Monday, November 30, 2009

The National ID Trojan Horse

The U.S. House of Representatives passed a national ID bill last week that masqueraded as “immigration reform.” The bill does nothing to address immigration policy, however, nor does it propose deporting a single illegal alien already in our country. It does nothing to address the porous border between the U.S. and Mexico, which is the fundamental problem. In reality, the bill is a Trojan horse. It pretends to offer desperately needed border control in order to con a credulous Congress into sacrificing more of our constitutionally protected liberty.

Supporters claim the national ID scheme is voluntary. However, any state that opts out will automatically make non-persons out of its citizens. The citizens of that state will be unable to have any dealings with the federal government because their ID will not be accepted. They will not be able to fly or to take a train. In essence, in the eyes of the federal government they will cease to exist. It is absurd to call this voluntary, and the proponents of the national ID know that every state will have no choice but to comply.

Sunday, November 29, 2009

Simple way to removal of Generic.PWS.j Trojan

You need to download "HiJackThis" tools to assist you in removal of this "hard to die" trojan.

Spent 2 days to study its infection mode before i can successfully killed it off.
It infect USB thumbdrive too.. thus it would infect others via USB mass storage devices..

My approach as followed:
==================
First I "write protect" the infected local drive's autorun files to
point it to a harmless text file.
I wrote a batch file to simplify removal if many PCs was infected
prior to acknowlegement of its existence.

Friday, November 27, 2009

Does Trojans Vundo Fix Actually Work?

If you get infected with Trojan Vundo, removal of it often becomes a very difficult
task. You will probably find that a lot of people will suggest that you can get rid of it by downloading and running VundoFix, but does it really work? You might be surprised to learn the truth.

Vundo is one the most common spyware infections making its rounds onto computers all over the world, and it is also one of the most difficult to get rid of. It consists of a Trojan downloader that will download and display popup advertisements over and over again but it has also been known to download and install more malicious files that can cause much more harm to your computer. If you suspect you are infected with this pesky spyware, what should you do?

Thursday, November 26, 2009

Free Trojan Removers - Download, Scan and Destroy

What Is A Trojan And How Can Is Ruin Your Pc?
A Trojan (or Trojan Horse) is considered a type of malicious software that appears to a user as a safe legitimate action, but in fact performs a dangerous function that threatens your computer's security. Malicious trojans can be very dangerous.
Trojans can erase your computer's data, corrupt files, install and spread viruses and there are many more security threats.

How Can You Protect Your Computer Against Trojans and other forms of Spyware?
Fortunately there are a great range of effective Trojan/Spyware Removers available that can combat trojans, which are very powerful at cleaning and protecting your
computer from future attacks. We've reviewed a huge range of trojan removers on the market and put them through their paces using an infected test computer loaded with trojans and other forms of malicious spyware.

Wednesday, November 25, 2009

Report Us

Hello,
Do you have a problem with computer viruses, spam, spyware, malware, trojans, etc.?

Report what is happening here, tell me with details of symptoms and the effects. how to provide comments on the post "Report Us".

And we'll find the best solution may be applied, Thank you.

Tuesday, November 24, 2009

Removing Computer Trojans in 3 Quick and Effective Steps

Removing computer Trojans is not usually achieved easily through a standard anti virus program due to the sneaky way they attach themselves onto your computer. For this reason they are referred to as Trojans (like Trojan Horse). Once these parasites install on your PC, they can be incredibly difficult to remove without a quality repair utility.

Two of the most common ways which Trojans install on computers are through spyware
and adware. Some of the virus programs can detect the files but most have a miserable
time removing them.

Monday, November 23, 2009

Trojan Vundo Removal and Solution

Trojan Vundo Removal
I tried a number of programs, including HijackThis, Trend's online virus scanner, Panda Software's online virus scanner, Symantec's FixVundo.exe and manual instructions and nothing worked! I thought I had it when I ran SpyBot Search and Destroy's software, but it only discovered 4 occurrences of the Vundo when actually there were 6.

Out of all the programs, only Adware Alerts spyware & adware detector and destroyer was able to detect all the infected files! The online virus scan site is located at:
Adware Alert and is a new free services designed to help you detect and keep your computer clean. It's very cool, speeds up your pc and is worth checking out!

Sunday, November 22, 2009

How to prevent your PEN drive from VIRUS

Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?

You can protect your PC by just following the simple steps below . It won't take much time.

· Connect your Pen Drive or USB drive to your computer .

· Now a dialogue window will popup asking you to choose among the options as shown
in the figure. Don't choose any of them , Just simply click Cancel.

Friday, November 20, 2009

F-Secure Internet Security 2009 9.50 for Windows 7 + Patch

F-Secure Internet Security 2009 provides you with everything that is necessary to protect your computer against the internet threats and viruses that are out there today. This security software offers complete protection against malicious software with many high quality features that will make sure that your computer is up-to-date with the latest virus information and other online threats that arise continuously.

This is especially made possible with its key feature, a new technology, F-Secure DeepGuard 2.0, that will constantly monitor the activities of your computer ensuring complete virus protection also against unknown viruses that are born every day. This software also includes features like award-winning antivirus, easy-to-use personal firewall, an improved antispyware. Additionally, the software filters unwanted and so called phishing attempts from your eMail. With the parental control you can control which websites are accessible from your computer and block the websites with questionable content.

Thursday, November 19, 2009

W32/Conficker.worm Infection Cycle

The W32/Conficker.worm can infect systems via three infection vectors, via exploit MS08-067, an Autorun mechanism or by exploiting weak passwords. In addition the worm has an auto update routine to update previously infected systems .

These Infections are all multi stage processes. Involving the initial compromise,
copy files and then executing the malware.

Exploit Vector
Local network is scanned for susceptible computers. Once a susceptible computer is located the exploit is then attempted against the machine. If successful the process is hijacked and malware is copied from remote attacking machines HTTP server (random port # is used) to the localhost. At this point the machine is compromised.

Fake Antivirus Remover, Use to Clean Fake Antivirus

We have more and more antivirus, free antivirus can we download on the Internet. But with so many free antivirus presence we need to be aware, many anti-virus which was spreading a virus or trojan.

Remove fake Antivirus is a simple tool that serves to remove the antivirus, fake antivirus that may have infected your computer.

Here's a list of fake antivirus that can be detected by Fake Antivirus Remove:
1. Cyber Security
2. Alpha Antivirus
3. Braviax
4. Windows Police Pro
5. Antivirus Pro 2010
6. PC Antispyware 2010

Wednesday, November 18, 2009

Download Free ESET Smart Security 4.0.314 + Serial Key

ESET Smart Security was designed to be complete solution in the field of computer protection against infiltrations and attacks. Eset Smart Security offers more than just a sum of its parts ? it is synergy that matters most. If all components are used simultaneously, the effectiveness of the whole program is multiplied. ESET Smart Security unifies all its functions to create a complex security solution.

ESET Smart Security is based on three basic pillars:
ESET NOD32 Antivirus + Antispyware
· This component is in fact an improved version of the award-winning scanning engine of NOD32 Antivirus v2.7. With respect to program's unprecedented scanning speed, the following improvements have been made:
· Improved system of cleaning and deleting infiltrations. The antivirus system now intelligently cleans and deletes infiltrations with no need for user interaction.
· Computer scan can be run in background in order to use only a part of system resources. Thus scanning will not affect the performance of your computer and you will be able to work on it as usual.
· The resident protection supports archive scanning.
· Update optimization, smaller update package size than in version 2.7, more effective management and protection of update files against damage.
· Email protection for users of Outlook Express.

Monday, November 16, 2009

DIFFERENCE FIREWALL, ANTIVIRUS AND IDS

IDS (Intrusion Detection system)
IDS is an acronym for Intrusion Detection System. An intrusion detection system detects intruders; that is, unexpected, unwanted or unauthorized people or programs on my computer network.

There are many forms of IDS. Network IDS and Host IDS are the example. Network IDS will Generally Capture all Traffic on the network Host will Capture Traffic for Individual Host IDS detects attempted attacks using Signature and Patterns much like an Anti Virus App will.

Sunday, November 15, 2009

How to remove Conficker and prevent re-infection

Symptoms of Conficker infection include the following:
- Access to security-related sites is blocked
- Users are locked out of the directory
- Traffic is sent through port 445 on non-Directory Service (DS) servers
- Access to admininistrator shared drives is denied
- Autorun.inf files are placed in the recycled directory, or trash bin

The following steps to remove W32/Conficker.worm and prevent it from spreading:

Download Free McAfee VirusScan Enterprise

McAfee VirusScan Enterprise protects your desktop and file servers from a wide range of threats, including viruses, worms, Trojan horses, and potentially unwanted code and programs.

This version provides these new or improved features:
- Support for 64-bit operating systems.
These features or products are not supported on
64-bit operating systems:

- Buffer Overflow Protection.
- Scanning of Lotus Notes databases.
- Alert Manager 4.7.1.

Saturday, November 14, 2009

Protect Computer Offline With USB Disk Security

USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.

Product Highlights:

100% protection against any malicious programs via USB storage

Tuesday, November 10, 2009

Download Free PC Tools Firewall Plus 6.0.0.66

A personal firewall that protects your computer from intruders and controls the network traffic in and out of your PC.

PC Tools Firewall Plus is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information.

PC Tools Firewall Plus is advanced technology designed specially for people, not experts. Powerful prevention against attacks and known exploits is activated by default and advanced users can also easily create their own packet filtering rules to customize the network defenses. All you need to do is install it for immediate and automatic ongoing protection.

How to Get Rid of Google Virus Fix

Infecting users via internet exposure and nooks and crannies found in unsecured browsers are the main causes of the redirect virus. So where does one inject the use of Google redirect virus fix? In order to properly employ its use first it is essential to understand what this threat is and what it does. The redirect mal ware lives up to its name, the infection causes a hijacking of any search or website visit a user plans to make. Instead of finding their site of choice the virus redirects them to fake websites containing ads and even corrupted pages.

The following fake errors are displayed by the vius
· Internet explorer cannot open web page
· filename.exe is not a valid win32 application
· Setup files are corrupted Please obtain new copy of program

How to identify and Avoid the USB drive affected with virus

Virus and worms are easily spread by carrying it on a removable medium such as ,USB drive , I-Pod, CD, Floppy. USB drive is otherwise called as “Flash Drive”,”Thumb Drive” ,”Memory stick” ,”External USB Hard Disk”. Even though we have very good Antivirus , New Viruses are one step Ahead than Antivirus. We cannot restrict USB Drive , but we can avoid spreading of virus and worms through USB Drive. So we have to be little bit careful while working with USB Drive, some precautionary steps are follows.

How to identify the USB drive affected with virus

After Inserted USB drive

This screen shot shows the USB drive which is affected with virus

Exploits Facebook - The Facebook fan check Virus

The Facebook fan check Virus has been running absolutely rampant today. Analysts estimate 237,000 accounts have already been compromised by the Facebook fan check Virus and over a million will be compromised by the Facebook fan check Virus in the next 48 hours.

The Facebook fan check Virus is a new virus that exploits Facebook's ability to add
applications. It steals the user's login data and locks them out of their account.
Then Facebook fan check Virus sends messages to every friend on the compromised account and attempts to infect them with the Facebook fan check Virus. The friends then open the message an automatically become infected.

Monday, November 9, 2009

Slow Start-up Windows XP When Using Norton Internet Security

If you are using Norton Internet Security, and are experiencing slow start-up of XP, (i.e. you can see the desktop with icons etc. but it takes 30-60sec before you can start using the computer), this fix might help:

· Click on Start button.
· Select Control Panel.
· Open "Network Connections".
· Under "LAN and High-Speed Internet", right-click on your "Local Area Connection" and select "Properties".

Sunday, November 8, 2009

Windows Defender in Windows Vista

Windows Defender is Microsoft’s anti-spyware program, which it purchased from Giant and re-badged. An examination of the effectiveness of this product is beyond the scope of this article. One excellent feature, however, is that WD (who else wishes they had called it Windows Malware Defender – WMD?) does tell the user in good
detail every time a program (even a legitimate one) takes certain actions, such as writing to the registry. For the informed user, this is useful information.

What is most interesting, though, is that despite all of the other measures taken in Vista to preserve system integrity and reduce the attack surface for malicious exploiters, there is still a need for a standalone (albeit bundled) application
which is dedicated exclusively to dealing with undesirable programs. This, more than any other indication, is tantamount to an admission that Microsoft does not believe
that the new security controls in Vista are going to solve ‘the virus problem’.

Fix Stop 0x00000050 Error With Registry Cleaner

What is a stop 0x00000050 error? Stop error 0x00000050 is an error that stops windows from working properly. It comes from the core of windows and most likely because of registry errors and invalid entries. In most cases, You may receive a stop 0x00000050 error message with the following format:

STOP Error 0x00000050: PAGE_FAULT_IN_NONPAGED_AREA

To resolve the issue, you will need to fix corrupt registry.The registry is basically a big database which lies at the core of windows. It's responsible for storing all the settings and options for all the programs on your computer, allowing your PC to "remember" a number of different things even if it's turned off. This is great, but because Windows is constantly using 100's of registry files, it actually ends up saving many of them in totally the wrong way. This makes them corrupt and damaged, making them extremely hard to read, making your computer slower and causing errors.

Friday, November 6, 2009

How do I protect myself from hackers

The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam.

Today’s computer software is very complex, comprised of thousands of lines of code. Since software is written by humans, it’s hardly surprising that they contain programming mistakes, known as vulnerabilities. These loopholes are used by hackers to break into systems; they are also used by authors of malicious code to launch their programs automatically on your computer.

Identification A Phishing Email or a Real Email

One of the problems about trying to teach people to avoid Phishing attacks is that the banks often use the exact same tactics that the phishers use. It is mind-numbingly stupid of them to do so, but still we see emails from banks that contain links in them. As a rule I tell people not to click on the links in these emails, but rather to log into their account by typing in the address of their bank by hand.

I had a question for my credit union about one of my accounts with them. The response came back and contained a link that I had to follow in order to reply. The email specifically said not to reply to the email because it wouldn’t be read. So, how do I know this isn’t a phishing attack? First of all I looked at exactly who the email came from. Believe me, this is far from foolproof. Email addresses can be spoofed. The more important sign was that when I followed the link I was not asked for any information at all. I did not have to login, I did not have to verify anything. In addition to this, the email came in response to an inquiry that I initiated and not out of the blue. The reply was relevant to the question I had asked.

TuneUp Utilities 2010 9.0.2000.16 - Final + Working Key

TuneUp Utilities can make your Windows operating system faster, more comfortable and more secure with just a few mouse clicks. And all operations performed on the operating system are completely safe, because all changes are monitored by TuneUp Rescue Center and can be undone at any time. All TuneUp Utilities modules can be accessed through a common interface that is divided into six categories.

The software helps both beginners and experts to make Windows meet their needs in a way that is better, easier and safer. All important system options are explained in an easy way and can be turned on or off at the click of your mouse. TuneUp Utilities will then make the necessary changes in the registry or boot files automatically. We place a high value on system stability, so that Windows won't stop working reliably. And most changes that you make can be undone in TuneUp Rescue Center - easily and safely.

Thursday, November 5, 2009

Clean Spam With Spam Inspector

Spam Inspector offers award winning spam protection integrated directly into Outlook, Outlook Express, Eudora, IncrediMail and Hotmail giving you the power to CLEAN your inbox, PROTECT your family, and FIGHTBACK against spam. Using Statistical, Natural Language Semantics, and Bayesian filters, Spam Inspector has the most complete and most accurate spam filters available. Simply installing it gives you 99% accuracy in eliminating spam, and overtime the Spam Inspector automatically learns from your incoming emails and input, training itself to become almost 100% accurate in blocking and stopping incoming spam

Spam Inspector Features:

Wednesday, November 4, 2009

Download Anti Trojan Elite 4.7.2 MultiLang + Patch

Anti-Trojan Elite™ (ATE) is a malware remover, it can detect and clean malware in disk or memory. Malware is software designed specifically to damage or disrupt a system, such as a trojan horse, a spyware or a keylogger. ATE contains a Real-Time File Firewall, it monitor system and clean malwares immediately. It is also a system security tools, you can view and control processes and TCP/IP network connections.

Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time. The ATE can detect more than 35000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time.

Malware attacks via Facebook

Facebook admitted that up to 1800 users had had their profiles defaced by an attack that secretly installed a Trojan while displaying an animated graphic of a court jester blowing a raspberry.

Facebook members are also receiving messages from friends hacked accounts via the social network, linking to third-party websites designed to infect the recipient’s
computer. Hackers have found value in compromising Facebook accounts, stealing usernames and passwords, and then using the profiles as a launching pad for massdistributing malware attacks and spam.

Adware, Spyware and Computer Virus

Adware, spyware and computer virus share some similarities, one of which is that all three aremajor nuisances for computer users. Let's differentiate the three.

Spyware is software that does not intentionally harm your computer. What they do is that they create pathways wherein someone else aside from the computer owner can communicate with the computer. Normally spywares record the various types of web sites you visit which are later used by web advertisers to allow them to send you unwanted emails and pop-ups.

Tips How to Virus Recovery

Why is a computer virus harmful? For the same basic reason that biological viruses are: they damage components that keep systems healthy. Some are relatively benign - they generate annoying, juvenile messages or crash the system once, then go away. But many are specifically designed to do substantial harm - by deleting files needed to run word processing programs or perform essential operating system tasks. Some prepare the way for further attacks by opening up access to administrative functions.

Combating them is simple - install antivirus software, keep it up-to-date and running in the background and don't open email attachments from unknown sources. Nonetheless, odds are high that someday the system will be infected. Important data will be lost, essential program and operating system files will be zapped. Now what?
First thing: Don't panic. You may not even be infected. Before implementing a cure you have to diagnose properly.

Tuesday, November 3, 2009

Download ESET NOD32 Antivirus + Activation until 2050

ESET NOD32 Antivirus gives you fast, effective and easy-to-use protection without getting in your way. Smart proactive detection blocks most known and emerging threats hours or days faster than other antivirus technologies. Fast, light and unobtrusive software protects your Internet experience without annoying system slowdowns.

Key Benefits
Keeps you safe from viruses, spyware, trojans, password stealers and other malware threats. Stops most new threats proactively, well before other vendors have issued a signature, maximizing your defense against new and unknown threats. Scans and cleans Internet traffic and email, even when it's SSL-encrypted, so your email is always safe. Stops threats from entering through removable devices so you can share files with confidence. Integrated SysInspector and SysRescue simplify system diagnosis and recovery. Self defense prevents malware from degrading your level of protection. Tiny signature updates happen discretely as needed and won't bog down your system.
Free technical support via the Web, email or phone.

Protect and Prevent Computer from Spyware Infection

Spyware is malicious software (malware) that installs itself or runs on your computer without providing you with adequate notice, consent or control. It can monitor your online behaviour or collect your sensitive personal information such as personally identifiable information and passwords. It could as well display annoying popup advertisements, change your computer settings or cause your computer to run slowly. Because spyware does not obtain your consent before installing or running on your computer, and may not immediately display any noticeable symptoms after it infects your computer, you might not actually be aware of its presence in your PC.

There are many sources from which spyware and other malware could be introduced into your system. Spyware is most commonly installed through free software downloads, such as file sharing, screen savers and search toolbars. Also, they could be installed by websites, downloaded programs, or software you might install from a CD, DVD, external hard disk, or other removable media.

Watch Out Potentially Unwanted Programs

Potentially Unwanted Programs (PUPs) is the generic term given to programs that find their way onto a machine, and that the user may or may not want to have. Although often deposited by way of Trojan horse, PUPs can be made by a legitimate corporate entity for some beneficial purpose.

A PUP is defined as ANY piece of code which a reasonably security-or privacy-minded computer user may want to be informed of, and, in some cases, remove. Even though they may be intended for legitimate corporate use, PUPs can alter the security state of the computer on which they are installed, and therefore most users will want to be aware of them.

The main types of PUPs are:

When and how to launch an attack Trojan Horses and Bots

In the often repeated story of the Trojan horse used to get inside and attack the fortifi ed and well-defended city of Troy from within, invaders used something that was seemingly benign as a vehicle for the attack: a large wooden horse. Similarly, Trojan horses of the information security world are seemingly benign programs that attack computer systems from within.

Once inside the computer, a Trojan program commonly replaces key system fi les and/or programs with malicious versions of the same. When these programs are executed,
they perform their predetermined destructive activities, and users are powerless to stop them. For example, an attacker may replace one of the Windows operating system dynamically linked libraries (DLLs) with a malicious version. DLLs are program fi les that Windows calls on to perform various tasks. An attacker may replace one of these DLLs with a Trojan horse version that does everything the normal DLL did, and a little more. That little more may be any number of things, from reformatting the
hard drive to stealing credit card numbers.

Monday, November 2, 2009

How to handle Phising Attack

Consequences

As the phishers can use so many techniques and can even combine them, it is rather difficult to tell if an email request comes from officials or not.

What are the consequences of disclosing confidential information?
$ The phishers can run up charges on your account.
$ They can open new accounts, sign utility or loan contracts in your name.
$ They can use a false ID and commit crimes using your personal information.

Do not bite the bait!
Do not fill in email forms concerning confidential information. Any trustful service provider uses secure websites and digital certificates.
Do not click on links provided by email, especially if you were not expecting that email. Contact the sender to verify if it was his/her intention to send this email (use the contact number the company gave you, not the one in the email).
Do not reply. Delete the message and check with the real company (use the contact number the company gave you, not the one in the email).
Do not click to follow the link provided in such a message. Type the address in the browser yourself.

Phising Definition, Concept and Techniques

What is phishing

Phishing, also known as "brand spoofing", is an elaborate form of data theft, targeting possible clients of ISP companies, banks, online banking services, government agencies etc.

When submitting your email address on the Internet, filling in online forms, accessing newsgroups or websites, your data can be stolen by Internet crawling spiders and then used without your permission to commit fraud or other crimes.

The Phishing Concept

Phishers develop counterfeit webpages, which imitate the corporate image of well-known, trusted service providers. Then, using collected or random generated email addresses, they "throw the bait".

Download Avira Premium Security Suite v9 + key valid 2011

Do you surf on the Internet, make online purchases, communicate by email, or make bank transactions on your PC? The Avira Security Suite reliably protects you and has an extra FireWall as well as an AntiSpam and a backup function in addition to the award-winning virus protection.

Feature

AntiVir stops all types of viruses
AntiAd/Spyware eliminates ad/spyware
AntiPhishing proactive protection against phising
AntiRootkit against hidden rootkit threats
AntiDrive-by prevents against downloading viruses when surfing
AntiBot prevents dangerous bot networks
EmailScannerEnhanced email protection
WebGuard protection against malicious websites
RescueSystem create a bootable rescue CD
BackupSystem configurable data backup solution
AntiSpam filters out unwanted emails
FireWall protection against hackers
GameMode uninterrupted game play
QuickRemoval eliminate viruses at the push of a button NEW!
NetbookSupport for laptops with low resolution NEW!
ParentalControl block websites unsuitable for children NEW!

How to Offline Update Kaspersky Antivirus & Internet securty 2010

Kaspersky antivirus for 2010 users who have difficulty to update antivirus databases that may be constrained connection problems or many others , the following will be discussed how manual update Kaspersky Internet Security 2010 using the programs manually from kaspersky utuility itself.

The reason why we use the utility because the utility we can carry around because of its shape which is portable and can we use on computers that have the connections, and more importantly with our utility can update other kaspersky with this utility, only 1 times update can be used to update other Kaspersky.

The first thing needed is a utility program it below:

Top 10 Computer Security Threats

1. Malicious spam invades blogs, search engines, forums and Web sites
Websense predicts that hackers will increasingly use Web spam to post URLs to malicious sites within forums, blogs, in the commentary or 'talk-back' sections of news sites and on compromised Web sites. This activity not only drives traffic to the infected Web sites but also assists in the purveyor's site sitting higher on search engine rankings, increasing the risk that users will visit the site.

2. Attackers use Web's 'weakest links' to launch attacks
The Web is an entanglement of links and content. The advent of Web 2.0 additions such as Google Adsense, mash-ups, widgets, and social networks along with the massive amounts of Web advertisements linked to Web pages have increased the likelihood of 'weak links' -- or Web sites and content that are vulnerable to compromises.

Sunday, November 1, 2009

Download AVG Anti-Virus & Firewall - Surf the web with confidence

AVG Anti-Virus & Firewall lets you surf and search the web, download files, chat and social network without worrying that a hacker could get at your personal information or even hijack your computer and take control of it from afar.

With AVG Anti-Virus & Firewall, you get all the protection of AVG Anti-Virus with the added benefit of AVG’s newly-enhanced firewall to ensure your digital life is safe from hackers. Plus you get LinkScanner®, the leading protection against dangerous websites, to ensure you don’t accidentally visit harmful websites.

It’s faster, smarter security that won’t slow you down.

How the Web Spoofing Attack Works

URL Rewriting

STEP I
# A Phisher could insert a malicious script inside a product review to attack the user.

# The Script would modify the host site so that the user believes he/she is interacting with secure site. this technique is also called as “Cross-Scripting.”

STEP II
# This done by using encoded characters to hide the destination address of a link.
Ex-“abc” = "abc”

Web Spoofing Attack

Web Spoofing is Tricking Someone into visiting a Website other than one they intend to visit , by creating a similar website. Web Spoofing is a Phishing Scheme.

The attacker must somehow lure the victim into the attacker’s false web. there are several ways to do this.

# An attacker could put a link to false Web onto popular Web page.
# If the victim is using email, the attacker could email the victim a pointer to false Web.
# Finally, the attacker could trick a web search engine into indexing part of a false Web.