Showing posts with label computer security. Show all posts
Showing posts with label computer security. Show all posts

Sunday, October 31, 2010

Password Recovery for Chrome Browser


ChromePass is a small and simple password recovery tool that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time.

You can select one or more items and then save them into text/html/xml file or copy them to the clipboard.

The utility is portable and released as freeware.

Latest software release: 1.16

Photobucket





Tuesday, August 24, 2010

Fight Malware – Remove Fake Antivirus

Remove Fake Antivirus is а free portable software used to remove the most popular fake antiviruses from your computer.

What is fake antivirus? This is a type of virus/malwares which disguises itself to be an antivirus. It infects your computer when you accidentally click a link in a website which will download the malware into your computer and run automatically when your windows boot. It scans the infected computer and produces fake alert warnings. It convinces you that your computer is in danger and urges you to purchase a useless copy of the fake antivirus. In most cases, the malware program blocks the real antivirus on your PC and Internet access to limit your ability for recovery.

These fake antiviruses must be removed immediately. The software supports removal of the 64 malware utilities, listed below:
  1. Security Tool
  2. My Security Shield
  3. Antivirus 7
  4. Antivirus GT
  5. Defense Center
  6. Protection Center
  7. Sysinternals Antivirus
  8. Security Master AV
  9. CleanUp Antivirus
  10. Security Toolbar
  11. Digital Protection
  12. XP Smart Security 2010
  13. Antivirus Suite
  14. Vista Security Tool 2010
  15. Total XP Security
  16. Security Central
  17. Security Antivirus
  18. Total PC Defender 2010
  19. Vista Antivirus Pro 2010
  20. Your PC Protector
  21. Vista Internet Security 2010
  22. XP Guardian
  23. Vista Guardian 2010
  24. Antivirus Soft
  25. XP Internet Security 2010
  26. Antivir 2010
  27. Live PC Care
  28. Malware Defense
  29. Internet Security 2010
  30. Desktop Defender 2010
  31. Antivirus Live
  32. Personal Security
  33. Cyber Security
  34. Alpha Antivirus
  35. Windows Enterprise Suite
  36. Security Center
  37. Control Center
  38. Braviax
  39. Windows Police Pro
  40. Antivirus Pro 2010
  41. PC Antispyware 2010
  42. FraudTool.MalwareProtector.d
  43. Winshield2009.com
  44. Green AV
  45. Windows Protection Suite
  46. Total Security 2009
  47. Windows System Suite
  48. Antivirus BEST
  49. System Security
  50. Personal Antivirus
  51. System Security 2009
  52. Malware Doctor
  53. Antivirus System Pro
  54. WinPC Defender
  55. Anti-Virus-1
  56. Spyware Guard 2008
  57. System Guard 2009
  58. Antivirus 2009
  59. Antivirus 2010
  60. Antivirus Pro 2009
  61. Antivirus 360
  62. MS Antispyware 2009
  63. IGuardPC or I Guard PC
  64. Additional Guard


Tuesday, June 22, 2010

Locking your PC with Predator

You would not like anybody else to access your computer at your absence? That is understandable, because your computer is part of your identity and you can have multiple reasons not to allow other people to take a look into. So, how do you deal with that issue now? You, probably, have a screensaver, turning on after some inactivity time, and requires password to access the desktop again.

There are several drawbacks for using this method, and the developers of the special security software Predator from France Montpellier-Informatique tried to cover them to make the process secure, traceable, and customizable. The software is free for personal use, and it costs $29 for the Professional Edition license.

What Predator can do for you?

PREDATOR locks your PC when you are away, even if your Windows session is still opened.
It uses a regular USB flash drive as an access control device, and works as follows:
- you insert the USB drive
- you run PREDATOR (autostart with Windows is possible)
- you do your work...
- when you're away from your PC, you simply remove the USB drive. Once it is removed, the keyboard and mouse are disabled and the screen darkens
- when you return back to your PC, you put the USB flash drive in place. Keyboard and mouse are immediately released, and the display is restored.

It's easier and faster than closing your Windows session, since you do not have to retype your password when you return. However, you still can use the unlocking password in case, for example, you lose your USB drive, serving as unlocking key.

Using the software

1.       To start monitoring your PC
* Insert your key
* Run the software via the Start Menu / Programs / Predator item or via the PREDATOR icon on the Desktop
* Make sure that the PREDATOR icon flashes in the taskbar.
2.      
When you go away
* Look at the PREDATOR icon in the taskbar: if it is red, wait. If it is green and blinking, remove the key.
* The desktop will be locked in a few moments, depending on the settings you have chosen.
* If somebody tries to use your PC, PREDATOR shows the password dialog and starts a countdown.
If an invalid password is entered, PREDATOR sounds an audible alarm and displays a blinking Access Denied sign.
3.       
When you're back
* Insert the key. The desktop will be unlocked in less than a second.
* If somebody has tried to use your PC, PREDATOR automatically opens the Log window and shows the failed access attempts



Choose the proper installer for your version of Windows OS.

Monday, March 30, 2009

Not all April Fool Jokes are Funny: Conficker Malware Threat

April Fool’s Day worm starts its countdown, security vendors are cautioning users that if they’ve implemented basic security on your home computer or network, they’ll be fine.

Others, however, face risk from a worm that’s spread rapidly and without a clear indication of its purpose, they told InternetNews.com.

"It’s important for users to apply the known, basic, common-sense steps to protect themselves, even in light of increasing and increasingly sophisticated attacks," said Jenko Hwong, director of security products for security appliance vendor Mirapoint. "Conficker.C and April 1st won’t bring Armageddon."
For most users, that involves using up-do-date software and security tools.

"If you have a legal copy of Microsoft Windows, you have invested ... in antivirus software, or you pay your service provider for secured Internet access -- most likely you are safe," said Ron Meyran, product manager for security for application delivery and network security vendor Radware. "The same applies for enterprise networks: Your corporate policy should cover such cases."

Nevertheless, the worm has still managed to spread widely. David Perry, global director of education at antivirus firm Trend Micro, told Internetnews.com several months ago that he believes about 10 million PCs have been hit.

Many of the infected PCs are inadequately defended. "If you run an illegal copy of Windows, your antivirus (if any) is a freeware, you are a DSL or cable subscriber and you never disconnect -- then you are the ideal target for self propagating viruses such as Conficker," Radware’s Meyran said.

"And it will not be he first time your computer is recruited into a botnet, he said. "In fact, there is a good chance that you already host malware of more than one botnet."

Owners of many infected PCs won’t know they’re infected until April 1, added Trend Micro’s Perry. "It’s hard to spot Conficker’s work."

Experts don’t know what the worm will do on April 1, but they have some educated guesses. Tal Golan, founder and CTO of antispam appliance vendor Sendio, said that the worm will likely send out e-mail containing spam or malware, but that the e-mail will be a "smoke screen masking the real targets of the worm or virus."

All of the experts that InternetNews.com contacted agreed that Conficker’s spread shows that many organizations are not up to date on their patches: The worm exploits a well-known vulnerability, published by Microsoft on Oct. 23, 2008. Anyone who applied the necessary patches since then is safe.

Security experts urged users who suspect they’re infected to scan their PCs. Trend Micro’s Perry recommended using security software based in the cloud, such as his company’s Trend Micro Smart Protection Network for enterprise users. The company also offers a Web-based scanning service called House Call for home users.

Radware’s Meyran said that one sign you’re infected could be if some Windows system services have been disabled on your PC.

The worm might be visible to any user: "It connects to a remote server in order to receive further instructions such as gathering personal information and downloading additional malware to the victim’s computer. It also disables a number of system services such as Windows Automatic Update, Windows Security Center and Windows Defender -- all to prevent disinfection."

Author: Alex Goldman
Source: InternetNews.com.

Updates 03-31-09:

Note that the vulnerability hole was fixed in October 2008 by Microsoft, but if your computer doesn't get automatic updates from Microsoft and you have not performed them manually for a while, your computer could be affected.

Try to update all the Microsoft updates first. If you see that you cannot perform them automatically, your computer might be already affected by the worm, who prevented you from healing your PC. If so, you will need to apply the medicine manually. Visit Microsoft explanation website http://technet.microsoft.com/en-us/security/dd452420.aspx and download Microsoft® Windows® Malicious Software Removal Tool (KB890830) on your Hard Drive. Run it and perform the Quick scan first. If at the first glance, you PC looks clean, ensure the fact by running full scan. Depending on how large your HDD, this scan might take from an hour to several hours. So be patient.

Sunday, August 3, 2008

Freeware professional consultant for your PC - BelArc Advisor

Belarc Advisor can be considered as a free for personal use professional computer-security consultant for your PC.

The application performs a detailed investigation of the computer hardware and software and analyzes a machine’s weak points, looking at elements such as whether antivirus software is up to date, or whether all the security flaws in Windows have been patched. It uses the Center for Internet Security (CIS) benchmark test to give the computer a score showing its overall security level, and produces a report that can be viewed in a Web browser.

Not only does it analyze software and operating system components and tell you where problems are, but in its comprehensive report software tells you what your computer’s physical components are: not just how much RAM you have, for example, but what kind of RAM and which slots are occupied.

This program does not fix the problems itself, but gives clear advice on how to address each issue. The software is recommended for all home PC users as a first step in securing their computers, or for those considering a hardware upgrade, and need a detailed overview of the current system configuration. All of your PC profile information is kept private on your PC and is not sent to any Web server.

Developers Web Site: http://www.belarc.com/

Direct download: http://www.belarc.com/Programs/advisorinstaller.exe

Related Posts Plugin for WordPress, Blogger...

Design | Elque 2007