Tuesday, October 27, 2009

Block Attacks By Blocking Autorun File

If you recollect,some months back i had posted on Panda USB vaccine. Similarly i have come across another tool which i feel is better than Panda USA Vaccine.

Autorun.inf is the primary instruction file associated with the Autorun function. Autorun.inf is a simple text-based configuration file that tells the operating system which executable to start, which icon to use, and which additional menu commands to make available.

1. How does this File Look ?

Line 1: [autorun]
Line 2: open=autorun.exe
Line 3: icon=autorun.ico


Kindly Note that Line N ( N=1,2,3) is used just for simplification.

Line 2 Means that when started,autorun.exe file will get executed and Line 3 means the autorun file will have autorun.ico as its File Icon.

In reality autorun.inf files are more complex than this but for now,i am limiting myself to simple examples only.

2.What is Autorun Protector

Autorun Protector is a two way protection .Net application which was released in April this year,prevents PC from infecting with autorun worms and also protecting your removable device from being infected from other sources.



Since I said it is developed in .Net,it requires 2.0 Framework pre installed.Kindly note that it doesn't clean all the worms so i would suggest to use good antivirus to scan the PC to ensure maximum protection.

Autorun worm infects your PC through removable device such as USB Drive. It has a file called autorun.inf which contains code to run malicious program. If PC failed to block this autorun file,it can cause serious damage to the PC.




As mentioned earlier,it has 2 way protection i.e PC Protection & Device Protection. But there is also another feature "The MountPoints2" which is a registry key that contains cached information about every removable device. Clearing this key might solve the problem on opening drive problem issue.



One feature that i really appreciated in the new release was the mean to create own autorun.inf files. It can also fix the drive opening issues.


DOWNLOAD NOW

Please don't copy this article to your website and this act is strictly NOT allowed. However, if you like this article, contact me before publishing this to any other blog/website/etc.

Monday, October 26, 2009

Fake Antivirus Tracking

Many of us know that these days too many antivirus are introduced and without knowing its actual contents and "what it does?".



Sometimes You visit a website and you get a warning message that is very convincing and looks like its coming from Windows telling you that you have a virus/spyware/Trojan/etc. Then it tempts you to click the button and ones you click it,it will auto install. Then is the worst part.It then downloads viruses to your computer and the rogue antivirus will find the virus.

Remove Fake Antivirus 1.36 is used to remove:

#Cyber Security
#Alpha Antivirus
#Windows Police Pro
#Antivirus Pro 2010
#PC Antispyware 2010
#FraudTool.MalwareProtector.d
#Winshield2009.com
#Green AV
#Windows Protection Suite
#Total Security 2009
#Windows System Suite
#Antivirus BEST
#System Security
#Personal Antivirus
#System Security 2009
#Malware Doctor
#Antivirus System Pro
#WinPC Defender
#Anti-Virus-1
#Braviax
#Spyware Guard 2008
#System Guard 2009
#Antivirus 2009
#Antivirus 2010
#Antivirus Pro 2009
#Antivirus 360 and
#MS Antispyware 2009(all of them are fake antivirus which are
viruses or trojans) from your computer.


DOWNLOAD NOW

Please don't copy this article to your website and this act is strictly NOT allowed. However, if you like this article, contact me before publishing this to any other blog/website/etc.

Sunday, October 25, 2009

How to track BLUE SCREEN error on Windows

I have been victim of this problem number of times.Doing some important work and suddenly experiences following SURPRISE



A lot of times a blue screen happens very quickly which you can’t even see what are the error messages and your computer got restarted.The memory crash dump are usually saved in C:\WINDOWS\Minidump and C:\WINDOWS\MEMORY.DMP

So I came across a tool,BlueScreenView which scans all your mini dump files created during 'blue screen of death' crashes, and displays the information about all crashes in one table.

For each crash, BlueScreenView displays the mini dump filename, the date/time of the crash, the basic crash information displayed in the blue screen (Bug Check Code and 4 parameters), and the details of the driver or module that possibly caused the crash (filename, product name, file description, and file version).

# BlueScreenView Features

1. Automatically scans your current minidump folder and displays the list of all crash dumps, including crash dump date/time and crash details.

2.Allows you to view a blue screen which is very similar to the one that Windows displayed during the crash.

3.BlueScreenView enumerates the memory addresses inside the stack of the crash, and find all drivers/modules that might be involved in the crash.


BlueScreenView also provides options for command line so that this program can be triggered easily.


DOWNLOAD NOW

Please don't copy this article to your website and this act is strictly NOT allowed. However, if you like this article, contact me before publishing this to any other blog/website/etc.

Tuesday, October 20, 2009

Art Of Security-Securing Your Wifi - Part 1

Many People get very excited about WiFi and after purchasing leave many patches in the security measures of the WiFi. Many folks leave the password and username as the same default.(I wont mention the default username and password..lol)



I note down some important steps to be taken care while setting up the security measures for your WiFi.

1. Change the Default Settings of WiFi :

Mostly Wi-Fi home networks is an access point or router. To setup the configuration a web page url is provided and to login the password.This is the right only for the admin.But for the default equipment the password provided is pretty simple and i am sure by now you people must have even guessed it.Lol..!!

Change the password immediately as soon as possible.



2. Ensure that WEP/WPA is enabled

Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks. It uses Shared key technique for authentication.
The 802.11i standard addresses many of the security issues of the original 802.11 standard. While the new IEEE 802.11i standard is being ratified, wireless vendors have agreed on an interoperable interim standard known as Wi-Fi Protected Access (WPA).

3. Enable MAC Address Filtering

MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.



While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.
While giving a wireless network some additional protection, MAC Filtering can be circumvented by scanning a valid MAC and then changing the own MAC into a validated one. This can be done in the Windows Registry or by using commandline tools on a Linux platform.


There are some other methods to secure Wifi.Which i would be discussing in my next post.

Tuesday, October 13, 2009

No Webcam ? I have a Solution

Webcame has really made the communicaion easier. For the people in india to the world and for the world to india..!! well..its really fun to have a webcam besides your PC/Laptop.

But hardly people use webcam or own webcam.Chill now..i have a solution for all the people who don't own a webcam.




1. How to Use it ?

Download the .sis file and use this application after setup installation.
As soon as you start the MobCam application on your mobile, you’ll be able to begin on-line watching of the mobile camera shots on this web site. All you have to do is enter the number you see on the mobile display into the CODE field.

2.Installation and Setup

After automatic installation, you have to perform a very simple application setup. MobCam can operate in three various modes:

# Periodical sending: The mobile phone takes pictures periodically (e.g. every minute), sending them immediately to www.mobcam.cz where you can look at them.

# Motion detection: At the moment of any motion being detected in front of the mobile camera lens, results in the MobCam application taking a picture and sending it immediately to the server at www.mobcam.cz.

#SMS detection: The application takes no pictures. At the moment an SMS with a set password is received, MobCam takes a picture and sends it to the server at www.mobcam.cz.

Select from the application menu to choose one of the modes. The “SMS” mode can operate even when the other two modes have been activated. MobCam is started at the moment you select “Start” from the menu. After that, the display will show a number (CODE); enter this number on the web site at www.mobcam.cz and then you can start watching the images from your mobile camera.

3.View Cam

Only the people with the knowledge of your numeric code (CODE) can look at the pictures from your mobile WEB camera.Share this code for comments and views with others.


Enjoy...!!!

Sunday, October 11, 2009

Samsung P2250- Is this Better Than Samsung 933 ?

Folks,I recently purchased 933 Samsung Widescreen monitors for my personal use.Well soon after it was purchased, Samsung launched another LCD monitor range of Samsung P2250.i was like " now what? is my one better than this new one ??

1.Design :

This model had a glossy black layer with a smooth transparent hard plastic layer. This layer sticks out a bit from the sides, thus giving the front view transparent borders, which look pretty cool. Unlike 933,The bottom panel has touch sensitive controls on its right half, while the Samsung Logo is printed at the center(Same as 933) - overall it looks very neat and sober.



2.Technical Monitor Specification :

# Panel contrast is 1000:1 (native)
# Brightness is rated at 300 cd/m2.
# Screen resolution is 1920 x 1080, a pure 16:9 aspect ratio.
# The exact size is 21.5 inches diagonal.
# Response time is rated at 2 ms.



3.Performance Grading :

well..i liked the UI especially the design and the navigable schemes.Touch sensitivity it self is rocking and smooth and buttons too are designed nicely.. There are presets like Text, Movie, Game, Dynamic Contrast, game etc.Sharpness and clarify is awesome.I would support this monitor for this reason.


4.Verdict :

Cost is too high for a common man its nearly Rs.12,000/-
But worth buying if you wish to enjoy the superb clarity and sharpness and Offcource if you are a game freak..!!

Image Source : Shopmania,Newtechnology

Tuesday, October 6, 2009

Micro(soft)Shock...!!!

Hotmail ones upon a time was a main loophole for hackers.And nope surprise even after Windows Live,the trend continues.Yahoo has already been the victim and now its time for Hotmail.

Microsoft Corp said on Monday 4th October that passwords belonging to some users of its Hotmail email service were exposed on an Internet site, but had since been taken down.



The company did not say how many users were affected, but some reports suggested that passwords to more than 10,000 accounts were exposed.

Strange is that Microsoft dint reveal the names of customers and said they are on the path to search the same.


I request all the readers to reach my 15th august post for secure your PC locally and on network ( Internet /Intranet)


Imahe Source : http://www.mxmcreation.com/images/internet-security/hacking-ym.gif

Thursday, October 1, 2009

BOSE..!! Sound ALoud

Strange but this is my first post on BOSE. Until by Higher secondary i was not very aware of this company and during my engineering life,when heard people speaking about it;It was so exciting.From that day onwards,i had a dream to see bose systems(but till date have just got satisfied with pics/videos) Lol..!!

DO LET ME KNOW IF ANY OF MY BLOG FRIENDS HAVE ONE..!! HE HE



The SoundDock 10 System is "Made for iPod" and "Works with iPhone" certified, and is compatible with any clickwheel iPod or iPod Touch, the iPhone 3GS, 3G and original iPhone model. Measuring approximately 9" (22.9 cms) high, 17" (43.2 cms) wide and 10" (25.4cms) deep, it incorporates new and existing Bose technologies, including a new version of Bose proprietary waveguide technology; debuting for the first time and developed specifically for the Sound Dock 10 system.



Together, the new waveguide and custom Bose woofer produce very deep low notes, without enlarging the enclosure or requiring a separate sub woofer. They are connected by a proprietary multi-purpose metal cap that met a required combination of benefits: it seals the waveguide and woofer, provides magnetic shielding, directs air through the enclosure, and withstands the high internal pressure created by the system when played.

SoundDock 10 digital music system is available in all Bose outlets pan-India from next month and its price is fixed at Rs 40,388. The optical bluetooth intercharge dock will be available at Rs 8,888.