Wednesday, May 26, 2010

What Is The Perfect Cup Size

Pharming. Phishing. Scam. We are protected

Before methods show some caution of different types of attacks on computer (trojans, viruses, fakes poisoning of host , malwares) .. I would like
teach a couple of videos a colleague, so they know the operation of pharming, also known as Fake , Scam, Phishing !
(false pages of a particular site , in order to raise information such as passwords, bank accounts, etc. ..) And it

could be entering a site COPY a site of a phisher and leave valuable passwords such as what is " Paypal" or bank accounts ! This
making method is to replace the direction url of the page where you want to really enter the site after leaving false information you need this redirects to the page so you do not suspect true! The
tips
of protection before such practices are at the end of video!

VIDEO PART 1



VIDEO PART 2

Monday, May 17, 2010

Endometrial Palups And Bloating

Fake? Antivirus you use?

This article is to challenge your privacy on the net ..
we really protected? Your antivirus is updated?
For even I can only say a sentence that is among my favorites:

"An anti-virus is as effective as the ignorance of who installs it"

Today I'll show you why you should have basic knowledge when it comes to be protected!
you trust your anti-virus? Maybe some anti-spyware .. But really we are safe from these criminals cyborg?

Note: I'm not a hacker or anything, this material is merely EDUCATION .. Insite want education on computer security rather than the morbidity of espionage!

Let's start with the main concept of theme

TROJAN: According to wikipedia, is called Trojan or Trojan horse (literal translation from English Trojan horse) to a malicious software under a harmless looking covertly runs in the system and allows remote access to an unauthorized user to the system. The term comes from the story of the Trojan Horse mentioned in Homer's Iliad

A Trojan is a computer virus the main differences are that the Trojans do not spread the infection to other systems themselves and need to receive instructions from an individual to perform its purpose.

(As he says, what we do is attach a malicious software program to manipulate remotely healthy)


But .. Our "victim" has "Antivirus", no problem =)

Luckily for activities such systems are to leave totally undetectable! Encrypting
our Trojan will try to mock the majority of antivirus signatures and the victim never suspect that your computer is being used remotely by someone else!
do not want to teach such "illegal" but if I want to give some recommendations to get rid of these attackers!

First things first ..

file we created our malware, encrypt, verify that is 100% undetectable by those antivirus that work can be thrown away .. _______________________________





File Info Report date: 2010-05-18 2:23:11 (GMT 1)
File name: Server-LxP.exe
File size: 369714 bytes MD5 Hash
: 2fe8ce8bfc62a1216382ac8cb09d1220
SHA1 Hash: c130239ba05ee90e438831d1f58e8bb4541dc709
Detection rate: 0 on 20 (0%)
Status: CLEAN


detections
a-squared - -
Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - - F-PROT6
- -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 - -
Panda - - Only
- -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - - _____________________________________



PERFECT! . Has been completely free from 20 different antivirus signatures!
it attached to a program (ares, msn, emule, including a virus that hill lol) = P hahaha .. We climbed to a download site (not give examples of sites not to any specific menosprestigiar).

is that I want to do a test as 100% expression, I have attached a "virus" and I uploaded the program to a web .. Waiting for someone to download our "program (virus)" to "clean" your computer .. But oh, = P Inside the Trojan Horse is our .. Just simply double-click on the installer .. and will be installing the "Antivirus and trojan "

And this is the result:





what not? =) As you may know that your antivirus SUPER I have now same total control of your computer? Things to think = S
And more when we think we can fall into dangerous hands .. This is just an "example" but it's more mention could be another person with other goals!
I've taken the liberty of making these images that this is "seeing is believing" whole life = p hehehe ..

Now I will mention a little about that could make these bad boys, I have listed the second image and explain to, the functions of this malware:

1. FILE MANAGER: Handling
full to the files on your pc .. C: D: desk, removable drives, and any existing folder on your computer.

2. KEYLOGGER:
records all the keystrokes of computer polluted ... Not dangerous? = S

3. PROGRAMS INSTALLED:
can see all programs and programs secretly DESISTALAR the victim ..

4. AUDIO CAPTURE:
If our amigito has micro .. can activate and listen to everything he says about the =)

5. ESCRTORIO REMOTE
is what we see in the second image, we have your desktop as our own! to see what he does and to use ..

6. CAPTURE WEBCAM:
This turns the webcam on our amigito without their consent)

7. EXTRA OPTIONS:
very functional, this can restart, shutdown, lock your keyboard, your mouse, hide your icons, the windows bar and amongst other more!

8. PASSWORD:
Displays all passwords that have been marked on the computer of the victim

9. WEBSITE OPEN: Opens
website without the consent of the "victim"

10. SEND FILE:
Perhaps the strongest ... With this option you can send a file and run to get visible or hidden mode! Either could destroy a computer by sending a simple virus. Bat erasing all the disk C:


INCREDIBLE NO? ... Well .. This is reality! I do not want to despair and think that everything is lost hehehe but I do not want you're quiet .. Your privacy is 100% discuss and question .. not leave everything up to a cheap or expensive antivirus!
invited you to discover how to be more effective than a virus!
In the upcoming article on how to get rid of these malware manually .. Know where to stay, what is their function to be "undetectable", which has intentions "cyberdelincuente you" and among other things ...


NOTE: I repeat, I am not any kind of "cyberdelincuente" This material is merely EDUCATION .. Desmostrando so we are not 100% protected Insite computer security education and


By PUZZLE ..

Friday, May 14, 2010

Girdle How Long Wear After Delivery

Courier El Correo Catalán Catalán

Analysis of Crisis

Monday, May 10, 2010

M Jak Milosc Odcinki Online 819

GOOGLE Change the design

a short time ago our friends at google have changed the design after an upgrade, this has brought a bit of controversy and some people wanting to return to the old Google ..

Diseño google

without much roll, I show you 2 simple solutions to this " problem, in particular think it's cool enough!

1. Options: access google right through this route:

http://www.google.com/webhp?hl=all


The drawback would be that the "search" and "I Feeling Lucky " of all I will be out in English life .. And if you try to change the language to simply return to yours NOW google .. But searches are the same as always .. This does not mean that everything will come out in English or English pages will be focused! You can do the test ..

2. Options: For those who sail right through firefox or Chrome I got this useful plugin .. That takes away all the appearance adopted by google .. Showing you the old design! The most convenient is that you can return anytime to the "new" design of google when you want .. worth trying too ..

Link: Plugin, old design google.

Friday, May 7, 2010

Bleeding On And Off 8 Daysbefore Period

Where housing a Virus or Trojan? Avoid Trojans

think we should all have a little insight into this issue .. Since privacy and computer security today is simply moot. And is that right now could set a Trojan virus and propagate it and NO, much less know it will detect and eliminate! So simple is the world of hacking today ..
If you're wondering right now, perhaps I can be infected with some virus or trojan having my super nod32 recorded and updated? Having my avast? By passing the kaspersky ..
The answer is .. SI ..
At the moment it might be a zombie ! And so you could be serving as a messenger of some spammer .. Yes, you are sending spam emails without realizing it!
never has happened to many of your msn contacts you plan to send those messages: "LOOK WHO YOU Remove from your MSN", "SOMEONE HAS DELETED", "TRY OUR NEW ......"
The sad reality is that most of the vecez are these people who sent this! But viruses and Trojans that propagate self! Lose =) I myself thus contaminated =) Well now

for educational use, I'll show you some of the routes where they usually stay the majority of these viruses and Trojans vecez!



The Home: Folder is located in the programs menu (Start-> Programs-> Startup)

For modern spyware, trojans, and other intruders, this place would be too obvious to interfere in the system, but no shortage of annoying splash window recently installed a program that puts us in that place reminding us to register, or who would buy a shirt of the company with the logo of a window ..

----------------------------------------------- ---------------

MSCONFIG

This powerful tool is found in almost any Windows operating system, and accessing it going a:
(Start Menu-> Run -> msconfig)
Well, that says START is a list of programs and executables that are loaded at startup, which allows a simple check mark to remove without deletion (by doubts, no?)

In WinXP flap is another interesting call services, enabling us to tick or uncheck the services that the system starts, remember that many programs require not only an executable, but also a service that starts with own operating system and is active all the time while the program is not used (read: Antivirus, promiscuous mode drivers for network cards, etc).

--------------------------------------------- ----------------- REGISTRATION



Of course, many executables are also displayed there in the Windows registry, but touch them with care. To access it written:
START -> Run, type regedit word
and presto, there it is to be tinkering.

Well, the key that interests us is
[HKEY _LOCAL_ MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ Curr CurrentVersion \\ Run ]
There are things that running when you start win, let's take that will not do. Many times when a virus attack we can be here in among other things.

----------------------------------------------- ---------------

WIN. INI

Clearly we can find in the same MSCONFIG or editing the file directly WIN. INI the ability to add things to start putting (or removing in this case) a line in this file contained in the folder c: \\ Windows (usually) say for example c: \\ executable. Exe

-------------------------------------------- ------------------

SYSTEM. INI

The last method we'll see is to add an executable as a parameter of explorer, under BOOT file system. Ini as follows:
SHELL = explorer. exe executable. Exe

------------------------------------------- -------------------

ADVANCED REGISTRATION

Another place where they can accommodate the executables is in registry key:
[HKEY _LOCAL_ MACHINE \\ SOFTWARE \\ Classes \\ exefile \\ shell \\ open \\ command ] changing the value "% 1"% * by executable. Exe . Unknown place, but interesting as it indicates that each time you run an EXE in the system will be running the executable. Exe .

Remember that this analysis we can deduce the possible places where the operating system stores strictly speaking what runs when you start our session.
A very useful tool when it comes to catch and remove malware manually mind is: HijackThis this tool should not be confused with an anti-virus or anti-malware, since it does not delete anything! Just shows you a detailed log of what would be the home of the virus and / or trojan that is hosted on your computer! HijackThis
is perhaps more powerful than any antivirus in safe hands!
nuesro advise always keep it in the repertoire and when in doubt, pass (does not last more than 15segundos) and save the LOG of our system so we can publish in any forum on aid to receive better care, more detailed and specific!

Thursday, May 6, 2010

Gay Cruising Phone Lines Nyc

Bicentuneando RELOADED in 4 Cats

How Long Should I Use Daktarin For



Naive vs. Trojans

I nternet .. Network Network .. Where we can find virtually any utility that we want for our computer. But be a little careful, any program you download can contain a virus or Trojan.

But it is a Trojan?

is simply a program that hides inside another program potentially dangerous to your computer and that, to go hidden in another, probably never installed in your PC. When trying to run this utility that we so eager to get and that we have finally managed to find on the Internet, not working properly (this is a generality but it is not at 100% of cases) and on top we have infected your computer.

As in the city of Troy, .. we got the enemy inside your computer, in a beautiful package, and left this at the mercy of the person who wrote the trojan.

The last Trojans are allowing third parties to take full control of your computer remotely, you can write, delete, change files, settings .. etc., like ourselves ahead of our screen.

In these programs, unlike viruses, its aim is not to reproduce. Therefore, most of the antivirus heuristic scanners do not detect such programs as hazardous unless they have been updated accordingly.


Well .. and what I can do to determine whether the program is just run a Trojan or not? Give a small general guidelines to try to discover whether or not a hidden Trojan.

1 Check the new appearance of DLLs or EXEs in c: \\ windows or c: \\ windows \\ system. There are several methods. One of them is to use find with the search option by date of modification or creation. Another is to use specific utilities like FileMon, a very useful free program that can get http://www.sysinternals.com/filemon.htm and helps monitor any changes in the filesystem.

2 The only way to maintain control of our machine by a Trojan is by opening a connection to your computer, it will check for open connections with a netstat-an. Any suspicious connection must be analyzed in depth.

3 will check the Windows Registry, be suspicious of new entries that appear spontaneously to run any program. There Be especially careful with the keys hanging in

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Run ,

As is often the place chosen by the majority of Trojans to install a key point to the file you want to run every time you restart Windows. In any case, we also will help free utility Regmon, that helps monitor any changes in the Windows Registry.

Finally, it is worth remembering that there are tools created especially for the detection / removal Trojans. Although today many antivirus detect and remove many trojans, the protection offered can not, in any case be sufficient. Anti-trojan tools specific, but still have much room for improvement, are generally much higher compared to the virus. Are two of them: Jammer 1.7, which has a freeware version and LockDown2000.

Tuesday, May 4, 2010

What Happened To The Soul Train Dancers

The 10 Immutable Laws of Security

what anyone with internet access has to know

Walking through the network, I have found these laws very friendly, every user and owner of a computer should know! Many people do not know that with a single executable downloaded from any website whatsoever, whether a game, program, movie, etc. .. doors may be opening for hackers and instrus in our system .. I leave here:



Law # 1: If a bad guy can persuade you to run the program it on your computer, it's not your computer.


the intruder or attacker typically will use the social engineering to convince run a seemingly "harmless", it tends to be through emails, electronic greeting cards, including any trojan or virus designed to damage .
Avoid downloading files from unknown sources and even some known contact hesitate to send any email out of the ordinary (I say this from experience), may have been the victim of an attacker already, and only this usurping their identity, avoid contact by other means not the same email.


Law # 2: If an attacker can alter the operating system on your computer, it's not your computer.


Close relationship with Act 1, as if somehow the attacker alters your computer's operating system, sorry but you lost. The operating system is metaphorically the "soul" of the PC, is one who performs and controls each process to be performed. Have access to all information stored on the computer it is the one who allows that interaction between the hardware and the user. To be altered the operating system is at the mercy of the attacker.


Law # 3: If an attacker has unrestricted physical access to your computer, it is not your computer.


common thing among the top 3 law is that your computer will no longer be yours. It sounds intimidating, but I think that this law applies double. If someone can physically access your computer is absolutely no longer your computer. It is a law that applies to everyone, but especially those using mobile devices such as laptops, Smartphone's, PDA's, etc where they store information. But anyone who can access your desktop PC can among many things, remove the hard drive (or drive) and take him stealing your information, which after all is most valuable for everyone.


Law # 4: If you allow an attacker to upload programs to your Web site, it ceases to be yours.


Very consistent this law with the freedom movement to share information. If you have a site you want to share with the world, limit or condition access to its visitors. Do not let it get on your Web site files unknown or dubious. This will download to your computer and your visitors and the first 2 laws took effect. Restrict your users and only allow privileges to their partners and not saboteurs.


Law # 5: Weak passwords against the security deposit.


The best security systems have been violated by the existence of users with weak passwords. As a network administrator from applying for its users to implement strong passwords that include special characters such as @ $ & # As well as uppercase and lowercase letters and numbers. Recommendation (External Embedding Disabled) is replacing letters with symbols or numbers. Eg, Password = P @ $ sW0rD and if they can see how strong it is, in sites such as Password Checker.



Law # 6: A machine is as safe as reliable as the administrator.


Poor but well-established practice is to let users and administrators of equipment or personal, or enter logearnos our teams with an account with administrator privileges. On this type of user has full control over the system on which it is working. Lets executing unknown and perhaps harmful to the system. I recommend that as we work on basic applications, Office, email, Internet, etc. do it with a standard user account and need to install something authentic, then we use our account manager.


Law # 7: Encrypted data is as secure as the decryption key.


Act 5 is jumping? Go back and read it because it is closely connected with this law. If our paranoia is such, and distrust of everything to the point that every file on your PC or email we send is coded properly and encrypted, but your decryption password is "weak" Have you lost your time and paranoia. Follow the recommendations of the Law 5.


Law # 8: An outdated antivirus is only slightly better than no antivirus virus at all.


Still have licensed the antivirus 3 or 6 months that came with your new pc ... 1 year?? Sorry but your PC is infected. The virus should be kept updated, if you have budgeted to buy one, find a free but get advice about their reputation. Keep your operating system updated online and use software referenced to know the vulnerabilities of your computer and its solution.


Law # 9: Absolute anonymity is not practical, nor in real life or on the Web.


Internet is full of forms that are intended to be filled by you with your real data. Be jealous of your information, anonymity does not take him anywhere, and less if a netizen recognized. Read the privacy statements hangouts, dude pop-ups that advertise themselves as the 1,000,000 user of the site, do not fill too many forms where personal data are "mandatory" unless you fully trust the site. Internet, like your city has some recommended areas for safety, avoid them.



Law # 10: The technology is not a panacea


is said that if something is not on Google it does not exist. The truth? Obviously not true, just a publicity stunt for this popular search engine. The technology provided countless benefits throughout the world, but the solution to their problems do not always find on the net, not everything is perfect, however there are also dangers, system errors, villains lurking, etc. . Try to have a 100% secure system is impossible, every day we can do "more" secure but there will always be who want to do some damage. The software we have installed is imperfect but it helps us in our activities, are imperfect and detectable virus but also get to make their dark activities. If you are a user of technology to ensure your system updated and common sense.