Google+ bgs: 12/01/2011 - 01/01/2012
Be the reason of someone's happynes, and never be a part of it. Be the part of someone's sadnes, and never be the reason of it...

facebook WORMs...............

Social Networking sites like facebook, google+, twitter is the current destination in the netizen world. Recently we've seen the worm which states 'OMG why iam Tagged in this VID' and 'SICK, I Just Hate Rihanna After Watching this VID'. When we click on these it'll asks us to select the address bar etc.., after that we may end up posting it on our friends walls.

Currently it has six viruses....

#1 ---If you get a notice of a PHOTO TAG ... Do not open it.

#2---If you get a notification that a friend reported you for offensive behavior etc.. Do not open it.

#3 Is a Video saying 99% of People can not watch this for more the 15 Sec. Do not open it is also a virus.

#4 all Messages from your friends via chat saying click this link .. Do not open! 

#5 [VIDEO] Yeah! It happens on Live television.. Do Not Open it its a VIRUS..

#6 [video] Girl Killed Herself after her father posted a Secret of her on fb Wall.
Do Not open it, its a VIRUS.

So try to paste the below matter on your wall and save yourself and your friends from scammers .......

WARNING ~~~PLEASE LISTEN UP !! SCAMMERS ARE BUSY ON FACEBOOK AGAIN!!! They post some insulting messages on the wall of your friends with your regards, without you knowing about it. If you receive one of those messages in my name it wasn't me posting them. Put this on your wall and warn your friends. Also, DONT open the video about a guy with a BIG ZIT. It is a virus.

or share these images



As i already said how to get back your hacked facebook account or if you want to prevent it from posting on your wall, then just do this.....Simply, don’t click on any suspicious links in Facebook but however attractive it may appear! Scammers are just exploiting the curious nature of human mind to good use in doing their job. To avoid getting such malicious wall messages, you may restrict other people (who are NOT your friends and not in your contact list) from posting on your wall. For doing this, choose:

“Account ; Privacy Settings ; How you Connect ; Edit Settings ; 
 Who can Post on your Wall ( Friends / OnlyMe ).”

Take a look at your URL (top box on your screen.) If you see "www" (or http), instead of "https" now, you DO NOT have a secure session. It appears that FB went straight on line to the world wide web now. Go to the drop down from where you log out: Account Settings - Click Security on the left top corner - click Edit next to Secure Browsing, Check box, click Save. FB has automatically set it on the non-secure setting. 

And there are also phising sites which looks like facebook page but do not forget to check that your're entering your details in the www.facebook.com........

Multi Uni-Uploader : Upload files to file hosters by YASSINOV

Multi Uni-Uploader is a small and easy to use application that allows you to quickly upload your files to multiple host websites.

To upload files to file hosters using a desktop program is more comfortable than uploading files by going to their hosters website.It supports popular choices such as rapidshare, mediafire, hotfile, filefactory, megaupload, imageshack, easyshare etc....


The new version 4.0 has an Enable account support option and you can connect it via a proxy server.It supports single file uploads, add files using the browse menu and automatically itself calculates the MD5 hash.When you click start upload it sends the file to the hoster and links are automatically retrieves and displayed in the interface and you can manually copy to clipboard or use the copy button.




Features:
--World First Integrated Features :
--Multi Server Uploader
--Multi Server Types
--Account Support Started with [MultiUpload] Server & more to be added
--Fast Upload Service
--Light Interface
--Upload to : Download Link / Delete Link Generator
--Direct IMAGE Upload + Forum Link Generator
--Added Servers List :

Rapidshare , 2Shared , khaZN , DepositFiles , Imageshack , Pic-Upload , Hotfile , PikiPimp , TurBoShare , MegaVideo , Megaupload , AxiFile , ZippyShare , Linkbucks , File@Email , MultiUpload , UploadSpace , Photo@Email , FileFactory , Netload , SpeedShare , TinyPic , Stooorage , TurboUpload , Herosh , CzShare , ULoz , NippyZip , MegaShares , Badongo , Storage , UploadMb , iFotos , DL.Free , Easy-Share , Extabit , Filefront , Mediafire , Uploading , FileSavr , Kiwi6 , BigUpload , FileHost , GigaSize , 1Fichier , WikiUpload , Localhostr , Turbobit , Easy2Download , YourFileLink , Filetitle , Ziddu , FileDropperSendSpace , TeraFiles , Loadto , Multisiteupload , FlameUpload , ArchiveTo , iFile , Partage-Facile , FileBase , X7to , Wrzuc , FileStorageto , FileServe , FileSonic , Jheberg , WooFiles , GigaUp , GsmFileHosting , Hostuje , JanDown(Torrent) , SlingFile , YourFileSender , UsaUpload , SendSpace(v2MU) , Duckload , Oron , Shareator , Mlfat4arab , MP3Zee , Mozillashare , JumboFiles , EnterUpload , FileServer , Cramit , PutShare , Loombo , GotUpload and more....


--Auto Update software (For new Servers).........

License : Freeware
Price : Free
publisher: YASSINOV

You can Download it from softpedia , Brothersoft , fileserve , hotfile , megaupload , filefactory , badongo , storage , mediafire , uploading........

Google Chrome : Most Secure browser

Antivirus and anti-malware can help prevent an infection, the first line of defense is using a secure web browser. For a person that surfs the internet, comparing and contrasting the security of different web browsers is difficult. 

Accuvant LABS study has says that Chrome occupies as the most secure browser,while IE and Firefox takes the second and third position. With rating to seven firefox filled only three places. The seven points criteria are Sandboxing, Plug-in Security, JIT Hardening, ASLR, DEP, GS, URL Blacklisting. The following chart shows the anti-exploitation measures used by these browsers. Each row represents a different anti-exploitation technology and each rocket represents a browser. The rocket with the highest position represents the browser with the most thorough anti-exploitation measures.






Accuvant compared browsers from a layered perspective, taking into account security architecture and anti-exploitation techniques. The best way to judge browser security is to first look at anti-exploitation measures that each browser has in place. Accuvant looked at the internals of Mozilla Firefox, Google Chrome, Microsoft Internet Explorer, and analyzed the anti-exploitation measures implemented by each.

Anti-exploitation technology can reduce or eliminate the severity of a single vulnerability or an entire class of exploits. Thus, the software with the best anti-exploitation technologies is likely to be the most resistant to attack and is the most crucial consideration in browser security.

If you’d like to see more granular information regarding this conclusion then check for Research Paper, Supporting Tools and Data.......



Download Google Chrome........

New McAfee All Access 2012 : All your devices. All your stuff. All protected.

It's always the best option to choose an all-in-one security suite rather than buying separate protection components by combining together, which may not work well.

As you can see that every anti-virus solution releasing their product by adding an extra feature, but it'll be only for the individual products.

Now McAfee presenting McAfee all access new for 2012 says that "Connect, surf, and socialize online, knowing your computers, smartphone, and tablet are safe from malicious websites, viruses, hackers, scammers, and identity thieves." It says that it'll take you to the next level and comes with a tagline of "All your devices. All your stuff. All protected."

In every AV Solution you'll see antivirus, internet security and total security products.But everyone chooses logically total security products. Coz antivirus products for offline computers, internet security adds an extra layer of firewall and total security products comes with an tools to speedup your pc. McAfee products of internet security comes along with 1GB of backup and total protection with 2GB. Now you can track your stolen components and added a feature called Anti-bot protection. See the below image for the McAfee product comparison. 


McAfee is givingaway it's product McAfee Internet Security 2012 for 90days of Protection. 






























     All your devices. All your stuff. All protected.

Safely enjoy your digital lifestyle on the devices you use to connect. McAfee All Access delivers the security protection you need for the devices you use at home and on the move. You can connect, surf, and socialize online, knowing your computer, laptop, netbook, smartphone, and tablet are safe from malicious websites and hackers, viruses, scammers, cyber bullies, and identity thieves. You can even track, lock, or remotely wipe your missing smartphone or tablet. Our comprehensive protection lets you connect with confidence and enjoy the convenience your digital lifestyle offers.

  • Secure your PC, laptop, and netbook against hackers and identity theft
  • Fend off threats to your Mac
  • Protect your smartphone and the precious information it holds
  • Guard your tablet against attacks and theft

is facebook malware or phising site.....

Wat happend to K7 product, that it was blocking facebook page as Malware/Phising site.......




Date and Time: 12/14/2011 and 6:37PM.....
and within 10min got the update and it went to normal.....

G Data InternetSecurity 2012 -- Free for 120days through FARAVIRUSI

German origin Security solutions G Data giving 120days(4months) of it's product G Data Internet Security 2012. The whole new generation of it's product came up with new features like Doublescan, CloudSecurity with minimum usage resouces.

It's Home Page......
Check the link to qualify for 4months....... 


Source : FARAVIRUSI

FileASSASSIN : can eradicate any type of locked files from your computer.

It's a tool from Malwarebytes Anti-Malware.......


About FileASSASSIN
If you use a computer, you’ve probably come across at least one of the following messages:

  • Cannot delete file: Access is denied.
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
  • The source or destination file may be in use.
  • The file is in use by another program or user.
These messages commonly appear when you’re trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the locked file, File ASSASSIN can remove it.

Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file.

Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors.

Usage
  • Start FileASSASSIN and select a file by dragging it onto the text area or select it using the (...) button.
  • Select a removal method from the list.
  • Click Execute and the removal process will commence.
Download FileASSASSIN from one of the links below. If you select the portable build, simply unzip and run the application. Otherwise, run the installer provided.

Download EnglishVersion......
Download SpanishVersion......
Download PortableVersion......

Malwarebytes Anti-Malware : Taking the Byte out of Malware

The authors claim to use a variety of technologies to find malware undetectable by other malware scanners.

Detect and Protect with Byte
Malware is big and malware is bad. Your computer is constantly at risk from infection by malware including viruses, worms, trojans, rootkits, dialers and spyware. Malwarebytes specializes in fighting malware.


If viruses are mischief, malware is mayhem. Malware doesn’t just want to disrupt your network, it wants your keystrokes, logins, passwords, address book, data, credit card information, favorite t-shirt and possibly your cat.

Malware is not going away any time soon. Malware is growing, developing, constantly evolving. Malware is becoming more difficult to detect, and even harder to remove.

Only the most sophisticated anti-malware techniques can detect and remove malicious programs from your computer. Malwarebytes Anti-Malware PRO combines powerful new technologies designed to seek out, destroy, and prevent malware.

Malwarebytes Anti-Malware PRO detects AND protects in an easy-to-use, straightforward, heavy-hitting but lightweight anti-malware application.

Taking the Byte out of Malware
Malwarebytes technology takes the next step in the fight against malware. Malwarebytes Anti-Malware PRO detects and removes malware where even the best known anti-virus and anti-malware applications fail.

Malwarebytes Anti-Malware PRO monitors every process and stops malicious processes before they even start. The Proactive Protection Module keeps your system safe and secure with advanced heuristic scanning technology. The comprehensive Threats Center keeps you up-to-date with the latest malware threats.




There is a free trial with limited options and a supported pro version with the ability to run scheduled scans and more.....



Malwarebytes Anti-Malware PRO Features include:
  • Flash - Lightning fast scan speeds
  • Thorough - Full scans for all drives
  • Works Well With Others - Cooperative functionality
  • Puts YOU first! - Priority database updates
  • Puts Malware in the Slammer - Quarantine function holds threats and lets you restore at your convenience
  • Talk to the hand - Ignore list for both the scanner and Protection Module
  • For Your Pleasure - Customizable settings enhance performance
  • Toolbox - Extra utilities to help remove malware manually
  • Chameleon - Gets Malwarebytes running when blocked
  • Nitty Gritty - Command line support for quick scanning
  • RPP, Yeah You Know Me - Realtime Proactive Protection Module
  • Hablamos Everything! - Multi-lingual support (Klingon still in beta)
  • Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit)
Besides anti-malware product there is an inbuild tool called FileASSASSINFileASSASSIN can eradicate any type of locked files from your computer.


Operating Systems: Microsoft ® Windows 2000, XP, Vista, 7 (32-bit and 64-bit).
Languages Available: English, Arabic, Belarusian, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Korean, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish, Vietnamese.

It's Homepage.....
Download it here........
Update it Offline.........