Friday, December 24, 2010

NORTON 2011 Review With 90 Days Trial


























Norton Internet Security 2011 will be the fastest and lightest security suite Symantec has ever delivered. Very easy to install and use. And most of the tasks runs in a idle time. Basic feature of a Norton 2011 is ease of use and graphics.  It has following built in tools which push Norton 2011 to total security suite.
  • Intelligent firewall
  • Anti-virus engine
  • Anti phishing
  • Password/identity management
  • Parental control
  • Reputation Scan (NEW)
  • Norton Power Eraser
  • Performance Alerts
  • File Insight
Norton provides 3 way securities. First is updates based detection of threats. Second is SONAR (systematic online network for advanced response). Third one which is almost unbeatable is Norton Insight Network. Norton 2011 is slightly lighter than Norton 2011. It has additional virus cleanup tools and small impact on performance and proactive performance warnings.  
                
                   As per my judgment, Norton’s firewall, Anti phishing, Antivirus engine and other features was never an issue. Recently I’ve found some problems in Norton. First is Norton 2011 is basically dependent to updates. Without updates it is unable to detect threats. And update is 102MB large. Also we can’t make backup of updates in case we want to format pc. So it’ll have to download whole update again after each format. It is little frustrating. Second, I’ve found that Norton is shockingly not detection Autorun virus and other which may infect pc from pen drive or any external devices. I truly suggest NOT using it under these circumstances. Symantec should provide offline updates for all versions or provide tool to take backup of updates or at least compress huge first update. If you have high speed internet broadband connection then these things are not an issue. So you can try Norton if you want.
download NORTON  2011 with 90 days trial .........
enjoy!
war379k

Thursday, December 9, 2010

ppt presentation on Viruses: {Origin and Prevention}

        I've prepared a PPT presentation about av's (anti virus) for college work. So i thought it would be great to put it on the web. Because i was searching  "block diagram of av engine" (algorithm) and unbelievably it's not  available on net. And many newbies may will need to know how exactly av works.... And as per me I've tried my best to explain everything in ppt. Whole PPT is designed and created by me. You won't find any copied data. Its 100% original !
You can download original version from following link.
And i hope this will help you to learn some basics about security, viruses and prevention!



this is some selected snapshots of contents of a ppt







LINK:- DOWNLOAD



 https://docs.google.com/viewer?a=v&pid=explorer&chrome=true&srcid=0B99MtzKupxCCM2U0MzU0ZWItNGRjNS00MTFhLWFhMjEtZmRlNTE4MDY2Njli&hl=en&authkey=CNnXyq4F


ENJOY!

Monday, November 15, 2010

Feeling Stuck With Antivirus?? (Nov 2010)

             In my previous article "Feeling stuck with av" of 2nd feb, i told u guys about av's. It was my 1st article about anti-virus. As i am a security freak i always test something new. Recently i've tested "AVAST" v5 (FREE) and its awesome. I personally recommend Avast v5 to you all who want to use free anti-virus. Only thing that avast free version not includes is Firewall. And i think it will be major issue who really concerns about online security and dislike to get hacked! Only thing that you have to get a free license from avast homepage. Either online or offline. But even for free av you must get license otherwise after 30 days, protection will get expired. Another good thing about avast that it supports offline updates. Many leading av's like Kaspersky, Norton and more don't give offline daily updates in their latest versions.




 LINK:- DOWNLOAD

 *******************************************************************************



              So, i installed "COMODO" free firewall because i want to create my custom free security suite. And it has blocked all attacks (100% result) of intrusion which i was tested. GUI, security, ease of use and overall performance is good for me. Comodo has 2 different engines. One is for firewall which monitor net traffic and incoming and outgoing connections. Another called as Defense+ which monitors all important files on local computer. Blocks viruses to modify system files. It uses file reputation method and created trusted file list for faster performance. Firewall and Defense+ is fully free modules in Comodo. It also has some advanced features in firewall. But i suggest you to use it only if you know what you are doing. Otherwise you will disable the TCP/IP on pc. It happens! Some users may finds that Comodo has complex GUI. But for advanced users, its really good. Firewall uses heuristics technology to scan all files. So that updates are not so much necessary.





  LINK:- DOWNLOAD


 ******************************************************************************


            

BY WAR379K

Sunday, June 13, 2010

REVIEW- KASPERSKY INTERNET SECURITY 2011

            Kaspersky Labs has respectable credit in computer security software. It is considered as most effective and next generation technology. Now, Its latest Kaspersky 2011 (Antivirus, Internet Security) is launched in market. We all know there is about 6 months remaining to 2011 but as per the marketing policies of Kaspersky Corp. they try to say that we are one step ahead from others. And its true. Many of leading antivirus companies depend on Kaspersky Labs for updates (which is hourly!). Kaspersky generates world's most concurrent updates about newest viruses which is almost untraceable for others. Almost every computer end user who knows about computer security "respects" Kaspersky. But somehow from its version 2008 it was loosing.. Not because of  bugs or loop holes in software but because of negligence about huge memory consumption and less effective GUI. If we put security issues aside, home uses cannot afford slow computer rather they are ready to little compromise on security. But at business, we have no any option but kaspersky!

            To overcome with basic problem of memory consumption, NEW version is launched. It proved not only lightest version among all previous versions of kaspersky but also adds some exciting features.


            The new Graphical User Interface (GUI) is also compact and impressive. It looks like this.....




Another main part is RAM consumption. As per tests, it takes only about 30000k on an average. Also it adds 5 seconds (4.850) while booting from XP. Detailed report as below

Process 1- avp.exe [system]
min memory take-8000k
max memory take-126000k
avg memory take-28000k [from 5 hrs]

Process 2- avp.exe [user]
constant about 5000k



While updating softwares it adds more 2 avp.exe processes and takes grand total of [126000+80000+6500+5000=276000k] 276MB of RAM. But its quite normal.


NEW FEATURES-
*Safe Surf- It means we can open browser in "sandbox" feature. It can be useful when you want to open any suspicious or harmful websites that may harm your computer.
*System Watcher- It monitors system for harmful changes. Like task manager disable..etc. And if any change detected, it give chance to restore settings.


IMPROVED FEATURES-
*Graphical User Interface- As discussed.
*Real Time Protective Defense- so no any malware can enter to your computer without detection.
*Parental Control
*Lighter Engine-Takes less memory.
*Faster Updates

 Other features also claims to be improved. But i didn't find any major improvements.


              One thing that freaking me out is it has accepted all  "blacklisted" keys!! The keys which is denied by its previous version as blacklisted, it actually accepting it. I don't know what is wrong with this new version. It can be good news for all those uses that stuff and hate to purchase software's.

                 Actually when you click on "My Kaspersky Account" it shows that your key is blacklisted. But still software is taking all updates from server!!. Also it is working fine (on blacklisted key). Isn't it great??? Kaspersky developers should think about that. Why people would purchase software if they are getting it for free?? And without any problem...

                 I would recommend this version to all. It only adds about 5 sec. while booting. Otherwise security, memory consumption, GUI, other features are all great.

Orkut Hack- How to add sound/music in scrapbook





There are many ways to add your favorite music in scrapbook. Here is the simplest method.....
Basically it is through application. The benefit is that you need not to "play" sound. It will automatically plays when anyone visits scrapbook. You can either add sound in your own scrapbook, any friend's or even you can embed it in normal scrap whatever suits to you.....

First  add 3D Music Spectrum Analyser in your account. Click here-http://www.orkut.co.in/Main#Application?appId=112888907858

**Now either you can upload your own music file(less than 6mb) or search.




INBUILT SEARCH
Just click in textbox "search music" and type keywords (song name) you want to add & hit enter.
Note:- IT IS NOT ORKUT SEARCH.

-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------


-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------
If you found your music then listen it  first and if it is ok then click on scrap/testimonial button. It will open new window as shown above. Copy all code to notepad or word.

It will look like this----






now DELETE highlighted RED area
and set width="1" height="1"



CUSTOM CODE WILL BE--









And you are done....

CUSTOM UPLOAD
-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------


-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------

**Now it will create file link under "Link to MP3 file". This is your custom link.

FINAL STEP
click on UPDATE button. It will redirect you to new window like this


-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------


-----------------------------------------------------------------------------------------
now copy the code and do changes as above. (set width="1" height="1" and delete RED area)
and the code is ready to paste...!!

Note- Once i've received error message from google about malfunction in bandwidth and for some time i am unable to open my account. BEWARE.


ENJOY AS YOU WISH

by WAR379K
e:- war379k@gmail.com

Thursday, March 25, 2010

Mafia Wars Quick Trick- How to LEVEL UP faster than ever!!!



Here are quick requisits to learn about how to GET ACHIEVEMENTS + DO JOBS (which require special items) + VAULT COLLECTION

1. You should know about Mafia wars. I am not gonna tell you how to do jobs, how to grow your mafia etc. Those are essentials.
2. You should have another facebook account. So that you can create 2nd mafia wars account.


TRICK 1 ( GET ACHIEVEMENT "That's Amore")
After creating 2nd account you can quickly get achievement by  giving a Diamond Ring to any player below level 8. That means you can send diamond ring to your 2nd account and get achievement!! From 2nd account you can click on "gift back" and get your ring back

TRICK 2 ( GET ACHIEVEMENT "Spreading it Around")
To get this achievement you need to send 500 gifts to your mafia. Just add the items to 2nd accounts wish-list which you have most like Cellfones, Cameras and "gift all". You will get achievement much faster. And anytime you are out of cellfones and other items, just gift from 2nd to 1st. Simple!


TRICK 3 (some little Hacks)
At 2nd account you have no need to use profile points other than energy. Because you want only energy to do more and more jobs. So just gain energy. Preferred type for 2nd account is Maniac. It will regain energy faster than others.
           Any time if you are out of some special required items (like Illegal Transaction RecordsUntraceable Cell Phones, Blackmail Photos etc) just use 2nd account to gain them and gift to yourself so that your energy will not be Wasted!
           This trick can be used to valuating collections or for special events at mafia wars or for adding yourself as top mafia. GET DOUBLE BONUS EVERY TIME...
Enjoy!!





by WAR379K

Friday, March 12, 2010

TrainSignal - TCP/IP and Networking Fundamentals






----------------------------------------------------------------------
                        ~ TABLE OF CONTENTS ~
----------------------------------------------------------------------

Video 1: What is a protocol?
* Definition of a protocol
* OSI Model


Video 2: Introduction to TCP/IP
* What is TCP/IP?
* TCP/IP Architecture
* TCP/IP Protocol Suite
* Types of TCP/IP communication


Video 3: Configuring an IP Address
* What is an IP Address?
-Network ID
-Host ID
* What is the purpose of a Subnet Mask?
* How to configure a computer with an IP Address
-Static
-Dynamic
* How to View a Computer???????s IP Configuration
* How to Check for Connectivity


Video 4: IP Address Planning
* How to plan an IP Addressing scheme
* Rules for IP Addressing
* What is Classful IP Addressing
* Private IP Addressing vs. Public IP Addressing
* What is Network Address Translation (NAT)?


Video 5: Binary Numbers
* Decimal vs. Binary
* Convert Binary to Decimal
* Convert Decimal to Binary
* Using a Calculator
* IP Address Conversion



Video 6: Internetworking
* Decimal vs. Binary
* Convert Binary to Decimal
* Convert Decimal to Binary
* Using a Calculator
* IP Address Conversion


Video 7: Classless Interdomain Routing
* Problems with Classful IP Addressing
* What is CIDR & VLSM
* Subnetting with CIDR


Video 8: Fundamentals of IPv6
* Disadvantages of IPv4
* IPv6 Solutions
* IPv6 Addressing
* Types of IPv6 Addressing

         I've personally tested all videos and its simply great!!! If you want to clear your ideas about various concepts den this is REAL deal.....Definately Recommended

****LINKS****

MEDIAFIRE




RAPIDSHARE

http://rapidshare.com/files/176498381/l-tstcpb-uds.part01.rar
http://rapidshare.com/files/176498307/l-tstcpb-uds.part02.rar
http://rapidshare.com/files/176498294/l-tstcpb-uds.part03.rar
http://rapidshare.com/files/176498282/l-tstcpb-uds.part04.rar
http://rapidshare.com/files/176498253/l-tstcpb-uds.part05.rar
http://rapidshare.com/files/176498342/l-tstcpb-uds.part06.rar
http://rapidshare.com/files/176498252/l-tstcpb-uds.part07.rar 


I realy hate rapidshare because of low speed, timer and also its servers is always busy..... Better download it from MEDIAFIRE..... It supports parallel downloads!!! Enjoy!!


<<<<<<<< THE WAR RELEASE >>>>>>>>

Wednesday, February 10, 2010

CYBER-TERRORISM AND INDIA


We are aware about "traditional" terrorism. When we talk about terrorism we imagine a masked man with AK-47. Cyber-terrorism is different than this. It is terrorism in cyberspace. Cyber-terrorism is new trend of terrorism of 21st century. This terrorist has only one powerful weapon “Computer”. We are familiar with the term “hacking”. The term cyber-terrorism is becoming increasingly common in the popular culture, yet a solid definition of the word seems hard to come by. Cyber-terrorism is an extension of terrorism and hacking. A terrorism by other means and it takes advantage of the fact that our society is increasingly becoming dependent on computer networks and, particularly, dependent on the Internet. It is new concept of terrorism. Cyber-terrorism has done in cyberspace which is carefully planned violence where a small amount of effort, usually hard to identify or catch. It is applied to interfere with the functioning of civil society.

There are some that say cyber-terrorism does not exist and is really a matter of hacking or information warfare. They disagree with labeling it terrorism because of the specific image of terrorism like of the creation of fear, significant physical harm, or death in a population using electronic means. Cyber-terrorist is invisible and hard to locate. He can easily spread terrorism from anywhere in the world. Experts already said that World War III would be in cyberspace.

Security professionals have expressed their increasing concern over not only the increase in frequency of attacks against the Internet, but also the increase in the level of sophistication of these attacks. While the complexity of the attacks is increasing, the skill level of the intruder that launched the attack is decreasing. This is a very troubling trend. As the terrorists learn from every attack what works and what doesn't, where the vulnerabilities are, how we respond, and the methods we use to detect these attacks. They gain the knowledge that will increase their chance for success.

TARGET-

The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems. It may be used in support of a physical attack to cause further confusion and possible delays in proper response. Although cyber attacks have caused billions of dollars in damage and affected the lives of millions. New terrorist organizations are highly funded, technologically strong groups capable of inflicting devastating damage to a wide range of targets.

There's many ways of judging the severity of such threats but the primary target for cyber-terrorism is the Internet. Its most attractive objective is to bring the Internet down, since increasingly, all commerce depends on Internet-based transactions. We call it e-commerce. In India e-commerce is growing rapidly. The cyber-terrorism threat is real because we have already experienced experimental acts of cyber-terrorism when a large number of Internet-connected computers have ceased to function. We have recent example at 7th June 2008 ten government sites of India got defaced.  Nearly 7,000 websites are hacked every year in India which means that on an average 19 sites are hacked a day. (CERT Official). And this number is increasing with every new day.

Cyber-terrorist exploits weaknesses. They take advantage of the fact that our software systems and our operating systems are woefully inadequate and are responsible for the intrinsic vulnerabilities that can be exploited. Cyber-terrorists live off the weaknesses of the defenders. In the cyber-terrorist's case it's the extremely low cost and low risk exploitation of the weaknesses of the victims where the cyber-terrorists have the advantage. From recent years India is on the target of Pakistani, Chinese and Bangladeshi hackers. They also enjoy the support of others. Every night there are thousands of conversations taking place in discussing the weaknesses of existing organizations in managing their computers. Every unsecured computer or network can be used for hacking, cyber-crime and cyber-terrorism. It means every unsecured computer is threat for someone.  So indirectly we are at the middle of war. No matter who loose and who wins, we are definitely going to loose.

Yet we have no idea how this threat is growing and becoming powerful day by day. Underdeveloped country like India has more danger than other European countries because of less expenditure on security. (check out my previous article) A weak cyber security policy in India is also resulting in increased cyber terrorism activities in India. The position is even worst when it comes to wireless security in India. Wireless security has become a headache due to its misuse by terrorists in India. Unfortunately, cyber security in India is an ignored world. In India there is large number of computer illiteracy. Million of computers of Asia especially India, Pakistan and China are infected by various viruses (threatfire.com). Viruses act as backdoors or tools for cyber-terrorists. They use Viruses, Trojans, Worms, Backdoors, Hoxes for controlling networks and servers. Very few people know about cyber security measures. As concern about India we’ve many enemies who want to bring down our economy. When India-Pak war has started, we’ve experienced many cyber attacks from Pakistani hackers called “Indian Mujahideens”.  We have a very weak cyber law, negligible cyber security and cyber forensics and almost missing legal enablement of ICT (Information and Communication Technology ) systems. The only solution is the quick deployment of a Counter-Cyber-Terrorist - someone who knows what you are up against today, someone who lives in the world of the people who are, and will be, attacking - someone who can train the people who must fight the battles.

*Information Sources*
-Cyber Terrorism In The Context Of Globalization By Rohos Nagpal
-CCRC (COMPUTER CRIME RESEARCH CENTRE)
-WIKIPEDIA (Encyclopedia)
-An Interview on Cyberterrorism with Paul Strassmann
-Thaindian News(Cyber Security In India: Another Wake Up Call)

Note- All rights of this article is reserved by owner. If you have any problem please contact at kulkarni.gargeya@gmail.com

Sunday, January 24, 2010

Feeling stuck with ANTIVIRUS??...Updated (2-Feb)



             Yes. I know. This is problem of every 2nd Indian… Most of the people (including my friends) think that they know everything about antivirus and if they’ve registered (WTF??) antivirus then their computer will not be infected. First of all I want to tell you guys… Your pc can be infected anytime. No antivirus product can give you 100% security. There are always some loops holes in engine. Yes. We can minimize risk by taking few steps.
            Ok. Lets move on to the popular and tricky question. Which antivirus is best?? I am gonna discuss a little on this topic. So first of all you have to tell me about your requirement. Because all antivirus softwares has some “distinct” feature. The basic security level is not problem. It is always mentioned by all (almost) multinational security software companies. Second thing the word “antivirus” means security suite in this article. Security suite is a bundle of all security software…like antivirus, antispam, firewall, web protection etc. I’ve compared best three antivirus products here. This comparison is based on my individual experience with some world class articles on security suits and also on some test results which have taken by “Test Systems”, “Malware City”, “AV Comparatives” and “Cascadia Labs”.

  1. Kaspersky Internet Security 2010- Kaspersky Labs has distinguish reputation for security software. Kaspersky 2010 provides excellent security. And its firewall is best of the best in world. I think it is BEST AV software ever. Real time protection of Kaspersky is just awesome. Often Kaspersky is FIRST to identify and eliminate new (unknown) threats because of its huge security network. Still it has some problems like false detections and huge prompts. Also it is best at virus detection but little lazy at warms. But still I recommend you to use Kaspersky if you know about your system and you have 1GB+ RAM. If your pc has some confidential or sensitive data and you don’t want to compromise at security then Kaspersky is the only one. I recommend this software for colleges and offices where environment is hostile. It’s really best AV available in India costing you around 600-700rs I think…


  1. Norton Internet Security 2010- I know we have very negative impression about Norton products. But I want to tell you guys that NEW Norton 2010 is one of the fastest antivirus in world. It is shocking but true. If you want faster pc with good security then go for Norton. Recommended RAM can be 512 or 1 GB. But it has some problem with its real-time protection. But if you want speed then I think you can compromise with Norton. So you can get good security and good speed both. It costs little more than Kaspersky. It costs nearly 1200-1500rs. It is huge amount for me for 1 year. It is good for any type of environment.


  1. Eset Smart Security 4- Ok. This means SPEED and only SPEED. If your most priority is your computer speed then go for ESET. If only you have no any sensitive data on your pc. You will forget that you having any antivirus product. It takes lesser memory so it needs only 256RAM. It is lightest antivirus I’ve found on internet. It costs 1000-1100rs. But I recommend this software for only home use. Because you cannot take a risk of security at work place.

             I often use ESET and Norton because I am always ready to format my pc if anything happens wrong. And I like fast pc. Still I want to tell you that I’ve never found any single virus on my pc while I am using anyone of these three antivirus products. Only thing is you have to update software at lease once in week.

MOST IMPORTANT- I’ve personally tested other products like (legend) Quick Heal, Avast, AVG with its latest versions and latest updates. And I must say that they are little kids in terms of security and speed. You cannot even compare these products with best AV's like Kaspersky or Norton. Quick heal, Panda, F-secure and AVG takes HUGE memory (so they are in my shit-list). I will prefer viruses than installing these products. Also above 3 best AV products are its best when you install it at formatted (clean) pc. (Use pc tweak software like Advanced System Care)

       Also if you dont have the key of above products and want to use free AV then i will say Avira Antivir or Avast is best choice. They give you best protection (real time). You won't get firewall protection in free version but still its fine. Today (2 Feb) i've tested Avast IS v5 (the newest) and i think its fine. It takes (4000k+23000k+18000k) memory which comparatively low. Also it has detected all 38 viruses (including my personal trojan).

Here i've listed Antivirus Products as per their performance (good to bad)
1. Kaspersky IS 2010
2. Norton IS 2010
3. ESET Smart Security v4
4. Bit Defender 2010 (it is also good defiantly recommended)
5. Avira Premium 2010 (good)
6. Avast IS 5 (good)
7. A- Squared Anti Malware v4.5 (detection rate is quite good but takes more memory)
8. AVG IS v9 (more memory)

Above all article is based on my personal opinion and some tests and articles. If you have any problem or query then mail me at war379k@gmail.com