Subject: Here you have (or “Just for you”)
Body: This is The Document I told you about, you can find it
Here. [link]
Please check it and reply as soon as possible.
Cheers,
source PCWorld
That's the example of the worm that the url will bring you to a .scr file instead of .pdf file. Then, it installs itself as CSRSS.EXE in the Windows directory, e-mails the contents of your address book and spreads through mapped drives, remote machines, and removable media. Then it attempts to download files and delete security software.
How To Avoid The Virus
1 - Golden rule, don't just click any link, even from known senders.
2 - Update your antivirus software so it will be able to handle 'Here you have' worm.
3 - If infected, disconnect from the Internet, install any latest antivirus and try to remove the worm.
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
Friday, September 10, 2010
Sunday, September 21, 2008
Need to spy?
As a guardian over my younger siblings, it's essential for me to keep my eyes on them all the time when they're using this pc. Well I can't do that! I can't be around them all the time. Plus, they know how to wipe off their record from history. So, my solution, I need a keylogger. After searching through download.com, I found this, System Surveillance Pro 5.5.
I must say it's pretty cool. It record almost everything and block unwanted urls through keywords. Users can find the software if they're smart enough to search for it but require password to disable it. It can't be stopped using task manager nor uninstalled through the Control Panel or the Program Files folder.
Pros : all above.
Cons : some says it doesn't work on FF, I don't know, I'm using IE.
Price : Free to try (7 days only), $49.95 to buy (heck, good things don't come for free)
Requirements: Windows 98/Me/2000/XP/2003 Server/Vista
Download from download.com
I must say it's pretty cool. It record almost everything and block unwanted urls through keywords. Users can find the software if they're smart enough to search for it but require password to disable it. It can't be stopped using task manager nor uninstalled through the Control Panel or the Program Files folder.
Pros : all above.
Cons : some says it doesn't work on FF, I don't know, I'm using IE.
Price : Free to try (7 days only), $49.95 to buy (heck, good things don't come for free)
Requirements: Windows 98/Me/2000/XP/2003 Server/Vista
Download from download.com
Monday, November 19, 2007
Net Spy Pro (Upgrade to v4.0 For All Licenses)
Net Spy Pro v4.0 is the latest in employee and student network monitoring software. Net Spy Pro allows you to monitor all user activity on your network from your own workstation. Net Spy Pro includes innovative features such as viewing multiple user screens, taking complete remote control of a PC with YOUR keyboard and mouse, web site logging and other LIVE and LOGGED monitoring features.
Who uses Net Spy Pro?
Our software is used by network administrators spanning a wide range of network types. Almost any type of network can benefit from this tool.
Employee Networks
=Call Center Environment
=Data Entry Environment
=Corporate Intranet
=Government Network
=City or County Intranet
=Student Networks
*Classroom of PC's
*Computer Lab
*Entire School Network
*School District Intranet
*College or University Labs
Employers who are seeking to regain discipline in their employees' Internet activity commonly use Net Spy Pro. Many companies are faced with employees whom waste time online when a supervisor has their back turned. Finding out the TRUTH about what they are doing *and* correcting an employee's bad behavior couldn't be easier.
Teachers who need to monitor and control the computers in their classroom also use Net Spy Pro. See an instant snapshot of all screens in your class to make sure they are working and not surfing the internet or playing games. View web sites visited and much more. We offer special discount licensing for educational institutions.
Parents who need to monitor and control their home network are also users of Net Spy Pro. Your children will think twice about doing something naughty online if they know you can see everything they do. View an instant screenshot updated every few seconds, block web sites or applications and do many other useful tasks.
What is Net Spy Pro?
Net Spy Pro is the ultimate combination network monitoring and administration software tool. Net Spy Pro allows you to monitor all user activity on a TCP/IP network from your workstation.
Price
Commercial : $169 + $6.90 Each Additional PC.
Business : $99 + $3.90 Each Additional PC.
Personal : $49 + $19.90 Each Additional PC.
Download Trial (new window) || Buy Now (new window)
Who uses Net Spy Pro?
Our software is used by network administrators spanning a wide range of network types. Almost any type of network can benefit from this tool.
Employee Networks
=Call Center Environment
=Data Entry Environment
=Corporate Intranet
=Government Network
=City or County Intranet
=Student Networks
*Classroom of PC's
*Computer Lab
*Entire School Network
*School District Intranet
*College or University Labs
Employers who are seeking to regain discipline in their employees' Internet activity commonly use Net Spy Pro. Many companies are faced with employees whom waste time online when a supervisor has their back turned. Finding out the TRUTH about what they are doing *and* correcting an employee's bad behavior couldn't be easier.
Teachers who need to monitor and control the computers in their classroom also use Net Spy Pro. See an instant snapshot of all screens in your class to make sure they are working and not surfing the internet or playing games. View web sites visited and much more. We offer special discount licensing for educational institutions.
Parents who need to monitor and control their home network are also users of Net Spy Pro. Your children will think twice about doing something naughty online if they know you can see everything they do. View an instant screenshot updated every few seconds, block web sites or applications and do many other useful tasks.
What is Net Spy Pro?
Net Spy Pro is the ultimate combination network monitoring and administration software tool. Net Spy Pro allows you to monitor all user activity on a TCP/IP network from your workstation.
Price
Commercial : $169 + $6.90 Each Additional PC.
Business : $99 + $3.90 Each Additional PC.
Personal : $49 + $19.90 Each Additional PC.
Download Trial (new window) || Buy Now (new window)
Tuesday, October 30, 2007
Thursday, October 18, 2007
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers (Paperback)
List Price: $44.99
Price: $32.84 & this item ships for FREE with Super Saver Shipping.
You Save: $12.15 (27%)
Editorial Reviews
Book Info
The ultimate guide to this rapidly growing cutting-edge technology. Written with the guidance of three legal experts, this material covers issues of privacy, entrapment, and liability. Softcover. CD-ROM included.
From the Back Cover
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action."
--From the Foreword by Marcus J. Ranum
"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today."
--Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems
Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.
Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.
Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.
With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.
The CD-ROM contains white papers, source code, and data captures of real attacks. Its contents will help you build and deploy your own honeypot solutions and analyze real attacks.
Product Details
Paperback: 480 pages
Publisher: Addison-Wesley Professional; Pap/Cdr edition (September 10, 2002)
Language: English
ISBN-10: 0321108957
ISBN-13: 978-0321108951
Product Dimensions: 9 x 7.1 x 1.2 inches
Shipping Weight: 1.8 pounds (View shipping rates and policies)
Average Customer Review: 5/5 based on 12 reviews.
Amazon.com Sales Rank: #227,786 in Books
List Price: $44.99
Price: $32.84 & this item ships for FREE with Super Saver Shipping.
You Save: $12.15 (27%)
Editorial Reviews
Book Info
The ultimate guide to this rapidly growing cutting-edge technology. Written with the guidance of three legal experts, this material covers issues of privacy, entrapment, and liability. Softcover. CD-ROM included.
From the Back Cover
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action."
--From the Foreword by Marcus J. Ranum
"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today."
--Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems
Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.
Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.
Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.
With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.
The CD-ROM contains white papers, source code, and data captures of real attacks. Its contents will help you build and deploy your own honeypot solutions and analyze real attacks.
Product Details
Paperback: 480 pages
Publisher: Addison-Wesley Professional; Pap/Cdr edition (September 10, 2002)
Language: English
ISBN-10: 0321108957
ISBN-13: 978-0321108951
Product Dimensions: 9 x 7.1 x 1.2 inches
Shipping Weight: 1.8 pounds (View shipping rates and policies)
Average Customer Review: 5/5 based on 12 reviews.
Amazon.com Sales Rank: #227,786 in Books
Wednesday, October 10, 2007
Stealing the Network
Stealing the Network: How to Own the Box [ILLUSTRATED] (Paperback)
List Price: $49.95
Price: $32.97 & this item ships for FREE with Super Saver Shipping.
You Save: $16.98 (34%)
Product Promotions
Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.
Editorial Reviews
Amazon.com
Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film.
One can read this book for entertainment, though its writing falls well short of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its explicit references to current technologies--Cisco routers, OpenSSH, Windows 2000--and specific techniques for hacking them (the heroes and heroines of this book are always generous with command-history dumps). The specific detail may open your eyes to weaknesses in your own systems (or give you some ideas for, ahem, looking around on the network). Alternately, you can just enjoy the extra realism that the detail adds to these stories of packetized adventure. --David Wall
Slashdot.org, June 4, 2003
Stealing the Network is a refreshing change from more traditional computer books...
Product Details
Paperback: 330 pages
Publisher: Syngress; 1 edition (April 1, 2003)
Language: English
ISBN-10: 1931836876
ISBN-13: 978-1931836876
Product Dimensions: 9.1 x 7.3 x 1 inches
Shipping Weight: 1.5 pounds (View shipping rates and policies)
Average Customer Review: 4.5/5 based on 32 reviews.
Amazon.com Sales Rank: #262,091 in Books
List Price: $49.95
Price: $32.97 & this item ships for FREE with Super Saver Shipping.
You Save: $16.98 (34%)
Product Promotions
Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.
Editorial Reviews
Amazon.com
Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film.
One can read this book for entertainment, though its writing falls well short of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its explicit references to current technologies--Cisco routers, OpenSSH, Windows 2000--and specific techniques for hacking them (the heroes and heroines of this book are always generous with command-history dumps). The specific detail may open your eyes to weaknesses in your own systems (or give you some ideas for, ahem, looking around on the network). Alternately, you can just enjoy the extra realism that the detail adds to these stories of packetized adventure. --David Wall
Slashdot.org, June 4, 2003
Stealing the Network is a refreshing change from more traditional computer books...
Product Details
Paperback: 330 pages
Publisher: Syngress; 1 edition (April 1, 2003)
Language: English
ISBN-10: 1931836876
ISBN-13: 978-1931836876
Product Dimensions: 9.1 x 7.3 x 1 inches
Shipping Weight: 1.5 pounds (View shipping rates and policies)
Average Customer Review: 4.5/5 based on 32 reviews.
Amazon.com Sales Rank: #262,091 in Books
Friday, September 21, 2007
Counter Hack Reloaded
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) (Paperback)
List Price: $59.99
Price: $35.99 & this item ships for FREE with Super Saver Shipping.
You Save: $24.00 (40%)
Product Promotions
Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.
Product Details
Paperback: 784 pages
Publisher: Prentice Hall PTR; 2 edition (December 23, 2005)
Language: English
ISBN-10: 0131481045
ISBN-13: 978-0131481046
Product Dimensions: 9.2 x 6.9 x 1.4 inches
Shipping Weight: 2.4 pounds
Average Customer Review: 5 stars based on 37 reviews.
Amazon.com Sales Rank: #12,296 in Books
Editorial Reviews
Amazon.com
In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.
The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall
List Price: $59.99
Price: $35.99 & this item ships for FREE with Super Saver Shipping.
You Save: $24.00 (40%)
Product Promotions
Get free two-day shipping on this item when you spend $200.00 or more on Qualifying Textbooks offered by Amazon.com. Prime members will also receive a $20 promotional certificate to be used for a future purchase. Need a promo code? Enter code TBFALLO7 at checkout.
Product Details
Paperback: 784 pages
Publisher: Prentice Hall PTR; 2 edition (December 23, 2005)
Language: English
ISBN-10: 0131481045
ISBN-13: 978-0131481046
Product Dimensions: 9.2 x 6.9 x 1.4 inches
Shipping Weight: 2.4 pounds
Average Customer Review: 5 stars based on 37 reviews.
Amazon.com Sales Rank: #12,296 in Books
Editorial Reviews
Amazon.com
In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.
The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall
Subscribe to:
Posts (Atom)