Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

USB Security Utilities 1.0 is a utility which controls and protects USB drives such as pendrive, removable hard disk etc. It has a strong scanning engine which helps to analyze the memory or a folder. It is small in size and portable and can be installed in any portable device. It will also detects dangerous files and draw backs as well as handling various functions in one single window.

USB Security Utilities

 USB Security Utilities 1.0 Features

  • Small in size and portable
  • Can be installed in various portable device
  • Supports Strong Scanning Engine
  • Detects dangerous files
  • Can view device information
  • Multilanguage interface
  • Simple to use
  • Strong detection ability
  • Prevents infection of device
Download USB Security Utilities 1.0 Here.



Research by Stanford University to investigate the privacy of the "private browsing" feature of many Web browsers suggests that the tools aren't all that private after all, and that many kinds of information can be leaked by browsers when using the mode. The paper is due to be presented next week at the USENIX security conference.


"InPrivate Browsing" in Internet Explorer, "Incognito mode" in Chrome, and "Private Browsing" in Firefox and Safari all strive to do the same two things: make it impossible for users of the same computer to figure out which sites the browser has been used to visit, and make it impossible for sites to know whether or not a particular user has previously visited them.

To keep browsing private from other users of the same machine, browsers must discard (or avoid creating) any history entries, cached items, cookies, and so on. To prevent sites from being able to track visitors, the browsers must ensure that they don't send any cookies or other identifiable information from non-private sessions when in private mode.

The researchers found that the browsers' protections were imperfect. Browsers did not properly isolate their private sessions from non-private ones, with the result that suitably crafted sites could trace visitors between private and non-private sessions. Sites could also leave persistent indications that they had been visited, allowing visits to be detected by local users.

The big problem: add-ons

The problem got worse when extensions and plugins were considered. All four browsers tested enabled plugins in private mode, and these plugins can themselves store data that allows both kinds of privacy to be defeated.

One example of such a plugin used to be Adobe Flash; Flash has its own cookie system, and it used to be the case that Flash's cookies did not respect the privacy mode of the browser. Cookies set in private mode persisted, and cookies set in public mode were readable from private mode. Fortunately, Flash has since been fixed, but any plugin could contain similar errors.

Internet Explorer and Chrome both disable browser extensions by default in their private mode; Firefox, however, does not, and this provides yet another avenue by which private information can be leaked.

As part of their research, the team also collected information on how often people use private modes. Though Microsoft advertises InPrivate Browsing as a way for people to buy gifts online without any risk that the recipient will find out, the most common use of private browsing was (shockingly) to explore the Internet's seedy underbelly, keeping prurient interests, rather than birthday presents, private. Even this use was relatively rare; only 8 percent of people used private browsing for their online sexual entertainment, with 6 percent using it for gift shopping and general Web browsing.

The use of private browsing also varied wildly between browsers. Internet Explorer users barely bothered—just 2 percent of them use it, even for X-rated sites—whereas some 14 percent of Safari users prefer to keep their dirty/gift-buying habits to themselves.

Simnet RegDefrag is yet another tool to defragment your registry. It quickly scans your registry and provides you with an overview that shows which parts of the registry are defragmented and to what extend. The program will create a System Restore point before it starts the defrag process, so you can undo the changes if you run into problems. By using Simnet Registry Defrag periodically, you improve your system’s performance, prevent registry corruption, compact and optimize windows registry.

Simnet Registry Defrag, Defram Optimize PC, Registry, Freeware, Download


Features:

* Automatic system restore points for safety.
* Automatically product update.
* Smart and easy-to-use interface.
* Minimal installation, low memory and cpu usage.

Download Simnet Registry Defrag

CCleaner Enhancer Makes CCleaner Even Better, Now Cleans 270 New Apps Windows only: CCleaner Enhancer updates the popular system cleaning utility with support for cleaning up after 270 more applications, so you can keep your system even more crap free.

Once you've downloaded and started the utility, your CCleaner installation will be updated with support for the extra applications—you'll be prompted to select the folder to install the rules in if you're using a portable version. You'll find the new rules on the Applications tab in CCleaner—readers should note that you won't actually see 270 new rules in the list, since you'll only see rules that actually apply to your system and installed applications.

CCleaner Enhancer is a free download for Windows only. If you're new to CCleaner, make sure to check out how to run CCleaner on a schedule to keep your PC crap-free automatically, or create a shortcut to run CCleaner silently.

Update: Looks like the web site died under the weight of Lifehacker's readers. Here's a mirror copy of the zipped download file.

Five Easy Steps to Create Super Strong Passwords

Posted by Junaid August 6, 2010

Secure your passwords safelyPasswords are your first and last line of defense. Most people do not seem to understand the importance of this tool. It’s only when their account is hacked, password is stolen or some security is compromised with, that they bother to exercise due care in dealing with passwords. Creating an ultra-strong password and not sharing it with world is all it takes to be safe on the web.





Here’s a guide that will help you create an easy-to-remember but strong password.

 Essentials of a good password

  1. Password should at least be 8-10 characters long.
  2. Passwords should be a combination of numbers and letters.
  3. Letters should be both capital and small.
  4. At least one symbol or special character should be present.

Steps to create a strong password




  • Step 1. Select A Sentence: First step is to select an 8-10 words sentence. The important thing to keep in mind here is that the sentence should not be obvious or guessable. Any random sentence is good enough. Do not take guessable and/or short sentences like “I first name is XYZ“, etc. For the purpose of explaining, we will take the first line of this post as the sentence.
    “Passwords are your first and last line of defence”.




  • Step 2. Trimming the words into characters: Reduce the words to their first letters. For example, “Passwords” can be reduced to “p“. Also, words like “are” can be changed to “r“, So our sentence gets reduced in the following manner:
    Passwords [p] are [r] your [y] first [f] and[a] last[l] line[l] of[o] defence[d]

    Now, the password looks like this: pryfallod
     



  • Step 3. Insert Numbers: As said before, a good password has both, numbers & alphabets. So to get numbers, we can do two things. Firstly, the word in Step 1 can be represented by numbers. In our example, “first” in the sentence can be represented by “1” instead of “f“. Secondly, letters in Step 2 can be converted into numbers which look similar. In the present case, the second last letter “o” can be changed to “0[zero]. Similarly you can substitute ” l” for “1“.
    After this step, our password turns into: pry1all0d




  • Step 4. Capital & Small Cap Letters: Some of the letters in the password have to be capitalized. Now we arrive at the question, which ones? The first and last letter can be selected. Or, perhaps, those letters can be selected which are more prominent or more important. In our case, “passwords” and “defence” happen to be the most prominent words in the sentence. These words need not be at the end or start of the sentence.
    Now our password looks like: Pry1all0D
     



  • Step 5. Special Characters or Symbols. Symbols lend and extra level of security to the password and make it nearly impossible to crack. One can randomly add a special character to the password or follow the same method that one did in Step 3 with numbers.
    For instance, “l” can be replaced with “!” or “a” can be replaced with “@“. Or randomly substitute letters with symbols like changing “y” with “$“.



    Final password: Pry1al!!d

    key chain accessNow, this password is really difficult to crack. Looking at it, one may think that it would be really hard to memorize such a password. However, it isn’t that hard to remember it. In fact, by the time I complete writing the article, I myself have memorized the password. Moreover, even if you forget the password, you’ll always have the original sentence to help you recall the password.

    Now that you have a good password, here are a couple of things you should take care of;

    • You should never share password with somebody else, not even your best buddy or spouse.
    • You should never write down your password anywhere, neither on a paper nor in notepad or document file.
    Often, the best passwords lose their importance if any of the two tips above isn’t followed.

    Take care and secure yourself.

Change WordPress login page URL

Posted by Junaid August 4, 2010


Change WordPress login page URL
Wordpress Login
As you might know, the default login page in WordPress is  domain/wp-login.php.  Almost every other person in the world knows that it is the login page of a WordPress blog. So if someone gets yourpassword, it is easy for them to login to your WordPress dashboard and change the default password.  Trial & error and  brute force attacks by bots on a particular page would also lead to password theft. Stealth Login is a WordPress plugin that can be used to change WordPress login URL to custom URL and prevent such incidents.


Stealth Login is a WordPress plugin :

Stealth Login Settings
Stealth Login Settings
Stealth Login WordPress plugin options:

Download the plugin here, upload to the  WordPress plugin directory and activate. As you can see from the screenshot, there is a simple option to customize WordPress login slug. First, turn the plugin ON and enter the required login URL slug in the login slug box. Now enable stealth mode and save changes.  Plugin will start working from the next login.


A Keylogger is basically a spy ware, it records all your keystrokes.

Here is how a keylogger 

works

  • By recording each keystroke and immediately dispatching it to remote listener over internet
  • By collecting keystrokes data in a temporary file and then uploading it via internet
  • The collected keystrokes are never sent via internet instead they are collected in a temporary file and then if someone has access to your system either physical or remote they collect this data manually.
  • Finally the hardware keyloggers: these are actually hardware devices that include a little flash memory to record all your keystrokes,and then the person collects this data manually

So why do I need a Anti Keylogger when I have an 

Antivirus?

Well I agree that most anti viruses offer or at least claim to offer security against keyloggers,but here comes the interesting part why not test your anti-virus below is a link to a small software that will check whether you are secure or not. Run various tests in it and then you will see how easily it records your keystrokes and desktop screen-shots.
bit.ly/94QGxB

So i hope now you know why you need a anti keylogger.
It’ also available as a firefox addon. https://addons.mozilla.org/en-US/firefox/addon/3383/
For more info visit their website : http://www.qfxsoftware.com


Working of a Proxy Server
Working of a Proxy Server
The word Proxy is derived from a Latin word proximus which means “close”.A proxy is actually a server which helps us maintaining our privacy on the Internet. It is just like a wall between you and the Internet. When you use a proxy, the webpage on the other side won’t be able to see you, webpage interacts with the proxy and proxy in return shows us the webpage. In this way a proxy server works. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.
For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server.


  • Hiding machine or other servers from public. It provides security.



  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.



  • To open blocked sites in college schools and some times in offices.



  • To bypass security/ parental controls.



  • To protect your real identity on internet.


  • A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.A proxy server can be placed in the user’s local computer or at various points between the user and the destination servers on the Internet.
    A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.

    Human is the most weakest part of the Information Security chain. Psychologists have identified many benefits people receive when they help others. Helping can make us feel empowered. It can get us out of a bad mood. It can make us feel good about ourselves. Hackers find many ways of taking advantage of our inclination to be helpful.
    Click Image To Enlarge
    Because Hackers often target people who don’t know the value of the information they are giving away, the help may be seen as carrying little cost to the helper. Most of Humans tend to explain thier behaviour and of others, while doing this we give away alot of information about us.
    Security is too often merely an illusion, an illusion sometimes made even worse when gullibility, naivete, or ignorance come into play. The world’s most respected scientist of the twentieth century, Albert Einstein, is quoted as saying, “Only two things are infinite, the universe and human stupidity, and I’m not sure about the former.” In the end, social engineering attacks can succeed when people are stupid or, more commonly, simply ignorant about good security practices.
    With the same attitude as our security-conscious homeowner, many information technology (IT) professionals hold to the misconception that they’ve made their companies largely immune to attack because they’ve deployed standard security products – firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards.
    Anyone who thinks that security products alone offer true security is settling for. the illusion of security. It’s a case of living in a world of fantasy: They will inevitaby, later if not sooner, suffer a security incident

    Download UltraSurf 9.97 Free

    Posted by Junaid August 2, 2010

     UltraSurf is a small application which protects your Internet privacy withanonymous surfing and browsing -- hide IP addresses and locations, clean browsing history, cookies & more.UltraSurf is a free software which enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. Users in countries without internet censorship also use it to protect their internet privacy and security.


    With UltraSurf started, you can use web browsers (like IE, Firefox) the same as before, but all are under UltraSurf's protection now.UltraSurf 9.97  is one of the best software to surf internet.



     




    Facts of UltraSurf:

    * Service provided for 6 years
    * Millions of users
    * Users from over 150 countries
    * Daily hits over 300 million
    * Daily traffic over 5,000 GB

    Features:

    * No installation required
    * Easy to use
    * Deletes all browsing traces automatically  

    Emsisoft Anti-Malware 5.0.0.67

    Posted by Junaid August 1, 2010

    Emsisoft Anti-Malware monitors all active programs in real time for dangerous behavior (Behavior Blocking) and can detect new unknown Trojans, Worms, Viruses and other damaging programs (Zero-Day dangers) without daily updates. The signature-based security (Emsisoft and Ikarus double engine) ensures a very high recognition rate of known Malware such as Trojans, Worms and Viruses.

    Emsisoft Anti-Malware provides reliable protection from:
    • Viruses, worms, bots.
    • Trojans, backdoors, keyloggers, rootkits.
    • Spyware, Adware, TrackingCookies.

    Download Here

    Subscribe To Guide 29

    Enter your email address:

    Delivered by FeedBurner

    Join On Social Networks
    • Subscribe to RSS feed
    • Become Fan On FB
    • Follow Updates on Twitter
    • Be A Friend on Digg
    • Follow On SU

    Become A Fan

    Tags