Antivirus Firewall Software Leak Test

Thursday, November 18, 2010 · 0 comments

How good is your antivirus firewall software program? It is hard to tell as a end user. Sure, you can rely on information provided by test magazines, Internet websites, antivirus and firewall software developers or opinions from friends and colleagues. All of those recommendations are to a degree based on opinion and test criteria.

A good way to perform security tests on antivirus firewall software programs are so called leak tests. These tests simulate different kind of attacks and manipulations on a computer system without actually doing any harm to it. They usually present statistics at the end telling the user which tests the antivirus firewall software program passed and which it failed.

Comodo leaktest is but one of the many available leak tests on the Internet. The security software is testing a total 34 different attacks and manipulations of a computer system running the Microsoft Windows operating system. Depending on the antivirus and firewall software in use some, all or none might spawn alerts.

antivirus firewall software

The software program will display a score in the end. The maximum amount of points is 340, 10 for each test passed. Each test is explained on a local html page that gets downloaded with the software program. Those information can be used to find out why a test has not been passed. It does require some research though as the information provided are only answers to the questions what the test is doing and what the harm is if the test fails.

The leak test can be divided into different categories. It will begin with some rootkits tests followed by invasion, injection, info send, impersonation and hijacking tests.

Comodo Leak Test is a portable security software that will test an antivirus firewall software that is installed on a Windows operating system. It provides the means to find out if your computer system is still – partially or fully – vulnerable to common attacks encountered locally and remotely.

Source:-ghacks.net

Get Panda Cloud Antivirus Pro for free

Thursday, October 28, 2010 · 0 comments

There are plenty of free security tools out there, but few include technical support, and many of them bug you with ads and nag screens.

Those are just two of the reasons to spend a few bucks on a pro-level antivirus solution. Of course, why spend a few bucks when you don't have to? Until tomorrow, you can get Panda Cloud Antivirus Pro 1.3 absolutely free. Regular price: $29.95.

As with most paid AV programs, that price is for a one-year license--and so is this freebie. Next year at this time, you can decide if you want to pony up for another year, or just stick with the feature-reduced (but still very effective) free version.

Cloud Antivirus Pro promises protection from viruses, spyware, and rootkits. It can disable Autorun to help protect you from viruses that propagate via flash drives, and the Pro version includes "automatic USB vaccination" to keep you from getting or spreading that kind of malware. (Interestingly, I just had such an encounter with an infected flash drive.)

Also included with the Pro version: 24-7 multilingual tech support. For anyone who wouldn't have a clue what to do in the event of a virus infestation, that could prove mighty helpful.

You can read more about Panda Cloud Antivirus over at CNET's Download Blog. As noted there, "during the registration process, the checkout cart will state at some point, 'Your card hasn't been charged yet.' This is apparently a cart template and does not affect users who are taking part in the license key giveaway." So don't freak out.

I continue to rely on Microsoft Security Essentials for malware protection, but just the other day I had to rescue my parents' laptop from an infection that MSE missed. Maybe a pro-level tool like Cloud Antivirus would have done a better job.


Read more: http://news.cnet.com/8301-13845_3-20021017-58.html#ixzz13ioS3nss

Password advice from the father of the firewall

Saturday, September 18, 2010 · 0 comments

Russian programmer Dmitry Zavalishin is working on a revolutionary new concept for an operating system. In Zavalishin’s Phantom OS, snapshots of the entire system will be continually saved to disk, preserving state for running applications and active data. There are no files in the traditional sense, instead a file is merely an object with persistent state. Neat!

Phantom is new, but it can currently boot, execute applications, and continually save system state to disk. A GUI is planned, as are cross-development tools. The new OS is planning to support interpreted scripting languages like Ruby and Python, and virtual machine programming languages like C# and Java. What, no perl?!

The saved-state nature of Phantom makes it a real contender for both the mobile market, as well as servers. Switch off your phone running Phantom and then turn it back on with no loss of data or apparent interruption in what you were doing. For server environments, a power loss may no longer be a big deal.

It’s great to see real innovation in the OS space. Challenging the status quo may mean that Phantom has an uphill battle before it, but it’s refreshing to see people reallAs more and more personal business is conducted online, passwords (make that dozens of passwords) have become a necessary evil of daily life. We all know the rules for coming up with good passwords, or at the very least we hopefully know there are rules—choose an alphanumeric combination, don't write it down, don't use it for multiple accounts, etc.

Despite this guidance, "people are lousy at picking passwords that computers can't guess, especially computers with multi-core processors," Bill Cheswick said at a cyber security conference held recently at New York Institute of Technology. Cheswick has some credibility in this area. In addition to his current position as lead member of AT&T Research's technical staff, he played a key role in developing the first firewall systems more than two decades ago.

The cyber security pioneer ran through about a dozen different corporate password creation policies from a variety of companies and concluded, "These rules don't make anything more secure." Even the longest and most complicated password is useless if it fall into the wrong hands.

Cheswick offered instead his "non-moronic password rule": A password should be an alphanumeric combination that a family member or friend can't guess in five tries, and it should be complex enough so a person can't figure it out by watching you type it one time. If you need a reminder, rather than writing down the password itself, write down something that will remind you of the password.

It's also important to weigh the value of the information you are protecting. Cheswick breaks this down to three levels. The "who cares?" category is for any account that simply provides access to information, such as an online subscription to The New York Times. If someone steals the password, the most they can do is read the publication or perhaps fill out a survey, so feel free to reuse passwords for these sites.

Other accounts deserve more protection and their passwords should be created and guarded more carefully. On one level are accounts where it would be "inconvenient" if a password were stolen, but the consequences (i.e. someone ordering a book via your Amazon.com account) could be rectified with some effort. Accounts demanding the highest level of protection are those that enable you to access bank accounts, trade stocks or otherwise deal with financial matters.

Of course, the bad guys have all sorts of ways of stealing your log-in information, and many of these thefts are no fault of the password holder, Cheswick said. Some of the most common ways for passwords to be stolen are through keystroke loggers, phishing attacks and password database hacks.

Keystroke loggers are typically installed on a person's computer without their knowledge when they download software or images from unsavory or compromised Web sites. Phishing attacks are delivered via e-mails posing to be from your bank, credit card provider or some other seemingly trusted source. Clicking on links in these bogus e-mails will take you to equally bogus Web sites created to resemble a bank or credit card company's site. When you try to log in, your information is captured. Hackers often attack password databases (such as those maintained by financial institutions or Internet service providers) directly, where they can steal dozens or even hundreds of passwords.

In these cases, much of the security burden falls on your bank, Internet service provider or whomever else is in charge of protecting your information. One way for them to improve security is to limit the number of password guesses, locking an account if the limit is exceeded. Unlocking such accounts should also be carefully thought through. If a Web site offers a secondary question for authentication, that question should be related to the password rather than you yourself, Cheswick said, noting that it's not too difficult to figure out the "maiden name" of a person's mother. thinking outside the box.

Source: scientificamerican.com

Adobe Releases Flash Player Security Update

Tuesday, June 15, 2010 · 0 comments

As expected, Adobe Systems Inc. issued a security bulletin repairing 32 vulnerabilities in Flash Player.


Adobe on Thursday released a security bulletin to patch 32 vulnerabilities in Flash Player, including a critical flaw that antivirus companies have seen being exploited in the wild.

The vulnerabilities could allow an attacker to take control of a system, Adobe warned.


The company recommended that all users with Flash Player 10.0.45.2 and earlier versions upgrade to the newest version, Flash Player 10.1.53.64. Adobe AIR 1.5.3.9130 and earlier versions for Windows, Macintosh and Linux are also affected and the company recommended that users update to Adobe AIR 2.0.2.12610.


The critical flaw that is being exploited in the wild also affects Adobe Reader and Acrobat; Adobe plans to provide a security update for those products on June 29.

source: techtarget.com

Wednesday, May 5, 2010 · 0 comments

eScan has announced the launch of its latest version for protection of Linux systems - eScan for Linux version 3.0. According to eScan, this solution works fine for both Linux desktops and file servers.

eScan for Linux Version 3.0 boasts of an improved antivirus engine that is claimed to enable quicker scanning and better detection of the latest threats. It can read inside the data stream and virtually scans all types of files; including zipped and archived files to detect threats. It allows the user to run preset action like disinfect the file or delete the infected file or rename it or prompt for action. It also provides the user commonly seen features (on Windows based antivirus softwares) like scheduling an automatic scanning and downloading of updates.

The software is available for major Linux distro's including Debian, Fedora, RedHat, Slackware, Suse and Ubuntu. You might want to visit the eSacn website for more on this.

Source: techtree.com

Tips for protecting Windows 7 with Anti-Virus Program

Monday, April 12, 2010 · 0 comments

An anti-virus program or software is a critical part of any Microsoft operating system that interacts with other systems, especially if it is connected to the Internet and works with browser, email, or instant messenger traffic. It looks like everyone has his or her favorite anti-virus solution and it is different from everyone else’s. For personal desktop systems, however, there are some rules of thumb that seem to be fairly universal among security experts:

Don’t run two anti-virus programs- Running two anti-virus applications at the same time is just asking for trouble. Whether it is because their real-time scanners fight over access and between the two of them can slow your PC to a crawl, or because one might misidentify virus signature files maintained by the other as actual virus infections, many problems can crop up that make using two desktop anti-virus programs effectively incompatible with each other.
Scan the entire Windows 7 PC- A real-time scanner is not enough. You should also make sure you perform full-system scans frequently, and automate the process with a scheduled nightly scan if possible. Real-time scanners only finds an incoming virus before it infects your PC if it happens to pass through a point of access that the scanner can effectively protect, and even then sometimes something might get through before there is a virus signature available for your Anti-Virus program.
Get Anti-Virus with a real-time scanner- You require an on-access, real-time scanner to ensure that some of the most common infection vectors for viruses and worms are checked live, to prevent an infection from spreading when your system first encounters the virus or worm. Real-time scanning can be a real burden on system performance, and there may be times when you would want to disable it to increase your performance, but you need to be very careful about that. Surfing the Web and checking email are not the times to turn off your anti-virus real-time scanner for extra performance.

Install your Anti-Virus program before connecting to the Internet- Any Microsoft Windows system should have anti-virus program installed before connecting to the Internet. We have seen malware insinuate itself onto a computer in less time than it took to download anti-virus software to use on the system. If you have not seen that, and you use that as evidence you do not need to worry about anti-virus until after you have opened a browser and visited to a Website where you can download Anti-virus software.

Don't trust default Anti-Virus program- Norton and McAfee, once among the most trusted anti-virus programs for Windows users. Now a days, most home desktop security experts recommend that any system that comes with any default anti-virus program get something else installed instead, as quickly as possible.
Other factors can play a vital role in protecting against virus infection, of course. A good firewall good user practices when browsing the Web, checking email, or downloading files and even Microsoft Windows 7 User Account Control can help sometimes.

PC Security is not difficult

Tuesday, March 16, 2010 · 0 comments

windows 98 support
These days, computers are essential for every person to fulfill basic needs. Computers come under the contact of virus when they are connected to Internet. I have experienced this when I purchased a brand new computer. As I am a gaming freak, I decided to get a new Internet connection in order to download games available online. I searched games on the net and download the executable files of the desirable game. My computer took couple of minutes to download the game and then I installed the game. After the game was installed, I observed something penasty with my computer. Some applications stopped working, blue screen of death problem and Windows freezed suddenly. My computer had been infected by severe viruses present in the executable file of game.
So I searched on Internet about virus attacks and I came to know about the various methods to avoid virus threats in your computer. Some basic practices, which I have exercised in order to prevent virus threats are mentioned below.
• Make sure that disks and files you run on your computer should be authentic.
• Don’t try the disks which have been used in other computers and don’t download files from unauthentic websites as well as avoid opening e-mail attachments without scanning.
• Download the antivirus software in order to detect the virus present in your computer.
• Install updates from the antivirus software website. Then the antivirus software will be able identify the virus and delete it.
• Download and install any software patches or other programs that will help you eliminate the virus. Or follow any instructions you find on deleting the virus manually.
• Try to scan all the files with the extensions .doc, .com, .xls and .ppt etc with antivirus software. Virus mostly present in the files with these extensions.
By following the above-mentioned instructions, I removed some infections from my computer but my computer was not yet completely free of malicious programs. Then I decided to go for technical support providers in order to make my PC secure. Everyone needs PC security to avoid unauthentic access to the data stored in the computer.
So if you find any difficulty while removing severe viruses from your computer then go for technical support firms who provide dedicated technical support to protect your PC against the virus attack. Their Microsoft Certified technicians will access your computer remotely and resolve the issue within fraction of seconds. So imagine the world with unlimited hassle-free Technical Support 24/7/365.

Get Latest Laptops and Enjoy Computing

Wednesday, March 10, 2010 · 0 comments

acer laptop
Acer offers a wide range of laptops, notebooks, and desktops and satiates the requirements of both the professionals as well as homer users.
Features:
The latest laptop series- Acer Aspire 8940G comes with dual-channel DDR3 SDRAM support, Dolby optimized Acer CineSurround sound system, Acer Bio-Protection fingerprint solution, etc. This laptop is integrated with Acer Instant On Arcade, Acer Bio-Protection, Acer Crystal Eye, Acer Launch Manager, Acer eRecovery Management, Adobe Reader, NTI Media Maker, etc.
Usability:
With the use of Acer Aspire 8940G, you can get exciting entertainment experience due to the Blu-ray optical technology. You can easily connect with anyone, because of its built-in webcam, stereo microphones, and Wi-Fi connectivity.
Limitations:
While working with the Acer laptop, you can face any technical issue like, blue screen error, system crash, hard disk failure, driver conflict, etc. In such a condition, you should go for Acer support provider, so that, your system can become fit and healthy once again.
In case, you face any technical issue with your Acer laptop, you can contact any service provider for assistance. Many technical service providers offer remote support for all Acer laptops. Services offered through remote support are enlisted as:
• Installation, re-installation, and un-installation of software
• Troubleshooting software errors
• Configuring settings for Office suite, Internet, e-mail, etc.
• PC Optimization
• Data backup
• Virus and spyware removal
All the above services are offered through remote connection. While accessing online support for your Acer laptop, tech expert will access your system via online and will diagnose your system. Thereafter, they will perform the necessary steps to resolve your technical issues related to Acer laptop.

SEE MORE -
Antivirus Support
Asus Support

Common computer problems and Easy fixes

Thursday, January 14, 2010 · 0 comments

printer support
If you have computer, then you have probably face these computer problems before. Once you purchase a computer, you must accept that sooner or later it will eventually crash due to a virus or some other massive error. If someone told you that your computer will last more than a decade, don’t believe it because it is just a myth or another sales pitch. But of course, you should take care of it if you want it to last for its third year without any defects. However, there are many people that would prefer to buy a new computer than spend some time trying to fix or figure out the problem with their laptop or desktop.
Usually you will need some kind of maintenance because your computer will tend to lose its original speed and performance. Well, here are some if the common problems that a computer user usually experience. Most of the time the biggest problem that your computer has is YOU – the owner or the user. There are many people that neglect the first signs of computer problems. You shouldn’t neglect those simple maintenance tasks that can enhance or prolong the life of your computer.
1. Computer speed or performance has slowed. There are several reasons why this happens to your computer. Lack of maintenance, fragmented data, corrupted registry, spyware, and unnecessary loading of computer programs and services can surely affect your PC speed and performance. Managing your programs and cleaning your registry can easily boost your computer’s performance speed up to 30%.
2. Computer system freezes and blue screens of death. You need to do some serious diagnostic procedures to effectively know the problem with your computer. Computer virus or spyware are maybe some of the reasons to your computer. Update your anti-spyware removal immediately to avoid this kind of problem and thoroughly scan your computer to see if it has any viruses or spywares. If you find that your computer is free from spyware then updating your hardware drive is the next step. Hardware drives makes it easier for your computer to effectively communicate with other hardware components. Without an updated driver the CPU locks up and may cause problems when you are using your computer. If that doesn’t work try to increase your Computer RAM to help avoid computer freezes. By increasing the RAM you get more use out your computer's computing power.
3. The computer keeps on rebooting again and again. This kind of problem is usually associated with hardware issue. Faulty power supply is usually the cause of this problem. Dirty or defective cooling fan is another reason why your computer is rebooting spontaneously. When your computer is trying to cool itself when the fan is defective it automatically switches off. Dust that accumulated in your computer can trap the heat inside which makes it hotter. What you should do is to clean the fan and make sure that it is running properly. Do not forget to check your power supply.
4. Noises and vibrations. This one is almost certainly that you have hardware issue. High pitched noises can be caused by electronic components. Whatever the reason, you conduct a small investigation. Unplug your computer and remove the case and run the computer to discover the origin of noise. If a loose wire or faulty fan is not the one that is making the noise then it may be time to call a computer tech to help you with your problem.
5. Your browser home page changed itself. It is known as "high-jacking" which is also caused by a Spyware installed on your system. The spyware in your computer installed a java script into your web browser that tells your browser to change settings hence changing the default home page of your browser. What you can do is to run an anti-virus or spyware program to remove the spyware from your computer. All of the problems stated in this article can be avoided easily by simply maintaining your computer.

Easy Online Support for Windows Registry

Wednesday, January 13, 2010 · 0 comments

windows98 support
The windows system Registry has been called the most important part of any Windows PC operating system (OS), but you probably didn’t even know it exists. There is a good reason for that. Microsoft doesn’t want you messing with it. Like so many other features in Windows, Microsoft chose to hide information considered too powerful to be left in the hands of mere mortals. Only the wisest of gurus can be entrusted with such knowledge.
The registry controls everything and a single mistake can have devastating consequences on the entire OS. Installed programs and applications will write important data into the registry. User defined data and configurations are also stored.
The data is tracked through a tree of folders and it’s called “keys” that branch off the registry nodes. Every key can have sub keys nested in multiple levels. Its data known as “values” are stored in the keys and sub keys. Groups of related keys, sub keys and values are known as hives.
Applications can modify the keys by changing the values, adding new keys or deleting existing ones. More recent versions of Windows will back up the registry and in the event of a problem, will ask you if you want to use the “Last known good configuration.” This was an option that began in the old Microsoft Windows vista days.
The good news is that such configuration issues related to the registry will not affect your important data like documents, photos, etc. The bad news is that many times the problem that caused the crash in the first place may also be saved in the backup versions of the registry.
Many software programs exist to examine registry the keys and make any necessary repairs. These programs can even check your registry for unused keys that clog your system. Removing these keys can significantly improve performance.
For more information on the Windows Registry, check out the Microsoft software support program.

Are you looking antivirus support to remove spyware embedded in PC?

Tuesday, January 12, 2010 · 0 comments

avg-antivirus-support
Are you looking antivirus support to remove spyware embedded in PC? The typical computer purchase usually comes with some form of installed antivirus software, but it is worth noting that these programs cannot deal with a wide variety of threats such as adware and spyware simply because they cannot detect and destroy them.
Antivirus support program is capable of detecting them while they run. However, you may also want to take note that different programs have different ways of scanning, with some scanning the system memory that the applications use while others scan the files directly to try to detect malware.
Another way Spyware generally costs the user a lot of time not only by slowing down the PC but also displaying many pop up advertisements that distract the user. Also, people tend to spend a lot of time looking for solutions to spyware removal problems online. There are many programs online that can help you scan your computer system for malware and viruses, but not many can permanently get rid of all the detected malicious software.
Some people want to try removing spyware on their PCs manually but usually do not end up with very good results. Some even end up deleting the wrong entries and damaging their computer permanently.
Are you looking for Spyware Remove?
Find Spyware & Adware Removal support on the market now at http://www.iyogi.ca/virus-removal-support/ first!

Computer install to get the desirous software

Tuesday, January 5, 2010 · 0 comments

Install Software

In today’s computer world no software is the ultimate one. As developer are working deliberately to give the best to the users. Hence, computer install is an essential part, both for beginner and the experts.
For critical software install user can take the help of reputed organization who are offering remote support for installation purpose. But, you must be aware of some general installation procedure so that you don’t have to frequently call them up.
Let’s get acquittal with installation of some important software program on your computer.
Installation for Security software and web browsers
Users can make use of CD/DVD of the latest security software like Windows Defender, Spyware Doctor, No adware and so on. For browser you have plenty of options, you can go for Firefox, Opera, IE 8. If you have the internet connectivity you may go for online download from authentic sites. General steps can be followed as:
STEP 1. Download and save the startup program to a desired location.
STEP 2. Run the setup file and proceed on following the prompts.
STEP 3. Accept the agreement and enter the suitable key words.
STEP 4. Click on “Finish.” Restart your system.
Communication has been revised well with the latest email clients. Programs like email client can be installed internally from the web browser.IE 8 have been designed to automatically launch your default email client.
However, if you have the ambition to install a different email client on your computer, you can change your default client in the browser's Internet Options menu. Proceed as follow:
STEP 1. Explore the Internet Explorer.
STEP 2. Navigate on to the "Tools" menu and select "Internet Options."
STEP 3. Select the "Programs" tab.
STEP 4. Click the button "Set Programs." Select "Set Your Default Programs" from the window that appears.
STEP 5. Select your email client from the list of programs on the left side of the screen. Next, click "Choose defaults for this program."
STEP 6. Check the box next to "Mailto" and click "Save."
Hence, you have got your preferred email client installed on your computer. Hope, that the above computer install article would be useful for you.