Using Internet safely with Kaspersky Internet Security 2010  

Wednesday, January 27, 2010

Fully Automated Real-Time Protection

Kaspersky Internet Security 2010 stops your PC being slowed down by cybercriminals and delivers unsurpassed on-line safety whilst protecting your files, music and photos from hackers:

* Keeps your money and identity safe
* Protects against bank account fraud
* Safeguards against online shopping threats
* Cybercriminals won’t hi-jack your PC
* Family protection from on-line predators
* Your files won’t be ruined by hackers
* Keeps your PC running smoothly
* Safer Wi-Fi connections
* Two way personal firewall


New And Improved Features
Kaspersky Internet Security 2010 offers a number of new and improved features together with unique protection technologies to address the latest online threats, keep your PC running smoothly and customize protection according to your activities:

* Unique Safe Run Mode for questionable applications and websites
* Security Application Monitor to give you full picture on programs installed on your PC
* Identity Information Controller to give valuable data an extra layer of protection
* Kaspersky Toolbar for Internet browsers to warn you about infected or unsafe websites
* Advanced identity theft protection, including improved secure Virtual Keyboard
* Urgent Detection System to stop fast emerging threats
* Next generation proactive protection from zero-day attacks and unknown threats
* Special Game Mode to suspend alerts, updates and scans while you play

Advanced Features For Better Protection

AddThis Social Bookmark Button

Information Linux Null PTR Dereference Exploit Framework  

To create your own exploit module for enlightenment, just name it
exp_whatever.c
It will be auto-compiled by the run_exploits.sh script and thrown into
the list of loaded exploit modules

Each module must have the following features:
It must include this header file, exp_framework.h
A description of the exploit, the variable being named "desc"
A "prepare" function: int prepare(unsigned char *ptr)
where ptr is the ptr to the NULL mapping, which you are able to write to
This function can return the flags described below for prepare_the_exploit
Return 0 for failure otherwise
A "trigger" function: int trigger(void)
Return 0 for failure, nonzero for success
A "post" function: int post(void)
This function can return the flags described below for post_exploit
A "get_exploit_state_ptr" function:
int get_exploit_state_ptr(struct exploit_state *ptr)
Generally this will always be implemented as:
struct *exp_state;
int get_exploit_state_ptr(struct exploit_state *ptr)
{
exp_state = ptr;
return 0;
}
It gives you access to the exploit_state structure listed below,
get_kernel_sym allows you to resolve symbols
own_the_kernel is the function that takes control of the kernel
(in case you need its address to set up your buffer)
the other variables describe the exploit environment, so you can
for instance, loop through a number of vulnerable socket domains
until you detect ring0 execution has occurred.

That's it!
*/

http://www.grsecurity.net/~spender/enlightenment.tgz
back: http://milw0rm.com/sploits/2009-enlightenment.tgz

source milw0rm.com

AddThis Social Bookmark Button

Automated Vulnerability Detection System  

Friday, January 8, 2010

Automate Your Penetration Testing

AVDS is a network vulnerability assessment appliance for networks of 50 to 200,000 nodes. It performs an in-depth inspection for security weaknesses that can replace exhaustive penetration testing. With each scan it will automatically find new equipment and services and add them to the inspection schedule. It then tests every node based on its characteristics and records your system's responses.

In a matter of hours and with no network down time or interruption of services AVDS will generate detailed reports specifying network security weaknesses.

Our database of tests is updated daily with the most recently discovered security vulnerabilities. The AVDS database includes over 10,000 known vulnerabilities and the updates include discoveries by our own team and those discovered by corporate and private security teams around the world.

Simple, Fast and Comprehensive

Manual vulnerability assessment is expensive and infrequently done. Assessment software can be time consuming to set up and operate, plagued by high false positive rates and cause network resource issues.

Automated Testing Using AVDS:
• Gets your tactical security work done routinely and quickly
• Provides the fixes you and your staff need for fast mitigation
• Buys you time to focus on security strategy
• Automatically scans new equipment, ports and applications
• Scales to handle multiple networks, business units, countries
• Reduces your patch-work by identifying exactly what is needed.

Security and Compliance Challenges
Read More

AddThis Social Bookmark Button

Network Security Software  

Wednesday, January 6, 2010

Network security threat is one of the major concerns for all online businesses today. As soon as the computer software was produced the hackers set off on their task of destroying software. In networks the more important thing than software is the data as the data contain sensitive information. Hackers send their programs to either destroy the data bases or steal data. Both are equally dreaded by network administrators.

Network security threat

AddThis Social Bookmark Button

Web hosting sites  

Web hosting is now widely used of netter to introduce their web commercial nette, lot from year to year using good web hosting service is paid or for free, and many benefits if we use the web-hosting, some of which we become more web easy to remember, unique and certainly more commercially profitable.
technically, the use of web hosting can be seen from some of the features available, because many web hosting providers that offer additional features such as relatively low prices, large disk space, usage period and warranty service, even free web hosting providers even dare to compete with providers are paid, our living choices.
Through this website, the netter can choose web hosting providers the most demanding of the world, best 10 web hosting sites that dare to compete provided from various sides, ranging from price, how to setup, domain, disk space, money back, and the usage period .
Through this website explained that the list of top web hosting is the most widely sought after by netter, affordable prices is one reason why the netter choose one of the ten web hosting these sites.
how about you? are already interested in using the best web hosting around the world to introduce your personal website?
The 10 top web hosting sites are among others BlueHost, JustHost, inmotion hosting, HostMonster, fatcow, supergreen, HostGator, 1and1, GoDaddy, and the last isyahoo web hosting, good luck

AddThis Social Bookmark Button

Protector Plus Antivirus Local Privilege Escalation Vulnerability  

ShineShadow Security Report 15092009-09

TITLE

Local privilege escalation vulnerability in Protector Plus antivirus software

BACKGROUND

Protector Plus range of antivirus products are known the world over for
their efficiency and reliability. Protector Plus Antivirus Software is
available for Windows Vista, Windows XP, Windows Me, Windows 2000,
Windows 98, Windows 2000/2003/NT server and NetWare platforms. Protector
Plus Antivirus Software is the ideal antivirus protection for your
computer against all types of malware like viruses, trojans, worms and
spyware.

AddThis Social Bookmark Button

Design by Amanda @ Blogger Buster