Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Thursday, July 19, 2007

Invisible Secrets (exe)

Topics:
Encryption Software - Security - Windows

Tags:
Carrier,
File,
Invisible Secrets

Source:
Neobyte Solutions

Overview: Invisible Secrets allows you to encrypt and hide
files in other files (carriers) which are not suspect of encryption
(JPG, PNG, BMP). First, It will encrypt the sensitive data using a
specified password and cryptosystem (algorithm). After that, the
encrypted data will be inserted in the carrier.


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software | Size: 1,849KB | Date: Jun 2006 | Version: 2.1 | System Requirements: Windows 98/Me/NT/XP | License: Free | Screen Shot | Downloads: 27337


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , ,

Wednesday, July 18, 2007

Discover What Unauthorized Applications are Running on Your Network

Topics:
Antivirus Software - Security - Windows,
Corporate Security Software - Security - Windows,
Monitoring Software - Security - Windows,
Spyware Removers - Security - Windows

Tags:
Antivirus,
Network,
Sophos Plc.

Source:
Sophos

Vendor Registration: required


Overview: Download Sophos' free Application Discovery Tool to
scan your network for consumer applications that Sophos Anti-Virus can
control. The tool operates alongside your existing anti-virus software.
It will help you identify and locate unauthorized applications on your
network. Please note: requires Active Directory.


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software | System Requirements: Active Directory | License: demo | Downloads: 8


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , , ,

Take the Sophos Threat Detection Test: Is your current anti-virus catching everything it should?

Topics:
Antivirus Software - Security - Windows,
Corporate Security Software - Security - Windows,
Firewall Software - Security - Windows,
Spyware Removers - Security - Windows

Tags:
Antivirus,
Sophos Plc.

Source:
Sophos

Vendor Registration: required


Overview: Use the Sophos Threat Detection Test to quickly
perform a scan and find any viruses, spyware, adware or zero-day
threats that might have by-passed your existing protection. The test
can be run without uninstalling or deactivating your current anti-virus
software.



Download and run this test now!


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , , ,

File Sheriff (dmg)

Topics:
File and Disk Management - Utilities - Mac

Source:
Koingo Software

Overview: Managing files with the Finder in Mac OS X can only
take you so far. File Sheriff allows you to easily generate icon
previews, rename your MP3 files based on their ID3 tags, batch-apply
file attributes, edit hidden file options. Version 1.0.5 may include
unspecified updates, enhancements, or bug fixes.


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software | Size: 5,240KB | Date: May 2007 | Version: 1.0.5 | System Requirements: Mac OS X/X Server/10.3/10.4 | License: Free to try | Price: $9.95 | Limitations: 15-day trial | Screen Shot | Downloads: 6


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , , ,

Free 30 Day Trial: Sophos Endpoint Security and Control

Topics:
Antivirus Software - Security - Windows,
Corporate Security Software - Security - Windows,
Firewall Software - Security - Windows,
Spyware Removers - Security - Windows

Tags:
Security,
Sophos Plc.

Source:
Sophos

Vendor Registration: required


Overview: Sophos Endpoint Security makes it easy to secure
your desktops, laptops, mobile devices and file servers from viruses,
spyware, adware, potentially unwanted applications (PUAs), and hackers,
so you no longer need to manage multiple products to stop different
threats. You can even stop your staff from using unauthorized software
such as IM, VoIP, P2P, and games.



Download your Free Trial now!


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , , ,

Ektron CMS400.NET Instant Demo

Topics:
Content Management,
Web Engineering - Tools - Windows,
Web Page Creation - Tools - Windows

Tags:
Ektron Inc.,
Web

Source:
Ektron

Vendor Registration: required


Overview: Ektron CMS400.NET lets you do more than just what
you need to do on the Web, it also lets you do everything you want to
do...all with one single application.


Take advantage of functionality such as Web content and
document authoring for your business users; site analytics, HTML form
building, and landing page management for your campaign managers;
Memberships, subscriptions, and Web alerts for your site visitors; and
wiki, blogs, and forums for your online communities.


Discover how Ektron CMS400.NET can truly enhance and add to
the functionality of your own public Web site, corporate intranet, or
customer extranet.



Register for an Instant Demo Today!


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Other Download | License: demo | Downloads: 27


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , ,

ForkLift (dmg)

Topics:
File and Disk Management - Utilities - Mac

Source:
Binarynights.com

Overview: ForkLift is designed to be the fastest, most
powerful file manager for the Mac. Utilizing the latest Cocoa
technology and taking advantage of the stable and robust UNIX
foundation, it provides an easy to use, yet very effective way to
manage your data, be it on your computer, remote servers or mobile
devices. The dual-pane view saves you the trouble of bloating your
desktop with connection windows and file listings enabling the most
effective workflow.


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software | Size: 1,406KB | Date: Mar 2007 | Version: 1 beta | System Requirements: Mac OS X 10.3/10.4 | License: Free | Downloads: 63


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , , ,

Haute Secure (1)

Topics:
Firewall Software - Security - Windows

Source:
Haute Secure

Overview: Unlike any other product, we prevent malware from
attacking your PC. Stay safe surfing social networking sites and blogs;
watching embedded Flash videos; viewing sites with banner ads and
widgets; clicking on search engine results that unknowingly point you
to malicious sites. The surest way to keep you safe is by blocking your
navigation to bad websites and embedded links. We label something as
bad in our malicious link database once weve observed it trying to
download malware onto your computer without your knowledge. When you
request a site that contains a malicious link in our database, the
Haute Secure client on your computer will stop the browser from loading
the link and its associated content, adding another layer of protection
to stopping malware attacks.


(Is this item miscategorized? Does it need more tags? Let us know.)


Format: Software | Size: 2,596KB | Date: Jul 2007 | Version: 1.1.1.0419 | System Requirements: Windows 2000/XP | License: Free

--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , matrix, internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------



Technorati Tags: , ,

Friday, July 13, 2007

Don't be so quick to click that Web page
















What
a world. First worms and viruses, then phishing schemes. But now,
cautions Trend Micro Chief Technology Officer Raimund Genes, your
online life may get that much hairier.


Welcome to the brave new world of booby-trapped Web pages. If Trend Micro's predictions hold up, more cyberattacks will originate from the Web than they do from e-mail.


That shift is expected to take place sometime next year, according to
Genes. CNET News.com caught up with Genes to find out how he sees the
battle lines shifting.



Q: At the Gartner IT conference earlier this year, you talked about how Web threats are going to outdo or surpass e-mail threats. Can you flesh that out a bit? What do you mean by a Web threat?

Genes: Yes. A Web threat is something which uses the Internet to
execute malicious activity. So, for example, even something which
arrives via e-mail, if it can't survive without additional downloads
from the Internet, it still constitutes a Web threat. It might be an
e-mail containing a URL, but all the rest works via the Internet.



If an e-mail contains the URL, does it qualify as a Web threat or is it still an e-mail threat, according to your definition?


Genes: It's a Web threat because everything which needs the Internet to
execute a malicious activity is a Web threat. What we are also seeing
among enterprise users, with pretty tight security on e-mail, is that
the main infection vector is actually over the Web. They do a good job
in e-mail filtering, but a bad or no job at all when it comes to Web
filtering.




Is that the only reason that Web threats are becoming bigger?


Genes: No, it's also because it's more attractive for the bad guys. If
Webmasters are careless, then you have a perfect infection scene. You
have a silent killer and you don't have the e-mail evidence to trace it
back to the initial infection scene. It's perfect for espionage and all
kinds of stuff.





Are these Web threats targeted at a particular audience or are they pretty much trying to get whoever they can get?


Genes: Overall, they try to get anyone they can because it's mainly to
plant a bot or to hijack a computer. Let's face it: everybody is a
consumer somehow--especially the enterprise users who use a notebook at
home.



How do you defend yourself?
Genes: You
could outsource e-mail security. But with Web security, it's more
difficult. You're talking about massive investments from the hosting
sites to do this at an acceptable speed via an external proxy. I
haven't seen this model really working. There are some start-ups
offering this, but I wonder how much money they lose every month.






What can consumers do to guard or protect themselves?

Genes: They could do a lot. They regularly have to patch the operating
system and the browser. No. 2: They should use alternative browsers.
They shouldn't use widespread browsers like Internet Explorer. This
doesn't mean that Firefox does not have vulnerabilities, but most of
the Web threats we are seeing are connected to having Internet
Explorer. By moving to an alternative browser, you already do a kind of
risk mitigation.




You're not saying the solution is to install some kind of security software?


Genes: No. Of course installing security is, for me, baseline. It's
like patching an operating system. But look: We could come out and say
we will be able to protect all our users. But we never will be able to
offer 100 percent protection. Nobody can.



What happens with typical Web threats? What do these things do to your computer or what do they attempt to do?


Genes: They attempt to convert your computer into a bot. It could be a
spambot or it could be a distributed denial-of-service attack bot. It
could be a key logger, an information stealer. It tries to use your
computer power.

Most of the bots we see are really to create spam on the
infected machines. They also attempt to use them for distributed
denial-of-service attacks, to hold people ransom and to attack them
with a lot of computers. The third thing they try is, of course, to
function as an information stealer. It is trained to recognize the
format of your credit card while you type in the number or while you do
your online purchases. It will look for certain keywords and documents.




You talked about using a different browser or
using a virtual machine. Should corporations do the same things or are
there different things you recommend?

Genes: No. Based on user behavior this will just be
difficult to enforce. And of course, there's a loss of productivity.
Some companies are pretty radical about what they're using...and they
strictly define what is allowed within a corporate environment. For
instance, whether (instant messaging) is allowed or if peer-to-peer
networking is allowed.

In a corporate environment this could be
company-threatening. Maybe the malware hasn't been targeted to actually
attack the company. But guess what happens when the attacker sees a lot
of documents or a lot of stuff that's confidential? He will try to sell
it.











What's the breakdown between e-mail threats versus the Web threat definition?


Genes: There is an increase in Web threats compared with normal
worms...the number of worms has increased by 22 percent since
first-quarter 2005, while Web threats have increased by 540 percent.


Would you call this a new era of threats or is there no such big word needed to describe Web threats?


Genes: I wouldn't call it a new era, it's just logical. Nowadays, the
bad guys try to make money out of it. To make money they have to
control something as long as possible. And they have to update it
because the bot, after a certain amount of activity, gets outdated in
about a week.





--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Java flaw poses widespread security threat

Google's security team has discovered vulnerabilities in the Sun Java Runtime Environment that threaten the security of all platforms, browsers and even mobile devices.

"This is as bad as it gets," said Chris Gatford, a security expert from penetration testing firm Pure Hacking.

"It's a pretty significant weakness, which will have a considerable impact if the exploit codes come to fruition quickly. It could affect a lot of organizations and users," Gatford told ZDNet Australia.

Australia's Computer Emergency Response Team analyst, Robert Lowe, warned that anyone using the Java Runtime Environment or Java Development Kit is at risk.

"Delivery of exploits in this manner is attractive to attackers because even though the browser may be fully patched, some people neglect to also patch programs invoked by browsers to render specific types of content," said Lowe.

According to Gatford, the bugs threaten pretty much every modern device. "Java runs on everything: (mobile) phones, PDAs and PCs. This is the problem when you have a vulnerability in something so modular--it affects so many different devices."

"Also, this exploit is browser-independent, as long as it invokes a vulnerable Java Runtime Environment," Gatford added.

Pure Hacking's Gatford said the problem is compounded by the fact that organizations are unlikely to take on the daunting process of patching all of their Java Runtime vulnerabilities.

"It would be an extremely difficult and laborious process for an organization trying to patch Java Runtime across the enterprise," he said.

Liam Tung of ZDNet AUStralia reported from Sydney.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------