Main » Архив материалов
Quite strange things are happening now, dear. Looked at the statistics recently one of his projects "Reytinge@Mail.ru" and came across this interesting thing here is:



scratched his head, thought a little - well thought, well a few bugs left, well, happens. But then curiosity leaped, and I climbed up to watch the open statistics neighbors ...



Finally, after ten minutes of surfing, I realized that such a request has almost all its neighbors in the rankings, almost all of my side projects, and projects my friends. Kopnuv deeper, it turned out that I got out in the statistics not only left requests, but to a page that has all smacks of delusions:



The link that I found, as time is a site offering the sale of licenses for JBC v3 and SPAM DirectMailer. In tech support suggested that the resource owner to put myself, my counter, but so? Why would a site whose daily attendance significantly higher attendance of my small candle factory, my counter?
... Читать дальше »
Просмотров: 627 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (1)

This information is habratopik for thought for users of the popular client-downloader FlashGet. Apologize for the lack of job options, but something Habr buggy.

To search for UFOs Malvar and control it I use the products of the company Symantec. And just yesterday I have a problem with the fact that the NIS was matyukatsya on FlashGet. I searched a bit online and as a result summarizes:
1. Multiple messages in a support from users that their computers antivirus was detecting Trojans in the directory FlashGet.
2. Panic Online program Flashget.
3. The main symptoms is the appearance in the files named:
  • inapp4.exe
  • inapp5.exe
  • inapp6.exe

  • detected by Kaspersky Antivirus as:
  • Trojan-Dropper.Win32. Agent.exo
  • Dropper.Win32.Agent.ezo
  • Trojan-Downloader.Win32.Agent.kht
  • 4. No other Trojan programs through which these files can get into the system without being detected.
    5. The audit revealed that in addition to the Tr ... Читать дальше »
    Просмотров: 693 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    On the Security @ Interop - an event, it is unfairly overlooked the attention of many IS-Schnick, we could take the pilot (April) issue of the magazine C'T-Russia, which I gladly did. Now he walks on his hands the whole company.

    Found in C'T very interesting and thoughtful comparative testing of 15 antivirus programs. Hands reached finally to "treatment" of this very "tasty" content. I will cite here only the introductory part of the methodology and conclusions. That is what is exactly that will be a comprehensive analysis on which the recently fashionable (and now you can) to scold or praise products of different vendors.

    I think that the team of the new magazine on computer technology as an integrated test - this is a great application for the leadership, because tests are not worse than those that conducts Neil Rubenking of PC Magazine USA. Now there's something to read and Russia - made their own hands testing, human language is described and fairly submitted that tog ... Читать дальше »
    Просмотров: 553 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    Just two publications have attracted my attention today. And let one already for April 30 but who now reads the CW?

    So, "an outpost against viruses" by special correspondent of open systems in St. Petersburg, Dmitry Zhelvitsky, and "Interview with Mikhail Penkovsky, commercial director of Agnitum" on his beloved I anti- Malvar.

    What's worth mentioning? Announce Anti-Virus Agnitum passed without a press pump, "The official presentation of new items happened after the first month of its sales through the Internet and in conjunction with the release of a boxed product." The cost of annual license - 499 rubles, while "Agnitum ready to raise the price, if asked to do distributors. This applies to both Russian and foreign-language versions. "



    Agnitum promotion decisions in Russia ... and abroad is very different. In western countries ... Agnitum has resorted to the tactic of incentives installations through distribution to all registered users of Outpost free Eng ... Читать дальше »
    Просмотров: 623 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)



    The domain name chronopay.com, the theft of which the company ChronoPay (owner of an online processing system with the same title) became known on Monday, returned to the rightful owner. If someone does not know - was recently a post about Chronopay and it was reported that the hacked database, but this was not the case - only the domain was hijacked.

    Now chronopay.com site is under the control of the company ChronoPay. Domain chronopay.com was returned to the registrar directNIC Thursday 12/30/2010 (attackers stole the domain chronopay.com, immediately changed the company, domain registrar to another, namely - Network Solutions).

    At the moment website ChronoPay at chronopay.com available. Current status of the domain in the internal system logger - «high security transfer prohibited». This means that the registrar directNIC take special measures to ensure the safety domain.

    To date, performance site ChronoPay fully restored. Operative in this situation, th ... Читать дальше »
    Просмотров: 608 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    By activity in different own projects I have to study both win / web-programming and design, 3d-animation, the administration of their servers. And, using webmoney, surf, rock Keys to dangerous sites, to set and test various dubious software, etc. Very often connect to a computer all sorts of new devices.

    If you do it all in one install wind, sooner or later it otupeet and have to reinstall all over again. You can also pick up a messy some troyanchika or a virus (although in my case is very unlikely).

    Against the background of the general paranoia of it-security found for himself the perfect solution - the use of different virtual machines for each specific range of tasks.

    As I have done:
    1. Put on VMWare XP, freewheeling, SP3, and put the Far Office - it is a necessary minimum for almost every problem
    2. For the first machine made linked-clones (new machine refers to the first, as the base) to surf (and test sites in different browsers in the configuration ... Читать дальше »
    Просмотров: 652 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    Guru cryptography, developer ciphers Blowfish and Twofish, Bruce Schneier in his blog discusses the interesting topic: why, with all the mistrust of the documents transmitted by e-mail, many organizations rely on signatures to a fax? It's the strangest thing that you can only imagine. Indeed, to forge them there is no difficulty: it is enough to cut one piece of paper, pasted on the other - and send it by fax. You do not need anything except scissors and glue. Can handle even a child. Faxes are so poorly protected against forgery, that if you think - it is strange that in our time, someone generally accepts them.

    Bruce Schneier says that he repeatedly sent by fax various documents, including contracts for the book, bank documents on the credit card authorization, non-disclosure agreement, etc. "It's amazing how organizations sometimes tend to perceive as verified these low-quality, neverifitsirovannye scans, which are transmitted over public communication lines, if they flatly r ... Читать дальше »
    Просмотров: 883 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    ESET NOD32 was the 50 th certified VB100% British magazine Virus Bulletin, almost silver wedding dearly love each other's spouses, and Advanced + from the Austrian lab of Andreas Clementi AV-Comparatives - and all three days ...

    Frankly, the speed with which reach the community sector news, sometimes leaves much to be desired. Actually, because the post is strictly do not judge.



    And meanwhile, on May 31, four days ago, published the results of laboratory tests by Andreas Clementi, a little later came the report about the regular testing of antivirus software magazine Virus Bulletin.

    Certificate VB100% this time were given anti-virus, which showed a medium Ubuntu Linux 8.04LTS Server Edition (linuksoidov dancing with a tambourine) 100% Detect viriya in conjunction with zero at Folsom known clean files.

    More details here Results of retrospective testing Clementi available on this link.

    Are repeated until both ... Читать дальше »
    Просмотров: 706 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    Security experts draw attention to one of the most familiar and natural functions of your browser: information on the visited link in your browser. As you know, after visiting the link, and reload the page link to change color. So, this information can be easily removed using a special script. The danger of such an attack is often underestimated.

    The site owner can easily see which links you have visited before. To this end, he may even specifically to introduce an invisible link on the page, removing information script. For example, it can check whether you went to the competitor's site, note this fact in cookies and even a change to your site content accordingly. Of course, this is a clear violation of privacy. And the more uncomfortable to know that private information about you is so easy anyone can learn. Mozilla developers have paid attention to this danger in 2002, but not figured out what you can do.

    Of course, there is no disputing the convenience functions for t ... Читать дальше »
    Просмотров: 593 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    All probably know that there are so many different ways to security threats. They are really quite how many of them learn reading under the cut.


    All use the link below for a sample taken when they where - that are not there to afftoru pritenzy not show

    The same article is available at the following addresses: http://forxakep.ucoz.ru/publ/3-1 -0-16
    http://forum.netall.ru/index.php?showtop ...
    http://www.inattack.ru/article/402.html

    Fishing (or phishing).

    A very broad term. Its meaning is to get from users of information (passwords, credit card numbers, etc.) or cash. This technique is not aimed at one user, but in many. For example, a letter allegedly from the technical support be sent to all known customers of any bank. The letters are usually requested to send the password to the account, supposedly because of any technical work. Despite the fact that users are warned that any such information from them, none of the workers may no ... Читать дальше »
    Просмотров: 1135 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

    « 1 2 3 4 5 6 7 ... 58 59 »