Featured Post Today
print this page
Latest Post

Anti-cybercrime bill approved by Senate (Philippines)

A MEASURE seeking to establish safeguards in using the Internet has been passed at the Senate.

Voting 13-1, legislators approved on third and final reading Senate Bill (SB) 2796, which penalizes cybercrimes such as hacking and spamming.

Violators will be fined at least P200,000 or an amount commensurate to the damage caused. They can also be jailed for six years and a day up to 12 years.

Cyber-squatters -- those creating online content “in bad faith to profit, mislead, destroy reputation and deprive others from registering the same” -- also face similar penalties.

People who engage in cybersex “for favor or consideration”, meanwhile, face fines of up to P1 million along with jail terms, while child pornographers face penalties set under the Anti-Child Pornography law.

Those advertising and selling products or services via the Internet without the recipient’s consent face fines of P50,000-250,000 along with a jail term of up to six months.

SB 2796 calls for the creating of the Office of Cybercrime under the Department of Justice.

A National Cybersecurity Coordinating Council will also be established under the Office of the President, to be aided by the National Cybersecurity Center that will be established under the Science and Technology department.

The measure’s enactment into law is expected to take some time as a counterpart bill remains pending at the comittee level in the House of Representatives. -- Antonio Siegfrid O. Alegado

Source:http://www.bworldonline.com/content.php?section=TopStory&title=Anti-cybercrime-bill-approved-by-Senate&id=45914 
0 comments
Posted by: Jaime
blognizend, Updated at: 7:23 AM

Tetris Battle Cheats, Hacks and Bots for Facebook

Requirements:
Google Chrome
Fiddler2
Complete and Init hack files
Tetris Battle account

Instructions:
1. Download and extract the file above. Install Fiddler2 then restart your browser;
2. Run Fiddler2 then go to Autoresponder tab;
3. Check "Enable automatic responses" and "unmatched requests passthrough";
4. Drag the Complete and Init hack files to the given space on the Autoresponder tab. Clear Google Chrome's cache right after dragging the Tetris Battle hack files
 5. Start Google Chrome, log-in your Tetris Battle account and play. Fully Tuned and Infinite Armor are automatically enabled;
6. Go to the energy bag and click "Collect Bonus" to activate Infinite Energy.

Proof that this Tetris Battle cheat is working 





 Files to download:
Fiddler 2
hack files 1 - God Hack
hack files 2 - 1 Game KO Cheat Hack

Link2:
Fiddler 2
hack files 1 - God Hack
hack files 2 - 1 Game KO Cheat Hack

Update New Hack File
Tetris Battle Hack 
Link 2





13 comments
Posted by: Jaime
blognizend, Updated at: 6:59 AM

How To Enable Stereo Mix in Windows7 to record Audio

Ever need to record something on your computer exactly as it comes out of your speakers?  Enabling “Stereo Mix” will let you do exactly that, and here’s how to do it.

Nowadays, most sound cards have the ability to record whatever is being output.  The only hang-up is accessing that recording channel, which can be done rather easily.
Enable Stereo Mix

Go down to the audio icon in your system tray, right-click it, and go to “Recording Devices” to open up the proper settings pane.




In the pane, right-click on a blank area, and make sure both “View Disabled Devices” and “View Disconnected Devices” options are checked.  You should see a “Stereo Mix” option appear.

Right-click on “Stereo Mix” and click “Enable” to be able to use it.

 I Still Don’t See It…

In some cases, your audio chipset drivers aren’t helping your cause.  Most likely, this is because they’re outdated.  In other instances, however, it’s because the newest Windows 7 drivers don’t support this feature.  This was the case on my Asus Eee PC (a 1000HE), but I got around the issue by downloading and installing the older Windows XP/Vista drivers for my audio chipset.  As always, before changing your drivers, make sure create a system restore point in case things don’t go as planned.

How Do I Use This?

With “Stereo Mix” enabled, you can open up your favorite recording program and select that instead of your microphone before you record.  If you don’t see the option, or your program doesn’t give you the ability to change the recording device, you can disable or unplug your microphone and make “Stereo Mix” the default recording device.



This works well for when you want to capture audio for a screen-sharing session, or record audio from streaming sources – such as live web-casts – that don’t necessarily allow you to download content immediately.  In order to do that, you’d open up your audio-recording application of choice (like Audacity), be sure other recording devices are muted or disabled, and click record.  Be sure to check out their article, to learn how to use Audacity.












0 comments
Posted by: Jaime
blognizend, Updated at: 4:40 AM

New Facebook Timeline



On January 31 all facebook account will switch to Timeline



Facebook yesterday officially announced that over the "next few weeks" it will roll out Timeline to all users. This means Timeline, the reverse-chronological display of a user's history on Facebook and other life events, which replaces and combines a user's Facebook Wall and Profile, will become non-optional. No specific date was given, and the language used ("roll out") suggests that the change won't occur on one single date for all users, but that batches of users will be transitioned on different dates.
Before Timeline strikes your Facebook account, there are a number of key things to know about the feature.
Basically, until recently, users were able to opt-in to Timeline; now they will be automatically switched over. When you get Timeline, however, you'll have a seven-day preview period, during which you can delete the content that is on your profile and hide what you don't want displayed."
From the time you receive notification that you'll be getting Timeline, whether you want it or not, you have seven days—or until you hit "publish," whichever comes first—to check it out privately, before anyone else can see it. You can also jump the queue and turn Timeline on now (see "How to Get Timeline"), but do note that once you turn it on, you can't turn it off.
I turned on Timeline early, back in September, to learn as much as I could about it and put together some answers and tips for people when Timeline became non-optional. Here's a summary of what I've learned. You can also take a tour of Timeline in the slideshow, in case you want to get a closer look at some of the editing option and other buttons without turning it on.
Q: What is Facebook Timeline?
A: Timeline is a section of a Facebook user's account that replaces the Profile and Wall pages, and merges them together. It shows the story of your life, as you choose to tell it or as Facebook has recorded it, in a visual, scrolling, reverse-chronologically ordered timeline. It's a cross between visual blog and online scrapbook. Fun fact: Facebook Timeline was accidentally released very briefly to the public back in December 2010 when it was called "Facebook Memories," but it was promptly removed.
Q: How can I get Facebook Timeline?
A: Go to the Facebook Timeline announcement page and look at the bottom of the page for a green button that says "Get Timeline." If you press this button, there is no undo! And if you don't take this step, Facebook will automatically turn on your Timeline within the next few weeks.
Q: What appears on my Timeline?
A: Status updates, photos, friendships made, as well as job history, marital status changes, and other information that you've recorded in your profile.
Q: Is the Timeline replacing my Facebook wall?
A: Yes. Timeline replaces your Profile and Wall. But it does not change your news feed page. When you log into Facebook and go to Facebook.com, that feed page of Recent Stories will still be the same. But, when you or visitors go to your unique Facebook URL, such as facebook.com/jillduffyNYC, they'll be able to see your Timeline instead of your old profile information and wall.
How to Edit Facebook Timeline
Q: I'm worry about privacy! Who can see my Facebook Timeline?
Q: How do I edit what appears on Timeline and who can see it?
Every Timeline entry has two icons for editing: a pen icon in the upper right corner where you can hide or delete the object, and a cog or silhouette (depending on the type of object) found next to the time or date of the activity, that lets you adjust who can see the activity. See the image above for an example. Additional images in the slideshow illustrate these two editing principles in more detail.
Q: Can I restrict which people who can see certain pieces of information, photos, and other details of my Timeline?
A: Yes! In the same way that you can manage who can see a status update or photo, you can limit who sees all the entries of your Timeline. Each entry has a drop-down menu next to it that lets you filter who can see the item.
Q: Can I delete status updates, images, and other content from my Timeline?
A: Yes! Deleting is an option. Just click that pen icon to edit, and you'll see "delete."
Q: When will I be forced to have Timeline?
A: If you don't have Timeline yet, you will be forced to have it "in the next few weeks," according to Facebook. The company has not given any more specific information. And from the day you get Timeline, you have seven days to see it privately before other users can see it.
Q: It sounds like you've used Facebook Timeline a lot. How is it?
A: I must admit that I liked playing with it a lot more than I liked filling in standard profile information. I set up Timeline on a Facebook account that doesn't have too much data in it, so it didn't feel overwhelming, but I could see how an active Facebook user would feel totally bowled over the first time he or she opened the Timeline. If you have thousands of status updates and photos on Facebook, you could be in for a very busy seven days between the time you are forced to have Timeline and the day it goes live for all to see.
You will want to use those seven days to tease your Timeline into shape, adding the permissions you want, deleting or marking private images you don't want everyone to see, and so forth.
But remember, by and large, this is a one-time setup process. After the one-time setup, new Timeline entries will come from your Facebook activity, and you'll be adding permissions and making other adjustments as you go. In other words, you have the tools to edit who can see what every time you put something on Facebook, and those permissions carry over onto Timeline. But, in the earlier days of Facebook, no one had those permission settings, so all old materials is public to all by default.
Other parts of Timeline that I like: that you can add life events, either current or back-dated. Some of the life events are pre-set in Facebook, like getting a new job and buying a home, but you can also create a custom life event or milestone.
Back-dating entries is great for photos. Say you post an old photo from 10 years ago. You can add the year 2002 so it shows up on Timeline with some sense of chronology and context.
You can back-date entries on your timeline with a nice calendar that lets you quickly jump to a year in the past, and optionally, you can add a month. If you want to add a memory from your childhood or back-date photos from your past, it's pretty easy to do so.
Q: What are some of the cons to Facebook Timeline?
A: The biggest cons: It's mandatory, or non-optional. You have only seven days from the date you're forced to have Timeline to when it is visible to all to review what's on it.
A minor con is that the dimensions for display images are unconventional, and I found that I didn't like how most of my images looked when I uploaded them without manipulating their size and dimensions. You can drag an image around the viewer space, but you can't crop or resize from directly within Facebook. (I'm taking bets now on how soon Facebook will build an image editor, or acquire a company that already makes one.)
Q: What is Timeline Apps integration?
Timeline Apps integration lets you post to Facebook Timeline the activities that you do in other apps. There are about 80 apps supported right now. For example, if you allow the Web site Pinterest permission to post to your Timeline (and yes, you have to turn it on; it's off by default), Pinterest will create a little box on your Timeline where it shows your Pinterest activity. Another example: You can set up the Wall Street Journal online to post to Timeline when you have read an article. Or you have have Spotify post to Timeline when you listen to a song. It's basically the same as apps activity in the Facebook Ticker, but on your Timeline.
For more, see Facebook Timeline Apps: Should You Use Them?

Source:http://www.pcmag.com/article2/0,2817,2393464,00.asp
4 comments
Posted by: Jaime
blognizend, Updated at: 1:37 AM

How to Disabled Autorun

 Removable USB/thumb drives use the Autorun feature to load files when the drives are plugged into the USB port. Malware exploits the Autorun feature to spread from thumb drive to PC. Disable the autorun feature to prevent malware from spreading.
1.The easiest and most effective means to truly disable autorun can be done via this simple autorun registry hack:

REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"

To use this method, Open Notepad and copy/paste the following into a text file:

REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"


2.Save the file as something.reg. (You have to be sure to change the "Save File as Type" to "All Files" before saving, or Windows will try to save it as a .txt even if you typed in .reg.

Locate the file you just saved and double-click the file to run it. You will receive a prompt asking if you want to add the data to the registry. Click yes to allow the modification.


0 comments
Posted by: Jaime
blognizend, Updated at: 1:42 AM

How to Remove Sality Virus

 Aliases

  • W32/Sality.B.gen!Eldorado (Command)
  • W32/Sality.AT (Avira)
  • Win32/Sality.AA (CA)
  • Win32.Sector.21 (Dr.Web)
  • Win32/Sality.NBA (ESET)
  • Trojan.Win32.Vilsel.vyy (Kaspersky)
  • W32/Sality.gen.e (McAfee)
  • W32/Sality.BD (Norman)
  • W32/Spamta.QO.worm (Panda)
  • Win32.KUKU.kj (Rising AV)
  • Troj/SalLoad-A (Sophos)
  • PE_SALITY.BA (Trend Micro)

Alert Level (?)
Severe 
 
Description:
Sality is a family of file infecting viruses that spread by infecting exe and scr files. The virus also includes an autorun worm component that allows it to spread to any removable or discoverable drive. In addition, Sality includes a downloader trojan component that installs additional malware via the Web.
Symptom:
As with many other malware, Sality disables antivirus software and prevents access to certain antivirus and security websites. Sality can also prevent booting into Safe Mode and may delete security-related files found on infected systems. To spread via the autorun component, Sality generally drops a .cmd, .pif, and .exe to the root of discoverable drives, along with an autorun.inf file which contains instructions to load the dropped file(s) when the drive is accessed. The Sality virus joins infected machines to its own P2P network. Updates to the malware are fed via decentralized lists of HTTP URLs.
Remediation:
System changes
The following system changes may indicate the presence of this malware:
  • Sudden termination of certain security-related applications, processes or services
  • Inability to run Windows Registry Editor
  • The presence of the following driver:
    %SystemRoot%\system32\drivers\amsint32.sys
  • Failure for certain security-related applications to run due to deletion of installed components such as files with the following extensions:
    • .AVC
    • .VDB
 
Installation
When run, Virus:Win32/Sality.AT drops a device driver as the following:
 
%SystemRoot%\system32\drivers\amsint32.sys - Trojan:WinNT/Sality
 
The virus creates and starts a system service named "amsint32" to run the dropped driver component. Virus:Win32/Sality.AT communicates with the driver component to restore SSDT.
Spreads via…
File infection
Virus:Win32/Sality.AT injects code into all running processes to load and run the virus and infect Windows executable files with extension ".EXE" or ".SCR". The virus seeks other target files by reading file names found in the following registry subkeys:
 
HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
 
Virus:Win32/Sality.AT will not infect files protected by SFC or if the file name starts with one of the following strings:

_AVPM.
A2GUARD.
AAVSHIELD.
AVAST
ADVCHK.
AHNSD.
AIRDEFENSE
ALERTSVC
ALOGSERV
ALSVC.
AMON.
ANTI-TROJAN.
AVZ.
ANTIVIR
APVXDWIN.
ARMOR2NET.
ASHAVAST.
ASHDISP.
ASHENHCD.
ASHMAISV.
ASHPOPWZ.
ASHSERV.
ASHSIMPL.
ASHSKPCK.
ASHWEBSV.
ASWUPDSV.
ATCON.
ATUPDATER.
ATWATCH.
AVCIMAN.
AVCONSOL.
AVENGINE.
AVESVC.
AVGAMSVR.
AVGCC.
AVGCC32.
AVGCTRL.
AVGEMC.
AVGFWSRV.
AVGNT.
AVGNTDD
AVGNTMGR
AVGSERV.
AVGUARD.
AVGUPSVC.
AVINITNT.
AVKSERV.
AVKSERVICE.
AVKWCTL.
AVP.
AVP32.
AVPCC.
AVPM.
AVAST
AVSERVER.
AVSCHED32.
AVSYNMGR.
AVWUPD32.
AVWUPSRV.
AVXMONITOR9X.
AVXMONITORNT.
AVXQUAR.
BDMCON.
BDNEWS.
BDSUBMIT.
BDSWITCH.
BLACKD.
BLACKICE.
CAFIX.
CCAPP.
CCEVTMGR.
CCPROXY.
CCSETMGR.
CFIAUDIT.
CLAMTRAY.
CLAMWIN.
CLAW95.
CUREIT
DEFWATCH.
DRVIRUS.
DRWADINS.
DRWEB32W.
DRWEBSCD.
DRWEBUPW.
DWEBLLIO
DWEBIO
ESCANH95.
ESCANHNT.
EWIDOCTRL.
EZANTIVIRUSREGISTRATIONCHECK.
F-AGNT95.
FAMEH32.
FILEMON
FIRESVC.
FIRETRAY.
FIREWALL.
FPAVUPDM.
FRESHCLAM.
EKRN.
FSAV32.
FSAVGUI.
FSBWSYS.
F-SCHED.
FSDFWD.
FSGK32.
FSGK32ST.
FSGUIEXE.
FSMA32.
FSMB32.
FSPEX.
FSSM32.
F-STOPW.
GCASDTSERV.
GCASSERV.
GIANTANTISPYWAREMAIN.
GIANTANTISPYWAREUPDATER.
GUARDGUI.
GUARDNT.
HREGMON.
HRRES.
HSOCKPE.
HUPDATE.
IAMAPP.
IAMSERV.
ICLOAD95.
ICLOADNT.
ICMON.
ICSSUPPNT.
ICSUPP95.
ICSUPPNT.
IFACE.
INETUPD.
INOCIT.
INORPC.
INORT.
INOTASK.
INOUPTNG.
IOMON98.
ISAFE.
ISATRAY.
ISRV95.
ISSVC.
KAV.
KAVMM.
KAVPF.
KAVPFW.
KAVSTART.
KAVSVC.
KAVSVCUI.
KMAILMON.
KPFWSVC.
MCAGENT.
MCMNHDLR.
MCREGWIZ.
MCUPDATE.
MCVSSHLD.
MINILOG.
MYAGTSVC.
MYAGTTRY.
NAVAPSVC.
NAVAPW32.
NAVLU32.
NAVW32.
NEOWATCHLOG.
NEOWATCHTRAY.
NISSERV
NISUM.
NMAIN.
NOD32
NORMIST.
NOTSTART.
NPAVTRAY.
NPFMNTOR.
NPFMSG.
NPROTECT.
NSCHED32.
NSMDTR.
NSSSERV.
NSSTRAY.
NTRTSCAN.
NTOS.
NTXCONFIG.
NUPGRADE.
NVCOD.
NVCTE.
NVCUT.
NWSERVICE.
OFCPFWSVC.
OUTPOST
OP_MON.
PAVFIRES.
PAVFNSVR.
PAVKRE.
PAVPROT.
PAVPROXY.
PAVPRSRV.
PAVSRV51.
PAVSS.
PCCGUIDE.
PCCIOMON.
PCCNTMON.
PCCPFW.
PCCTLCOM.
PCTAV.
PERSFW.
PERTSK.
PERVAC.
PNMSRV.
POP3TRAP.
POPROXY.
PREVSRV.
PSIMSVC.
QHONLINE.
QHONSVC.
QHWSCSVC.
RAVMON.
RAVTIMER.
AVGNT
AVCENTER.
RFWMAIN.
RTVSCAN.
RTVSCN95.
RULAUNCH.
SALITY
SAVADMINSERVICE.
SAVMAIN.
SAVPROGRESS.
SAVSCAN.
SCANNINGPROCESS.
SDRA64.
SDHELP.
SHSTAT.
SITECLI.
SPBBCSVC.
SPHINX.
SPIDERCPL.
SPIDERML.
SPIDERNT.
SPIDERUI.
SPYBOTSD.
SPYXX.
SS3EDIT.
STOPSIGNAV.
SWAGENT.
SWDOCTOR.
SWNETSUP.
SYMLCSVC.
SYMPROXYSVC.
SYMSPORT.
SYMWSC.
SYNMGR.
TAUMON.
TBMON.
AVAST
TMLISTEN.
TMNTSRV.
TMPFW.
TMPROXY.
TNBUTIL.
TRJSCAN.
UP2DATE.
VBA32ECM.
VBA32IFS.
VBA32LDR.
VBA32PP3.
VBSNTW.
VCRMON.
VPTRAY.
VRFWSVC.
VRMONNT.
VRMONSVC.
VRRW32.
VSECOMR.
VSHWIN32.
VSMON.
VSSERV.
VSSTAT.
WATCHDOG.
WEBSCANX.
WEBTRAP.
WGFE95.
WINAW32.
WINROUTE.
WINSS.
WINSSNOTIFY.
WRCTRL.
XCOMMSVR.
ZAUINST
ZLCLIENT
ZONEALARM
 
Removable and remote drives
Virus:Win32/Sality.AT attempts to copy one of following files to the Windows temporary files folder (e.g. %TEMP%) and infects the copied file:
 
%SystemRoot%\system32\NOTEPAD.EXE
%SystemRoot%\system32\WINMINE.EXE
 
The virus copies the infected file to the root of all remote and removable drives as one of the following:
 
\<random>.pif
\<random>.exe
\<random>.cmd
 
The virus then writes an Autorun configuration file named "autorun.inf" pointing to the virus copy. When the drive is accessed from a computer supporting the Autorun feature, the virus is launched automatically.
Payload
Prevents booting Windows in safe mode
Win32/Sality.AT recursviely deletes all registry values and data under the following registry subkeys preventing the user from starting Windows in safe mode:

HKLM\System\CurrentControlSet\Control\SafeBoot
HKCU\System\CurrentControlSet\Control\SafeBoot
 
Disables security monitoring software
Win32/Sality.AT reads the system service descriptor table (SSDT) directly from the NT kernel ("ntoskrnl.exe") and passes the original SSDT to a buffer created by the driver component (Trojan:WinNT/Sality). System API calls to the SSDT are redirected to the clean version stored in the driver component. The behavior may block some HIPS or antivirus on-access detection methods that rely on SSDT hooks.
 
 
Deletes security-related files
This virus deletes security data files including security software detection database files or signatures that have the following file extensions found in all drives and network shares:
  • .AVC
  • .VDB
 
Terminates security-related services 
Win32/Sality attempts to stop and delete the following security-related services:
 
Agnitum Client Security Service
ALG
Amon monitor
aswUpdSv
aswMon2
aswRdr
aswSP
aswTdi
aswFsBlk
acssrv
AV Engine
avast! iAVS4 Control Service
avast! Antivirus
avast! Mail Scanner
avast! Web Scanner
avast! Asynchronous Virus Monitor
avast! Self Protection
AVG E-mail Scanner
Avira AntiVir Premium Guard
Avira AntiVir Premium WebGuard
Avira AntiVir Premium MailGuard
AVP
avp1
BackWeb Plug-in - 4476822
bdss
BGLiveSvc
BlackICE
CAISafe
ccEvtMgr
ccProxy
ccSetMgr
COMODO Firewall Pro Sandbox Driver
cmdGuard
cmdAgent
Eset Service
Eset HTTP Server
Eset Personal Firewall
F-Prot Antivirus Update Monitor
fsbwsys
FSDFWD
F-Secure Gatekeeper Handler Starter
FSMA
Google Online Services
InoRPC
InoRT
InoTask
ISSVC
KPF4
KLIF
LavasoftFirewall
LIVESRV
McAfeeFramework
McShield
McTaskManager
navapsvc
NOD32krn
NPFMntor
NSCService
Outpost Firewall main module
OutpostFirewall
PAVFIRES
PAVFNSVR
PavProt
PavPrSrv
PAVSRV
PcCtlCom
PersonalFirewal
PREVSRV
ProtoPort Firewall service
PSIMSVC
RapApp
SmcService
SNDSrvc
SPBBCSvc
SpIDer FS Monitor for Windows NT
SpIDer Guard File System Monitor
SPIDERNT
Symantec Core LC
Symantec Password Validation
Symantec AntiVirus Definition Watcher
SavRoam
Symantec AntiVirus
Tmntsrv
TmPfw
tmproxy
tcpsr
UmxAgent
UmxCfg
UmxLU
UmxPol
vsmon
VSSERV
WebrootDesktopFirewallDataService
WebrootFirewall
XCOMM
 
Terminates security-related processes
Win32/Sality attempts to terminate the following security-related processes:
 
_AVPM.
A2GUARD.
AAVSHIELD.
AVAST
ADVCHK.
AHNSD.
AIRDEFENSE
ALERTSVC
ALOGSERV
ALSVC.
AMON.
ANTI-TROJAN.
AVZ.
ANTIVIR
APVXDWIN.
ARMOR2NET.
ASHAVAST.
ASHDISP.
ASHENHCD.
ASHMAISV.
ASHPOPWZ.
ASHSERV.
ASHSIMPL.
ASHSKPCK.
ASHWEBSV.
ASWUPDSV.
ATCON.
ATUPDATER.
ATWATCH.
AVCIMAN.
AVCONSOL.
AVENGINE.
AVESVC.
AVGAMSVR.
AVGCC.
AVGCC32.
AVGCTRL.
AVGEMC.
AVGFWSRV.
AVGNT.
AVGNTDD
AVGNTMGR
AVGSERV.
AVGUARD.
AVGUPSVC.
AVINITNT.
AVKSERV.
AVKSERVICE.
AVKWCTL.
AVP.
AVP32.
AVPCC.
AVPM.
AVAST
AVSERVER.
AVSCHED32.
AVSYNMGR.
AVWUPD32.
AVWUPSRV.
AVXMONITOR9X.
AVXMONITORNT.
AVXQUAR.
BDMCON.
BDNEWS.
BDSUBMIT.
BDSWITCH.
BLACKD.
BLACKICE.
CAFIX.
CCAPP.
CCEVTMGR.
CCPROXY.
CCSETMGR.
CFIAUDIT.
CLAMTRAY.
CLAMWIN.
CLAW95.
CUREIT
DEFWATCH.
DRVIRUS.
DRWADINS.
DRWEB32W.
DRWEBSCD.
DRWEBUPW.
DWEBLLIO
DWEBIO
ESCANH95.
ESCANHNT.
EWIDOCTRL.
EZANTIVIRUSREGISTRATIONCHECK.
F-AGNT95.
FAMEH32.
FILEMON
FIRESVC.
FIRETRAY.
FIREWALL.
FPAVUPDM.
FRESHCLAM.
EKRN.
FSAV32.
FSAVGUI.
FSBWSYS.
F-SCHED.
FSDFWD.
FSGK32.
FSGK32ST.
FSGUIEXE.
FSMA32.
FSMB32.
FSPEX.
FSSM32.
F-STOPW.
GCASDTSERV.
GCASSERV.
GIANTANTISPYWAREMAIN.
GIANTANTISPYWAREUPDATER.
GUARDGUI.
GUARDNT.
HREGMON.
HRRES.
HSOCKPE.
HUPDATE.
IAMAPP.
IAMSERV.
ICLOAD95.
ICLOADNT.
ICMON.
ICSSUPPNT.
ICSUPP95.
ICSUPPNT.
IFACE.
INETUPD.
INOCIT.
INORPC.
INORT.
INOTASK.
INOUPTNG.
IOMON98.
ISAFE.
ISATRAY.
ISRV95.
ISSVC.
KAV.
KAVMM.
KAVPF.
KAVPFW.
KAVSTART.
KAVSVC.
KAVSVCUI.
KMAILMON.
KPFWSVC.
MCAGENT.
MCMNHDLR.
MCREGWIZ.
MCUPDATE.
MCVSSHLD.
MINILOG.
MYAGTSVC.
MYAGTTRY.
NAVAPSVC.
NAVAPW32.
NAVLU32.
NAVW32.
NEOWATCHLOG.
NEOWATCHTRAY.
NISSERV
NISUM.
NMAIN.
NOD32
NORMIST.
NOTSTART.
NPAVTRAY.
NPFMNTOR.
NPFMSG.
NPROTECT.
NSCHED32.
NSMDTR.
NSSSERV.
NSSTRAY.
NTRTSCAN.
NTOS.
NTXCONFIG.
NUPGRADE.
NVCOD.
NVCTE.
NVCUT.
NWSERVICE.
OFCPFWSVC.
OUTPOST
OP_MON.
PAVFIRES.
PAVFNSVR.
PAVKRE.
PAVPROT.
PAVPROXY.
PAVPRSRV.
PAVSRV51.
PAVSS.
PCCGUIDE.
PCCIOMON.
PCCNTMON.
PCCPFW.
PCCTLCOM.
PCTAV.
PERSFW.
PERTSK.
PERVAC.
PNMSRV.
POP3TRAP.
POPROXY.
PREVSRV.
PSIMSVC.
QHONLINE.
QHONSVC.
QHWSCSVC.
RAVMON.
RAVTIMER.
AVGNT
AVCENTER.
RFWMAIN.
RTVSCAN.
RTVSCN95.
RULAUNCH.
SALITY
SAVADMINSERVICE.
SAVMAIN.
SAVPROGRESS.
SAVSCAN.
SCANNINGPROCESS.
SDRA64.
SDHELP.
SHSTAT.
SITECLI.
SPBBCSVC.
SPHINX.
SPIDERCPL.
SPIDERML.
SPIDERNT.
SPIDERUI.
SPYBOTSD.
SPYXX.
SS3EDIT.
STOPSIGNAV.
SWAGENT.
SWDOCTOR.
SWNETSUP.
SYMLCSVC.
SYMPROXYSVC.
SYMSPORT.
SYMWSC.
SYNMGR.
TAUMON.
TBMON.
AVAST
TMLISTEN.
TMNTSRV.
TMPFW.
TMPROXY.
TNBUTIL.
TRJSCAN.
UP2DATE.
VBA32ECM.
VBA32IFS.
VBA32LDR.
VBA32PP3.
VBSNTW.
VCRMON.
VPTRAY.
VRFWSVC.
VRMONNT.
VRMONSVC.
VRRW32.
VSECOMR.
VSHWIN32.
VSMON.
VSSERV.
VSSTAT.
WATCHDOG.
WEBSCANX.
WEBTRAP.
WGFE95.
WINAW32.
WINROUTE.
WINSS.
WINSSNOTIFY.
WRCTRL.
XCOMMSVR.
ZAUINST
ZLCLIENT
ZONEALARM
 
Additionally, Virus:Win32/Sality.AT kills processes which have following modules loaded:

DWEBLLIO
DWEBIO
 
Modifies Windows settings
Virus:Win32/Sality.AT modifies the registry to disable Windows Registry Editor:

Sets value: "DisableRegistryTools"
With data: "1"
Under subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\system
 
The virus modifies the registry to prevent viewing files with hidden attributes.

Sets value: "Hidden"
With data: "2"
Under subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer

Lowers computer security
Virus:Win32/Sality.AT modifies the registry to bypass the Windows firewall.

Sets value: "<virus file name>:*:enabled:ipsec"
With data: "<virus file name>"
Under subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications\List
 
The virus modifies other registry data that lower the security of the infected computer. Virus:Win32/Sality.AT modifies the following registry data to change Windows Security Center and Windows Firewall settings.

Sets value: "AntiVirusOverride"
with data: "1"
Under subkey: HKLM\SOFTWARE\Microsoft\Security Center
Sets value: "AntiVirusOverride"
with data: "1"
Under subkey: HKLM\SOFTWARE\Microsoft\Security Center\Svc
Sets value: "AntiVirusDisableNotify"
with data: "1"
Under subkey: HKLM\SOFTWARE\Microsoft\Security Center\Svc
Sets value: "FirewallOverride"
with data: "1"
Under subkey: HKLM\SOFTWARE\Microsoft\Security Center\Svc
Sets value: "FirewallDisableNotify"
with data: "1"
Under subkey: HKLM\SOFTWARE\Microsoft\Security Center\Svc
Sets value "EnableFirewall"
with data: "0"
Under subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
 
Downloads arbitrary files
Virus:Win32/Sality.AT attempts to download files from remote servers to the local drive, then decrypts and executes the downloaded files. We have observed the virus to connect to the following servers:

www.klkjwre9fqwieluoi.info
kukutrustnet777888.info
klkjwre77638dfqwieuoi888.info
89.119.67.154
kukutrustnet777.info
kukutrustnet888.info
kukutrustnet987.info
 
At the time of this writing, retrieved files were identified as the following:
 
  •  
    Despite the fact the Microsoft strives to make Windows operating systems as secure as possible, malware threats might still breach the computer security and infect the PC. Depending on the type of malware, various tools can be used. One of them is Win32/Sality Remover, an application developed by AVG for eradicating a specific Windows virus.

    Win32/Sality.AM is a variant of polymorphic file infectors targetting Windows executable files featuring .SCR or .EXE extensions. Win32/Sality.AM can run a damaging payload deleting files with specific extensions while also killing security-related processes and services.

    The benefit of using such a utility over a dedicated security solution is that removal tools specialize in detecting and removing specific viruses that might not be included in the virus definitions of the existing antivirus.

    Win32/Sality Remover does not need to be installed onto the target computer as it runs out-of-the-box, simply by double-clicking its file. It automatically starts scanning the PC yet users can stop the process when needed. During this scan, one can view the total number of analyzed files, the infected ones, as well as the removed ones.

    If any of the scanned files cannot be accessed because it is used by the operating system or by another program, Win32/Sality Remover can schedule the scan and clean for the next OS restart, so that it is no longer interrupted by any disturbances.

    This software can be run from the command-line, and depending on the parameters, it can be used to scan and disinfect a certain file, an entire folder or a drive. Needless to say, it is best if this action is performed by an expert, familiarized with Windows commands.

    Although Win32/Sality Remover is efficient in detecting and removing Win32/Sality.AM variants, one should not rely exclusively on this application for ensuring PC security. A full-featured antivirus solution is essential for keeping the computer malware-free.
      
 You can Download Sality REMOVAL

4 comments
Posted by: Jaime
blognizend, Updated at: 1:31 AM

Ultrabook

From Wikipedia, the free encyclopedia


Asus UX21 ultrabook

An Ultrabook is a higher-end type of subnotebook defined by Intel.[1] Intel claims a trademark in the name Ultrabook.[2] Ultrabooks are designed to feature reduced size and weight and long battery life while retaining strong performance. They use low-power Intel CULV processors with integrated graphics, solid-state drives for fast loading times, and unibody chassis to fit larger batteries into smaller cases.[3] Because of their minimal size, the ability to have many ports (USB, HDMI, VGA, ethernet, etc) is limited.

By this marketing initiative and an associated $300 million fund, Intel hopes to influence the slumping PC market against rising competition from tablet computers, which are typically powered by competing ARM-based processors.[4]



Hardware requirements


Three phases of Ultrabooks are planned to align with the release of low voltage Sandy Bridge, Ivy Bridge, and Haswell processor models.

First phase (Q4 2011)


  • Thin – less than 21 mm (0.8 inch) thickness[5]
  • Lightweight – less than 1.4 kg (3.1 pounds)[6]
  • Long battery life – 5 to 8+ hours[7]
  • Mainstream pricing – around $1,000 USD [8]
  • May use flash-based SSDs[9]
  • Use CULV (17 W TDP) Intel Sandy Bridge mobile processors
    • Core i5-2467M (1.6 GHz)
    • Core i5-2557M (1.7 GHz)
    • Core i7-2637M (1.7 GHz)
    • Core i7-2677M (1.8 GHz)
  • Use Intel's graphics sub-system HD Graphics 3000

Second phase (Q2 2012)


  • Use CULV Intel Ivy Bridge mobile processors
  • Intel is targeting up to:
    • 30% increase in integrated graphics performance over Sandy Bridge
    • 20% increase in CPU performance over Sandy Bridge
  • USB 3.0, PCI Express 3.0

Larger Screen Sizes


Though not a "requirement" per se, more 14 and 15" screens can be expected later on into 2012. At a presentation at the Consumer Electronics Show, an Intel Manager stated that market analysis revealed that screen size motivated some of the reluctance to switch to 13" Ultrabooks. As a result, Intel is planning to ensure, through cooperation with manufacturers, a 14 or 15-inch screen on 50% of the 75 Ultrabooks that will likely come to market in 2012. [10] [11]

Third phase (2013)


  • Use CULV Intel Haswell mobile processors
  • New advanced power saving system – power consumption half of early 2011 chips[12]
  • Use 15 W TDP processor (multi-chip package, like Westmere)[13]

List of models


Because of the novelty of the Ultrabook, many manufacturers been unable to meet all of Intel's requirements in their initial models. These deviations (especially cost overruns) are expected to decline as manufacturing processes for Ultrabooks mature. Sections in bold indicate an area where the model fails to meet Ultrabook requirements.

First phase (Q4 2011, Q1 2012)


Brand - Model1 Price of
Base Model2
Release Date Intel Processor
of Base Model
Base RAM
Capacity
Base Drive
Capacity
Minimum / Maximum
Thickness3
Weight Battery Life Display Size
Resolution
Acer Aspire 3951[14] $900 October 2011 Core i5-2467M (1.6 GHz) 4 GB 320 GB HDD + 20 GB SSD4 13.10 mm / 17.50 mm
(0.51 in / 0.69 in)
1.35 kg (2.98 lbs) 36 Wh, ~6 hours 13.1" (1366×768)
Acer Aspire 3951 $1,200 November 2011 Core i5-2467M (1.6 GHz) 4 GB 256 GB SSD 13.10 mm / 17.50 mm
(0.51 in / 0.69 in)
1.35 kg (2.98 lbs) 36 Wh, ~6 hours 13.1" (1366×768)
Acer Aspire 3951[15] $1,300 November 2011 Core i7-2637M (1.6 GHz) 4 GB 256 GB SSD 13.10 mm / 17.50 mm
(0.51 in / 0.69 in)
1.35 kg (2.98 lbs) 36 Wh, ~6 hours 13.1" (1366×768)
Asus Zenbook UX21[16] $1,000 October 2011 Core i5-2467M (1.6 GHz) 4 GB 128 GB SSD 16.76 mm (0.66 in) 1.10 kg (2.43 lbs) 35 Wh, ~5 hours 11.6" (1366×768)
Asus Zenbook UX31[16] $1,100 October 2011 Core i5-2557M (1.7 GHz) 4 GB 128 GB SSD 17.00 mm (0.67 in) 1.30 kg (2.90 lbs) 50 Wh, ~5 hours 13.3" (1600×900) (Glossy)
Dell XPS 13 [17] $1,000 February 2012 Sandy Bridge i5 at first, then later Ivy Bridge. 4 GB 128 GB SSD 6-18mm; 12mm or 0.47in average 1.36 kg (3 lbs) 47 Wh, ~8 hours 13.3" (1366×768)
HP Folio 13[18] $930 December 2011 Core i5-2467M (1.60 GHz) 4 GB 128 GB SSD 18.00 mm (0.7 in) 1.49 kg (3.3 lbs) 59 Wh, ~9 hours 13.3" (1366×768)[19]
HP Spectre (HP Envy 14)[20] [21] $1,400 February 2012 Core i5-2467M (1.60 GHz) 4 GB 128 GB SSD 20.00 mm (0.8 in) 1.8 kg (3.95 lbs) ~9 hours 14" (1600×900)
Lenovo IdeaPad U300S[22] $1,000[23] November 2011 Core i5-2467M (1.6 GHz) 4 GB 128 GB SSD 14.99 mm (0.59 in) 1.34 kg (2.95 lbs) 30 Wh, ~8 hours 13.3" (1366×768) (Glossy)
Lenovo IdeaPad U300E [24] $800 February 2012 Ivy bridge
500 GB HDD + 32 GB SSD4

~8 hours 13.3" (1366×768)
LG X-Note Z330[25] 1,700,000 ($1475) December 2011 Core i5-2467M (1.6 GHz) 4 GB 120 GB SSD 14.7 mm (0.58 in) 1.21 kg (2.67 lbs) ~6 hours 13.3" (1366×768)
Samsung Series 5 13"[26][27][28] $900 January 2012 Core i5-2467M (1.6 GHz) 8 GB max 128 GB SSD / 256 GB SSD / 500 GB HDD 14 mm / 17.6 mm (0.55 in / 0.69 in) 1.38 kg (3 lbs) ~6.4 hours 13" (1600×900)
Samsung Series 5 14"[26][27][28] $1,100 January 2012 Core i5-2467M (1.6 GHz) 8 GB max 128 GB SSD / 256 GB SSD / 1 TB HDD 20.9 mm (0.82 in) 1.84 kg (4.06 lbs)
14" (1600×900)
Samsung Series 9 13" (2012) [29] [30] $1,400 February 2012 Refresh Core i5-2537M (1.4 GHz) 4 GB (8 GB max) 128 GB SSD 12.7mm (0.5in) 1.1 kg (2.5 lbs) 47 Wh, ~7 hours 13.3" (1600×900) (Matte)
Samsung Series 9 15" (2012) [29][30] $1,500 February 2012 Refresh Core i5-2537M (1.4 GHz) 4 GB (8 GB max) 128 GB SSD 15.74 / 16.25 mm
(.62 in / .64 in)
1.59 kg (3.50 lbs) 47 Wh, ~7 hours 15" (1600×900) (Matte)
Toshiba Portege Z830[31] $900 November 2011 Core i3-2367M (1.4 GHz) (i5, i7 models exist) 4 GB 128 GB SSD 16.00 mm (0.63 in) 1.11 kg (2.45 lbs) 47 Wh, ~8 hours 13.3" (1366×768) (Matte & Glossy models)
Toshiba Portege Z835-P330[32] $800 November 2011 Core i3-2367M (1.4 GHz) 4 GB 128 GB SSD 16.00 mm (0.63 in) 1.11 kg (2.45 lbs) 47 Wh, ~8 hours 13.3" (1366×768)

Second phase (expected release Q2 or later 2012)


Brand - Model1 Price of
Base Model2
Release Date Intel Processor
of Base Model
Base RAM
Capacity
Base Drive
Capacity
Minimum / Maximum
Thickness3
Weight Battery Life Display Size
Resolution
Acer Aspire "S5" [33] [34] No Data Q2 2012 Ivy Bridge 8GB SSD 14.9mm (0.59 in) 1.35 kg (2.97 lbs) ~8 hours 13.3" (1366×768)
Lenovo Thinkpad T430u[35] $850 Q3 2012 No Data 4 GB 128 GB SSD or 1TB HDD 20.3mm (0.8 in) 1.77 kg (3.9 lbs) ~6 hours 14" (1366×768) (Glossy)
Lenovo IdeaPad "Yoga" [36] $1,200 Q3 2012 Ivy Bridge No data on base model 256 GB SSD 17mm (0.67 in) 1.4 kg (3.1 lbs) ~8 hours 13.3" (1600×900) (folds into tablet)
Lenovo IdeaPad U310 [37] [38] $700 May 2012 No data 4 GB 64 GB SSD or 500 GB HDD 18mm (0.71 in) 1.7 kg (3.75 lbs) ~8 hours 13.3" (1366×768)
Lenovo IdeaPad U410 [37] [38] No Data May 2012 No Data 4 GB 64 GB SSD or 500 GB HDD 21mm (0.83 in) 1.9 kg (4.2 lbs) ~8 hours 14" (1366×768)

Notes:
1 Only base laptops are shown here.
2 Pricing announced (in USD and on the US market, unless specified) by manufacturer or at time of product release.
3 Some Ultrabooks have a uniform Thickness.
4 These models include two drives. The SDD is pre-configured to store only hibernation data (for faster S4 resume).
0 comments
Posted by: Jaime
blognizend, Updated at: 9:47 PM

ClamX Free Mac Antivirus and Windows

ClamXav 2.2.2 with ClamAV 0.97.2 backend - 22nd August 2011


Requires at least Mac OS X 10.5 *
Available in English, Danish, French, German, Japanese, Korean and Spanish.

If you already have ClamXav 2.0.x installed, please use the "Check for ClamXav updates" option in the ClamXav menu as it simplifies the update procedure.

*If you're on OS X 10.4, please see below.


Mac App Store Version

A slightly modified version of ClamXav is available in the Mac App Store.

What are the differences between the version of ClamXav available to download here and the version on the Mac App Store?

  • The App Store version doesn't contain ClamXav Sentry, so it is not able to watch your computer for new files and scan them as they arrive.
  • There is no engine installation phase as the App Store requirements stipulate that everything must be self-contained within the app.
  • Virus definition updates are downloaded on a per-user basis.
  • Updates to the ClamXav app itself are taken care of via the Mac App Store.
  • Mac OS X 10.6 or greater is required.

The exact same version which is on the Mac App Store can also be downloaded here.

Mac OS X 10.4 Users

New versions of ClamXav have a minimum requirement of OS X 10.5, so if you're still using 10.4, you should download Version 2.2.1 and turn OFF application-update checking in ClamXav's preferences.

You should, however, keep checking for virus definitions as you will still receive updates for these for the time being.

SHA1 Checksums

The SHA1 checksum can be used to check the authenticity of files you download from this website. To use it, open the Terminal (which is inside the Utilities folder), type
/usr/bin/openssl sha1
followed by a space and then drag into the terminal window the file you downloaded, hit return and verify that the number returned to you is the same as the one here.

Note, this will not work if you decompress the archive first. You have to do it on the exact file you download from this website.


sha1 for ClamXav_2.2.2.dmg is 35a27c7f8fffdf35349e46555d2705d7305d4039

Version History

Version 2.2.2 - 22nd August 2011
       Updated ClamAV engine to 0.97.2*
       Fixed an issue with virus definition files having wrong permissions after a defs update
       Fixed window placement bug on 10.7 Lion
       Fixed Spanish translation error in the scheduling preference pane
       Updated engine remover for LaunchAgents
       Added Danish, French, German, Japanese, Korean, Spanish to AppStore version
          * If you have edited freshclam.conf and clamd.conf by hand, you can find your old files inside /tmp.†
          † If you don't know what that last line means, you can probably ignore it!

Version 2.2.1 - 23rd July 2011
       This is the final version which will work on OS X 10.4
       Launching ClamXav Sentry automatically when saving preferences if appropriate.
       Fixes a few scheduling bugs in 10.4 introduced in the last release.

Version 2.2 - 22nd June 2011
       Scanning engine updated to ClamAV 0.97.1*
       Added the ability to scan your entire hard drive
       ClamXav help menu linked to online documentation
       Miscellaneous bug fixes
       Sentry: Hold command key and click "Ignore warning" to hide multiple warnings.
       Support for 10.7 Lion

Version 2.1.1 - 24th March 2011
       Maintenance release to update engine to ClamAV 0.97.

Version 2.1 - 8th January 2011
       Full release from Beta phase.
       Fixed bug preventing the use of a custom ClamAV installation path.
       Improved stability.
       Updated the included version of Sparkle to fix various issues.

Version 2.0.9 - 24th December 2010
       Scanning engine updated to ClamAV 0.96.5 *
       Improved stability during scan.
       Fixed issue with Sentry incorrectly reporting certain files as infected.

Version 2.0.8 - 31st October 2010
       Scanning engine updated to ClamAV 0.96.4 *
       Improved stability during scan.
       Fixed the issue giving "Error creating tmp directory" on scan after installation.
       Fixed issue with Sentry scanning files with similar names to folders being watched.

Version 2.0.7 - 10th September 2010
        Scanning engine updated to ClamAV 0.96.2 *
       Hold option key while clicking "start scan" in toolbar to update defs prior to scan.
       Updated ClamXav Sentry icon and menu bar graphics (thanks Bojan).
       Dealing with errors better - in particular the infamous "error" 2.
       Improved Installation and Update procedures.
       Improved stability in ClamXav and Sentry.

Version 2.0.6 - 10th June 2010
        Scanning engine updated to ClamAV 0.96.1 *
        Added ability to download just the differences to virus definition files rather than dowloading the whole file each time.
        Fixed a bug caused if an exclude setting is left empty but enabled.
        Fixed issues preventing ClamXav Sentry from launching at log in.
        Improved stability in ClamXav during scans.

Version 2.0.5 - 19th December 2009
        Added German localisation.
        Added option to play a sound at the end of each scan.
        Fixed an intermittent bug causing text to appear in ClamXav's console log unexpectedly.
        Fixed a bug which prevented pasting text into ClamXav's exclusion settings.
        Fixed bug in Sentry causing delays going to sleep in 10.6.
        Stability improvements in Sentry particularly under 10.6.
        Fixed crash in Sentry which would occur if changing prefs in ClamXav whilst Sentry was running but not actively watching.

Version 2.0.4 - 8th November 2009
        Scanning engine updated to ClamAV 0.95.3
        Printing out an extra message at the end of a scan stating clearly whether any infected files were found and what was done with them.
        Fixed an issue with Quarantine settings when updating from ClamXav 1.x to 2.0
        Fixed the notorious "something unexpected happened" bug in Sentry.
        Improved stability in ClamXav Sentry during scans and after waking from sleep.

Version 2.0.3 - 16th September 2009
        Fixed an infinite loop caused by having the quarantine folder within the folder you're scanning.
        Fixed a problem which could occur if scanning via the Contextual Menu or Services menu in 10.6.1
        Correctly clearing out the progress bar after a scan/update.
        Changed a default setting to help avoid false positives.

Version 2.0.2 - 13th September 2009
        Added a "Scan with ClamXav" item in the Services menu. You must log out and back in again to make this work.
        Finder contextual menu "Scan with ClamXav" now available for (10.6) Snow Leopard users. You must log out and back in again to make this work.
        Now preventing drag and drop if a scan/update is running.
        Added French localisation.
        Much better memory usage when scanning large folders.
        Ensuring the full summary appears at the end of a scan.
        Fixed a crash which could occur during startup.
        Fixed a crash which could occur during scans.
        Fixed a crash which could occur whilst saving preferences.

Version 2.0.1 - 29th August 2009
        Fixed a bug preventing the installation of the ClamAV engine
        No sparkle release this time around as the engine install logic is the only change

Version 2.0 public beta initial release - 28th August 2009


Homepage: http://www.clamxav.com/
0 comments
Posted by: Jaime
blognizend, Updated at: 2:02 AM

Avast! Free Antivirus for Mac 2012


We're glad to announce a new major version of "avast! Free Antivirus for Mac". The current popularity of Apple products also makes them more interesting for the bad guys so we thought it would be good to prepare for the battle sooner rather than later. The new version has been almost totally reworked compared with our previous solution for the Mac OS.

We're kicking off with three shields and an on-demand scan. The Web Shield together with the Mail Shield will check the vast majority of incoming data from the Internet. avast! Free Antivirus for Mac is also equipped with a File Shield, which scans all programs stored and executed from your hard drive. Everything is packed in a brand new GUI and is now available as a public beta.

Features:
  • On-demand scanning: It's possible to scan the whole file system, network volumes or a mounted removable volume. You can also run a custom scan. Scan reports are automatically archived and are accessible from the GUI at anytime.
  • On-screen alerts: Alert messages are displayed on-screen whenever a threat is detected.
  • File Shield: The File Shield scans the binaries of started applications and all files at the time they are modified.
  • Web Shield: The Web Shield monitors and filters all HTTP traffic coming from web sites on the Internet. Connections from your web browser are redirected to the Web Shield module. The Web Shield in turn connects to the requested web server and while downloading the content, it simultaneously scans it for viruses and Trojans. Only clean data is delivered to the browser, all malware is stopped before it gets saved on your Mac.
  • Mail Shield: The Mail Shield monitors and filters all POP3 and IMAP traffic coming from mail servers on the internet. It does not prevent saving of infected files (doing so could lead to irreversible data loss), it just detects them. The File Shield prevents any infected attachments from causing harm to your system.
  • Automatic updates: The scanning engine is automatically updated with our regular VPS database updates.

Known Issues:
  • Sometimes Apple's default icon is shown in the Dock and Finder instead of the avast! icon.
  • Some items in the menus and some buttons in the GUI are greyed out / disabled as their functionality is not yet fully implemented.

Installation & Uninstallation:
  • To use the Mail Shield, you need to disable encrypted POP3/IMAP connections in your email client's settings so the traffic can be scanned. By default, the Mail Shield encrypts all outgoing traffic itself if the mail server supports it (encrypted connections can be forced for selected mail accounts in the Mail Shield settings).
  • Uninstallation must be carried out from the application's menu bar - item "Uninstall avast!"

If you have any comments of feedback, please start a new topic and/or respond to an existing one rather than bloating this particular thread.


Download link:
http://public.avast.com/dev/mac-beta1/avast-35889b.dmg

Note for Lion users who have build 29138 or 30664 installed:
There was a bug discovered in the beta build 29138 and 30664. Uninstallation of these particular build can lead to system crash. To uninstall it safely use this tool instead of choosing "Uninstall avast!" in avast! application menu:
http://public.avast.com/dev/mac-beta1/UninstallAvast.app.zip
Note the tool may need to reboot your Mac. So please save all your documents and quit all the other applications.

Many thanks
Vlk

CHANGELOG:

refresh 12/21/2011:
- localisation:
 * Fully localisable
 * English and Czech languages available at the moment
- changes in Filesystem Shield:
 * Customisable path exclusions
 * Smaller scan overhead for big files
 * Enhanced robustness
- changes in System Preferences plugin:
 * Dialog for path exclusions
- changes in GUI:
 * Small adjustments in layout and controls
 * Efficient scan log compression
 * Scan log export to plist format
 * Shield panes modified
 * Context menu for history tabs
 * New "Local Volume" scan type and enhanced scan dialog
 * Number of parallel scans limited
 * Improved communication between GUI and the scanning core
- changes in GUI helper:
 * New layout of pop-up messages
- changes in Mail Shield:
 * Fixed bug with connections to non-SSL servers

refresh 11/02/2011:
- changes in GUI:
 * Repair/Delete buttons now work on scan report for infected files.
 * Added buttons to clear history of shields.
 * Added context menu in Scan report page.
 * Fixes of assorted bugs.
- changes in MailShield:
 * Added IPV6 support.
 * Added advanced configuration in System Preferences.
 * Fix communication with mail server without SSL support.
 * Other minor fixes.
- changes in WebShield:
 * Added IPV6 support.
 * Fix connection problems with Kindle and ICQ.
 * Added advanced configuration in System Preferences.
- changes in FileSHield:
 * Few minor bug fixes.

refresh 09/22/2011:
- new daemonisation mechanism and install/uninstall scenario
 * all components guarded by the system (keepalive mode)
 * no additional delays in system shutdown/reboot process
- fixed kernel panic problems upon network shields uninstall
 * problematic cases are detected, auto-reboot offered
- fixed possible GUI-engine communication deadlock
- changes in scan reporting
 * new scan report design
- changes in the main window
 * new status screen design
 * tittle bar with preset/update buttons
- changes in the fileshield
 * enhanced robustness

refresh 09/01/2011:
 - fixed bug in Filesystem Shield which can under some circumstances
   prevent certain operations (e.g. emptying your Trash) in Finder with
   a message box some file is in use.
 - fixed bug during Uninstall, which can lead to system crash on Lion.
 - minor bug fixes and enhancements in GUI.

refresh 08/11/2011:
 - added support for Mac OS X 10.7 Lion (webshield & mailshield)
 - various minor bug fixes

refresh 07/29/2011:
- fixed startup mechanism
 * solved dock icon problems
 * window focus
 * drag'n'drop on dock
 * uninstall/reinstall compatibility
- new system-preferences Avast! pane
 * per-shield start/stop configuration
 * on-demand scan configuration
 * pop-message subsystem configuration
- GUI/scan bugfixes
 * shield statistics inconsistencies
 * volume scan / full system scan problems
- MacOS X 10.7 Lion workarounds
 * webshield and mailshield are disabled for now on 10.7
 * we're working on webshield/mailshield workaround for Lion
- prolonged lifetime of this beta (till  10/1/2011)

refresh 06/22/2011:
- explicit VPS update in the application menu
- fixed some issues of GUI with shield history
- scan report history has pop-up menu, allowing to delete scan reports.
- added preference pane in System Preferences
  (for now with few options about popups only, more will come later)
- dropped Growl dependency
- fixed various mailshield bugs
 * broken IMAP appends
 * broken IMAP starttls handling
 * broken connections to non SSL capable servers
- tons of other minor updates and fixes.

refresh 05/27/2011:
- fixed corruption of downloads over 4GB, caused  by the network shield

refresh 05/25/2011:
- fixed airport connectivity problem, caused by the setup of net shields on MacOS X 10.6.x
- fixed typo in "Start New Scan" page header
Source:http://forum.avast.com/index.php?topic=78646.0
0 comments
Posted by: Jaime
blognizend, Updated at: 10:25 PM
 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. blognizend - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger
Google+ Jaime Lacson