PageRank Button

neobux

AFF1

Your Ad Here
Google
 

Minggu, 17 Februari 2008

Computer Viruses

Stay up to date with your anti virus. More than 2.000 viruses was invented
Here, we provide some recommended anti virus.
Enjoy

Jumat, 15 Februari 2008

ANTIVIRUS
SECURE YOUR PERSONAL COMPUTER
PCMAV (PC MEDIA ANTI VIRUS)
PCMAV RC 24 UPDATE BUILD 2
One of the best antivirus in Indonesia even in the world.
Protect your computer from many viruses, Trojan, and worm.
This Antivirus (PCMAV) is made by PC MEDIA MAGAZINE. That magazine is one of the best computer magazine in Indonesia.
The interface of PCMAV is so friendly with beautiful appearance.
This antivirus (PCMAV) can be paired with CLAMAV.
PCMAV update build 2 can be downloaded from the direct link bellow
http://www.divshare.com/download/3672357-1fc
or if you don’t have PCMAV, please click

ANTIVIRUS
ANSAV ANTIVIRUS
Antivirus with a fast performance and small size. ANSAV is recommended as your portable antivirus.
ANSAV has more than 700 virus signatures.
ANSAV has reliable action to defeat viruses
ANSAV download http://www.ansav.com

ANTIVIRUS
CLAMAV
CLAMAV ANTIVIRUS is a reliable antivirus with more than 98.000 virus signatures.
It is very helpful to protect your computer.
http://www.clamav.com
This antivirus has main.cvd as virus database
http://db.local.clamav.net/main.cvd
Clamav provides daily update with release daily.cvd
http://db.local.clamav.net/daily.cvd
IF YOU USE PCMAV JUST PASTE MAIN.CVD AND DAILY.CVD TO PCMAV FOLDER AND LIBRARY CLAMAV.
Download library CLAMAV
http://downloads.sourceforge.net/visualsynapse/TClamav.0.1.1.zip
Extract TClamav.0.1.1.zip (file "libpclamav.dll" only)


SECURITY GLOSSARY
heuristic analysis, heuristics
A method of scanning that looks for patterns or activities that are virus-like, to detect new or previously undetected viruses.
macro virus
A malicious macro - a saved set of instructions created to automate tasks within certain applications or systems - that can be executed inadvertently, causing damage or replicating itself.

mass mailer virus
Viruses such as Melissa and Bubbleboy that propagate themselves rapidly using e-mail services.


mirror, mirroring
The act of copying the contents of one distributed software repository to another outside of the normal replication process.

Trojan horse
A program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. Trojan horses are not technically viruses, because they do not replicate.
virus
A program that is capable of replicating with little or no user intervention, and the replicated program(s) also replicate further.

worm
A virus that spreads by creating duplicates of itself on other drives, systems, or networks.


Free Download Manager
Free Download Manager
Features
Free Download Manager can help you to download files fast. Downloading processes can be paused and be continued easily. If the internet connection being failed or being down this software will continue downloading processes . Free download manager has special feature to ensure that the files isn’t dangerous or malicious. And you can see opinions from other downloader or user.
Score review
Free Download Manager is very helpful with less error than other download manager that writer had used. You can get this software easily and it’s free. You can get it from links
Three Thumbs up of Five Thumbs up is given to Free Download Manager.

FREEWARE
IZArc

Overview
If you ever used the Internet, you've probably encountered archive files like Zip, Rar, Arj etc. IZArc is the way to handle these archived files. It's both powerful and very fast. IZArc includes tight integration with My Computer and Windows Explorer. Drag and drop to or from Explorer, or zip and unzip without leaving Explorer. IZArc is extremely easy to use! To open an archive simply double click (or, you're working in Web style, click once) on an archive listed in My Computer or the Windows Explorer, drag and drop an archive onto IZArc, or use the standard Open dialog box. The main IZArc window features a list with the names, and sizes of all files in the open archive. This list can be scrolled and sorted on any field. A configurable tool bar provides fast access to commonly used actions. Extensive context sensitive help is always available. The Windows Drag and Drop interface is fully supported. You can drag and drop files from IZArc to other applications, or just into Windows Explorer to extract them into a specific directory. IZArc will extract the files before dropping them on the target application. The target application will treat the files as if they had been dropped from My Computer or the Windows Explorer. You can also drop archives on IZArc to open them, or drop files on IZArc to add them to an opened or new archive.

Features
IZArc supports the following archive file type: 7-ZIP, A, ACE, ARC, ARJ, B64, BH, BZ2, BZA, CAB, CPIO, DEB, ENC, GCA, GZ, GZA, HA, JAR, LHA, LIB, LZH, MBF, MIM, PAK, PK3, RAR, RPM, TAR, TAZ, TBZ, TGZ, TZ, UUE, WAR, XXE, YZ1, Z, ZIP, ZOO

All features of IZArc:
Create an archive
Add files to an existing archive

Delete files from an existing archive

Extract files from an existing archive
Test an archive file
Convert archive
Convert CD Images
Repair broken archive
Searching for any files in many archives
Favorite Folders
Obtaining a detailed list of files and information like compression rate, path, or size from an archive file
Supports both long and short 8.3 filenames
Disk spanning from and to multiple diskettes or other removable media

Implementing the possibility to sort the list items by name size, date and etc.
Full Drag & Drop support
CD/DVD Images support (ISO, BIN, MDF, NRG, IMG, C2D, PDI, CDI)
Integrating in Windows Explorer context menu
Automatic installation of most software distributed in archive files
Add / View comments in an archive
By double-clicking onto a file in the file list, it's opened with the program associated to this file type
CheckOut feature
Create a self-extracting archive
E-mail an archive
Checking for new updates
Build-in multilanguage support
Virus Scan feature
UU/XX/MIME Encode/Decode
Create Multi-Volume Set
Merge Multi-Volume Set
UnSFX (Convert self-extracting (SFX) .EXE files to standard archives)
Encrypt files using Rijandael - AES (256-bits) encryption (WinZip 9 compatible)
Decrypt (.ize) files

Score Review
Uh….. IZArc has a lot of features. What a complete software! But Writer finds error in multilingual / Multilanguage feature, writer’s pc has Multilanguage and fonts installed (east Asian included ) . IZArc can’t show some languages with unique fonts.
For information IZArc got awards from several sites

Three Thumbs up of Five Thumbs up is given to IZArc

Worms
This malicious program category largely exploits operating system
vulnerabilities to spread itself. The class was named for the way the
worms crawl from computer to computer, using networks, e-mail, and
other data channels. This feature gives many worms a rather high speed
in spreading themselves.
Worms penetrate a computer, calculate the network addresses of other
computers, and send a burst of self-made copies to these addresses. In
addition to network addresses, worms often utilize data from e-mail client
address books. Some of these malicious programs occasionally create
working files on system disks, but they can run without any system
resources at all (with the exception of RAM).
Viruses
Programs that infected other programs, adding their own code to them to
gain control of the infected files when they are opened. This simple
definition explains the fundamental action performed by a virus -
infection.
Trojans
Programs that carry out unauthorized actions on computers, such as
deleting information on drives, making the system hang, stealing
confidential information, etc. This class of malicious program is not a virus
in the traditional sense of the word (meaning it does not infect other
computers or data). Trojans cannot break into computers on their own
and are spread by hackers, who disguise them as regular software. The
damage that they incur can exceed that done by traditional virus attacks
by several fold.
Recently, the most widespread type of malicious program damaging computer
data has been worms. Then follow viruses and Trojans. Some malicious
programs combine features of two or even three of these classes.
Adware
Program code included in software, unbeknownst to the user, designed to
display advertisements. Adware is usually built into software that is
distributed free. The advertisement is situated in the program interface.
These programs often also collect personal data on the user and send it
back to their developer, change browser settings (start page and search
pages, security levels, etc.) and create traffic that the user cannot control.
All this can lead to breach of the security policy and to direct financial
losses.

Spyware
Software that collects information about a particular user or organization
without their knowledge. You might never guess that you have spyware
installed on your computer. In general, the goal of spyware is to: trace user actions on a computer; gather information on the contents of your hard drive; in such
cases, this more often than not involves scanning several
directories and the system registry in order to compile a list of
the software installed on the computer; gather information on the quality of the connection, bandwidth,
modem speed, etc.
Riskware
Potentially dangerous software that does not have a malicious function
but can be used by hackers as an auxiliary component for a malicious
code, since it contains holes and errors. Under certain conditions, having
such programs on your computer can put your data at risk. These
programs include, for instance, some remote administration utilities,
keyboard layout togglers, IRC clients, FTP servers, and all-purpose
utilities for stopping process or hiding their operation.
Yet another type of malicious program that goes along with programs like
adware, spyware, and riskware is programs that plug into your web browser and
redirect traffic. You have most certainly encountered such programs if you have
ever opened one web site when you thought you were pulling up another.
Jokes
Software that does not do any direct damage but displays messages
stating that damage has already been done or will be under certain
conditions. These programs often warn the user of dangers that do not
exist, such as messages that pop up about formatting the hard drive
(although no formatting actually takes place) or detecting viruses in
uninfected files.
Rootkits
Utilities used to conceal malicious activity. They mask malicious programs
to keep anti-virus programs from detecting them. Rootkits modify the
operating system on the computer and alter its basic functions to hide its
own existence and actions that the hacker undertakes on the infected
computer.

Other dangerous programs
Programs created to set up DoS attacks on remote servers, hacking into
other computers, and programs that are part of the development
environment for malicious programs. These programs include hack tools,
virus builders, vulnerability scanners, password-cracking programs, and
other types of programs for cracking network resources or penetrating a

Senin, 11 Februari 2008

ANTIVIRUS

SECURE YOUR PERSONAL COMPUTER

PCMAV (PC MEDIA ANTI VIRUS)

PCMAV RC 24 UPDATE BUILD 2

One of the best antivirus in Indonesia even in the world.
Protect your computer from many viruses, Trojan, and worm.
This Antivirus (PCMAV) is made by PC MEDIA MAGAZINE. That magazine is one of the best computer magazine in Indonesia.
The interface of PCMAV is so friendly with beautiful appearance.
This antivirus (PCMAV) can be paired with CLAMAV.
PCMAV update build 2 can be downloaded from the direct link bellow
http://www.divshare.com/download/3672357-1fc
or if you don’t have PCMAV, please click OTHER POST BELOW