Kamis, 04 September 2014

7-PDF Website Converter is a PDF Converter to convert Web Pages to PDF

0 komentar
Have you tried to convert webpages to PDF format using one of the conventional PDF printers? You must have noticed that most of the times PDF printers are unable to maintain the original layout  of the HTML webpage making a mess of the output file you expected. The 7-PDF website converter is one of the rare PDF printers that provides you complete layout of the webpage being converted into a PDF without cutting the pages or splitting them.

PDF Converter

The simple to use 7-PDF Website Converter  freeware automatically generates clickable PDF hyperlinks from web headings, creates clickable PDF links from website links and allows you to add a cover sheet for the PDF file. One of the best qualities of this software is that the user interface of the application is laid with several tabs allowing users to access all available features.

convert WebPages to PDF Documents 1 7 PDF Website Converter is a PDF Converter to convert Web Pages to PDF

Features of 7-PDF website converter
  • The software comes in a portable version and hence does not require any installation
  • Availability of Printing Options for Website
  • Setting of fixed PDF page titles
  • Creation of content table from web content
  • Headers with web address and no of pages
  • Creation of PDF clickable bookmarks from web headings
Convert webpages to PDF using 7-PDF website converter

convert WebPages to PDF Documents 2 7 PDF Website Converter is a PDF Converter to convert Web Pages to PDF

1. Converting webpages to PDF is very simple, all you need to do is just to paste the URL of the WebPages and click on “Convert to PDF” button.

convert WebPages to PDF Documents 3 7 PDF Website Converter is a PDF Converter to convert Web Pages to PDF

In fact 7-PDF website converter provides with an option using which you can automatically convert the URL into PDF by just dragging and dropping the URL and checking the checkbox “Convert Drag & Drop URLs automatically”. You can even change the orientation and select one of the available orientations between Portrait and Landscape.

convert WebPages to PDF Documents 4 7 PDF Website Converter is a PDF Converter to convert Web Pages to PDF
2. Also, using 7-PDF website converter you can change the configuration of paper size, overwrite existing file with the same name, output folder etc.
3. Make use of Advanced settings to make use of functions such as inserting a table of contents, cover page, generating a PDF in grayscale and many more.

7-PDF Website Converter free download

Since the software is available in a portable version, you can carry the application anywhere you want and start using it by just clicking on the .exe file of the application. This application can be used as a  freeware when it comes to private use irrespective of the number of computers you install.  Incase it is used for commercial purpose, then it is necessary to upgrade and pay for the Pro version after a period of 30 days. Click here to download the free software and start using it.

Create bootable media using ESET SysRescue Live

0 komentar
We all use various ways to enhance security of our operating system. If your system is subjected to various removable disks in a day, then it becomes the matter of primary concern that you should use a good backup and a smart security suite to tackles threats on your system. Recently, a popular security company ESET has released its SysRescue Live bootable CD/USB. It is a free utility that allows you to create a bootable rescue CD/DVD or USB Drive. You can boot an infected computer from your rescue media to scan for malware and clean infected files.

Eset SysRescue Live Create bootable media using ESET SysRescue Live

ESET SysRescue Live

Now lets see how ESET SysRescue Live works:
1. Download ESET Live USB Creator from the here. Additional files will be downloaded during installation on a portable device.
2. Run ESET Live USB Creator and select Create USB drive or Create CD/DVD.
3. Select the type of media you want to create and confirm the operation.

Eset SysRescue 1 Create bootable media using ESET SysRescue Live

4. Wait until ESET SysRescue Live gets installed on your portable device you have chosen in the previous step.
5. The message “ESET SysRescue has been successfully created.” will be displayed when ESET SysRescue Live installation is complete.
6. When your ESET SysRescue Live media is ready, remove it from your computer and store it in a safe place. You can now use ESET SysRescue Live on an infected machine.
7. To start ESET SysRescue on an infected system, you can change its boot order so that computer boot to USB first. Plug the ESET SysRescue Live media and you’ll see following screen. Select Run ESET SysRescue.

Eset 2 Create bootable media using ESET SysRescue Live
Following are the highlights of ESET SysRescue Live:
  • New: Drive is usable on multiple machines
  • New: Creator application
  • New: USB rescue drive
  • New: Linux based Live System
  • Improved: Downloading and writing the ISO image
  • Improved: Creating multiple copies
  • Improved: Running several applications
  • Improved: On-demand and boot sector scanning
This freeware works for all Windows operating system in both 32-bit and 64-bit configuration. It also works on Microsoft Windows Server 2000, 2003 (x86 and x64), 2008 (x86 and x64), 2008 R2, 2012, 2012 R2.

Chromebook vs Windows laptop – A discussion

0 komentar
Chromebook vs Windows laptop is a hot topic for discussion these days. People are discussing whether a Chromebook is better or Windows 8 laptops still rule the world. People are also wondering whether Chromebooks are powerful and feature-rich enough to replace the mighty Windows machines. I this post, we will have a look at the advantages and disadvantages, the pros and cons and the pluses and minuses of a Chromebook vs. a Windows 8 laptop.
Basically, choosing between Chromebook and Windows 8 laptop depends on user’s priorities and nature of work. This decision answers the very basic questions – What are your requirements.
Chromebook vs Windows 8 laptop 2 Chromebook vs Windows laptop   A discussion

Chromebook vs Windows laptop

Before you start making a decision about buying a Chromebook or Windows laptop, you should first understand the fundamental difference between the two.
A Chromebook can be used only for web surfing and using web applications. It offers a better user experience with Chrome Suite and Online applications. However, you can’t use applications that are meant for offline use. You need Internet connectivity all the time to be able to use a Chromebook.
A Windows laptop – be it any version of Windows OS – is a complete package of a ‘PC’. Apart from using it for Internet surfing and online applications, Windows laptops offer the widest range of services which majority of people need in day-to-day life. This includes, Microsoft Office suite, photo editing using software, online or offline video calling, downloading games and playing them offline and more. The list is huge.

Difference between Chromebook and laptop

While most are voting for the full-fledged Windows 8 laptops, some people are choosing Chromebooks. Here’s the comparison between the two.
Price
Chromebooks are cheaper than any Windows laptop. If you are looking for a device that can connect you to the world through web at cheaper price, then Chromebook is the device for you. Windows laptops are little pricier as compared to Chromebooks. However, if you want a PC that increases your productivity, then Windows laptops should be the choice.
However this price difference may narrow down as Microsoft is getting ready to launch $199 Windows laptops made by HP, as well as $99 Windows tablets, to compete with Google Chromebooks.
Surfing the web and online apps
This is the point where both Chromebook and Windows 8 laptops score the same. The Chromebook is optimized for Google’s online apps, which include Google Drive, Google Calendar and Gmail. Windows laptops too offer a smooth connectivity with Windows Store. However, when it comes to using some of these apps offline, then Windows 8 laptops score an additional point. You will be able to watch your favorite movies and TV shows offline on Windows 8 laptops; but not on Chromebooks. Chromebooks, by default, need internet connectivity at all the times!
Microsoft Office Suite
If you are a hardcore user of Microsoft Office suite (Word, Excel, PowerPoint etc.) and other Windows programs, then you may have a hard time adjusting with the Chromebook. You can use Microsoft Web Apps on the Chromebook though. Microsoft Web Apps is a free cloud version of Microsoft Office and it’s compatible with Chromebooks. Besides, you can also make use of Google Drive to open Microsoft Word documents and Excel sheets. However, you will need to tackle with the formatting issues when importing Office documents to Google Drive. Hence, if you are going to import large number of Microsoft Office files like documents, spreadsheets and PowerPoint presentations, then it’s better to stick to Windows 8 laptops.
File structure and placement of documents
Most of your files such as document, videos or pictures need to be uploaded on cloud when using Chromebooks. However, with Windows 8 laptops you can choose the placement of your documents. Besides, those habitual with Windows PC’s file structure may find Chromebook file structure messy and unorganized.
Image editing
If your job involves image editing task frequently then Chromebook may not solve your purpose completely. With Chromebook, you can use web-based image editing alternatives such as Pixlr Editor. Pixlr Editor doesn’t offer all the features that software like Adobe Photoshop (which runs smoothly on Windows 8 laptops) has; but it will simply help you edit the image which is usable. However, Chromebook certainly isn’t the device for hardcore image editors whose job involves complex image editing tasks.
Games
Chromebook certainly isn’t a high-powered, graphic-rich gaming notebook. You can play games, but limited to the games that are available on Chrome Web store. Besides, Chromebooks’ graphics processing ability is limited, and hence, you won’t be able to play online games which require high leveled graphic processing power. On the other hand, Windows 8 laptops offer both online and offline gaming.
Skype, iTunes and other such programs
Those connected with their friends, family and colleagues through Skype, won’t be able to go for Chromebook as Skype doesn’t run on Chromebooks. Similarly, other essential programs such as iTunes, Quicker and many more don’t run on Chromebook at all. For these, you will have to go for Windows 8 laptops.
Printers and Scanners
The Chromebooks need Google Cloud Print-ready printers. Other printers won’t work on Chrome. Hence for any printing job you will need a Windows PC, laptop or a Mac device. In fact, the Chromebooks can’t connect many other peripheral devices directly, such as scanners.
Summary
As we mentioned earlier, the selection depends purely on your priorities. If you are happy with online apps or are mostly connected through Gmail and are looking for a cheaper device, then Chromebooks is the choice for you. However, if your requirements include lot of documentations, spreadsheets, PowerPoint presentations, image editing jobs, Skype connectivity and offline gaming, then Windows 8 laptops should be your pick.
In short, set you priorities and go for the technology that works for you!

Rabu, 03 September 2014

USB firmware: Beware of a new threat called BadUSB

0 komentar
When we think and talk about malware and viruses, we often try and secure our computers with antivirus programs. The obvious threat comes from web where we visit a number of websites and online applications; some of them posing a serious threat for our systems. However, have you ever thought that a USB device can pose as a danger to our systems? No, we are talking about the viruses entering from a USB to our PCs through some files.

BadUSB

This new threat is caused by USB firmware. Well, this is the fact which was brought to notice by a researcher duo, Karsten Nohl and Jakob Lell, in 2014′s Black Hat annual conference that took place in Las Vegas.
USB firmare

In the 45 minute long presentation by Karsten Nohl and Jakob Lell, the researchers explained how an innocent looking USB firmware can cause a massive threat to our systems. The malware is known as ‘BadUSB‘.
BadUSB manipulates the USB firmware, the supervising software that controls the mechanism of a USB device. The worst part about this malware is that the threat is tricky to trace. The currently available anti-virus programs cannot detect this malware as it lies in the USB firmware. The attackers just need to get hold of the USB device and they can insert their own controlling chip in the USB firmware. The chip does its ‘job’ when inserted in the computer. It connects with your PC and steals your data or simply spy on your activities.
At the beginning of this presentation Karsten showed a demo on how a USB firmware can easily install a malicious software onto your system. He inserted a normal looking USB into the laptop. The USB was empty and to confirm that the USB did not contain anything, he formatted right in front of the audience. He mentioned that, the presentation wasn’t about the viruses into a flash drive.



You can see in this presentation that the USB device does nothing for a minute after inserting in the laptop. But after that, within a split-second, the USB firmware installed some malicious software on the laptop, turning the normal USB device into a ‘different USB device’.
Implications of BadUSB USB firmware on home and enterprise users
The official blog on Microsoft mentions the implications of BadUSB on home and enterprise users,
“Some USB peripherals may have to be discarded in the future if they become targeted and no manufacturer update is made available…. If any enterprise users require USB thumb drives, they should look into upgrading to a USB model with non-writable firmware or models that require digitally signed firmware updates. Enterprises with highly sensitive data may need to evaluate the firmware update process for all the peripheral devices they currently use and are purchasing.”
BadUSB is therefore a future threat that needs close monitoring and serious attention.

What is Malvertising? How to Avoid it?

0 komentar
There are many methods being used to compromise users of the Internet, so that their information can be obtained by cyber-criminals. Once a computer is compromised, the cyber-criminals can use the users data for anything they want. Such events may even result in Identity Theft, where cyber-criminals use your identity for taking loans, etc. and leave you in a mess. Among the many newer methods of compromising a computer is -  Malvertising. Let us take a look at what is malvertising and how to stay safe by avoiding it.

What is Malvertising

Malvertising or Maladvertising contains two words: Malicious + Advertising. This is not just about malicious misleading advertisements that lure users to Phishing websites. Malvertising is about compromising your computer, by downloading a short malicious code on to it, when you hover on or click on an advertisement. Some adverts will even download malicious code to your computer, while the website is still loading in the background. In such cases, by simply visiting a website, users can get infected via Drive-by-downloads.
Cybercriminals are using advertisements as a means to hack in to your computers. Since these advertisements look genuine, users click on them expecting to be taken to a website, where they can get more information about the advert. However, instead of being redirected, the click action triggers a download of a small but malicious code to users’ computers. In fact the infection can even take place silently in the background, even as the ad is being loaded by the browser. Since the ad networks serving these ads are pretty huge, it is nearly impossible to identify the person or organization behind the malicious advertisement. Many popular websites too end up unknowingly serving such adverts without any harmful intent, as they do not know that the adverts are malicious.

How Does Malvertising Work

One does not need to hack a website to place malicious advertisements on that website. Instead, criminals use advertising networks to insert their advertisements on thousands of millions of websites. If you know how advertising on the Internet works, you know that once an ad is submitted, after scrutiny, it is pushed into the Internet where it appears on websites related to the keywords typed by users for any kind of information.
Cyber-criminals use display advertising to distribute malware. Possible vectors of attack include malicious code hidden within an ad creative (such as a swf file), executables embedded on a webpage, or bundled within software downloads. All web publishers and websites are potential targets for malware authors attempting to spread their software by hiding malicious code within an ad’s SWF (Flash) file, GIF file or landing page.
If an advertiser or agency provides you with an infected ad, your computer and personal information, and that of your site’s visitors, can be exposed to serious harm. Google’s Anti-Malvertising.com website has a few tips ad publishers and website owners may want to check out.
Although reputed advertising networks do scrutinize the ads for the obvious factors, like banned words, prohibited products, etc., without a proper scrutiny of the code, malvertisements can slip through! In such a scenario, the ad network places millions of users at risk by displaying the infectious advertisements on various websites. And there are yet other ad networks who may even ignore such malvertising, for the lure of good money.
In other cases, criminals claim to represent genuine institutions, submit clean adverts directly to the websites instead of ad networks. Later, they attach a malicious code to the advert that is downloaded to computers of users who click on the adverts on websites. After a while, when the target is met, the criminals remove the code. The advert stays there for the contract period. Between attaching and removing the code, the criminals get to hack plenty of computers and thus, much information about different Internet users is at their hands. They can use this information for any purpose they like.

How To Avoid Malvertising

Precaution is the only key to avoid malvertising. Malicious ads can appear even on reputed websites. If any ad looks overtly promising, simply avoid them. For example, popups saying you are the 100th visitor and are chosen for a prize – ignore it. Avoid anything that promises you likes of money, gifts, discount coupons etc. for free. Since the advertisements that appear on the websites are result of network advertisers, it is up to them to check the advertisements for malicious codes. Most of them just check the language profanity and publish the ads. These days, most reputed networks like the Google AdSense network check the entire code, but there have still been the rare case, where malicious advertisements have crept in.
There are some cloud-based malvertising detection platforms and solutions, which deliver insight about and control over the safety of online ads being served on the websites. Large publishers may want to check this option out. As a user, make sure you have a good security software and inculcate safe browsing habits. And remember to keep your operating system and your installed software, including browser plugins, always updated.

Some recent examples of Malvertising

Certain ads on DeviantART.com were redirecting users to the Optimum Installer web page in order to install Potentially Unwanted Applications on unsuspecting users. Hackers had compromised Clicksor Ad Network to distribute malware. Blackhole Exploit kits were being distributed via the Clicksor Ad Network and others. In yet another very recent case, Java exploits were being served via advertisements on Java.com, reported Fox IT.com.
Infographic This Infographic shows how Malvertising works.
what is malvertising What is Malvertising? How to Avoid it?

It is therefore important that publishers use only such advertising networks and exchanges that have strong screening methods and who take immediate action, once instances of Malvertisements are found, in order to prevent the spread of malware within their systems, as well as contain the damage which may be caused.
Bad, vulnerable and insecure plugins often get compromised. So as I mentioned earlier, make sure you have a good security software and inculcate safe browsing habits. And remember to keep your operating system and your installed software, including browser plugins, always updated.
Stay safe!
4

Fix: The Disk Is Write-Protected error for Removable Disks

0 komentar
We all use removable disks in Windows. Well, sometimes, you may came across such errors with these removable disks, that may make you believe that  the disk has malfunctioned and can’t be used at all. Today, in this article, we’ll discuss on such scenario I recently faced with a USB Drive. Actually, whenever I plug that drive and perform any operation with this drive results in following error:

The disk is write-protected. Remove the write-protection or use another disk.

The Disk Is Write Protected Fix: The Disk Is Write Protected error for Removable Disks

Obviously, the Try again button shown in above error box does nothing significant to fix the hitch. Due to this, you might feel that the disk is not usable and you should throw it to dustbin. But wait! If you’re really going to do so, why not try something to make this disk again this writable. Here are the two fixes you can try to make your USB drive working again:

The Disk Is Write-Protected

FIX 1

1. Press Windows Key + R combination, type put regedit in Run dialog box and hit Enter to open the Registry Editor.

 Fix: The Disk Is Write Protected error for Removable Disks
2. In the left pane, navigate here:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
The Disk Is Write Protected 2 Fix: The Disk Is Write Protected error for Removable Disks

3. In the left pane of this location, right click Control key and select New -> Key. Name the new sub-key so created as StorageDevicePolicies. Now come to the right pane of this sub-key i.e. StorageDevicePolicies, right click and select New -> DWORD Value. Name the newly created DWORD as WriteProtect. In some cases, you might find that this DWORD under the sub-key already exists and the DWORD has a Value set to 1. Double click on the DWORD to modify its Value data:
The Disk Is Write Protected 3 Fix: The Disk Is Write Protected error for Removable Disks

4. In the above shown box, change the Value data to 0 from 1. Click OK. Close the Registry Editor and check if the issue is resolved, else try FIX 2 mentioned below.

FIX 2

1. Open administrative Command Prompt.
2. Type these commands one by one and press Enter key after each:
diskpart
list disk
select disk # (# is the number of USB drive with which you’re getting error and is plugged in, see screenshot below)
attributes disk clear readonly

The Disk Is Write Protected 1 Fix: The Disk Is Write Protected error for Removable Disks

You may now close Command Prompt and re-plug the USB drive and check if the issue is resolved. If the disk is still showing same error, there could be a possibility that the chip-set of this drive is broken.
If this does not help you, you may want to see this post, which gives additional tips on how to remove the Write Protection on a Disk. If your data on the drive is of paramount importance, you may need to consult a data recovery professional.

Selasa, 02 September 2014

TeamLab Office Personal: Free Cloud Based Office Suite

0 komentar
There are already a plethora of web based online processors available in the market, TeamLab Office is just another online processors for Word, Excel and Powerpoint documents. There are two version of Teamlab: Personal and Corporate. Personal Teamlab is available for free; for Corporate usage, Teamlab users have to purchase a plan.

TeamLab Office

If we talk about the difference between other online processors and Teamlab, then from a user point of view, it offers enhanced formatting qualities for both Microsoft Office applications and cloud based storage services, like Google Docs. A tech geek will find Teamlab useful as it supports HTML5 - hence making it  easier to create and share files with other users.
Teamlab Personal by default allows user to work on document, spreadsheet and presentation editor. Users can create, edit and save that file on the Teamlab website itself. They can also upload the files in different format and can work and share.
Let us have a look at the 3 tools in brief.

Document Editor

teamlab office personal TeamLab Office Personal: Free Cloud Based Office Suite
Document Editor work in the same way as we work on Microsoft Word. It has features like align option, user can insert graphs, worksheets into it to create a dynamic Word document, few other but noticeable features that we saw in Teamlab Office is that multiple users can work on the same file at once, all co-users can chat with each other by using the chat button which appears on the top left hand side. User can also use the in-built search feature to look for resources that are available on that particular document.

Spreadsheet Editor

teamlab xls TeamLab Office Personal: Free Cloud Based Office Suite
Just like the Document Editor, Spreadsheet program also offers amazing features like adding comments on created file, sharing with other user. Users can also save the file on Teamlab Office itself, or on any cloud storage service to work on it further. Working on cloud based Spreadsheet file is fun as users can work or save on the file from anywhere they just need an internet connection to access it.

Presentation Editor

teamlab pptx TeamLab Office Personal: Free Cloud Based Office Suite
Like the traditional PowerPoint, Presentation Editor works in the same way. It offers user options to add template, add new slides in between based on the requirement. Once done working on the file user can download the file in PDF or PPT format also can be saved online for future use.
Getting Started with Teamlab Personal
You have to use either Google or Facebook account to login into Teamlab. However user can also click on Document, spreadsheet or presentation buttons to see the demo and check how it looks like and can also work on the files – but to save or share it, user have to sign up.
Once done with the sign in, a default dashboard will be presented to the user. Click on the doc, spreadsheet or presentation link and start working on it.
If a user wants to upload their own Word, PowerPoint or Excel file, they can do that and also edit, share or save the new edited file.
Under the Settings tab, a user can add different cloud based storage service like Drive, Box, One Drive or Dropbox to store file.
To share a file, a user have to click on the Share button which appears along with the file. A Window will pop-up asking to select type of access that you would like to give to that file. Copy the URL or create a tiny URL for the same. The file can also be shared on Facebook, Twitter, Google+ or via mail, by just clicking on the buttons.  There is also a Deny access link, ad if the option is enabled, then no one will be able to access the file from any shared links.
Personal Teamlab, is a must have backup tool for those users who spend most of their time working on Word, Excel or PowerPoint documents. It is available for free for personal use, go ahead and check it out here.
If you do not have a Microsoft Office license, such free Microsoft Office alternatives for Windows will help you get the work done.

Free software to lock Windows using USB Pen Drive

0 komentar
Protecting your computer with a USB has always been an additional feature for securing your Windows computer. If you leave your PC alone for short intervals, then using a USB for locking your Windows PC is recommended for you, as it is instant and safe. You just need to take out your USB drive and boom, your PC is locked – and the instant you plug it back again, it will be unlocked. It is a fast way of locking and unlocking Windows as compared to other methods.
We have already see how we can use the built-in SysKey Utility in Windows 8 / 7, to lock the computer using a USB stick. Today we will list a few free software that will allow you to to password protect, lock, unlock Windows PC using USB Pen Drive. Let us have a look at them.

Lock Windows using USB

Predator

predator usb 400x356 Free software to lock Windows using USB Pen Drive
Predator is a free software that turns a USB drive into a key that can be used to lock or unlock your computer. Even if you are logged into your computer and you plug out the USB drive, the computer will automatically stop responding. As soon as you remove the USB drive, the keyboard and mouse will stop working and when and the screen will turn dark. And when you again plug the USB back to its place, the computer will revert back normal. Read more about Predator here.

WinLockr

edit 400x255 Free software to lock Windows using USB Pen Drive
WinLockr is another freeware that lets you lock or unlock your Windows computer using a USB flash drive. It supports automatic Keyboard Locking. In addition to this, it comes with a nice Shutdown prevention feature, that prevents shutdowns or restarts while it is active. The full screen mode hides away everything from the screen so that no one can view your activity. Read more about WinLockr here.

USB System Lock

USL is an open source USB locking freeware that lets you lock and unlock your device using a USB flash drive. The software can run on almost all USB devices, including MP3 players, Card Readers, etc. There is a limitation of this software, and that it can protect your computer only under normal boot. It fails to run under Safe Boot. Despite its limitations it is a good software overall. Click here to download USB System Lock.
442591 Free software to lock Windows using USB Pen Drive
These apps are very good at their task and can help you out in maintaining an addition layer of security for your Windows computer. If you frequently leave your desk then you must have one of these apps, so that while leaving your desk you can instantly lock your computer by plugging out the USB and again instantly unlock your computer by plugging in the USB drive.

Levitation & LawnMark websites show you the power of Internet Explorer

0 komentar
In spite of the fact that Internet Explorer has been improving with every version release, people still love to hate it. Microsoft has been going all out and trying its level best - apart from considering a rebranding exercise - to capture mind space, but has not really been very successful at it.
To me, it is all in the mind. IE lost its brand equity and people no longer want to use it. Its like, most think that a particular search engine gives the best result – and they cannot imagine that any other could give equally good, if not better search results. As a result of which they do not even attempt to try out the other search engines. Habits die hard!
It’s the same with browsers too. IE got a bad name, and rightly too – what with some of its earlier releases like Internet Explorer 6 being full of holes. Microsoft took its dominant position in the browser market for granted and remained complacent. Firefox and then Chrome jumped into the market, exploited the user’s disenchantment with IE and managed to gain a formidable market share.
But with the release of Internet Explorer 9, things started changing. Folks started taking IE seriously again. After Internet Explorer 10 was released, I too switched to it as my default web browser, for the security and the speeds that it offered to me.
IE still owns over half of the market share, although it is no longer the dominant player. It does not matter how you feel about Microsoft. What is important that you get the best browser you deserve. Let go of preconceived notions, try Internet Explorer for a week and see how it suits you. If you don’t like it you can always go back to your favorite alternative browser.
To test your browser, visit the LawnMark 2013 site with IE10 or the latest versions of Firefox or Chrome and click on the RUN BENCHMARK button in the bottom right corner.
Check how fast your browser renders the complete page. Internet Explorer 10 took 7.55 seconds. On Chrome and Firefox, its 150 seconds and counting. So I closed these two browsers. On Opera the button just wouldn’t load.
ie-lawnmark
Now visit the Levitation website. On IE10, you will see a blank gray screen with some gray buttons. On the latest versions of Opera, Chrome or Firefox, you will see the flag and a few effects when you click on it.
levitate-1
But visit the site with Internet Explorer 11 and you will see the fluidity with which the images move. Simply moving the cursor makes the flag jump or levitate.
levitate-ie11
After reading this, I know there will still be people who will not be able to resist saying, “IE still sux“! :D That’s all right. I am not trying to push IE to you. Just want to make sure that you re-check what the ecosystem is NOW offering you, and then decide which browser, you feel suits you the best.

Evolution of Malware – How it all began!

0 komentar
Hi. I am Creeper. Catch me if you can. It was the ’50s! Back then, computers were big. Programmers used punching cards. One such programmer – Bob Thomas – experimented with self-replicating programs and created the Creeper. Fortunately, the worm could not self-replicate, but it did affect users of ARPAnet (one of the first computer networks’ community). From there, began a journey into the most dangerous realms of the Internet.
Evolution of Malware Evolution of Malware   How it all began!
Let us check out the evolution of malware after taking a quick look at difference between a worm and virus.

Worm vs Virus

A Worm is basically a program that can self-replicate across computers and other types of digital devices. A Virus needs to be attached to something like an application and needs a trigger, such as execution of that application, to work for whatever intention it was created. In other words, worms are independent and can replicate without the need for any triggers. They can be downloaded with other programs. They can affect your computers by passing in through Flash drives. A virus uses plenty more methods in addition to the two mentioned here, to get into a computer and infect it. It requires some action to be taken by the user before it becomes active and does the work for which it is programmed.
These days, we do not hear about worms explicitly. We have a common word called Virus and even a more generic one – Malware. Since these days, the intentions of worms and virus, plus other types of software like Spyware, etc. are malicious or bad, they are collectively called Malware. Unlike the beginning, where malware were result of curiosity and experimentation, and the intention was merely to irritate, cause mischief or havoc, these days’ viruses are full programs that are intended to steal or destroy data. The intentions are bad as the industry creates malware for their benefits at your costs.

Evolution of Malware and Viruses

The first Internet Worm and a great deal of MS-DOS viruses were harmless to both the user and the computer. They were designed to be annoying and let the world know about their creators existence. But with the passage of times, things changed. Today’s malware writers exploit their creations to use infected machines, and then steal banking credentials, send spam messages, or leverage their revenue by advertisement click fraud. Corporate espionage also brings constant revenue, as malware opens backdoors into the organization’s network.
Although WinVer 1.4 was said to be the first Windows virus, the first malware to be introduced to the world was the Creeper. It was not a malware by definition though. It simply displayed a message which would irritate users and as a result, the first anti-virus software was born. It was named Reaper and it was made to counter Creeper. There are different arguments saying this cannot be called malware as it could not replicate or cause damage to computers, but still, many accept Bob Thomas and his Creeper as the beginning of what later turned into a multi-billion industry of malware. Bob could not have even imagined that.
Anyway, the next malware was said to be Brain. It was developed by two Pakistan-based people in 1986. By this time, general public too had fans of computers and there were many hobby groups and communities that were run using computers. The target of Brain was these communities. It targeted the boot sector of computers via a 5 1/4 inch floppy disks and showed just a message. It, too, was not intended to steal data or cause data loss in any way. It also gave the phone number of the malware developers – Basit and Amjad – so that people could ask them for help to remove the malware.
The first reference to a worm that caused damage (presumed to be because of a bug in the worm code) was Morris’ worm. It was developed by Robert Morris, a student at Carnell University. Again, as with the Creeper, people argued this was the first worm – as it could replicate. “Worms need to replicate else they are not worms”, people argue. This infected more than 5000 computers in the USA and caused damage between 100,000 and 10,000,000. The exact damage could not be estimated.
The biggest turn in the history of malware or its evolution was the LoveLetter worm. By that time, most organizations had computers working on MS DOS or other similar operating systems. It was the year 2000 and the LoveLetters that contained an infected attachment which when, downloaded, infected the email program and sent a copy of the worm to people in recipients’ address book. Not only that, it overwrote certain file types with rubbish. By the time it was discovered as not being a prank and a serious threat, damage was done. However, it educated people about malware and that people out there are not all good – but bad ones too who would want to play with the data they had on their computers.
A need for anti-virus software on every computer was stressed and was implemented slowly. Of course, those were small codes who kept on updating themselves as and when new worms or viruses are discovered.
The year 2001 saw the emergence of Red Code, a malware that targeted Microsoft IIS based systems. Normal antivirus could not find it as it was resident in the active memory of the computer. The worm could be detected only in transit. Traditional antivirus failed and need arose for better ones that can scan all parts of a computer where such malware can reside: boot sector, memory, hard disks, application files etc.
Then came Win32/Ninda that was a threat to Networks. It used network backdoors to spread and affected hundreds of thousands of computers and web servers. Many websites were compromised and provided as a source for further infections. By this time, Internet usage was in full swing. It is said the malware initiated around the attacks of Sept 11, 2001. Antivirus vendors went back to their drawing boards to create antivirus that could also monitor network ports, especially Port 80 - the one used to connect to the Internet and detection of other open or closed ports that they need(ed) to hide from the networks.
People were also educated about the possibilities of Spyware, Adware, etc and the collective term, Malware, was subsequently coined. You can read the difference between Virus, Trojan, Worm, Adware, Rootkit, etc, here.
Over the last two decades, both malware and antimalware programs have became complex. Phishing became part of Internet soon and antivirus had to scan complete emails – including the contents – to make sure there are no malicious URLs etc.
We can say that the last decade, especially, had seen a tremendous rise in dreaded virus problems, as well as good improvements in the antimalware solutions. There are many free antivirus software and free Internet Security Suites, that act as good as the paid options. One now needed to take an integrated approach to fighting malware, and hence Firewalls, Heuristics, etc, were also made a part of the arsenal.
There are competing claims for the innovator of the first antivirus product. Possibly the first publicly documented removal of a computer virus in the wild was performed by Bernd Fix in 1987. By the end of 1990 there were a number of anti-virus products available.
Infographic
BitDefender has prepared this wonderful and a very informative Infographic on the timeline and history of computer viruses starting 1970. The history of malware is rife with incidents that allowed viruses to morph from innocent pranks to advanced military weapons.

malware history Evolution of Malware   How it all began!
If you’d like to find out more about how malware grew in time, download this PDF copy of the Malware History whitepaper from BitDefender. There is also a lot of information at Microsoft, on the evolution of malware and malware trends. You might want to also see this interesting Infographic titled, Malware Hall of Shame.
Ransomware, Rogue software, Rootkits, Botnets, RATs are all here to stay now. New technologies that have emerged or are emerging, including but not limited to BYOD and Internet of Things will be attacked. Malware has also started focussing on the Social Media. While a good security software will help you stay protected, it is equally important to carry out safe Internet and Browsing practices.

Senin, 01 September 2014

Meet Inori Aizawa – Internet Explorer personified!

0 komentar
In a personification of the browser Internet Explorer, on the occasion of ongoing Anime Festival Asia (AFA) 2013, Microsoft has posted a video of a character named Inori Aizawa, who is now also the mascot for the Internet Explorer browser. It’s an anime, and Inori is a female character, who had a terrifying past and is now all geared up to fight the world.

Inori Aizawa is the mascot of Internet Explorer

In the video, Inori who likes surfing the internet, karaoke, the new coding language HTML5 is fighting against the dark side of the internet – malware and online bullies, who seems to appear as drones. In her elegant and typical wardrobe, the logo of Windows can be seen on her skirt.
The personified web-browser, tells about her past,
My name is Inoriand I’m an anime personification for Internet Explorer! Shall we explore the web? When I was younger, I used to be a clumsy, slow and awkward girl. However, just like the story of ugly duckling, people told me that I have really matured and changed over the years. I feel confident in my abilities now, and I’m eager to show you what I can do. Why don’t you get to know me a little better?
There is no denying that Internet Explorer had a bad patch. They were once a very good browser, but ever since other 3rd party alternative cropped up, Microsoft sort of missed on polishing its web-browser esp. IE6. But things have changed drastically over the last couple of years. The browser we all loved to hate has really grown stronger. The newest version, Internet Explorer 11 is secure, swift, light and stable.
You can get to know more about her on her Facebook page. You can watch the video here. There is also a special cuter version of Internet Explorer dedicated to her, which you can download from here.

Incidence and usage of rogue antivirus software dropping

0 komentar
Rogue antivirus software is a malware that pretends (and acts) like an antivirus software. However, in reality it simply downloads malicious software on your system and displays false detections of viruses on the computer. After displaying this, the rogue antivirus software scares and convinces users into paying fees to clean these ‘detections’. With such tactics to trap users, rogue softwares have been an indivisible part of malware ecosystem. Some of such fraud antivirus softwares are the Win32/FakeRean and Win32/SpySheriff that are active since 2007 and still making revenue.
However, Microsoft’s Malware Protection Center’s recent study shows that the usage of the rogue antivirus software is dropping significantly. The graph below is the result of this study that shows the overall trend of rogue antivirus software family for last one year (Aug’13 to Aug ’14).

Rogue antivirus software

As can be seen in the graph, the usage of the rogue antivirus software family, such as Win32/FakePAV, Win32/OneScan, Win32/FakeXPA and Win32/Winwebsec has gone significantly low in the year 2014.
It’s pretty surprising to see the trend going lower and lower. But Microsoft states the reason behind this downfall:
“It’s likely this has happened due to the antimalware industry’s intense targeting of these rogues in our products, and better end-user awareness and security practices. In particular, greater education about the social engineering technique the rogues use, and the large number of legitimate, free antivirus products available on the market appear to have had an impact on a user’s willingness to pay for such pests.”
So, actually, the free-of-cost availability of genuine antivirus software in the market has been the major driving force behind the drop of incidences of rogue antivirus software.
Rogue software always use different name combinations and brandings to hide their tracks and avoid detections by genuine antivirus programs. However the recent updates in antivirus programs, this covering is not working anymore. Hence, now-a-days, the rogue softwares are using other tricks to catch users’ attention towards them. Microsoft mentions that,
“In the past we’ve regularly seen rogues use the hosts file to block access to a legitimate security product’s websites to deny users protection against the threat…Rogue Win32/Defru has a different and simpler approach on how to trick the user and monetize on it. Basically, it prevents the user from using the Internet by showing a fake scan when using different websites.”
At the ending note, Microsoft mentions that there are genuine, reliable yet free security programs such as Microsoft Security Essentials. Users should always do a thorough investigation about the authenticity of the antivirus program that asks you to pay for it.

RollBack XP: Secure and Protect Windows XP indefinitely

0 komentar
Windows XP users are looking for ways to secure their Windows XP installation as Microsoft has already ended support for this old, but popular operating system. There are several risks of staying with Windows XP now.  One way you can secure and protect your Windows XP installation in perpetuity would be to roll back or restore it back to a good point, every time you restart your computer. RollBack XP is a new freeware for Windows XP that lets you do just that.
Today, the size of the information that we store on our computers is too large. In fact, ‘large’ is an understatement. All this information is crucial and if anything goes wrong with the system, chances are that we might lose all this vital information in no time. The best way to protect ourselves against such disasters, it is advisable that we take frequent backups of all our important data. RollBack XP gives you a better option. Rollback, in literal terms, means an operation that returns the database to a defined previous state. With the help of Rollback XP, you can take backup of your data on Windows XP. For this, the app takes snapshots of your system and it restores your computer to any previous state as mentioned by you.

Rollback XP

Rollback XP 2 RollBack XP: Secure and Protect Windows XP indefinitely

Rollback XP is an efficient data storage system. This is a newly released data backup storage software developed for Windows XP. When downloaded, the software takes snapshots of your system. Using these snapshots you can restore your system to a previous state in an error-free manner. This is an excellent way to save your data in case of disaster.
The installation process of Rollback XP takes a considerable amount of time. And it may ask you to restart your system. However, once it is installed, Rollback XP is an easy to use software as it has user-friendly interface. It has a left sidebar which consists of a list of common tasks, advanced tasks and a control panel.
The most common tasks are inclusive of following tasks:
  1. Take Snapshot
  2. Rollback system
  3. Recover files
  4. Snapshot history
The Advanced tasks include:
  1. System Security
  2. Snapshot defragmenter
  3. Baseline Manager
Using the control panel you can manage Rollback XP as per your wish. It consists of following controls:
  1. Access Control
  2. Scheduled tasks
  3. Program settings
  4. Event logs
  5. Product activation
Features of Rollback XP
Rollback XP is a feature-rich software. In case of errors or system breakdown due to viruses, you can reverse your system to a previous time within seconds using Rollback XP. You can go back few minutes, hours, days, weeks or months back, as per your requirement. When you are making these changes, Rollback XP does not affect your computer’s performance as it makes use of minimum system resources.
With the help of Rollback XP, you can take up to 10 snapshots. Rollback XP takes complete system snapshots without the need to restart the system. You can even reverse to any system crash within seconds, even if Windows can’t startup.
Rollback XP works with Virtual Machines and VMware. It serves as a host or within the virtual machine as a client. It also locks the snapshots takes in order to avoid automated deletions. You can always explore, browse and retrieve files and folders from any snapshot.  You just have to drag and drop the snapshot files into your active system.
Though the name is ‘Rollback XP’ you can also roll forward to any available system snapshot.
Using this tool, the user can test any software as the software can be ‘uninstalled’ at any moment, simply by rolling back. You can also take the snapshots manually as per your wish. You can fix a schedule to take the snapshots. Once set, Rollback XP takes the snapshots automatically.
Conclusion
Rollback XP is easy to use and takes snapshots automatically. It’s an effective software that lets you revert the changes and save your data. It has only one drawback that you need to leave Rollback XP running the background to do its job – but its worth it, especially, should your Windows XP computer get compromised by malware, you can roll it back to a clean state.
Give Rollback XP a try if you are a Windows XP user and let us know your take on this! Go get it here.
Windows XP has reached end-of-support and it actually does not make sense continuing with it, but the fact still remains that many are still using this outdated operating system. This post is meant for them.