NANO Antivirus review

Searching today on twitter.com for tweets regarding computer security, I’ve found a twitter account, NANOantivirus associated with a new russian security software company,  NANO Security. To be honest, I never heard of this company before so I made a little research  on Google.com for his product NANO AntiVirus and surprisingly enough the first search results on Google.com are dominated by links to sites talking about a fake antivirus with the same name, NANO AntiVirus. According to these sites, the NANO AntiVirus rogue software has the same behaviour as all the fake antiviruses, it displays false alerts and pop-up warnings about a false computer massive infection. Displaying a lot of fake …

Continue reading

Posted in AntiVirus reviews.

Scam websites

More and more people from around the world use the Internet for socializing, for online transactions, buying things, send and receive money,  and about anything they can do involving interaction with other people or companies. Almost all these start with a search for your interest keywords in a powerful search engine and the most powerful is Google.com as you know but far from the perfection. Many hackers using black hat methods can manipulate  the Google search results positioning their scam websites in the top of search results, though for short amount of time until Google blacklist them. Let’s dig a little how this is possible. One of the most factor …

Continue reading

Posted in Thoughts. Tagged with , .

Data Loss Prevention Systems

In the past, the data loss or data leakage was a big concern for big or medium companies but nowadays when we are witnessing an exponential growth of commercial espionage and the fight for “the market” become so intense between competitors, the data loss prevention is of utmost importance for absolutely all the companies, bigger or smaller. A  data leakage from within the company has direct and indirect consequences, direct as  data usage by your competitors and indirect as loss of the credibility with your customers. Nobody wants their personal data as addresses, phone numbers, Social Security number or credit card details being compromised by a company with neglectful employees …

Continue reading

Posted in Tools & Reviews. Tagged with , , , .

How data recovery programs works

Have you ever wonder, how data recovery software works ? I mean, everybody knows, when you delete files them are going to a special folder Recycle Bin, but what is happening when you empty Recycle Bin ? To understand this we must first understand how data are stored on storage devices e.g. hard drives. I don’t want to write a very “technical” article, instead I will try to keep it as simple as I can. The most commonly file system formats used in modern Microsoft Windows based systems are FAT (File Allocation Table) and NTFS (New Technology File System). The FAT and FAT32 is used predominantely by systems running earlier …

Continue reading

Posted in Tools & Reviews. Tagged with .

Sandboxie — One of the best security tool

I wrote in the past an article about Sandboxie and its add-ons but I feel a such powerful security tool deserve a  more in depth review. I run a small computers business and there are no rare the cases when people call me or come to me asking for an advice how to remove different malware from the computer, therefore I’m not lacking for malware samples for analysis. Always I ask people when the computer infection occur, what they did before to get that malware, trying to track the infection source. Unfortunately very often the reason why the people get their computers infected are themselves. The people behaviour on the …

Continue reading

Posted in Thoughts.

Disable Autorun to prevent computer virus infections–USB flash drives threats

Almost any PC user use intensively the USB Flash Drives called popular memory sticks to transfer data between computers or between different devices as photo cameras, portable players and the computer. Many people use such a drive to share photos or music or even games with the friends and an Flash Drive with interesting content will travel from a computer to another borrowed by its owner. The  Autorun and Autoplay , a rather useless I dare to say and source of troubles Windows feature, and the portable character of the flash drives create the perfect context for malware spreading. From my experience, a lot of small companies which still run Windows …

Continue reading

Posted in Thoughts.

How do you know your computer is virus infected ?

It’s better to prevent a computer virus infection than to remove the virus itself but sometimes the inevitable just happen, therefore an article maybe accompanied with your comments and experiences about virus infection signs(symptoms) is necessary for a lot of us. To be able to  accomplish their main goal of stealing personal data, a lot of stealth malware are coded with low computer resources(CPU and RAM) consumption in mind and run unnoticed in your computer. One of the most advanced method to hide the malware presence, is using the rookits. Them can run at privileged levels , Ring 0 sau kernel-mode rootkits the same as a device driver or Ring …

Continue reading

Posted in Thoughts.