In this video I infect myself with a basic trojan virus, show some of its features and then show how to manually remove it.
This trojan is NOT public. Watch it in HD!
Read more...
Monday, October 18, 2010
MPX Backup v1.0 Released - FREE no install backup program
MPX Backup v1.0 has been released.
This tool requires no installation and is great for backing up to a flash drive. It is very basic and does not need much user input, just place the program
where you want your backup stored and run the program and select what you want, it will do the rest. Give it a try, its FREE!!!
Download Now
Read more...
This tool requires no installation and is great for backing up to a flash drive. It is very basic and does not need much user input, just place the program
where you want your backup stored and run the program and select what you want, it will do the rest. Give it a try, its FREE!!!
Download Now
Read more...
Labels:
Free Backup Program,
Free Backup Software
Saturday, October 9, 2010
Email Spreading Worm 10-9-2010 to.php BE VERY CAREFUL
There is a bad worm going around right now. Once you are infected with it, it will grab all of your contacts and send them an email with a link inside to an infected web server with a php exploit. This link, from what I have seen, has always been to a page called "to.php" on a random web server.
Example Email:
http://ta******.com/to.php
Best regards, ali*********@live.com
Remember, never click on random websites whether you know who it is from or not. If you do not know the address, do not go to it. Best advise I can give.
Read more...
Example Email:
http://ta******.com/to.php
Best regards, ali*********@live.com
Remember, never click on random websites whether you know who it is from or not. If you do not know the address, do not go to it. Best advise I can give.
Read more...
Labels:
Email Spreading Worm,
Worm Virus
Wednesday, October 6, 2010
Windows Tips & Tricks - Part 1 - Run Commands
In this video I will show you just a few of the available commands that can be used with the run function.
Read more...
Read more...
Labels:
CPL Commands,
Run Commands
New Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution Discovered Sept. 14, 2010
Description:
The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
A list of affected operating systems can be found here:
http://www.microsoft.com/technet/security/bulletin/MS10-065.mspx
Read more...
The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
Solution:
Click here to check your Windows for updates.
A list of affected operating systems can be found here:
http://www.microsoft.com/technet/security/bulletin/MS10-065.mspx
Read more...
Labels:
Microsoft IIS,
Remote Code Execution
New Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution Discovered Sept. 14, 2010
Description:
The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content.
More info:
http://www.microsoft.com/technet/security/Bulletin/ms10-062.mspx
Read more...
The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content.
Affected Operating Systems:
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
Windows 7 is NOT affected!
Solution:
Click here to check your Windows for updates.
More info:
http://www.microsoft.com/technet/security/Bulletin/ms10-062.mspx
Read more...
New Print Spooler Service Vulnerability Could Allow Remote Code Execution Sept. 15, 2010
This is a critical vulnerability in the Windows Print Spooler service which allows attackers to gain remote control of the affected computer.
Affected Operating Systems:
Solution:
Click here to check your windows for updates.
Read more...
Affected Operating Systems:
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
Solution:
Click here to check your windows for updates.
More Info:
Read more...
New Adobe Flash Player / AIR Code Execution Vulnerability Discovered Sept. 15, 2010
A vulnerability has been discovered in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system. This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system.
The vulnerability is reported in the following products:
More info:
http://www.adobe.com/support/security/advisories/apsa10-03.html
Read more...
The vulnerability is reported in the following products:
- Adobe Flash Player 10.1.82.76 (confirmed) and prior.
- Adobe Flash Player 9.x
- Adobe AIR 2.0.3 and prior.
Solution:
Click here to update your Adobe Flash Player / Air.
http://www.adobe.com/support/security/advisories/apsa10-03.html
Read more...
New Office Outlook Vulnerability Discovered Sept. 15, 2010
New Reported Vulnerability in Microsoft Outlook Could Allow Remote Code Execution!
It is a critical vulnerability in Office Outlook, which allows users to gain remote control of the affected computer.
Operating Systems Affected:
Microsoft Office XP Service Pack 3
Microsoft Office 2003 Service Pack 3
Microsoft Office 2007 Service Pack 2
Solution:
Click here to check your windows for updates.
More info:
Read more...
It is a critical vulnerability in Office Outlook, which allows users to gain remote control of the affected computer.
Operating Systems Affected:
Microsoft Office XP Service Pack 3
Microsoft Office 2003 Service Pack 3
Microsoft Office 2007 Service Pack 2
Solution:
Click here to check your windows for updates.
More info:
Read more...
Labels:
MS Office,
Outlook Vulnerability
Subscribe to:
Posts (Atom)