Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Friday, September 10, 2010

'Here You Have' Virus Tries to Delete Your Security Software - PCWorld

Subject: Here you have (or “Just for you”)

Body: This is The Document I told you about, you can find it

Here. [link]

Please check it and reply as soon as possible.

Cheers,


source PCWorld

That's the example of the worm that the url will bring you to a .scr file instead of .pdf file. Then, it installs itself as CSRSS.EXE in the Windows directory, e-mails the contents of your address book and spreads through mapped drives, remote machines, and removable media. Then it attempts to download files and delete security software.

How To Avoid The Virus

1 - Golden rule, don't just click any link, even from known senders.
2 - Update your antivirus software so it will be able to handle 'Here you have' worm.
3 - If infected, disconnect from the Internet, install any latest antivirus and try to remove the worm.

Sunday, September 21, 2008

Need to spy?

As a guardian over my younger siblings, it's essential for me to keep my eyes on them all the time when they're using this pc. Well I can't do that! I can't be around them all the time. Plus, they know how to wipe off their record from history. So, my solution, I need a keylogger. After searching through download.com, I found this, System Surveillance Pro 5.5.

I must say it's pretty cool. It record almost everything and block unwanted urls through keywords. Users can find the software if they're smart enough to search for it but require password to disable it. It can't be stopped using task manager nor uninstalled through the Control Panel or the Program Files folder.

Pros : all above.

Cons : some says it doesn't work on FF, I don't know, I'm using IE.

Price : Free to try (7 days only), $49.95 to buy (heck, good things don't come for free)

Requirements: Windows 98/Me/2000/XP/2003 Server/Vista

Download from download.com

Monday, November 19, 2007

Net Spy Pro (Upgrade to v4.0 For All Licenses)

Net Spy Pro v4.0 is the latest in employee and student network monitoring software. Net Spy Pro allows you to monitor all user activity on your network from your own workstation. Net Spy Pro includes innovative features such as viewing multiple user screens, taking complete remote control of a PC with YOUR keyboard and mouse, web site logging and other LIVE and LOGGED monitoring features.


Who uses Net Spy Pro?

Our software is used by network administrators spanning a wide range of network types. Almost any type of network can benefit from this tool.


Employee Networks


=Call Center Environment
=Data Entry Environment
=Corporate Intranet
=Government Network
=City or County Intranet
=Student Networks


*Classroom of PC's
*Computer Lab
*Entire School Network
*School District Intranet
*College or University Labs


Employers who are seeking to regain discipline in their employees' Internet activity commonly use Net Spy Pro. Many companies are faced with employees whom waste time online when a supervisor has their back turned. Finding out the TRUTH about what they are doing *and* correcting an employee's bad behavior couldn't be easier.

Teachers who need to monitor and control the computers in their classroom also use Net Spy Pro. See an instant snapshot of all screens in your class to make sure they are working and not surfing the internet or playing games. View web sites visited and much more. We offer special discount licensing for educational institutions.

Parents who need to monitor and control their home network are also users of Net Spy Pro. Your children will think twice about doing something naughty online if they know you can see everything they do. View an instant screenshot updated every few seconds, block web sites or applications and do many other useful tasks.


What is Net Spy Pro?

Net Spy Pro is the ultimate combination network monitoring and administration software tool. Net Spy Pro allows you to monitor all user activity on a TCP/IP network from your workstation.


Price

Commercial : $169 + $6.90 Each Additional PC.
Business : $99 + $3.90 Each Additional PC.
Personal : $49 + $19.90 Each Additional PC.

Download Trial (new window) || Buy Now (new window)

Tuesday, October 30, 2007

Cloak 9 Download - Download







Cloak 9 Download - Download

Cloak 9 Download - Download


Protect your personal information and documents from prying eyes Cloak is a powerful security package designed to protect and secure your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to compress and encrypt documents, encrypt and hide documents within images, send e-mails that appear completely blank to the naked eye, and also shred and permanently delete files from your system. In addition to protecting documents and e-mails, Cloak also provides industry standard internet trace cleaning options (cookies, temporary internet documents, internet history files, recently typed URLs, and much more). Cloak can also be fully integrated with Microsoft Outlook which greatly enhances workflow and allows you to send secure files and e-mails directly from Cloak. Whether at home or at work, Cloak provides the necessary security to protect your privacy.












Thursday, October 18, 2007

Honeypots: Tracking Hackers

Honeypots: Tracking Hackers (Paperback)

List Price: $44.99
Price: $32.84 & this item ships for FREE with Super Saver Shipping.
You Save: $12.15 (27%)

Editorial Reviews

Book Info


The ultimate guide to this rapidly growing cutting-edge technology. Written with the guidance of three legal experts, this material covers issues of privacy, entrapment, and liability. Softcover. CD-ROM included.

From the Back Cover

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action."
--From the Foreword by Marcus J. Ranum

"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today."
--Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems

Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.

Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.

Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.

With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.

The CD-ROM contains white papers, source code, and data captures of real attacks. Its contents will help you build and deploy your own honeypot solutions and analyze real attacks.

Product Details

Paperback: 480 pages
Publisher: Addison-Wesley Professional; Pap/Cdr edition (September 10, 2002)
Language: English
ISBN-10: 0321108957
ISBN-13: 978-0321108951
Product Dimensions: 9 x 7.1 x 1.2 inches
Shipping Weight: 1.8 pounds (View shipping rates and policies)
Average Customer Review: 5/5 based on 12 reviews.
Amazon.com Sales Rank: #227,786 in Books

Wednesday, October 10, 2007

Stealing the Network

Stealing the Network: How to Own the Box [ILLUSTRATED] (Paperback)

List Price: $49.95
Price: $32.97 & this item ships for FREE with Super Saver Shipping.
You Save: $16.98 (34%)

Product Promotions

Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.

Editorial Reviews

Amazon.com


Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film.

One can read this book for entertainment, though its writing falls well short of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its explicit references to current technologies--Cisco routers, OpenSSH, Windows 2000--and specific techniques for hacking them (the heroes and heroines of this book are always generous with command-history dumps). The specific detail may open your eyes to weaknesses in your own systems (or give you some ideas for, ahem, looking around on the network). Alternately, you can just enjoy the extra realism that the detail adds to these stories of packetized adventure. --David Wall

Slashdot.org, June 4, 2003
Stealing the Network is a refreshing change from more traditional computer books...

Product Details

Paperback: 330 pages
Publisher: Syngress; 1 edition (April 1, 2003)
Language: English
ISBN-10: 1931836876
ISBN-13: 978-1931836876
Product Dimensions: 9.1 x 7.3 x 1 inches
Shipping Weight: 1.5 pounds (View shipping rates and policies)
Average Customer Review: 4.5/5 based on 32 reviews.
Amazon.com Sales Rank: #262,091 in Books

Friday, September 21, 2007

Counter Hack Reloaded

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) (Paperback)

List Price: $59.99
Price: $35.99 & this item ships for FREE with Super Saver Shipping.
You Save: $24.00 (40%)

Product Promotions

Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.

Product Details

Paperback: 784 pages
Publisher: Prentice Hall PTR; 2 edition (December 23, 2005)
Language: English
ISBN-10: 0131481045
ISBN-13: 978-0131481046
Product Dimensions: 9.2 x 6.9 x 1.4 inches
Shipping Weight: 2.4 pounds
Average Customer Review: 5 stars based on 37 reviews.
Amazon.com Sales Rank: #12,296 in Books

Editorial Reviews

Amazon.com

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.

The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall