Showing posts with label keyloggers. Show all posts
Showing posts with label keyloggers. Show all posts

Friday, June 08, 2007

RoboForm Automated Password Manager

RoboForm is an award-winning automated password manager and
web form filler with some serious Artificial Intelligence
that completely automates password entering and form
filling..

This is what it does:

AutoSave passwords in browser.

AutoFill passwords to login form.

Fill personal info into online forms.

Save offline passwords & notes.

Generate Secure Random Passwords.

Encrypt passwords and personal data using AES, Blowfish,
RC6, 3-DES or 1-DES algorithms.

All personal info is stored on your computer only.

Backup & Restore, Print your passwords.

It has NO ADWARE, NO SPYWARE.
Works under Windows as an add-on to IE-based browsers.
Works with Netscape, Mozilla, Firefox under Windows.

Memorizes your passwords and Logs You In automatically.

Fills long registration and checkout forms with one click.

Encrypts your passwords to achieve complete security.

Generates random passwords that hackers cannot guess.

Fights Phishing by filling passwords only on matching web
sites.

Defeats Keyloggers by not using keyboard to type passwords.

Backs up your passwords, Copies them between computers.

Synchronizes passwords between computers using GoodSync.

Searches for keywords in your passwords, notes and Internet.

Portable: RoboForm2Go runs from USB key, no install needed.

PDA-friendly: sync your passwords to Pocket PC and Palm.

Neutral: works with Internet Explorer, AOL/MSN, Firefox.

IE 7 and Vista are now supported.

Download Roboform here:
http://www.roboform.com/

Comprehensive Tutorials here:
http://www.roboform.com/tutorials.html

Watch it on Windows Media Player here

Tuesday, April 03, 2007

Why Do I Feel Like Somebody’s Watching Me?

Spyware is one of the fastest-growing internet threats. According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user's knowledge. Once embedded in a computer, it can wreak havoc on the system's performance while gathering your personal information. Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.

Where does it come from?
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user's knowledge. The user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data for the spyware author's personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads that posses spyware programs.

The user of a downloadable program should pay extra attention to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program. Unfortunately, we do not always take the time to read the fine print. Some agreements may provide special "opt-out" boxes that the user can click to stop the spyware from being included in the download. Be sure to review the document before signing off on the download.

Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why the user has to initiate a download by clicking on a link. These links can prove deceptive. For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen. The message may ask you if you would like to optimize your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.

Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.

What can spyware programs do?
Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.

Spyware can:

1. Monitor your keystrokes for reporting purposes.

2. Scan files located on your hard drive.

3. Snoop through applications on our desktop.

4. Install other spyware programs into your computer.

5. Read your cookies.

6. Steal credit card numbers, passwords, and other personal information.

7. Change the default settings on your home page web browser.

8. Mutate into a second generation of spyware thus making it more

difficult to eradicate.

9. Cause your computer to run slower.

10. Deliver annoying pop up advertisements.

11. Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliate's settings.

12. Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.

Spyware Examples
Here are a few examples of commonly seen spyware programs. Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use.

CoolWebSearch, a group of programs, that install through "holes" found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.

Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.

180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they've altered.

HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. It's a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

How can I prevent spyware?
There are a couple things you can do to prevent spyware from infecting your computer system. First, invest in a reliable commercial anti-spyware program.

I recommend you follow this link http://www.linkbrander.com/go/34613 and read more and you can also scan your PC for free. There are several others on the market including stand alone software packages such as Lavasoft's Ad-Aware available for free at http://www.lavasoft.de/products/ad-aware_se_personal.php or Windows Antispyware. Other options provide the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software. As with most programs, update your anti virus software frequently.

As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality. Spyware enjoys penetrating the IE's weaknesses. Because of this, many users have switched to non-IE browsers. However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources. This will help reduce your chances of a spyware infiltration.

And, when all else fails?

Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

Add to Technorati Favorites

Friday, March 23, 2007

Protect Your PC and Privacy

You may think that you are reasonably safe as you surf the net, but windows has many gaping flaws that do not protect your privacy, and it it far too easy for a hacker to gain access to your privacy and others to harness your ISP etc. There are some simple steps outlined below which will allow you to surf much safer, as well as guiding you through various tweaks to help you.

Set a Restore Point or back-up your PC FIRST!

I have been using AVG free Anti-Virus for many years and install it as first choice on other peoples machines.
Get yours here: http://free.grisoft.com/doc/avg-anti-virus-free/lng/us/tpl/v5

Ad-Aware Personal remains the most popular anti-spyware product for computer users around the world, with nearly one million downloads every week.
http://www.lavasoft.de/products/ad-aware_se_personal.php

Also worth using is ZoneAlarm free firewall available from http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp

SpywareGuard, SpywareBlaster and MRU-Blaster available for free from http://www.javacoolsoftware.com/products.html

The only thing that I would actually PAY for is XoftSpy, and it is only a one off payment with lifetime updates, and a free scan so you can test it and see what it finds.
It's availabe at http://www.linkbrander.com/go/34613

Also check your PC for free at http://pcpitstop.com/

Without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet may be offering some or all of your computer's data to the entire world at this very moment! You can check your open Ports, File Sharing etc for Free at http://www.grc.com/default.htm
Simply scroll down the page to *Hot Spots* and click on ShieldsUp.

Finally for now, I would also recommend the use of CCleaner (formerly Crap Cleaner) is a freeware system optimization and privacy tool. It removes unused and temporary files from your system - allowing Windows to run faster, more efficiently and giving you more hard disk space. The best part is that it's fast! (normally taking less than a second to run) and Free. Cleans the following:
Internet Explorer Cache, History, Cookies, Index.dat.
Recycle Bin, Temporary files and Log files.
Recently opened URLs and files.
Third-party application temp files and recent file lists (MRUs). Including: Firefox, Opera, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Office XP, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and more...
Advanced Registry scanner and cleaner to remove unused and old entries. Including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more... Backup for registry clean.
Windows Startup tool.
http://www.filehippo.com/download_ccleaner/

Hope that some of this is of some use to you.
Have a good day all
http://www.linkbrander.com/go/35000
http://www.linkbrander.com/go/33862
http://www.linkbrander.com/go/33863

Any problems then feel free to leave a comment and I will get back to you asap.

Add to Technorati Favorites