Monday, November 30, 2009

Computer virus

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.
Infection strategies:
In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.
Nonresident viruses:-
Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.
Resident viruses:-
Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. This module, however, is not called by a finder module. The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer.
Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible. A fast infector, for instance, can infect every potential host file that is accessed. This poses a special problem when using anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can "piggy-back" on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful.

Stealth:-

Some viruses try to trick antivirus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the antivirus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the antivirus software, so that it seems that the file is "clean". Modern antivirus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.

Self-modification:-
Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses. If a virus scanner finds such a pattern in a file, it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.

Encryption with a variable key:-
A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible. Since these would be symmetric keys, stored on the infected host, it is in fact entirely possible to decrypt the final virus, but this is probably not required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least flag the file as suspicious.
An old, but compact, encryption involves XORing each byte in a virus with a constant, so that the exclusive-or operation had only to be repeated for decryption. It is suspicious for a code to modify itself, so the code to do the encryption/decryption may be part of the signature in many virus definitions.

Anti-virus software and other preventive measures:-

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.
Some anti-virus programs are able to scan opened files in addition to sent and received e-mails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.
One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent).
If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives

Friday, November 13, 2009

White Paper: The Evolution of Viruses

The first computer virus appeared more than 30 years ago, which renders this class of pestilence a mere infant compared to the real thing. But 30 years is an eon in technology time, and the critters—and their creators—have morphed and adapted to resist every effort to stamp them out. While early viruses were the innocuous work of geeks seeking a creative outlet, any of today’s computer viruses are hatched with criminal intent.




  • Primordial Viruses


The first computer viruses were created for exploration and experimentation; they often did little more than replicate. “Very early viruses were kind of proof of concept,” says Craig Schmugar, threat research manager for McAfee Avert Labs. “[They were] written by, effectively, geek programmers who had a lot of skill and who knew what they were doing. In some respects it was almost like an art form to them.”

Creeper, which appeared in the early 1970s on the ARPAnet (the progenitor of the Internet), is a case in point. It did little more than spread across the network and taunt its victims.

When John Walker, creator of the 20-questions-style game Animal, wanted a better distribution method than mailing tapes (this being 1975, magnetic tape was the prevalent means of data storage), he turned to a second program of his creation called Pervade. Attached to Animal, the Pervade code copied the game to all the directories the game player had access to.

As a result, both Animal and Pervade made their way into the accounts of system administrators, who spread both programs to even more systems—via tape, ironically enough. From there, it didn’t take long for the programs to spread to computers across the United States. Walker, who went on to found Autodesk, had no malicious intent—he just wanted to distribute his little game—but his technique blazed a path for modern virus propagators.

The first personal-computer virus broke into the wild in 1982. Created by high-school freshman Richard Skrenta, Elk Cloner spread by copying itself from an infected Apple II floppy disk to the host computer’s system memory. The virus would reside in memory until another floppy was inserted, at which point the program would copy itself to the new disk. When the disk was used to boot the machine (Apple II computers didn’t have hard drives), the embedded virus would display a short poem on every 50th startup.

Computer viruses became more prevalent in the 1990s, and they exploded with the widespread availability of Internet access. A hacker culture began to take root. Most virus writers remained tinkerers, but they sought more widespread fame and even formed communities.
The use of macro viruses was one common technique for spreading an attack as quickly as possible. The ubiquity of programs such as Microsoft Word and Excel—with their built-in scripting language—gave virus writers a new way to toy with systems.


  • Modern Times


The virus economy today is booming, for the virus writers as much as it is for the antivirus doctors. “It’s scary how literal a business it is,” says Zulfikar Ramzan, senior principal researcher at Symantec. “You have a lot of people who had really good technical skills, but when the economies in [Eastern Europe and Asia] drastically shifted… [they] were out of a job and needed some outlet to make income.” By analyzing attacks, Ramzan says he can tell the time of day these kinds of viruses are written—a fingerprint that reveals the authors to be 9-to-5 employees. They even write clean, commented code in order to ease collaboration.

These often-criminal enterprises create viruses that can generate illicit profits in several ways: Keyloggers can steal passwords, credit cards, and identities; and botnets create massive, distributed platforms that can be leased for spam mailings, phishing, denial of service attacks, and other uses. Some of these groups even sell virus toolkits with full graphical user interfaces, so their customers can install their own payloads. “They actually offer technical support if you’re having trouble getting it installed,” according to Schmugar.

The original viruses often simply taunted victims with their presence, but today these ventures make the most money by staying quiet to delay their removal. Some viruses even download modified antivirus software as their first step, blocking infection from competitors while fooling the host system into behaving as though it’s healthy.
Rootkits often help viruses avoid detection. These tools are nothing new; system administrators sometimes use them to manage PCs or hide critical files. But viruses often use these low-level tools to mask their presence while gaining complete access to a machine. Once free to muck around, viruses can modify the kernel and process list to stay hidden even if a user asks which programs are running. And boot-record viruses in the spirit of Elk Cloner are once again becoming popular because they can be difficult to detect and purge.
Security researchers and less-predatory hackers have also become a part of this monetized culture. Maintaining a “white hat,” or ethical, approach, they root out vulnerabilities in code and then follow established disclosure practices to inform companies about security flaws in their products before going public with the information. Some software developers even pay bounties for such tips.

  • Breaking In


Sometimes, computer owners make the hacker’s job entirely too easy. “The main security issues today are not so much technical as they are social,” notes Symantec’s Ramzan. “Hackers often just ring the doorbell and ask to be invited in. Although there are ways to compromise a system by finding a technical hole, the most common way hackers try to compromise systems is by finding the human hole, by emailing you an attachment with malicious code and telling you to execute it by yourself.” These initial bits of code often work as a stage downloader, with the main objective being to clear a path for the malicious bytes to follow.

Sloppy programming, on the other hand, creates opportunities for viruses to infect a system without a user’s help. The buffer-overflow attack is one of the most common exploits. The virus designer, for example, might identify a point at which the software expects user input. Instead of entering a normal amount of data, the virus floods the query, overwhelming the program. Executable code hidden within this tsunami of data gains control of the host machine and overrides the program, tricking the computer into running a new set of instructions.

“Code itself is a type of data,” Ramzan explains. “It’s basically data that can be executed on a machine. Sometimes that distinction is not actually made at a very low technical level, and that’s what often causes these vulnerabilities to occur. At the end of the day, they’re all just bits, and your computer has to know which one’s which.”
Fortunately, it’s easy to protect your PC from viruses and cyber criminals. Install an antivirus program, perform periodic scans, and don’t do anything that would make it easy for criminals and mischief-makers to take advantage of you.

Antivirus Software Roundup -- Protect Your PC!

Behind every piece of malware—be it a virus, spyware, or any other form of hostile, destructive code—is a sneaky, scheming scoundrel, oftentimes someone you’d never suspect. Antivirus suites promise to defend your PC against all the baddies. We test 10 of the leading products to see which ones are best at keeping your PC safe. You don’t need a military background to recognize that the Internet has turned intoa war zone. Not only are you always under attack, but the bad guys possess a seemingly endless arsenal of weapons that are constantly changing. Set foot in the wrong website and you might be stepping into a booby trap of malicious Javascript code. Toolbars and greeting cards come laced with spyware, hackers are finding new exploits faster than software vendors can patch the old ones, and rootkits have given virtual villains a way to stealthily penetrate deep into your system at the kernel level.


And if all that weren’t enough, social networking continues to sweep the web, making it even easier for morally bereft miscreants to spread their foul files. Can you really trust that MySpace page you’re viewing not to contain some hidden element ready to do you harm? You even need to be suspicious of IMs, and that includes messages seemingly originating from contacts on your buddy list. It’s enough to make you want to wave the white flag—and if you plan on going into battle alone, you probably should.

But you don’t have to fight the fight all on your lonesome. Several security vendors offer software packages that not only promise protection against viruses, but also purport to run off rootkits, stop spam dead in its tracks, and even circumvent websites from loading hidden malware before it has a chance to run amok on your PC. This got us wondering, just how much protection is actually necessary?

To answer that question, we hit up all the major security vendors and asked them to send us their most robust packages. We also gathered the most popular free antivirus programs for comparison. After all, power users know how to practice safe computing habits, which can go a long way toward PC safety. We’ll cut through the hype to tell you if the protection you get with a paid app is any better than what you can get for free—or if the paid programs, which have become so huge as of late, are too unwieldy and ultimately more troublesome than the viruses they’re meant to combat
  • Our Testing Methodology:
It doesn’t matter how effective an AV app is at catching viruses if it means we have to suffer through constant nagging or performance degradation in our day-to-day computing. We’ve identified the five criteria by which security apps should be judged.

  • System Performance and Scan Speed
We know you spent time researching components and toiling over your system build, so why let a poorly optimized program transform your hot rod into a horse and buggy? To gauge each AV package’s performance impact, we loaded up a series of action scripts in OSMark (http://tinyurl.com/OSMark), paying close attention to both memory and CPU activity. We then compared the results to that of a clean install.
We’re also interested in how long it takes to complete a full system scan. In today’s dual- and quad-core landscape, you no longer have to sit idly by waiting for a scheduled scan to finish, but if you suspect your system has become ill, you won’t want to do much of anything until your virus scanner produces a clean bill of health. With stopwatch in hand, we measured the time it took each program to run through its routine.
  • Annoyance:
Whether we’re using our PC for work or play, we don’t want to be bothered with near-constant nagging from our security software. An AV app should integrate seamlessly with the OS and be able to do its job with minimal interaction from the end user, while still offering at least some level of customization. Otherwise, it’s no less obtrusive than the viruses it’s supposed to be protecting against.

In order to assess how much each app intrudes on our day-to-day life, we performed a variety of common tasks to see how the AV software responds, if at all. This includes web surfing, downloading files, running executables, playing games, and everything else you’re likely to do with your PC.
We also took into account how much harassment we can expect to receive when the subscription runs out.
  • Features and Implementation:
Anyone who’s ever shopped for a new car knows what it’s like to be pressured into paying extra for all kinds of upgrades. And just because the salesman is attempting to increase his profit margin doesn’t mean you can’t both benefit from tacking on useful additions, but that only works if you’ll actually use the added amenities. Do you really need six cup holders in a two-seat sports car?

Likewise, there’s no point in owning a security suite stuffed with apps if most of them suck. Not only that, but you need to consider whether this added functionality is easy to use and how much pestering you can expect from disabling unused features. We take all this into consideration.
  • How To Avoid Viruses

Captain Obvious says that the best way to prevent infection is to avoid viruses in the first place, but what he doesn’t tell you is how to do it. And even though hackers continue to get more cunning in both delivery and execution, you can tip the odds considerably in your favor by practicing safe and sane computing.

If you receive an unknown or unexpected attachment, don’t open it no matter who it came from. Not only are some viruses capable of emailing themselves to everyone they find in an infected user’s address book, but inexperienced computer users are just as guilty of passing along payloads as hackers are of distributing them.

BitTorrent sites and peer-to-peer networking clients are also common modes of spreading infection. When attempting to download a legitimate program—a Linux distro, for instance —use the link provided at the vendor’s website. Pirated software is a particularly popular source of malware, so if your moral compass doesn’t steer you toward the straight and narrow, the risk of infection should.
And finally, get in the habit of regularly checking for software updates. New exploits are always being discovered in Windows, QuickTime, web browsers, and other common programs




computer virus


Computer virus rogue computer program , typically a short program designed to disperse copies of itself to other computers and disrupt those computers' normal operations. A computer virus usually attaches or inserts itself to or in an executable file or the boot sector (the area that contains the first instructions executed by a computer when it is started or restarted) of a disk; those that infect both files and boot records are called bimodal viruses. Although some viruses are merely disruptive, others can destroy or corrupt data or cause an operating system or applications program to malfunction. Computer viruses are spread via floppy disks, networks, or on-line services. Several thousand computer viruses are known, and on average three to five new strains are discovered every day. Virus programs can also infect advanced cellular telephones.


Antivirus programs and hardware have been developed to combat viruses. These search for evidence of a virus program (by checking for appearances or behavior that are characteristic of computer viruses), isolate infected files, and remove viruses from a computer's software. Researchers are working to sidestep the tedious process of manually analyzing viruses and creating protections against each by developing an automated immune system for computers patterned after biological processes. In 1995 Israel became the first country to legislate penalties both for those who write virus programs and those who spread the programs.

A distinction should be made between a virus—which must attach itself of another program to be transmitted—and a bomb, a worm, and a Trojan horse. A bomb is a program that resides silently in a computer's memory until it is triggered by a specific condition, such as a date. A worm is a destructive program that propagates itself over a network, reproducing as it goes. A Trojan horse is a malicious program that passes itself off as a benign application; it cannot reproduce itself and, like a virus, must be distributed by diskette or electronic mail.

Wednesday, November 11, 2009

A Computer Virus Will Cause Damage to Your PC

Unless you have ever seen how a computer virus can affect a computer; you may not know how bad the damage can be; the thing is that if your system does acquire a virus; most likely you will have to spend the money to get a brand new one. However just because you run out and purchase a brand new system; does not mean that you should not know how to take preventative measures to ensure that it does not happen again.


People do not like to talk about computer viruses; because everyone knows that a computer virus will cause damage to your PC. People understand that there are certain things you have to be aware of online. The first and foremost important thing is to avoid opening up emails from people you do not know. We all get junk email and sometimes that is all we get; however the main thing is to avoid opening it; because it could contain a virus that could harm your system.

Yes you system can become infected by a virus and unfortunately if it is infected; then it can become useless. There is basically nothing you can do with a computer that has been infected and the worst part is that it will be difficult to access all the information on your present computer.

People who are searching for diagnostics tools need to realize that when they run into the free sites that are available online; you have to be careful. You never know what these sites contain and unfortunately since they are free; they may not be the safest sites to use. Even if you are looking for a way to clean up your system; I highly recommend that you use a reputable service that is known for cleaning up systems. Yes you will have to pay a small one time fee; however if you get a virus on your computer; then it will cost you a whole lot more money to replace your current system.

The worm is one of the viruses that is sent by someone sending you a file. If you do get this virus the good thing is that you can not spread it to someone else's computer. You will notice if you do get a worm; that it will quickly bring down your system by eating up all the bandwidth and the memory.

No matter what type of virus your system acquires whether it is a worm, trojan or a virus; you will know that a computer virus will cause damage to your PC. The main thing that I have learned from my personal experience is to make sure that you are cleaning your system on a regular basis to ensure that your hard drive remains clean and clutter free. If you have no idea how to clean up your system; then you can easily visit the site below and get access to the hottest diagnostic tools that will ensure that you PC keeps running the way that it should.

Scan your system right now to ensure that you have not been infected by anything online that can damage your PC. Stop making excuses and visit any site online for free to scan ur PC.

Tuesday, November 3, 2009

Avast! Home Edition 4.8.1351 [Freeware Antivirus]


Avast! Home Edition 4.8.1351



Filename: setupeng.exe


File size: 36.03MB (37,778,896 bytes)

Requirements: Windows (All Versions)

License: Non-Commercial Freeware

Date added: August 18, 2009

Author: Alwil Software

 
Homepage: http://www.avast.com/

  
avast! antivirus Home Edition represents the best free antivirus protection currently available on the market.

  
This edition is FREE OF CHARGE for non-commercial & home use. Its features include:

 
  • Anti-spyware built-in
  • Web Shield
  • Anti-rootkit built-in
  • Automatic updates
  • Strong self-protection
  • Virus Chest
  • Antivirus kernel
  • System integration
  • Simple User Interface
  • Integrated Virus Cleaner
  • Resident protection
  • Support for 64-bit Windows
  • P2P and IM Shields
  • Internationalization
  • Network Shield

 

Download Avast! Home Edition latest version

The Best Anti-Virus Approach For Home Personal Computer Use

Of course anti-virus software is an important part of your war chest for protecting PC use at home .... but "working safely" is just as important. My techie Brother recommends not running any AV software on your windows machine all of the time .... though one thing you should have on ALL the time is Zone Alarm free version.

What you can always do though is never ever use Microsoft Outlook or Outlook Express and never use Internet Explorer. Always virus check any files you download which aren't from utterly reputable sources i.e. Java updates from SUN, etc, using the very handy online scanner from Trend Micro. Other machines on your LAN (i.e. the kids) should be firewalled from your machine and everything networky should go through a Linux server running iptables Firewall and an ADSL router (NOT modem).

These safety-101 basics can help you not to worry .....

* Incoming rogue internet connections.

None of the Windows machines are directly addressable from the internet, only the firewalled Linux server.

* Dodgy emails being executed by your mail client.

Thunderbird never loads images from the internet, never runs javascript or embedded media, and will flag suspect content such as obfuscated URLs and spam pretty reliably. Always delete suspect email without opening it.

* Malicious website content.

Although Firefox has its bugs they are usually fixed exceptionally quickly. Don't go to 'those' sort of sites which are likely to have unpleasant scripts on them.

* Unknown background network activity.

Zone alarm while not perfect will alert you to any unauthorised programs trying to gain network access.

* Compromised downloads.

Virus scan them with the above mentioned Trend Micro tool before executing any programs. The TM database will be the most current revision every time and it only takes a minute or so to do.

It's important to remember that an AV solution is NOT going to protect you or your data or your network, working on your PC sensibly is way more valuable to you with your AV tool as a backup for when your vigilance lapses. I've known of commercial AV software failing to the tune of dozens of infected systems on a corp network, slowing machines to a crawl, etc!

Adhering to the above doctrine .... the number of viruses my techie brother has had in the last 3 years?
 
Labels: Anti-Virus, Computer Virus, Trend Micro, Virus Scan, Zone Alarm

Smadav 2009 Rev. 7.1 - Local Antivirus of Indonesia

Download SMADAV 2009 Rev. 7.1 for local virus threats in Indonesia ...



SmadAV 2009 better than any import antivirus for protection and cleaning of widespread virus in Indonesia since the development SmadAV focused and specialized only for in Indonesia, while import antivirus could be said less suitable for the Indonesian user because its for international viruses cleaning or protecting and unfocused to viruses that made by Indonesian. Currently SmadAV 2009 was recognized more than 90% viruses widespread in Indonesia.


This is the reasons why using SmadAV:


  • SmaRTP technology, SMART-Protection
  • Smad-Lock Technology
  • Smart Scanner
  • Infected documents Cleaner
  • Cleaning & repairs (1500 value) Registry
  • Latest updates on every revision
  • Manual Weapons is very easy to use
  • Free to download
  • SmadAV team is professional team
  • Portable and support all OS Windows
  • The best Site and most complete antivirus
  • The secret features?

In this time SmadAV rev. 7.1 has been enhanced to be much faster and lighter in detecting and securing your computer from virus threats in Indonesia. New features added such as Smad-Turbo (Scanning 10x faster), Smad-Theme (Changing the color theme), Smad-Ray (Auto flash is very fast scan). This all makes SmadAV become one of the fastest antivirus and lightest in the world, so SmadAV still be used on computers with lower specifications though.

 

 Completion SmadAV 2009 Rev. 7.1 :

  •   Addition of a new virus database
  •  Auto Update for SmadAV Pro on Vista & Win7
  •  Scan Bug fix with SmadAV
  •  Quarantine loading faster
  •  Send statistics to the SmadAV server
  •  Cleaning bug in the fusion virus
Start download SMADAV 2009 Rev. 7.1 ...
 

Monday, November 2, 2009

Panda Internet Security

What the Research Says:


Security suite.Security suites bundle antivirus and anti-spyware software, a firewall and other components into a single program. Reviews say the secondary features (such as spam prevention) of Panda Internet Security 2008 aren't very good, but it excels at its primary tasks (virus and spyware prevention). User reviews indicate no conflicts with other security programs. Panda is also cheaper than other security suites. Panda's standalone Antivirus 2008 is about $10 cheaper, but not recommended in the only early review we found.

Panda Antivirus Plus Firewall 2008





 
 
 
 
 
 
 
 
 
 
 
Latest generation antivirus


Automatically detects and eliminates all types of viruses.
If content is missing from your hard disk, if you have problems starting your computer, or if some of your files are unusable, you can be sure you've been hit by a computer virus. You can be infected just by surfing the Net, downloading a file, or opening an email attachment. There are also the dangers of worms and Trojans which now use new stealth techniques to evade detection.

With Panda Antivirus + Firewall 2008 you can use the Internet and download or share files in the knowledge that you are fully protected against all types of viruses, worms and Trojans. Forget about infections!

Powerful AntiSpyware

Keeps your PC free from spyware.
Computer slowdowns, annoying and aggressive pop-up ads, sudden changes to your system settings... these are just some of the effects that spyware can have on your PC. The real danger however is that these threats can steal information about your Internet activity and then use it without your knowledge.

Panda Antivirus + Firewall 2008 automatically detects and removes spyware and other annoying programs. Safeguard your privacy!
Personal bi-directional firewall

Blocks hackers and intruders.

When you connect to the Internet, many programs try to access your PC. Some of them are not dangerous, such as those that let you update applications you have installed, but others will try to exploit your connection or control your computer.

Panda Antivirus + Firewall 2008 includes a configurable personal firewall to stop intruders and hackers from accessing your PC. Turn your computer into a fortress!

AntiPhishing
Protects against online fraud.

Certain emails are designed to trick you into revealing your confidential bank details. They may appear to have been sent from your bank, but they have not. Falling into the trap can be costly: it could give the phishers complete access to your accounts. Panda Antivirus + Firewall 2008 can identify these fraudulent emails, and prevent you from revealing your bank details, account numbers or other confidential information.

Panda Antivirus + Firewall 2008 will keep you safe from these dangerous scams. Bank and shop online with complete peace of mind!

Protection against dangerous websites

Prevents access to websites harboring threats.

Many infections occur simply when you visit a certain web page. Panda Antivirus + Firewall 2008 recognizes dangerous web pages and prevents you from opening them and becoming infected. This feature is particularly effective against certain types of spyware and online fraud. Surf the Internet safely!

TruPrevent® Technologies

Double protection.
Some new threats are able to spread globally in just a few hours. In this time, your PC could be unprotected as your antivirus will not have had time to update. The TruPrevent® Technologies included in Panda Antivirus + Firewall 2008 detect and block these unknown threats, intelligently scanning program behavior. This means your PC will have the reinforced protection it needs. Stay one step ahead of unknown threats!

AntiRootkit

Detects threats that try to hide on your PC.

Rootkits can be used to hide threats and prevent them from being detected by security solutions. These threats can then act with impunity on your system. With Panda Antivirus + Firewall 2008 you won't have any problem, as its reinforced protection system can detect threats that use this stealth technique. Protect yourself from hidden threats!

Download:-
http://rapidshare.com/files/82859474/Panda_2008.By.VICTORIOUS.rar

Panda Internet Security 2008 v12.00.00
















Global protection to let you use the Internet with complete peace of mind

Protects your confidential information. Keeps hackers out. Prevents theft of bank details. Keeps PCs free from viruses and spyware.Blocks spam. Protects your children on the Internet.
Enjoy truly global security with the new Panda Internet Security 2008. All your computer activity will be fully protected against identity theft and you can forget about viruses, spyware, hackers, spam, online fraud and other Internet threats. You'll also be able to make automated backup copies of your most important documents and optimize the performance of your computer.

Includes:

- Antivirus
- AntiSpyware
- AntiPhishing
- Firewall
- Identity Protect
- Backup
- TruPrevent
- AntiSpam
- Parental Control

FEATURES:
New! Automated backup system
Safeguard your files against accidental loss or damage.

No doubt at some time or other you have lost important documents that were saved on your PC, either through unintentionally deleting them or due to hard disk problems or other accidents. With Panda Internet Security 2008 you can now make simple automatic backup copies that will let you restore these files whenever you need. You can also select the files that you want to save and make backup copies either on hard disk, CD, DVD or other external drive. Back up your files quickly and easily!

New! Optimized PCperformance system.
Panda Tuneup: helps optimize operating system performance.

Sometimes your computer may operate erratically or slow down for no apparent reason. In these cases, the first thing to do is to use the system's optimization and maintenance tools. Panda Internet Security 2008 helps you access these utilities directly. First it cleans out all unnecessary components (removing cookies, temporary files, items in the recycle bin, etc.) and then defragments the disk to optimize performance. Keep your computer in top shape!

Offer! Now 12 months' free online backup
With up to 1 GB of storage space on a secure online server.

The ability to access your most important documents securely from any computer offers numerous advantages. Panda Internet Security 2008 lets you make backup copies -quickly and simply- on a secure Internet server, with up to 1 GB of storage space for 12 months. Safeguard your information online!

Latest generation antivirus
Automatically detects and eliminates all types of viruses.
If content is missing from your hard disk, if you have problems starting your computer, or if some of your files are unusable, you can be sure you've been hit by a computer virus. You can be infected just by surfing the Net, downloading a file, or opening an email attachment. There are also the dangers of worms and Trojans which now use new stealth techniques to evade detection.
With Panda Internet Security 2008 you can use the Internet and download or share files in the knowledge that you are fully protected against all types of viruses, worms and
Trojans. Forget about infections!

Powerful AntiSpyware
Keeps your PC free from spyware.

Computer slowdowns, annoying and aggressive pop-up ads, sudden changes to your system settings... these are just some of the effects that spyware can have on your PC. The real danger however is that these threats can steal information about your Internet activity and then use it without your knowledge.

Panda Internet Security 2008 automatically detects and removes spyware and other annoying programs. Safeguard your privacy!

Panda Identity Protect
Secures your personal data.

Whenever you shop or bank online, you have to provide data to verify your identity, such as your account number, credit card number or other ID. This information is sensitive and needs to be protected. The new Panda Internet Security 2008, through the Identity Protect feature, lets you know at any time when this type of data is about to be sent out of the computer so you are in control at all times. Don't let anyone access your data without your permission!

Personal bi-directional firewall
Blocks hackers and intruders.

When you connect to the Internet, many programs try to access your PC. Some of them are not dangerous, such as those that let you update applications you have installed, but others will try to exploit your connection or control your computer.

Panda Internet Security 2008 includes a configurable personal firewall to stop intruders and hackers from accessing your PC. Turn your computer into a fortress!

AntiPhishing
Protects against online fraud.
Certain emails are designed to trick you into revealing your confidential bank details. They may appear to have been sent from your bank, but they have not. Falling into the trap can be costly: it could give the phishers complete access to your accounts. Panda Internet Security 2008 can identify these fraudulent emails, and prevent you from revealing your bank details, account numbers or other confidential information.

Panda Internet Security 2008 will keep you safe from these dangerous scams. Bank and shop online with complete peace of mind!
TruPrevent Technologies

Double protection.
Some new threats are able to spread globally in just a few hours. In this time, your PC could be unprotected as your antivirus will not have had time to update. The TruPrevent Technologies included in Panda Internet Security 2008 detect and block these unknown threats, intelligently scanning program behavior. This means your PC will have the reinforced protection it needs. Stay one step ahead of unknown threats!

AntiRootkit

Detects threats that try to hide on your PC.
Rootkits can be used to hide threats and prevent them from being detected by security solutions. These threats can then act with impunity on your system. With Panda Internet Security 2008 you won't have any problem, as its reinforced protection system can detect threats that use this stealth technique. Protect yourself from hidden threats!

AntiSpam

Automatic blocking of junk mail.
No doubt you often receive emails from unknown or dubious senders. This avalanche of spam is time-wasting and can make it difficult to find the emails you really need to read. The reinforced anti-spam technology in Panda Internet Security 2008 automatically filters junk mail, keeping your inbox free from spam. Rid yourself of the avalanche of junk mail!

Parental control

Restricts access to inappropriate websites.
If you're worried about your children accessing violent, pornographic or racist content, or that your employees are wasting valuable time visiting non-work related websites, Panda Internet Security 2008 has the solution. Its content control feature can let you decide what type of web pages each user of a computer can view, with a range of custom filters (child, adolescent, employee…) You decide how the Internet should be used!

SYSTEM REQUIREMENTS:
Processor: Pentium 300 MHz or faster
RAM: 128 MB (256 MB recommended to install TruPrevent Technologies).

Hard Disk: 160 MB free space
Operating System: Windows® Vista (Home Basic/Home Premium/Business/Ultimate -32 & 64 bits), Windows® XP (32 & 64 bits), Windows® 2000

Internet Explorer 5.5
Size: 52.7 MB


Download:
http://rapidshare.com/files/124534014/Panda_Internet_Security_2008_v12.00.00.rar

Bit defender V10.0 + Keygen


Info-

The purpose of the antivirus module is to ensure detection and removal of all viruses in the wild. BitDefender Antivirus uses robust scan engines certified by ICSA Labs, Virus Bulletin, Checkmark, CheckVir and TÜV.

The firewall module filters network traffic and controls the access permission of applications connecting to the Internet. In Stealth Mode, your computer is “hidden” from malicious software and hackers. The firewall module is capable of automatically detecting and protecting against port scans (streams of packets sent to a machine in order to find “access points”, often in preparation for an attack).

Download-
http://rapidshare.com/files/23709476/BitDefender_Antivirus_Plus_v10.rar

Keygen-
http://rapidshare.com/files/23709500/BitFender-Antivirus-Keygenrar.rar
Pass-

cbkste

Bit defender 2008(11) total security patch only
it defender total security patch is available here and instruction is also available

Download-
http://rapidshare.com/files/77849827/bit_defender.rar
If it asks password then type :

JujU

Bit Defender Internet Security v10 FULL-Patch Included

Antivirus

The purpose of the antivirus module is to ensure detection and removal of all viruses in the wild. BitDefender Antivirus uses robust scan engines certified by ICSA Labs, Virus Bulletin, Checkmark, CheckVir and TÜV.

IMPROVED Proactive Detection

B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) emulates a virtual computer-inside-a-computer where pieces of software are run in order to check for potential malware behavior. This BitDefender proprietary technology represents a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not yet been released.
Permanent Antivirus Protection

The new and improved BitDefender scanning engines will scan and disinfect infected files on access, minimizing data loss. Infected documents can now be recovered instead of being deleted.
NEW Rootkit Detection and Removal

A new BitDefender module looks for rootkits (malicious programs designed to control victim computers, while staying hidden) and removes them on detection.
NEW Web Scanning

Web traffic is now filtered in real-time even before reaching your browser, providing a safe and enjoyable web experience.
Peer-2-Peer and IM Applications Protection

Filters against viruses that spread via instant messaging and file sharing software applications.

Full E-mail Protection
BitDefender runs on the POP3/SMTP protocol level, filtering incoming and outgoing e-mail messages, regardless of the e-mail client used (OutlookTM, Outlook ExpressTM, The Bat!TM, Netscape®, etc.), without any additional configuration.

Antispyware
BitDefender monitors and prevents potential spyware threats in real-time, before they can damage your system. By making use of a comprehensive database of spyware signatures, it will keep your computer spyware-free.

Real-Time Antispyware
BitDefender monitors dozens of potential “hotspots” in your system where spyware might act, and also checks any changes made to your system and software. Known spyware threats are also blocked in real-time.

Spyware Scanning and Cleaning
BitDefender can scan your entire system, or just part of it, for known spyware threats. The scan uses a constantly updated spyware signature database.

NEW Privacy Protection
The privacy guard monitors HTTP (web) and SMTP (mail) traffic flowing out of your computer for what might be personal information –such as credit card numbers, Social Security numbers and other user-defined strings (e.g. bits of passwords).

Anti-Dialer
A configurable anti-dialer prevents malicious applications from running up a huge telephone bill at your expense.

Cookie Control
The antispyware component filters incoming and outgoing cookie type files, keeping your identity and preferences confidential when you’re browsing the Internet.

Active Content Control
Proactively blocks any potentially malicious application such as: ActiveX, Java Applets or Java Scripts type codes.
DOWNLOAD FULL PROGRAM HERE:
Code:
http://www.fileegg.com/files/1EA5C5901AB05319

DOWNLOAD PATCH HERE:
http://www.fileegg.com/files/08D84EDE16235C69

Bit defender V10.0 + Keygen - Best of all




Info-
The purpose of the antivirus module is to ensure detection and removal of all viruses in the wild. BitDefender Antivirus uses robust scan engines certified by ICSA Labs, Virus Bulletin, Checkmark, CheckVir and TÜV.

The firewall module filters network traffic and controls the access permission of applications connecting to the Internet. In Stealth Mode, your computer is “hidden” from malicious software and hackers. The firewall module is capable of automatically detecting and protecting against port scans (streams of packets sent to a machine in order to find “access points”, often in preparation for an attack).

Download Link:
http://rapidshare.com/files/110391768/BD_CW_Keys.rar

Bit Defender 90 Days FULL LICENSES PROMO
http://www.feedmy.net/2008/08/bitdefender-90-days-full-internet.html
go there, then when you see the link,
just enter name and email and you will receive your code

Bit-Defender Total Security 2008(New!)



What it includes:


1. World #1 Antivirus
2. world #1 firewall
3. world #1 antispam
4. privacy control
5. parental control
6. Defrag Disks
7. Clean internet files
8. Clean registry
9. Find duplicate files
10. Shred Files
11. Recover registry
12. back up your system
13. restore your system
14. burn directly your back on dvd/cd
15. burn your email back/chat records to cd/dvd
16. burn any video, folder, files to dvd/cd as iso and other formats formats
17. as on date nearly 1 million antivirus signatures .....
and many more...

downlaod:
http://rapidshare.com/files/92491270/BitD2008.rar

Bit defender

Bit defender total security 2008(100% working -full)


















view the advantage of using Bit defender total security.The links to active product comparison chart

Code:
http://www.bitdefender.com/site/view/antivirus-comparison.html?na_usa_itxt_link=homeoficon

install note

This will come handy during installation

*first disconnect from network

*open the setup

*install it as usual but dont enter the product key at the time

*complete installation and then restart the computer

*now connect to network and update the product

*disconnect

*there will be a flash message that you are using trial version

*now click register in that and enter the product key from keygen in the "patch.rar" file and then press next

*it will instruct u to update at the earliest, then click "create an account later"and finish installation

*now copy the "patch.exe"file to installation folder and patch it

*connect to network

*update now and then click register to see expiration date lol!

then finally make a full system scan

download
http://rapidshare.com/files/123912490/bitdefender_totalsecurity_2008_vas_7831.rar
patch
http://rapidshare.com/files/122060065/weekly.exe
http://rapidshare.com/files/122980473/weekly_new.exe

Bit defender total security 2008 - V11.0.9
Real-time Antivirus Protection

Protects your PC in real time from known viruses, spyware and other malware with hourly updates

Proactive Protection

Blocks unknown viruses using advanced proactive detection techniques

Anti-Rootkit Detects and removes the newest breed of hidden threats known as rootkits
Gamer Mode

Provides a smooth gaming experience by reducing the system load to a minimum

Privacy Protection

Reduces the risk of identity theft by preventing personal information leaks via e-mail or web.

Anti-Spyware

Monitors and prevents spyware threats in real-time

Web Anti-Phishing

Protects against phishing attacks by filtering all accessed web pages for fraud attempts

Firewall Protection

Controls applications’ access to the Internet while “hiding” your computer from hackers

Wi-Fi Wireless Protection

Alerts you to unauthorized access to your Wi-Fi network by notifying you when computers log in to the network.

Protection from Spam Email

Now responds faster to new spamming techniques with new adaptive engines

E-mail Anti-Phishing

Prevents different types of spam and scam e-mails from reaching your Inbox
Parental Control

Blocks access to inappropriate websites and e-mail

Web Time Limiter

Allows or blocks web access during specified time periods

Application Control

Allows user to limit access to certain applications

Data Backup

Safeguards your data by creating backup copies to local and removable drives, CD-R/RW or DVD-R/RW

PC Tune-up
Improves your PC performance by removing unnecessary files and registry entries
Trace clean-up
Completely erases files and "traces" of files from disk to prevent recovery

downlaod:
http://rapidshare.com/files/70411738/BitDTS2008_11.0.9.rar

Password if needed:
littlewhitelines.co.uk

Bit Defender 8 Anti-Virus [Full Appz+Serial+Crack]


Norton Internet Security 2009


Review , Comparisons and details of top Antivirus Softwares
Norton Internet security 2009







Norton Internet security 2009 will not affect system performance like the older versions.this time also there is no compromise in the case of security. one of the major feature is pulse updates which will deliver more frequent and thus smaller signature updates. Other important differences from older versions of Norton anti virus are little time for install and update less time requirement for full system scan etc. Full version of Norton Internet security 2009 is priced 68.98$ for one year
Posted by Picasa

Ad-Aware Free Anti-Malware

Proactive protection against today's online threats


 
We have taken the security product millions of people know and trust one step further to give all users the power to protect themselves. By combining Lavasoft's pioneer anti-spyware technology with advanced Genotype detection, Ad-Aware Free is your proactive malware removal tool, allowing you to combat today's toughest cyber threats.

Ad-Aware Free Anti-Malware features real-time protection, a rootkit removal system, automatic updates, and much more — to ensure that you have the power to protect yourself online.


Features
Core malware protection trusted by millions around the world.


 
  • New!Core Malware Protection
  • Ad-Watch Live! Basic integrated real-time protection
  • New!Genotype Detection Technology
  • New!Behavior-Based Heuristics Detection
  • New!Rootkit Removal System
  • New!The Neutralizer Malware Removal Tool
  • New!Download Guard for Internet Explorer
  • Minimal Strain on System Resources
  • Easy to Install & Use
  • Automatic Updates


Tech Specs
  • Processor
          P600 MHz or better

  • RAM
         Operating system + 100 MB

  • Hard Disk
         100 MB free space recommended

  • Supported Operating Systems
          Windows 7 (32 and 64-bit), Windows Vista (32 and 64-bit), Windows XP (32-bit), Windows 2000 Pro

Supported Languages

English, French, German, Japanese, Traditional Chinese, Simplified Chinese, Italian, Dutch, Spanish, Portuguese, Swedish

NOTE! We now give you the power to add your own language. The new XML-based language format of the user interface allows you to edit and upload translated text for others to use. Visit MyLavasoft for more information.


Windows Vista consumer security software providers

We recommend that you install security software to help protect your computer from viruses and other security threats, and that you keep your security software up to date.


Some companies use products that appear to be antivirus programs to install viruses or malware on your computer. When you install the program, you might also be installing the virus or other malware, without knowing it. Many companies, including those listed on this page, distribute antivirus programs. You should carefully investigate the source of antivirus and other products before downloading and installing them.
The companies listed below provide consumer security software that is compatible with Windows Vista. Just click the company name to see the Windows Vista-compatible product they offer. For business security software that is compatible with Windows Vista, please visit the Windows Vista Compatibility Center or contact your security vendor of choice.
Important: Before you install antivirus software, check to make sure you don't already have an antivirus product on your computer. If you do, be sure to remove the product you don't want before you install the new one. It can cause problems on your computer to have two different antivirus products installed at the same time








Free antivirus - Avira AntiVir

Free antivirus - Avira AntiVir

 


 
Avira AntiVir Premium
Avira AntiVir Premium provides professional protection against viruses and malware, worms, Trojans, adware, spyware and phishing.

 
With real-time on-access scanning, profile-based on-demand scans and scheduling of full system scanning and updates, it offers premium protection. It includes an integrated POP3/SMTP MailGuard that scans email traffic.

 
With WebGuard you are protected in real-time from DriveBy downloads and viruses, when surfing web sites that have been compromised or have malicious content on them.

 
With a user-friendly control center, quarantine management, fast performance and world leading detection rates, Avira AntiVir Premium provides essential protection for your PC.

 

 
Recommended

 
Avira Premium Security Suite

 
  • Avira AntiVir Premium features, plus:
  • AntiSpam
  • FireWall
  • Game Mode
  • Backup
  • AntiPhishing
Enhance your security protection to the maximum with the complete protection of the Avira Premium Security Suite.
Forum:

On the Avira Personal Support Forum you can read and discuss various topics, such as:

• All about viruses, Trojans, Dialers, Adware and Spyware
• General questions about installation, configuration, updates etc.
• Questions and answers about AntiVir products.


FAQ:

Looking for some answers?

We have collected some of the most frequent questions from AntiVir users.
Maybe one of these crossed your mind, too...
Browse the FAQ list and see if the answer you are looking for is already given.


Documentation:

If you want to make the most of your Avira AntiVir products and tools, here is the current documentation.

The User Manual gives you full details about each feature and all configuration options.



Tutorials / Install Guides:

Let us show you how easy it is to use Avira AntiVir. With a few mouse-klicks, Avira AntiVir is installed and ready for action.


•Downloading AntiVir with Internet Explorer
•Downloading AntiVir with Mozilla Firefox
•How to install Avira AntiVir Personal