[kjkn
Read rest of entry
Saturday, December 5, 2009
Tuesday, August 11, 2009
Wi-Fi Defense Systems – Protect your Network! [WIN]

On previous entries I talked about how easy it can be to infiltrate a network, and in this entry I will provide software to protect your network from invaders. Here are the previous posts:
WEP Cracking
How Secure is your Network
Wi-Fi defense systems find unique visitors on your network. You may have heard of “war diving.” It is people driving around with their laptops, iPods/iPhones, and antenna devices looking for unsecured networks. In one test of driving around in Las Vegas they found over 100 open networks in just a few minutes. Some carry GPS units and mark these unsecured networks and upload the longitude and latitude coordinates to websites.
Now, pair that up with software such as Network Stumbler, which scans for networks roughly every second and logs all the networks it runs into–including the router's SSIDs, the AP’s MAC address, the best signal-to-noise ratio encountered, and the time you crossed into the network’s space. Most war-drivers do it for 'kicks' but some have more harmful intentions.

SpyderSoft Wi-Fi Defense was designed with the mainstream, non-technical consumer in mind, yet is powerful enough to offer security benefits to even the most advanced user.
The technology detects all devices on the network, provides identifying information to assist the owner in designating each as Friend or Foe, and seamlessly locks-down the network to allow only approved devices. Adding a new device or allowing a visitor to join the network is also an easy task, and the application ensures that you maintain a locked-down network. At all times, SpyderSoft Wi-Fi Defense continues a background scan to detect new and/or unauthorized devices.
Rapidshare Files:
Windows Installer: Download
Portable Version: Download

Step 1 - Press on the Windows button on your keyboard + R
The windows button looks like this:

Step 2 - The Run window should have popped-up. Type in cmd

Step 3 - A black Command Prompt window should have popped-up. Now, type in ipconfig/all with no spaces between the /.

Step 4 - The command prompt should display some info and you will find your MAC address under 'physical address'. Write down the sequence.

Step 5 - Open up the keygen, type your MAC address, and generate your key.

Now you have a 100% working version of Wi-Fi Defense. With this software you will have control over your wireless network.
Monday, August 10, 2009
Agnitum Outpost Firewall Pro 2009 [WIN]

Outpost Firewall Pro provides a superior arsenal of defense against PC infiltration. Outpost ensures your online security with solid protection against all Internet-borne threats. Outpost is the first personal firewall developed with Open Architecture. It is also the first personal firewall that supports plug-ins. Sample plug-ins are included to show how this revolutionary technology can easily be employed for such tasks as Intrusion Detection, Advertisement Blocking, Content Filtering, E-mail Guard, and Privacy Control. It is equipped with every feature a personal firewall should have. It is the most functional firewall in the world. It supports all the latest security techniques and features such as: Full Stealth Mode, Anti-Leak, and MD5 Authentication.
What you get:
* Advanced firewall for secure connections
* Antispyware to keep your PC spyware-free
* Host protection to block zero-day threats
* Web control to protect your PC from web-borne threats
Safety on the Internet
The two-way firewall stops inappropriate or malicious access to your computer from both internal (LAN) and external (Internet) sources. As a frontline defense, it prevents malware from spreading or “phoning home”, providing protection against hackers, loss of personal data, unknown malware, and unauthorized program activity.
Preemptive threat protection
Outpost’s Host Protection module monitors how programs interact to protect your system against high-level security breaches and has passed all well-known leaktests to prevent unauthorized transmission of information from your PC.
No more spyware!
Eliminate spyware with Outpost’s dedicated antispyware utility. Regular updates and always-on monitoring ensure that spyware cannot activate and cause damage to your data or divert your applications.
Secure web surfing
The versatile Web Control module safeguards you against the Internet's darker side. It steers you away from websites infected with drive-by downloads, prevents the inadvertent disclosure of personal information, limits your exposure to potentially unsafe web properties, and keeps your identity private.
Bulletproof self-defense
Outpost cannot be deactivated by targeted attacks, ensuring continuity of protection.
Power without complexity
Whether you’re a security novice or expert, you can easily configure Outpost Firewall Pro to meet your needs. Thanks to automated and context-sensitive help, the firewall can learn how to handle alerts and make decisions for you, so you can focus on what you want to do, and leave the security to Outpost!
Rapidshare Link:
Download
File Size: 22.4MB

iWork '09 [MAC]


iWork ‘09, Apple’s office productivity suite, is the easiest way to create documents, spreadsheets, and presentations the Mac way. Writing and page layout are easy in Pages. Numbers gives you simple ways to make sense of your data. You’ll captivate your audience with new, sophisticated features in Keynote. And iWork is compatible with Microsoft Office, so it’s easy to share your work.
And here is where you can get it!!

Rapidshare File:
Download
File size: 450.4MB

Tuesday, July 14, 2009
Malware Removal Guide - Step by Step




Uncompress the file and run the executable file.

Use the U3 installation wizard from the U3 Smart Menu to install the app to your U3 Smart system.
Clean Adware, Rootkits, Spyware, Trojans, Viruses and Worms. Malware is short for malicious software. It is a general term that refers to any software or program code designed to infiltrate or damage a computer system without the owner's informed consent. This guide will show you how to remove these infections and protect yourself from future infections using free software.
FACT: 89% of consumer PCs are infected with spyware
First Step - Cleaning Up The Windows OS
In this step we will clear up space from your system by removing temporary files, browser history, cookies, browser forms, and registry errors with the following applications.

CCleaner is system optimization and privacy tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. But the best part is that it's fast.
Downloads:





CleanUp! is a powerful and easy-to-use application that removes temporary files created while surfing the web, empties the Recycle Bin, deletes files from your temporary folders and more.
Downloads:


Second Step - Scanning And Cleaning
In this step we will perform a few scans with multiple scanners to rid the system of malware.




First we will run a few applications that will target viruses.

Trend Micro Sysclean Package is a stand-alone fix package that incorporates the Trend Micro Malware and Spyware scanning engines as well as the Trend Micro Damage Cleanup Engine. This tool will terminate all detected malware/spyware instances in memory, remove malware/spyware registry entries, remove malware/spyware entries from system files, scan for and delete all detected malware/spyware copies in all local drives.
Downloads:

Latest Virus Pattern File: Download
Latest Spyware Pattern File: Download


Avira AntiVir Personal is a German made, comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users with a 99.7% Malware Detection Rate.
Downloads:



Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.
Downloads:



Integrated, Real-Time Protection against viruses, worms, trojans, spyware, adware, phishing, and hackers. Best detection, fastest performance & smallest footprint. Nod32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC.
Downloads:



McAfee VirusScan Command Line Scanner offers advanced anti-virus scanning technology in a UNIX-based or Microsoft Windows-based utility. You get comprehensive threat detection and cleaning with command-line granular control. However this application is written to easily operate the DOS line scanner. It is also known as Bart's McAfee VirusScan GUI Wrapper.
Downloads:

Latest SuperDat File (sdatxxxx.exe) - Download
**(where xxxx is the version number, for example sdat4290.exe)

Now we will run a few applications that will target SpyWare.

Spybot - Search and Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.
Downloads:



Ad-Aware protects you from spyware that secretly takes control of your computer, resulting in aggressive advertising pop-ups, sluggish computer activity and even identity theft through stolen private information.
Downloads:



HijackThis is an awesome utility which quickly scans your Windows computer to find settings that may have been changed by spyware, malware or other unwanted programs. HijackThis creates a report, or log file, with the results of the scan.
Downloads:



Trend Micro RootkitBuster is a rootkit scanner that scans hidden files, registry entries, processes, drivers, and Master Boot Record (MBR) Rootkits. In addition, RootkitBuster can also clean hidden files and registry entries.
Downloads:




Subscribe to:
Posts (Atom)