This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Tuesday, June 7, 2011

Detecting trojan in svchost.exe

 Here is simple trick based on observation to detect backdoor in svhost
One of the common things an attacker may do once they are inside your machine is to rename the process they are running as. In many cases they will try to imitate or get very close to normal system process names. One common process to spoof is the svchost process.

What is svchost?

Microsoft states that “svchost.exe is a generic host process name for services that run from dynamic-link libraries”. So when a piece of software starts a service from a dll, it will be found connected to an svchost instance.

So what?

Well, if that is the case then we can rest assured that any svchost process will also have some services running under it. The following command will show us the svchost instances and what services are under it:
C:\> tasklist /SVC
If we then notice any svchost.exe instances running without any services under it, then it is most likely another process that has renamed itself to look like svchost.

Friday, May 20, 2011

Norton Internet Security 2011 Antivirus with working license

Norton Internet Security 2011 + Antivirus lifetime license

norton internet security download

Norton Internet Security runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. The friendly and efficient product design helps minimize confusing security alerts and system slowdowns that can get in the way of your online experience. Norton Internet Security™ provides essential protection from viruses, hackers, spyware, spam and other privacy threats. A comprehensive set of security tools, Norton Internet Security helps keep you safe online as you surf and email, swap files, download programs, and chat. In addition to protecting against viruses and unwelcome intrusions from the Internet.

NIS also allows you to automatically block annoying banner ads and pop-up windows, set up parental site blocking options for restricting access to specific Web sites, and selectively determine which, if any, Java applets and ActiveX controls should be allowed to download and execute on your computer. Enjoy the Internet with award-winning protection!

Key Technologies:
• Anti Virus
• Anti Rootkit
• Bot Protection
• Norton™ Safe Web
• Smart Firewall
• NEW! SONAR™ 2 Behavioral Protection
• NEW! Norton System Insight
• NEW! Norton Insight Network AntiSpam
• NEW! Norton Download Insight
• NEW! Norton Threat Insight
• Spyware Protection
• Identity Protection
• Pulse Updates
• Network Monitoring
• Parental Controls
• Vulnerability Protection
• NEW! Professional Strength AntiSpam
• NEW! Norton File Insight

Key Benefits:
• NEW Delivers clear threat and performance explanations—Gives you greater insight into downloaded applications and files by telling you where they came from, if they can be trusted, and how they may impact your PC’s resources and performance.
• NEW Identifies unsafe web sites right in your search results—Warns you of dangerous web sites and suspicious sellers so you can surf and shop online with confidence.
• IMPROVED! Stops online identity theft, viruses, spyware, bots and more—Guards your PC, online activities, and your identity against all types of Internet threats.
• IMPROVED! Stops attacks before they get on your PC—Proactively blocks hackers and prevents dangerous software from downloading to your computer when you surf the web.
• Uses intelligence-driven Norton Insight Network for faster, fewer, shorter scans—Detects and eliminates dangerous software with the shortest scan times of any security product.

Norton Internet Security 2011 Features:

Intelligent Protection
• IMPROVED! Norton Protection System delivers multiple layers of security that work together to provide comprehensive Internet threat protection.
• NEW! Norton Safe Web identifies unsafe and dangerous web sites right in your search results.
• IMPROVED! Norton IdentitySafe offers one-click log-ins and automatic form filling to prevent key loggers from stealing your information as you type.
• NEW! Norton IdentitySafe On-the-Go lets you access your most up-to-date log-ins and passwords on any Norton Internet Security 2010 protected PC.
• Industry-leading anti-phishing technology authenticates safe sites and protects you from visiting unsafe and fraudulent web sites.
• NEW! Analyzes downloads, files and applications and tells you if they can be trusted before you install and use them.
• IMPROVED! Vulnerability Protection guards security holes in your operating system, applications, browsers and browser plug-ins.
• IMPROVED! Detects and gets rid of even the hardest to find Internet Explorerf and Firefox cookies.
• Smart Firewall stops hackers and makes intelligent security decisions for you.
• NEW! Parental Controls give you insight into your kids' online activities so you can teach them good Internet habits and help keep them safe.
• IMPROVED! Norton Bootable Recovery Tool repairs, restores and boots severely infected, unbootable PCs.
• NEW! Professional-strength antispam protection uses the same technology as many large businesses to effectively block unwanted emails.

Engineered for Speed
• IMPROVED!Proven fastest, lightest security suite for protection that won't slow you down, get in your way, or swallow up system resources. More info
• IMPROVED! Norton Insight scans only files at risk for fewer, shorter scans and the fastest scanning times in the industry. More info
• Won't slow you down when you download, copy, or edit files, or install applications. More info

Combats today's rapid-fire attacks
• NEW! Norton Insight Network uses Symantec's global security network to provide real-time protection from the latest-breaking threats.
• NEW! SONAR 2 (Symantec Online Network for Advanced Response) uses online intelligence and proactive monitoring to detect and stop new threats.
• Norton Pulse Updates provide rapid mini updates every 5 to 15 minutes for up-to-the-minute local protection against the latest threats.
• Prevents bots from taking control of your PC.
• Finds and removes rootkits.
• Prevents Internet worms from getting on your PC.
• Tells you which application processes currently running on your PC are safe and which are at risk.
• Norton Bootable Recovery Tool provides a deep level of cleaning for heavily infected PCs.

Provides info on threats, downloads and files

• NEW! Norton Download Insight warns you of dangerous downloads before you install and use them.
• NEW! Norton Threat Insight tells you if threats were detected, what actions the threats attempted to perform on your system, and how Norton Internet Security eliminated those threats.
• NEW! Norton File Insight tells you where files and applications came from, if they're trusted, and how they may be impacting your PC's speed.

Helps keep your PC running at top speed
• NEW! Norton System Insight helps you improve and maintain PC and application performance.
• NEW! Automatic and on-demand application optimization improves application performance.
• NEW! Norton System Insight gives you an overview of recent events on your PC such as installs, downloads, scans and detected threats, so you can see what events may have impacted your PC's performance.
• NEW! Norton System Insight resource usage graphs help you pinpoint what's causing your PC to slow down.
• NEW! Tells you how files and applications impact your PC's performance.

Protection without disruption
• Smart Scheduler conducts scans and other tasks only when your PC is idle.
• Automatically switches to Silent Mode (no alerts, updates or scans) when watching movies or playing games in full-screen mode.
• NEW! Automatically delays product updates and other tasks if you're watching TV or burning CDs/DVDs.
• NEW! Power Saver Settings help extend portable PC battery life by putting off power-intensive activities until your computer is plugged in.

Additional Features
• NEW! Monthly report tells you what Norton Internet Security has done in the past month to protect you and your PC.
• Free 24x7 support by phone, email, live chat or online knowledge base.**
• Automatically scans emails and IMs for infections.
• Maps and monitors your home wireless network so you can see everything connected to it — even unauthorized visitors like the PC next door.
• Automatically downloads protection updates and new product features as they become available during your service period.
• With the Norton Automated Renewal Service your yearly subscription can be automatically renewed for uninterrupted protection.

Why Choose Norton Internet Security:
* IMPROVED! Stops online identity theft, viruses, spyware, bots and more – Guards your PC, online activities, and your identity against all types of Internet threats.
* IMPROVED! Stops attacks before they get on your PC – Proactively blocks hackers and prevents dangerous software from downloading to your computer when you surf the web.
* NEW! Delivers clear threat and performance explanations – Gives you greater insight into downloaded applications and files by telling you where they came from, if they can be trusted, and how they may impact your PC's resources and performance.
* NEW! Identifies unsafe web sites right in your search results – Warns you of dangerous web sites and suspicious sellers so you can surf and shop online with confidence.
* Uses intelligence-driven Norton Insight Network for faster, fewer, shorter scans – Detects and eliminates dangerous software with the shortest scan times of any security product.

Supported Operating Systems:

* Microsoft® Windows® XP with Service Pack 2 or later Home/Professional/Media Center
* Microsoft Windows Vista (32-bit and 64-bit) Starter/Home Basic/Home Premium/Business/Ultimate
* Microsoft Windows 7 (32-bit and 64-bit) Starter/Home Basic/Home Premium/Professional/Ultimate


norton antivirus crack


Symantec's Norton AntiVirus 2011 - Winning protection against viruses, spyware, and other malicious threats! Heuristically detects Spyware threats, detects blocks Internet worm attacks, and protects email.
Norton AntiVirus blocks viruses and spyware with advanced protection. It helps protect your entire computer by stopping viruses, spyware, and other security risks. Norton AntiVirus works in the background so you can surf the Internet, read the news, play games, and download software or music without disruption. It also scans and cleans all email and instant messaging (IM) attachments, preventing you from receiving viruses, or spreading them to others. With set-it and forget-it functionality, Norton AntiVirus checks for updates continuously and automatically blocks new and emerging threats from getting on your system. In addition to protection updates, Norton AntiVirus provides new product features as available throughout your service subscription.

Homepage: of norton antivirus
http://www.symantec.com


norton antivirus

Norton Internet Security + Norton Antivirus + Crack download
here

How a virus works

The word virus is often being used as a common term for all malicious programs, but technically a virus is a program or code that attaches itself to a legitimate, executable piece of software, and then reproduces itself when that program is run. Viruses spread by reproducing and inserting themselves into programs, documents, or email attachments. They can be transmitted through emails or downloaded files and they can be present on CDs, DVDs, USB-drives and any other sort of digital media.
virus

A virus normally requires action to successfully infect a victim. For instance - the malicious programs inside email attachments usually only strike if the recipient opens them. The effect of a virus can be anything from a simple prank that pops up messages to the complete destruction of programs and data.

In recent years viruses have been on the decrease. In January 2007, one in 119.9 e-mails, or 0.83 percent, were infected with viruses, while more than 20 percent of emails at times contained viruses five years earlier. The difference is partly due to virus attacks becoming more targeted and no longer occurring as one large outbreak. Also, there has been big increase in spam emails that contains links to download viruses.

The computer virus turned 25 in 2007. Long-suffering computer users would be forgiven for thinking that the first computer virus appeared in the mid-1980s, but the first virus actually predates the first IBM-compatible PC. Elk Cloner, which spread between Apple II computers via infected floppy disks, was released July 1982 and it was the first computer virus to spread in the wild.

Viruses had their heyday around the year 2000, with the Y2K scare. In 1999, the Melissa virus caught antivirus companies flat-footed and propagated rapidly. It was the first real outbreak of many of its kind that spread using Microsoft's Word and Outlook. A year later, the 'I Love You' virus caught the world by surprise. Lloyds of London estimated that the virus cost the global economy $10bn, making it the most expensive piece of malicious software to be unleashed to date. It was also the first time a computer virus became the day's top story for newspapers and television stations, marking a shift to mainstream awareness of computer viruses.

Nowadays, also mobile operators are starting to feel the pinch from viruses resulting from the increasing use of emails and Internet browsing on cellphones. Attacks on cellphones rose five times in 2006, with clients of 83 percent of mobile operators around the world having been hit, an industry study showed.

But mobile viruses are around 20 years behind those plaguing PCs, which translates into more than 300 virus variants targeting mobiles and smartphones, but around 400,000 such threats targeting PCs. In June 2004, a security company released details of a piece of mobile-phone malware that used Bluetooth to try to spread to other Symbian Series 60-based mobiles. That is believed to be the first case of a self-replicating mobile-phone virus and since then there has been a consistent increase in mobile viruses.

Kaspersky Antivirus Mobile 9.0.49 Final


Image 
Kaspersky Anti-Virus Mobile is a convenient and reliable solution that protects smartphones from malicious programs that target mobile platforms.

Advantages:
Real-time antivirus scanning
Anti-spam for SMS/EMS/MMS
Fast and discreet performance
Automatic database updates

Features:
On-demand antivirus scanning of the smartphone internal memory and extension cards
Automatic scanning of all incoming or modified SMS, MMS, email items and executable files
Full antivirus scans on a schedule defined by the user.Free technical support on issues related to installing, activating, configuring and using the product

Please select a version. To find the version that is right for your phone, you can select either:
The Operating System on your phone, OR Your phone model (motolrola,NOkia,sony erisson,Samsung,etc)

Compatible Smartphones
Kaspersky Mobile Security runs on smartphones with:

* An Internet connection
* One of the following Operating Systems:
o Android: 1.6-2.2
o BlackBerry: 4.5-6.0
o Symbian (Nokia): Symbian^3 or Series 60 9.1, 9.2, 9.3, 9.4
o Windows Mobile: 5.0-6.5
 

BitDefender Antivirus 2011 version 14.0.28.351+ serial


Image

BitDefender Antivirus Pro 2011 gives your PC fast, proactive protection against the latest viruses, spyware, and identity theft attacks, all in a friendly and customizable dashboard.

BitDefender Antivirus Pro 2011 provides comprehensive proactive protection against all Internet security threats, along with system maintenance and backup, without slowing down your PCs.

PRODUCT BENEFITS

  • Proactive protection stops new viruses and malware that other products miss.PLay aND WOrK SeaMLeSSLy
  • Automatically activate Game, Laptop, or Silent Mode to minimize interruptions, prolong battery life, or reduce system load to ensure seamless and secure gameplay.SaFeGUarD yOUr PrIVaCy
  • Eliminate the chances your data and conversations are leaked to others over email, Facebook, IM, or websites that track your online activities.CHOOSe yOUr VIeW
  • Match the interface to your level of comfort by selecting between Basic, Intermediate, or Expert settings ¥and quickly create shortcuts to frequently used controls.Surf Safely
  • Automatically get warnings about unsafe pages displayed in search results.Smart Tips
  • When online explorations take you into dangerous terrain, BitDefender prompts you with a series of suggested privacy safeguards, relevant to your most recent activity.FIND SUPPORT FAST
  • Troubleshoot issues with the new video library or call for free tech assistance for the duration of your software license. Search relevant results from the Knowledge Base, Help file, Troubleshooting and Video Tutorials.VIDEO LIBRARY
  • A new collection of step-by-step videos helps you navigate through common security challenges.

Instructions:
-Install the software & register online using the (Serial) provided in my
upload , Genuine & original License as usual.

How does antivirus work?

An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).
Anti-virus software typically uses two different techniques to accomplish this:
how antivirus works
  • Examining files to look for known viruses by means of a virus dictionary
  • Identifying suspicious behavior from any computer program which might indicate infection

Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.
Virus dictionary approach
In the virus dictionary approach, when the anti-virus software examines a file, it refers to a dictionary of known viruses that have been identified by the author of the anti-virus software. If a piece of code in the file matches any virus identified in the dictionary, then the anti-virus software can then either delete the file, quarantine it so that the file is inaccessible to other programs and its virus is unable to spread, or attempt to repair the file by removing the virus itself from the file.
To be successful in the medium and long term, the virus dictionary approach requires periodic online downloads of updated virus dictionary entries. As new viruses are identified "in the wild", civically minded and technically inclined users can send their infected files to the authors of anti-virus software, who then include information about the new viruses in their dictionaries.
Dictionary-based anti-virus software typically examines files when the computer's operating system creates, opens, and closes them; and when the files are e-mailed. In this way, a known virus can be detected immediately upon receipt. The software can also typically be scheduled to examine all files on the user's hard disk on a regular basis.
Although the dictionary approach is considered effective, virus authors have tried to stay a step ahead of such software by writing "polymorphic viruses", which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match the virus's signature in the dictionary.
Suspicious behavior approach
The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but instead monitors the behavior of all programs. If one program tries to write data to an executable program, for example, this is flagged as suspicious behavior and the user is alerted to this, and asked what to do.
Unlike the dictionary approach, the suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it also sounds a large number of false positives, and users probably become desensitized to all the warnings. If the user clicks "Accept" on every such warning, then the anti-virus software is obviously useless to that user. This problem has especially been made worse over the past 7 years, since many more nonmalicious program designs chose to modify other .exes without regards to this false positive issue. Thus, most modern anti virus software uses this technique less and less.
Other ways to detect viruses
Some antivirus-software will try to emulate the beginning of the code of each new executable that is being executed before transferring control to the executable. If the program seems to be using self-modifying code or otherwise appears as a virus (it immeadeatly tries to find other executables), one could assume that the executable has been infected with a virus. However, this method results in a lot of false positives.
Yet another detection method is using a sandbox. A sandbox emulates the operating system and runs the executable in this simulation. After the program has terminated, the sandbox is analysed for changes which might indicate a virus. Because of performance issues this type of detection is normally only performed during on-demand scans.
Issues of concern
Macro viruses, arguably the most destructive and widespread computer viruses, could be prevented far more inexpensively and effectively, and without the need of all users to buy anti-virus software, if Microsoft would fix security flaws in Microsoft Outlook and Microsoft Office related to the execution of downloaded code and to the ability of document macros to spread and wreak havoc.
User education is as important as anti-virus software; simply training users in safe computing practices, such as not downloading and executing unknown programs from the Internet, would slow the spread of viruses, without the need of anti-virus software.
Computer users should not always run with administrator access to their own machine. If they would simply run in user mode then some types of viruses would not be able to spread.
The dictionary approach to detecting viruses is often insufficient due to the continual creation of new viruses, yet the suspicious behavior approach is ineffective due to the false positive problem; hence, the current understanding of anti-virus software will never conquer computer viruses.
There are various methods of encrypting and packing malicious software which will make even well-known viruses undetectable to anti-virus software. Detecting these "camouflaged" viruses requires a powerful unpacking engine, which can decrypt the files before examining them. Unfortunately, many popular anti-virus programs do not have this and thus are often unable to detect encrypted viruses.
Companies that sell anti-virus software seem to have a financial incentive for viruses to be written and to spread, and for the public to panic over the threat.

Twitter Delicious Facebook Digg Stumbleupon Favorites More