IObit Security 360 Free — the review

Browsing today Yahoo Answers, I saw someone recommendation for the users to try IObit Security 360 as an advanced spyware and malware removal tool. Quickly I’ve done a Google search and I found the official site of the program http://www.iobit.com/, a site with a few interesting and useful freeware and commercial tools. …removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers… they say in the official site. Good, let’s try it then. I’ve downloaded 8.78MB and installed the application. The first impression was of a simple and intuitive interface, nothing to do with “advanced users” features found in other …

Continue reading

Posted in AntiSpyware reviews.

About : Desktop Security 2010 removal

Today my kid 8 years old makes me “happy” again. He was browsing the Internet searching for online games and suddenly call me to see something at the computer. An avalanche of warnings and alerts was appearing on the desktop claiming the computer is infected and involved in illegal actions as spamming, the BIOS will be destroyed or will be necessarly to buy a new motherboard, I will be disconnected from the Internet and thrown maybe in the prison, and so on. The malware offered anyway a solution to solve ALL my problems : to buy Desktop Security 2010 , the only antivirus that can help me to get rid …

Continue reading

Posted in Thoughts.

Complementary security tools

It’s interesting what vision has PC users with not a lot of experience about their antivirus, how they feel about that software. It’s more about a feeling, yes, they perceive the antivirus like a comrade who defend them fighting back against all kind of nasty malware and zombies for their safety and peace, look how people speak about their antivirus :  “my antivirus says this or says that…” Well, if it’s about a comparison between an antivirus and a bodyguard who must defend me against the Internet threats, the bodyguard is a blind person when it comes about new threats and here you must consider as a fact that daily …

Continue reading

Posted in Tools & Reviews.

"Hacking the Hacker" — Network Security

The common way to protect against network threats is installing a Firewall, which theoretically will block all attempting to establish a malicious connection, protecting the computer. It is well-known fact that always first step a hacker do trying to hack a computer in a network is a port scanning to find what ports are open and can be used to “communicate” with the target computer. Ports are in range from 0 to 65535, and some of them are assigned for special use as : File Transfer Protocol(FTP) connections — port 21 Telnet — port 23 Hypertext Transfer Protocol(HTTP) — ports 80 and 81 HTTP over Transport Layer Security — port …

Continue reading

Posted in Thoughts.

Malicious behaviour — PC Confidential 2008

Today, when I was cleaning up my kids PC, I saw on the Desktop an object, kind of icon, with name “Shredder” without an extension and with a behaviour characteristic to many malware programs –it locks itself on the desktop taking off the possibility to delete it and it has only two context menu(right-click) options: Open Create Shortcut This is how the icon looks like :   For all other files from the Desktop I have a lot of options as you all know like Delete, Rename, Cut, Copy, Open with, entries added by WinRAR(Add to archive), entries added by my antivirus for scanning the file in discussion, and entries …

Continue reading

Posted in Thoughts.

Programs analysis tools — Sandboxie "add-ons"

These days, when many software vendors are ready to do anything to increase  their incomes, including embedding adware and other unwanted programs in their products for advertising and marketing purposes, to analyse a program carefully before to run it, it’s a normal and desirable behaviour  install it fully in the computer. I’m  talking about less-known  programs, sometimes spreaded as freeware, sometimes advertised as program that will do “miracles” in the computer and finishing dropping adware and spyware in the computer of a naïve user. Using virtual environments as a VMware machine, or a sandbox which will emulate an Operating System are the preffered methods for analysis because they give the …

Continue reading

Posted in Tools & Reviews.

Malware infections — prevention and cure

A simple look at statistics from last 24h in virustotal.com site reveal the fact that only 2% from the files submitted are detected by the ALL antivirus engine, for the rest of 98% one or more antiviruses are failing in detection.   There is tests that shows aproximately only 20% of new trojans are detected by an antivirus, any of them, it does not matter but my believing is the percentage is in reality lower than 20%, maybe 1 -5 % of new trojans – zero day attacks are detected by an antivirus because speaking of unknown and newly  created trojans, only heuristic and file emulation can be used  as …

Continue reading

Posted in Thoughts.