style="font-weight: normal;"><o:p></o:p></span></span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-weight: normal;"> </span></o:p></p><p></p>Shriranghttp://www.blogger.com/profile/08174656715896468006noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-16881742941491581692008-12-09T01:13:00.000-08:002008-12-09T01:23:08.662-08:00beware of Fake antivirus scamPC <a href="http://www.itsecurity.com/features/top-59-influencers-itsecurity-031407/">Security expert</a>s are worried of a new fake anti-virus software scam in circulation.<br /><br />A rogue program called <a href="http://forums.cnet.com/5208-6132_102-0.html?forumID=32&threadID=305126&messageID=2836392">VirusRemover 2008</a> has been spotted by <a href="http://trendmicro.com/">Trend Micro </a>who warned that though the hoax uses similar tactics to previous security program scams, the criminals behind it have tried to disguise it.<br /><br /><blockquote>"Virus Remover 2008 seems to have distanced itself from the <a href="http://www.microsoft.com/windows/">Windows</a>-looking interface,"</blockquote> said Jovi Umawing of Trend Micro.<br /><br />The program, which can be found when searching the web for '<a href="http://free.avg.com/">free anti-virus</a>' or a similar term, scans your PC and then brings up warnings that it is <a href="http://antivirusnfirewall.blogspot.com/2008/09/best-antivirus-practises.html">infected with a virus</a>.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-46294769370149908242008-11-26T12:16:00.000-08:002008-11-26T12:30:10.951-08:00Norton plays Gaming Mode in Norton AntiVirus 2009 Gaming Edition<a href="http://www.symantec.com/">Symantec</a> on recently released o <a href="http://www.symantec.com/redirects/norton/norton_com/gamer/">Norton AntiVirus 2009 Gaming Edition</a>. Designed for online gamers it maintains <a href="http://antivirusnfirewall.blogspot.com/">full-scale antivirus and antispyware protection</a> without interrupting game play.<br /><br />The great thing about it is Gameing mode is activated automatically when a full-screen program is active, and hence it also avoids interrupting presentations and movies.Gaming Edition is available at $39.99 with the cost same as the non-gaming edition.<br /><br /><a href="http://www.symantec.com/norton/antivirus">Norton AntiVirus 2009</a> already has what's called Silent Mode, which suppresses alerts and notifications. And <a href="http://www.download.com/Norton-AntiVirus-2009/3000-2239_4-10592477.html">NAV 2009 </a>already runs background tasks only when the system is otherwise idle. The difference between Silent Mode and the new Gamer Mode is one of control. Gamer Mode additionally lets the user suppress Advanced Protection, Intrusion Prevention, and Automatic <a href="http://service1.symantec.com/Support/sharedtech.nsf/docid/1999051911110813">LiveUpdate</a>. It can even turn off <a href="http://antivirusnfirewall.blogspot.com/2008/11/antivirus-softwares-needs-protection.html">antivirus protection</a> entirely, though of course this isn't recommended.<br /><br />The other big difference is in the <a href="http://en.wikipedia.org/wiki/User_interface">user interface</a>. All the same controls are present as in the non-game edition, but the main window has a rugged, war-torn appearance that Symantec hopes will appeal to gamers. And naturally it offers the same lightweight resource usage as the non-gaming edition. According to Symantec it "<a href="http://www.hardwaregeeks.com/index.php/gadgetblog/comments/symantec_norton_internet_security_2009_to_install_in_under_1_minute/">installs in under a minute</a>, uses less than 6 Mbytes memory, adds less than 1 second to<a href="http://wordpress.com/tag/boot-time-anti-virus-scan/"> boot time</a> and averages scans in less than 35 seconds".Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com1tag:blogger.com,1999:blog-806600226444307246.post-45024231080891994982008-11-13T06:45:00.000-08:002008-11-13T06:51:51.676-08:00Antivirus softwares needs protection for themselvesEven the computer’s guardian can serve as a <a href="http://antivirusnfirewall.blogspot.com/2007/10/what-is-virsuwormtrojan.html">trojan</a>. After phishing, pharming and vishing, security experts have discovered that malware is increasingly spreading through the very device that is used as a safeguard against it — the antivirus software. Users don’t suspect that their antivirus software can also be compromised.<br /><br /><a href="http://www.ivizsecurity.com/">iViz</a>, an information security company, has <span style="font-weight:bold;">detected multiple vulnerabilities in <a href="http://antivirusnfirewall.blogspot.com/2008/07/best-antivirus-software-products.html">commonly-used antivirus software</a></span>, which make the software susceptible to hacking.<br /><br />Bikash Barai, CEO, iViz, said: “A <a href="http://catb.org/jargon/html/H/hacker.html">hacker </a>can send a mail with an infected file and while processing it, the antivirus software can be compromised.”<br /><br /><a href="http://www.business-standard.com/india/storypage.php?autono=340033">Read more...</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-46182138439835851302008-11-13T06:24:00.000-08:002008-11-13T06:39:07.311-08:00Fix the threats that your antivirus software missedPrevx finds and fix threats that your current security products missed.<br /><a href="http://www.prevx.com/">Prevx</a> fixes <a href="http://antivirusnfirewall.blogspot.com/2008/05/avg-antivirus-8-0-pro-edition-final.html">root kits</a>,<a href="http://antivirusnfirewall.blogspot.com/2008/06/what-is-spyware.html"> spyware</a>, information stealers, <a href="http://antivirusnfirewall.blogspot.com/2007/10/what-is-virsuwormtrojan.html">trojans, viruses</a>, bots and adware.<br /><br /><blockquote>Prevx CSI is a powerful new security tool that will quickly and easily tell you if your PC has been <a href="http://antivirusnfirewall.blogspot.com/2008/09/best-antivirus-practises.html">infected</a> by one of these new threats. It is easy to use and enabling you to check if your PC has <a href="http://antivirusnfirewall.blogspot.com/2008/06/what-is-spyware.html">active spyware or malware</a>, and it takes less than two minutes. So why take the risk, check your PC now with Prevx CSI.<br /><br />If you like Prevx CSI it is useful to keep on your PC or on a <a href="http://en.wikipedia.org/wiki/USB">USB</a> memory stick. Then you can use it as often as you like to check if your PC has been infected. Also, pass it on to your friends, that way we can all reduce the risk of our PCs infecting others.</blockquote>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com1tag:blogger.com,1999:blog-806600226444307246.post-83681120649392492982008-10-19T01:59:00.000-07:002008-10-19T02:20:58.908-07:00Enrolling in Enhanced Security Online BankingHow to get started? The first step is to enroll in<a href="http://antivirusnfirewall.blogspot.com/2008/10/security-need-for-fincanical.html"> Enhanced Security</a> by following one of the two enrollment options.<br /><br /><br />Enrolling at prompt when logging into <a href="http://www.onlinesbi.com/">Online Banking</a>: After logging into Online Banking click Add extra security to my account and this computer if you are logging in at a computer you normally use for accessing Online Banking. This will place <a href="http://www.google.com/cookies.html">secure coookies </a>on that computer. Choose Add extra security to my account only if you are at a public computer in a library, a friend’s house, or elsewhere you don’t want others accessing your account. This will set up the account but will not place the secure cookies on that computer. Enrolling at a later time from User Options Menu in Online Banking: Go to User Options located at the top right corner of the page. Choose Enhanced Security from the list. Click Add extra security protection to this computer and click Submit .<br /><br />What happens after my account is enrolled? On computers that you have ‘added the extra security’ you will login as usual. The secure cookie has been placed on the PC so you will be able to login with your member number and <a href="http://www.microsoft.com/protect/yourself/password/checker.mspx">password</a>. On computers that don’t have the extra security you will be asked to validate your identity by answering your challenge questions correctly before the login is successful and seeing your account information. The future of enterprise security has long been summed up in one word: convergence. For years, pundits, analysts and others have predicted that at some point in the future, companies will begin to take a holistic view of their security operations. The building security you encounter at the front desk when you swipe your card in each morning will no longer be a separate system from the security you encounter when you sit down at your desk and log-on to your computer. When converged, these typically disparate systems will be connected and will communicate as a way to validate your identity when you access your office or your company’s network. However, combining these parallel but different universes requires both cultural and technological changes to your organization. <br /><br />A company’s<span style="font-weight:bold;"> physical and logical information networks </span>and user interfaces have been completely separate for years. Building access, or physical security, systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the corporation’s security department. Network and data security, or logical security, systems are the domain of the IT department. Each developed separately within the organization—corporate security departments developed to protect physical assets through locks, surveillance and alarm systems—and are typically staffed by people with backgrounds in law enforcement, not technology; in contrast, protecting a company’s information and knowledge assets has been one of the main tasks of IT since day one. This role has evolved into protecting both company and employee data since the dawn of the Internet age. At this point, many companies are hesitant to embrace convergence, asking questions such as, Why should I consider a converged solution? What is the benefit? Doesn’t this seem like more trouble than its worth? Won’t this be costly from both an implementation and a human capital perspective? And, do the benefits outweigh the costs? Merging the cultures of these two areas is not an overnight process—and ever since the buzz started about convergence, companies felt that merging physical and logical access systems could take even longer. But this is starting to change with new, more intelligent solutions that help companies add these capabilities while maintaining the operation of their existing security systemsg: After logging into Online Banking click Add extra security to my account and this computer if you are logging in at a computer you normally use for accessing Online Banking. This will place secure coookies on that computer. Choose Add extra security to my account only if you are at a public computer in a library, a friend’s house, or elsewhere you don’t want others accessing your account. This will set up the account but will not place the secure cookies on that computer. Enrolling at a later time from User Options Menu in Online Banking: Go to User Options located at the top right corner of the page. Choose Enhanced Security from the list. Click Add extra security protection to this computer and click Submit <br />What happens after my account is enrolled?On computers that you have ‘added the extra security’ you will login as usual. The secure cookie has been placed on the PC so you will be able to login with your member number and password. On computers that don’t have the extra security you will be asked to validate your identity by answering your challenge questions correctly before the login is successful and seeing your account information. The future of enterprise security has long been summed up in one word: convergence. For years, pundits, analysts and others have predicted that at some point in the future, companies will begin to take a holistic view of their security operations. The building security you encounter at the front desk when you swipe your card in each morning will no longer be a separate system from the security you encounter when you sit down at your desk and log-on to your computer. When converged, these typically disparate systems will be connected and will communicate as a way to validate your identity when you access your office or your company’s network. However, combining these parallel but different universes requires both cultural and technological changes to your organization. A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access, or physical security, systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the corporation’s security department. Network and data security, or logical security, systems are the domain of the IT department. Each developed separately within the <span style="font-weight:bold;">organization—corporate security </span>departments developed to protect physical assets through locks, surveillance and alarm systems—and are typically staffed by people with backgrounds in law enforcement, not technology; in contrast, protecting a company’s information and knowledge assets has been one of the main tasks of IT since day one. All banks uses <a href="http://antivirusnfirewall.blogspot.com/2008/10/microsoft-internet-security-and.html">secure dedicated server</a> to store their website data these dedicated servers must be secure servers i.e. they should have <a href="http://antivirusnfirewall.blogspot.com/2008/07/best-antivirus-software-products.html">best antivirus softwares</a> running on & most secure SSL certificates must be installed on the server.<br /><br />This role has evolved into protecting both company and employee data since the dawn of the Internet age. At this point, many companies are hesitant to embrace convergence, asking questions such as, Why should I consider a converged solution? What is the benefit? Doesn’t this seem like more trouble than its worth? Won’t this be costly from both an implementation and a human capital perspective? And, do the benefits outweigh the costs? Merging the cultures of these two areas is not an overnight process—and ever since the buzz started about convergence, companies felt that merging physical and logical access systems could take even longer. But this is starting to change with new, more intelligent solutions that help companies add these capabilities while maintaining the operation of their existing security systemsNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-76110551160990226962008-10-19T00:39:00.000-07:002008-10-19T00:49:39.908-07:00Security need for fincanical institutionsYour online security has always been concern for banks. That’s why a new feature for Online Banking, Enhanced Security, is so important. The new security service is free, easy, and most importantly gives you extra <span style="font-weight:bold;">protection from fraud and identity theft</span>.<br /><br />Enhanced Security is a superior <span style="font-weight:bold;">security technology</span> that protects your accounts from unauthorized access. It identifies you as the true “owner” of your accounts by recognizing not only your password but your computer as well. If we don’t recognize your computer – you’ve logged in from a public computer or one you haven’t used before– we’ll ask you to answer your Challenge Questions as an additional line of defense t<span style="font-weight:bold;">o prevent unauthorized access</span>. With Enhanced Security, you’ll be protected from whatever computer you’re using, whether you’re at home or on the go.<br /><br /><span style="font-weight:bold;">Enhanced security</span> is designed to: Defend against<a href="http://en.wikipedia.org/wiki/Identity_theft"> identity theft</a> and fraud. Provide security from any computer, wherever you are. Make it easy for you to bank online anytime, anywhere. To protect all of our members’ accounts, Enhanced Security will be required on all Online Banking accounts starting December 6, 2006. Enhanced Security meets requirements outlined by the<a href="http://www.ffiec.gov/"> FFIEC</a>, a federal governing agency for financial institutions. The agency has mandated that all financial institutions have additional security in place as soona as possible. The security changes are for the benefit of members by ensuring that their <span style="font-weight:bold;">confidential account data</span> is protected from would be hackers.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-91702649269744969852008-10-10T13:00:00.000-07:002008-10-10T13:13:00.680-07:00Symantec acquired MessageLabs for £401.2m<a href="http://antivirusnfirewall.blogspot.com/2008/07/best-antivirus-software-products.html">Antivirus software</a> expert Symantec has gone on a buying spree. <br /><br /><a href="http://www.symantec.com/">Symantec</a> is to extend its online messaging security services offering with the acquisition of MessageLabs for around £410m.<br /><br /><a href="http://www.messagelabs.com/">MessageLabs </a>has more than eight million end-users in more than 19,000 organisation, ranging from small businesses to <a href="http://money.cnn.com/magazines/fortune/fortune500/">Fortune 500 </a>companies.<br /><br />MessageLabs email filtering services cover much the same technological function as <a href="http://www.symantec.com/specprog/brightmail/index.html">Brightmail</a> spam filtering appliances, another Symantec acquisition. "I'm not concerned at all that we can have Brightmail on premise and MessageLabs, and that the two will work with each other," Thomspson said.<br /><br />CEO of MessageLabs <a href="http://www.securecomputing.net.au/Feature/98003,interview-adrian-chamberlain-and-jos-white.aspx">Adrian Chamberlain </a>said"Joining with Symantec we can leapfrog into new markets we might not have been able to access for years. In addition there's the potential for us to develop Symantec protection products as an online service, expanding the portfolio, as well as creating a potential to <a href="http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci942946,00.html">cross-sell</a> existing products."<br /><br />Subject to regulatory approval, the firms hope the deal will be completed by the end of the year.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-27274751887269721102008-10-07T04:06:00.000-07:002008-10-07T04:24:02.432-07:00Microsoft® Internet Security and Acceleration (ISA) Server 2006Microsoft® Internet Security and Acceleration <a href="http://www.microsoft.com/ISAserver/default.mspx">(ISA) Server 2006 </a>provides controlled <span style="font-weight:bold;">secure access between networks</span>, and serves as a Web caching proxy providing fast Web response and offload capabilities, as well as <span style="font-weight:bold;">secure Web publishing for remote access</span>. Its multiple layered architecture and advanced policy engine provide granular control of the balance between the level of security you need and the resources that are required. As an edge server connecting many networks, <span style="font-weight:bold;">ISA Server </span>handles large amounts of traffic compared to other servers in an organization. For this reason, it is built for high performance. This article provides guidelines for <span style="font-weight:bold;">deploying ISA Server</span> with best performance and adequate capacity.<br /><br /><br />Executive Summary<br />In most cases, the available <span style="font-weight:bold;">network bandwidth</span> and especially that of the Internet link can be secured by ISA <span style="font-weight:bold;">Server</span> running on available entry-level hardware. A typical default deployment of ISA Server securing<a href="http://www.isaserver.org/IsaNews/ISA2000_MS05-034.html"> outbound Web access</a> for <a href="http://www.w3.org/Protocols/">Hypertext Transfer Protocol (HTTP) </a>traffic requires specific hardware configurations for various Internet links. These hardware configurations are shown in the following table. (For details, see Web Proxy Scenarios in this document.). For better speed & <a href="http://antivirusnfirewall.blogspot.com/">security</a>, host your website on <a href="http://dedicatedserverindia.net/">Dedicated server in India.</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com1tag:blogger.com,1999:blog-806600226444307246.post-62656329333890992752008-10-05T13:05:00.000-07:002008-10-05T13:11:14.818-07:00Antivirus news - Oct,5Athletics Win With <span style="font-weight:bold;">Antivirus</span><br />RedOrbit, TX - Oct 5, 2008<br />"Penn State works like most education institutions with a focus on best-practice results from any software purchases, while adhering to a tightly managed <a href="http://www.redorbit.com/news/technology/1577621/athletics_win_with_antivirus/">(more)</a><br /><br /><br /><br /><span style="font-weight:bold;">ZoneAlarm Internet Security Suite 2009 </span>- ZDNet Asia<br />ZoneAlarm Internet Security Suite 2009<br />ZDNet Asia, Asia - Oct 5, 2008<br />To find out how we test antivirus (and now Internet Security suite) software, see CNET Labs' How we test: Antivirus software page<a href="http://www.zdnetasia.com/reviews/software/internet/0,3800010231,44099552p,00.htm">(more)</a><br /><br /><br /><span style="font-weight:bold;">The School of Hacking</span><br />Newsweek - Oct 5, 2008<br />Their professor, George Ledin, has showed them how to penetrate even the best antivirus software. Ledin insists that his students mean no harm,<a href="http://www.newsweek.com/id/158730">(more)</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-91164312627909555262008-10-05T12:46:00.000-07:002008-10-05T12:49:44.771-07:00Kaspersky debugs critical bugs in antivirus its products<p>Antivirus vendor <a href="http://www.kaspersky.com/" target=_blank><u><font color=#0000ff>Kaspersky</font></u></a> has released Maintenance Pack 2 for <a href="http://www.kaspersky.com/productupdates?chapter=186435857" target=_blank><u><font color=#0000ff>Kaspersky Anti-Virus 6.0</font></u></a> and <a href="http://www.kaspersky.com/productupdates?chapter=186437046"><u><font color=#0000ff>Kaspersky Internet Security 6.0</font></u></a> to close a number of security holes, some of which are critical. For instance, attackers can exploit flaws in the installed ActiveX controls <tt>AxKLProd60.dll</tt> and <tt>AxKLSysInfo.dll</tt> to download or delete files from a victim’s computer. This is also possible with the ActiveX control <tt>SysInfo</tt>, which allows an FTP transfer to be launched on the user’s computer without authentication and without prompting the user. In all three cases, however, the victim first has to visit a malicious website using <a href="http://www.microsoft.com/windows/products/winfamily/ie/default.mspx">Internet Explorer</a>. While the Maintenance Pack does remedy the holes, it does not do so by correcting the flaws, but instead deletes the vulnerable controls during installation.</p> <br /><p>In addition, two heap overflows have been found in Kaspersky products. One of them can be triggered by specially prepared ARJ Archives in an on-demand scan: the scanner can be brought down and code injected and launched. The other overflow is the result of a flaw in the hook function of the driver <tt>klif.sys</tt> which can be exploited to execute code with kernel privileges. According to the experts at security service provider iDefense who made the discovery, these holes are very difficult to exploit. Finally, yet another flaw in this driver allows programs to be executed with the highest privileges (ring 0). The flaws have been remedied in build 6.0.2.614. </p> <br /><p>Users are advised to <a href="http://www.kaspersky.com/productupdates" target=_blank><u><font color=#0000ff>download</font></u></a> and install the product updates as quickly as possible. </p>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-9953078552983369662008-09-07T23:45:00.000-07:002008-11-13T06:37:16.383-08:00Best antivirus practises..<span style="font-weight:bold;">use it</span> - i don't just mean have it installed, i mean sit down and actually scan things (like files you download or removable media you insert into your computer) from time to time (and scanning the entire drive on an automated schedule doesn't count)... install and forget security is bullshit... you need to interact with the software, to learn what it's alerts actually look like so you can distinguish them from fake alerts, and to become skilled in the actual use of the tool... <br /><br />some may say that's working for your <a href="http://en.wikipedia.org/wiki/Category:Security_software">security software</a> instead of making it work for you and real people have real jobs to do, but it doesn't actually take much time or effort to scan incoming materials and both of those other concepts ('working for the software' and 'making it work for you') are nonsense... it's a tool, and like any tool you can only get out of it what you put into it... if you don't know how to use it properly then you ultimately won't do as good a job at protecting yourself with it as you might have otherwise... it's a poor craftsman who blames his tools...<br /><br /><span style="font-weight:bold;">keep it up to date </span>- known-malware scanners are only as good as the knowledge-base they embody... new malware is being created at a rather incredible rate and the only way to make known-malware scanners effective against that new malware is to update those scanners with 'knowledge' of that new malware...<br /><br />sure there are other types of <a href="http://antivirusnfirewall.blogspot.com/2008/07/free-antivirus-software.html">anti-malware software</a> that don't require such updates, but they also don't come with expert knowledge about known-malware built into them and so are of little diagnostic value when prevention inevitably fails... also, it's always easiest to prevent something bad if you 'know' specifically what to look for...<br /><br /><a href="http://en.wikipedia.org/wiki/Quarantine">quarantine</a> first - don't trust the scanner to automatically delete things it thinks are bad... scanners make mistakes and you don't want to compound those mistakes by allowing the scanner to automagically delete critical files...<br /><br />trust the results enough to consider that the file(s) in question may be bad, but verify those results, and verify that it's safe to get rid of the file(s) before you actually do so... trust but verify...<br /><br /><span style="font-weight:bold;">don't rely on it alone</span> - just as you shouldn't place absolute trust in it's results when it detects something you also shouldn't place absolute trust in it when it doesn't find anything... this is probably the best practice most directly in conflict with av marketing, and there are a number of people i really wish would stop listening to marketing and catch up because i learned of the benefits of using a multi-layered approach (what would be better known now as defense in depth) back in the early 90's thanks to the people who actually made (rather than marketed) this stuff...<br /><br />you need to use other types of anti-malware technology in conjunction with scanners (not just additional scanners) if for no other reason than because there will always be a window of time between when a new piece of malware is created and when an update for that malware is made available... in other words: if the malware's too new, a scanner won't do...<br /><br /><span style="font-weight:bold;">scan from a known-clean environmen</span>t - just as you shouldn't necessarily trust the scanner you also shouldn't trust an <span style="font-weight:bold;">infected</span> or even possibly infected machine... this likely won't seem intuitive since the av industry itself has for years been producing features and services that contradict this such as web based scanners or the ubiquitous scheduled system scan... in an effort to be less of an uncompromising s.o.b. let me say that those are features and services that are offered for convenience and shouldn't be solely relied upon as they do not replace outside-the-box scanning... <br /><br />you can't trust a compromised environment to accurately report it's own integrity... the code the runs first wins and the only way to make sure <a href="http://en.wikipedia.org/wiki/Malware">malware</a> doesn't run first is to operate in an environment where no code from the suspect system has run; not the operating system, not even the boot sectors...<br />source:- anti-virus-rants.blogspot.comNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-15985358546113778412008-07-28T10:12:00.000-07:002008-10-19T02:19:54.259-07:00BEST ANTIVIRUS SOFTWARE PRODUCTSThere is always lot of discussion about <a href="http://best-antivirus-software.org/">Best AntiVirus software</a>. everyone want to know which is the best anti virus software. So here is a list of top antivirus softwares.<br /><br /><br /><strong>2007 BEST AntiVirus software:</strong><br /><br />Golden:<a href="http://www.bitdefender.com/">BitDefender AntiVirus</a><br />Silver:<a href="http://www.kaspersky.com/">Kasperskyantivirus</a><br />Copper:F-Secure Anti-Virus<br />04:PC-cillin AntiVirus<br />05:ESET Nod32<br />06:McAfee VirusScan<br />07:Norton AntiVirus<br />08:AVG Anti-Virus<br />09:eTrust EZ Antivirus<br />10:<a href="http://www.norman.com/">Norman Virus Control</a><br />11:AntiVirusKit<br />12:AVAST! AntiVirus<br />13:Panda Titanium<br />14:F-Prot<br /><br />These were the most popular best antivirus softwares in the world. To check more i suggest you to check <br /><a href="http://best-antivirus-software.org/">best-antivirus-software.org</a>.<br />best-antivirus-software.org is an organisation which provides unbiased reviews & insights about top <a href="http://antivirus1234.blogspot.com/">anti virus</a> products.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com1tag:blogger.com,1999:blog-806600226444307246.post-75995895900405605932008-07-28T10:01:00.000-07:002008-07-28T10:06:34.167-07:00Free Antivirus SoftwareIf you want a<strong> good free anti-virus</strong>, then I reccomend Avast Home Edition, which is free as long as you register with them (a simple process).<br /><br />Avast is easy to use, has a simple interface, a good virus database updater, and constantly scans your computer with it's resident shield, providing protection even for software such as Windows Live Messenger, AIM and Limewire.<br />Beat free anti-virus i've found around.<br /><br />Avast <strong>anti-virus software</strong> : <a href="http://www.avast.com/">avast.com</a><br /><br />Also, if your planning to get an anti-virus, i suggest you might want to get a good firewall too. I currently use comodo, a really good free firewall, that although touchy at times, displaying just about everything as a threat (including windows proccesses that are completely legitamised), but eventually it'll grow to allow these. If you plan to start using it, remember to let through any program you know is installed on your computer, and to tick the "remember this next time" box, so that next time it will automatically give that program access.<br /><br />Comodo Firewall software: <a href="http://www.personalfirewall.comodo.com/">http://www.personalfirewall.comodo.com/</a><br /><br /><br />For an <strong>anti-spyware </strong>solution, the best i've found is Spybot: Search and Destroy, which about on par with AVG Anti-Spyware, also free. Spybot is good, as it has a very large malware and spyware database, and scans in a reasonably small amount of time. It contains an internet explorer scanner, which automatically scans IE while you're using it, and an advanced menu view hich gives you a lot of options about your computer, scanning, and etc.<br /><br />Spybot: <a href="http://www.safer-networking.org/">http://www.safer-networking.org/</a><br /><br /><br />Remember to always update your <a href="http://antivirusnfirewall.blogspot.com/">anti-virus software </a>and anti-spyware software to ensure they work well!Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-80805820860698096492008-06-27T21:18:00.000-07:002008-06-27T21:21:47.334-07:00Getting spyware-free RealPlayer through the BBCAn anonymous reader sez, "The <a href="www.bbc.co.uk/">BBC</a> made a unique deal with <a href="www.real.com/ ">Real Networks </a>which disposes of their spyware tactics. Basically, if a user clicks on a link to download Real Player from a BBC website, the referrer script sends them to a page where they can download an expiry-free, spyware-free and nuicance-free version of the player. It's because the BBC have such a stringent public service remit, that it was offensive to charge people a license fee for BBC content, then make them pay all over again for the facility to view/listen to it." <br />Link-<a href="http://www.bbc.co.uk/radio/audiohelp.shtml?help">Download Real Player from BBC </a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-73001680670127285742008-06-24T04:18:00.000-07:002008-06-24T04:31:17.409-07:00What is Web Hosting ?A web hosting company will offer clients access to a server that will provide the clients’ content to individuals on the <a href="http://www.w3.org/WWW/">World Wide Web </a>after they make a URL or domain name request. To view pages on the web, you must have a web browser, such as Microsoft <a href="http://www.microsoft.com/windows/products/winfamily/ie/default.mspx">Internet Explorer</a> or <a href="http://browser.netscape.com/">Netscape Navigator</a> to request the web page from the <a href="http://whatis.techtarget.com/definition/0,,sid9_gci212964,00.html">server</a> after you have purchased internet access. Hosting companies require that you buy your<a href="http://en.wikipedia.org/wiki/Uniform_Resource_Locator"> URL </a>or domain name first before you purchase hosting services. Choosing a perfect web hosting provider needs lot of things to be considered. Though price and affordability is what many people look after, but the search for a proper web hosting provider never ends with money. Most hosting companies have a package that will allow you to buy the domain name and hosting at the same time. For <strong>cheap domain Name registration in india,Cheap linux web hosting or <a href="http://www.dotcom1234.com/">cheap windows web hosting in India </a></strong>I recommend you dotcom1234.com.The servers of dotcom1234.com are really fast & reliable.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-66811860291052955042008-06-02T12:01:00.000-07:002008-06-02T12:14:04.347-07:00What is spyware? how to prevent it?Spyware is computer software that collects personal information about users without their informed consent. The term <a href="http://en.wikipedia.org/wiki/Spyware ">Spyware</a>, which was coined in 1995 but wasn't widely used for another five years, is often used interchangeably with adware and malware. <br /><br />Spyware is a tracking software that will get into ur computer through malicious sites or when ur downloading something or thorugh some banners, some of the get execute themselves and some need permission to install.<br /> The work of spyware is to send ur information, id, password, credit card number, ur private information, i.e to stastical data back to particular site or banner advertisers , through this information they can hack ur account or as u know can use ur credit card , etc ...mind it, it is not antivirus :) .. thats why its better to keep away from wire transfers <br />Read more on <a href="http://security.gt500.org/doku.php?id=spyware-prevention">spyware-prevention</a>...Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-88910094309383328992008-05-30T07:19:00.000-07:002008-05-30T07:32:00.548-07:00Free Antivirus SoftwareThere's no such thing as a free ride, or is there? If you're an experienced user and don't mind putting in a little elbow grease, you can build your own security suite:<br /># Free Virus Scanners<br /># <a href="www.zonealarm.com/">ZoneAlarm </a>Personal Firewall<br />For those who want a more holistic all-in-one solution:<br /># Top Antivirus Software<br /># Top Spyware ScannersNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-24840963206156381552008-05-15T05:01:00.000-07:002008-05-15T05:02:26.532-07:00AVG Antivirus 8 0 Pro Edition Final FREE Rapidshare Links for Download<strong>AVG Anti-Virus& Anti-Spyware protection for Windows</strong> from the world’s most trusted security company. Use the Internet with confidence in your home or small office. * Easy to download, install and use * Protection against viruses, spyware, adware, worms and trojans * Real-time security while you surf and chat online * Top-quality protection that does not slow your system down * Free support and service around the clock and across the globe * Compatible with Windows Vista and Windows XP Integrated protection * Anti-Virus: protection against viruses, worms and trojans *<strong> Anti-Spyware</strong>: protection against spyware, adware and identity-theft * <strong>Anti-Rootkit</strong>: protection against hidden threats (rootkits) * Web Shield & LinkScanner: protection against malicious websites Easy-to-use, automated protection Real-time protection, automatic updates, low-impact background scanning for on-line threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time: * All files including documents, pictures and applications * E-mails (all major email clients supported) * Instant messaging and P2P communications * File downloads and online transactions such as shopping and banking * Search results and any other links you click on Download ->Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-7342816952543731212008-05-15T04:59:00.000-07:002008-05-15T05:00:15.758-07:00Avast! Antivirus 4.8.1195 Professional EditionThe professional solution to great protection <strong>avast! 4 Professional Edition </strong>represents the<strong> best antivirus protection </strong>avast! 4 Professional Edition comes with anti-spyware, anti-rootkit and strong self-protection built-in. It is designed to protect your valuable data and programs, as well as keep itself up-to-date and has the kind of built-in features that many vendors charge for additionally, or don’t include at all. Simply install and forget. All-inclusive, comprehensive protection avast! 4 Professional Edition <strong>includes ANTI-SPYWARE protection</strong>, certified by the West Coast Labs Checkmark process, to protect against the latest spyware threats and ANTI-ROOTKIT DETECTION based on the best-in class GMER technology, built in to the scan engine. No additional purchase is required. Simple to use and automated Just install and go. Automatic incremental updates provide real-time protection of your system, including web surfing. We’ve made avast! antivirus as simple to use as possible, while allowing full control of your security. fastddl.com - Fast direct downloadsAvast! Antivirus 4.8.1195 Professional Edition direct downloads.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-83297441434489534172007-12-08T06:38:00.000-08:002007-12-08T06:44:03.251-08:00Avoiding Spyware And Malware Attacks<strong>Spyware</strong> and other types of <strong>malware</strong> are more than just a pain in the neck - they can cause other programs to malfunction and even make your computer unstable. And of course there's all the privacy issues that go along with it.<br />By <a href="http://www.copypastearticles.com/article/author/paul-wilcox/">Paul Wilcox</a><br /><br /><br /><br /><br />Spyware and other types of malware are more than just a pain in the neck - they can cause other programs to malfunction and even make your computer unstable. And of course there’s all the privacy issues that go along with it.<br /><br />These pieces of software are generally installed on your computer without your knowledge or consent. They often can’t be removed without some kind of specialized software. If you need to be tricked into installing it, chances are you can’t trust the source.<br /><br />The first line of defense against spyware is to be careful installing software. Know what’s being downloaded. A large percentage of freeware or shareware programs have spyware embedded in them. Sometimes that’s disclosed in the user agreement, but often not.<br />Check for “<strong>spyware free</strong>” guarantees on software you download. Obviously, anyone can say something is spyware free even when it isn’t, but if a website has gone to the trouble to say so, it is more likely to be safe than if they hadn’t.<br /><br />How can you tell if you have spyware on your system? You may see pop-up advertisements even when you aren’t browsing the web. Your homepage may have been changed without your consent. New toolbars are installed on your web browser which you didn’t request. Your computer may be sluggish or mysteriously reboot on its own. Though, the last effect is usually a virus.<br /><br />If you do get infected with spyware, there are ways to get rid of it. A number of companies make software designed to get rid of it. These programs will scan your computer and check through their database of known spyware for any matches. These databases get updated frequently as new forms of spyware are found.<br /><br />Some of these programs are free while others will cost. The paid versions sometimes have additional features, such as automatic scheduled scans. None of them are 100% foolproof however, so it’s a good idea to run more than one of them.<br />Some kinds of spyware are notoriously difficult to get rid of. They may make changes to your Windows files that help them hide from the scanners. On occasion, you may need to delete them manually to be sure they’re gone.<br /><br />This is obviously not something you should undertake unless you’re quite familiar with Windows and working with system files. You wouldn’t want to delete something that renders Windows inoperable.<br /><br />Once your system is spyware free - help keep it that way. Some of the spyware removal tools include utilities that can protect your computer from being exposed to spyware. Much like virus scanners, they monitor changes to your system files and alert you of any suspicious activity.<br />And of course, always be aware of the risks before you accept any free offers for software on the internet. You never know what the real cost is for that free program.<br />How can you protect yourself from spyware, viruses, identity theft and other <a href="http://www.onlinesecuritytoolkit.com/" target="_new" rel="nofollow">internet security attacks</a>? You don't need to be a technical genius to be safe. Learn the insider secrets that will keep your computer safe at <a href="http://www.onlinesecuritytoolkit.com/" target="_new" rel="nofollow">onlinesecuritytoolkit.com</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-60005290767854132722007-10-30T13:34:00.000-07:002007-10-30T13:37:51.211-07:00<span style="color:#3366ff;"><em><strong><span style="color:#ff0000;">What is a Backdoor?</span></strong><br /><br />Backdoor is an independent program which has two components i।e. Server and Remote. Server component is installed on the victim system and remote component is the tool to control the victim system remotely. This is basically used for the hacking. </em></span><br /><p><span style="color:#3366ff;"><em> </p><br /><br /><strong><span style="color:#cc0000;">What is Adware and Joke or Prank?</span></strong><br /><br /><strong><span style="color:#ff6666;">Adware:</span></strong><br />A program that secretly gather personal information through the Internet and relay it back to another computer, generally for advertising purpose. This is often accomplished by tracking information related to Internet browser usage or habits.<br /><br /><strong><span style="color:#ff6666;">Joke (Prank):</span></strong><br /><br />A program that change or interrupt the normal behavior of your computer, creating a general distraction or nuisance.<br /><br /></em></span>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-806600226444307246.post-67334269852760973772007-10-24T11:55:00.001-07:002007-10-24T11:55:41.228-07:00<script type="text/javascript"><!--<br />blogrush_feed = "32428407";<br />//--></script><br /><script type="text/javascript"<br /> src="http://widget.blogrush.com/show.js"><br /></script>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0