ShareThis

5/27/2011 Microsoft Security Essentials and Updates, Download now.

Microsoft Security Essentials and Updates.
 
 
Microsoft Security Essentials icon.png Microsoft Security Essentials wordmark.svg
Microsoft Security Essentials.png
Microsoft Security Essentials version 2.0


A pop-up notification stating malware was found.


Developer(s)              Microsoft Corporation
Initial release                                 29 September 2009; 19 months ago  (2009-09-29)
Stable release           2.0.657.0 / 16 December 2010; 5 months ago (2010-12-16)
Development status:           Active
Operating system
         Windows XP with Service Pack 2 (32-bit)
         Windows Vista and Windows 7 (32- and 64-bit)
Platform                                 Intel x86 32-bit  x86-64 













                       
Size:-                                            32-bit (7.5MB),
                                                        64-bit (9.5MB)
                                                        Virus Definitions: 62 MB (almost)
                                                        NIS definitions: 3.75 MB
Available in                  English, Bulgarian, Chinese (Simplified), 
                                                       Chinese (Traditional), Croatian, Czech
                                                      , Danish, Dutch, Finnish, French, German,
                                                       Greek, Hungarian, Italian, Japanese, Korean,
                                                       Norwegian, Polish, Portuguese (Brazilian),
                                                       Portuguese (Portugal), Romanian, Russian,
                                                       Swedish, Slovakian, Spanish, Thai, Turkish and Ukrainian
Type:                                        Antivirus and Networkintrusion Detection System

License:                      Freeware
Website:                                www.microsoft.com/secutiy_essentials

Microsoft Security Essentials - Latest 32/64 bit Installation 

guidelines:-

Below are updated instructions for MSE installation for 32 bit or 64 bit versions of Windows:
1. Uninstall any previous Anti-virus products (esp. the 60 day trial 
AV products that may have come with your system)

2. Reboot your system to ensure a clean start

3. Go the WINDOWS UPDATE site to install all updates for improved protection.
There is a Malicious Software Removal
Tool which will clean up major virus or spyware infections that could be present on your system.

http://www.update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us

4. PREREQUISITES: You must be on latest service packs for your Operating System 
(SP3 for XP). Also in order to download MSE, your system must be WGA compliant.
  At this site Click on VALIDATE BUTTON to ensure your system is WGA compliant if you have
not done this in the past or are working with a new or newly built PC:

http://www.microsoft.com/genuine/

5. Then visit Microsoft Security Essentials (MSE) site and click
DOWNLOAD Button. There is also an Installation Video to guide in this process you can
watch 1st if desired using Media Player


http://www.microsoft.com/security_essentials/

6. MANUAL UPDATE OPTION: MSE will automatically update itself, but the first update may
be time-consuming.  On a high speed Internet connection, I've found it useful
to manually Download latest virus definitions (great technique for updating a secondary dial up only
PC that you might want to protect) 
Older 32 Bit systems (XP, Vista)

http://go.microsoft.com/fwlink/?LinkID=87342


Newer 64 Bit systems (Vista, Windows 7)

http://go.microsoft.com/fwlink/?LinkID=87341


After downloading, click on MPAM-FE.EX (32 bit) or MPAM-FEX64.EXE 
(64 bit). It will automatically install lastest definitions in a couple of minutes.  If you have 
PCs that never connect to the Internet, this technique is a great way of
staying updated with MSE.

7. Reboot system to ensure MSE starts automatically and with a green icon 
displayed in the System Tray area.

8. Launch Microsoft Security Essentials from Start Menu and select FULL SCAN to ensure your
system is malware free.This may take an hour or two depending on the size of system. You can let it run 
unattended.  Check each of the tabs for 
desired times to update and other desired settings.

9. Ensure your system is set for AUTOMATIC UPDATES (the WIndows Update process)
if desired.  The link in step 1 above allows you to select this option

10. If the MSE icon in the System Tray changes to any other color than GREEN, it indicates a
problem (and usually a pop-up message will occur recommending AV signature updates or the need for
a weekly scan).  The quick scan satisfies the need for a scan and it's good once per month to do a full scan
which may take a couple of hours and can run while you're away from the PC.

QUOTE: Microsoft Security Essentials is a free download from Microsoft that is simple to install, 
easy to use, and always kept up to date so you can be assured your PC is protected by the latest 
technology. It’s easy to tell if your PC is secure when you’re green, you’re good. It’s that simple














Digg it StumbleUpon del.icio.us

Learn Hacking and make your career in It security (only for Indian readers)



 Learn Hacking and make your career in It security (only for Indian readers      

                                     


A recent study conducted by NASSCOM, the expected demand of Ethical Hacking professionals by the year 2012 would be around 1,88,000, as opposed to current availability of only about 22,000 professionals.
Hi friends, This post is the most popular post in my blog but outdated so i thought to publish it with complete analysis.
This post is specially for those people(for Indian readers) who has some interest in hacking and want to make career in this field. First of all we will talk about institute you should not join.


  Appin certified security expert (ACSE) 

 

(1)Appin knowledge solution- Appin runs the most advanced certificate, diploma, advanced diploma programs in Information Security, Ethical Hacking, Computer Forensics, Secured Programming, Cryptography, Network Security. 


About course content- Nothing different and advanced then you find on internet , But you find all course material in a structured format like a book.
If you read my blog and others blogs or sites regularly you will get to know you have wasted your money. And the last thing I didn't got any call for job interview.


Certified



Information Security Expert(CISE)


http://www.adpost.com/classifieds/uploadmtb/in/innobuzz_my/innobuzz_my.1.jpg                       https://lh5.googleusercontent.com/-66V-F7FqrmA/TWoaD2dnjMI/AAAAAAAAAfU/zJGJkUlHX5o/Capture1.PNG

 

Innobuzz knowledge solutionCISE (Certified Information Security Expert) certification is one of the most recognized Indian certification in Information Security and Ethical Hacking. The Program covers all aspects of Information Security and Ethical Hacking, enabling one to become an Information Security Expert. Online Security Breaches are happening at a very fast rate and experts are needed to check and cure these. ITS (IT Security) Experts are in demand. According to NASSCOM, the demand for ITS Experts will be 13 Lac by 2012 in India. ITS is a THE next big thing in IT and you should make the best of it. as i got to know @ their website www.innobuzz.in  If you are a newbie and thinking to join short term course , No issue. Long term course is advanced and looks attractive before joining properly investigate about faculty and lab.

About course content and placement- Course content  not bad, short term course covers all important topics, I tried hard to get free classes but never succeed, they never replied my email letter. So i don't have any personal experience about innobuzz knowledge solution.

 

 Reliance is running this course with Ankit Fadia.Ankit Fadia™ Certified Ethical Hacker (AFCEH) 5.0 is a one-of-its-kind certification program in Ethical Hacking that aims at training and certifying a whole new generation of world-class Ethical Hackers in the field of computer security.The program contains new and comprehensive training material, content, lectures and books on the latest tools, techniques and methods being used in the field of computer security. All this information i got @ this website http://www.relianceworld.in/ankit_progs.htm for more information about Mr. Fadia and courses you can visit www.ankitfadia.in
About course content:-   I recommend this course for those people who have some extra money to waste and want to see a famous personalty Mr. Ankit Fadia.
Kyrion Digital securities-


                                        http://plugincampus.com/content/uploadimages/237_a2.jpg
 
Kyrion Digital Securities at Kyrion Technologies Pvt. Ltd. is an IIT Delhi Alumni venture, founded by a group of IT Security Experts. It has laid a foundation in the field of Ethical Hacking & Information Security.
Kyrion Digital Securities has conducted workshop on Ethical Hacking and Information Security in Top Engineering colleges of India such as IISc Bangalore, IIT Kharagpur, IIT Madras, IIT Delhi, IIT Roorkee, IIT Guwahati, NIT Calicut, NIT Warangal, NIT Jalandhar, IIIT Allahabad, VIT Vellore, NIT Silchar, NIT Hamirpur, etc. and has reached out to an excess of 8,000 students and tutors in different cities across the country.

Kyrion provides various certification courses in It security and ethical hacking. For details click here.
About course content - I never saw any advertisement of kyrion on internet , so we can think not a company or organisation that is eager to earn money.
Course content is ok but properly investigate about the learning centre before depositing any big amount.

 
EC-Council provides certification in various it security fields. Recognized by the US Department of Defense, CEH is a premier certification option for US Cyber Defenders. Recognized by the National Security Agency Committee on National Security Standards at every level, EC-Council programs cover everything from Novice Computer Security to techniques used in defending critical infrastructure and top secret government networks in the "Enclave.A globally accepted information security organization, EC-Council provides Completely Vendor Neutral tacticalsecurity programs.certified members earn top salaries by employing the most advanced capabilities.
For Details click here
About course content and placement- Most valuable ethical hacking certification in india. There are many affiliated centres in india to get this certification you can try this link or search their site and Google http://www.mercury.co.in/CEH.html
These are the most recognized certifications in india, Apart from these there are many institutes you will find for this but i don't think we need to talk about them.

 Ethical Hacking, Cyber Crime Investigation,Cyber Forensics & Information Security by TechDefence:-




 From my Point of view i would say this person and his traning program is best among all other institute and i prefer it ..
http://profile.ak.fbcdn.net/hprofile-ak-snc4/50554_108956615821371_1187486_n.jpg
Sunny Vaghela is 22 year old one of the countries pioneer Information Security & Cyber Crime Consultant. The young and dynamic personality of Sunny has not only assisted in solving complex cyber crime cases but has also played an instrumental role in creating awareness about information security and cyber crimes.
During his graduation at Nirma University he developed projects like SMS Based Control System, Voice Recognition Based Control System exhibiting his sharp acumen for technology.
At the age of 18, Sunny exposed loopholes like SMS & Call Forging in Mobile Networks. The technology that allowed to send SMS or Make Call to any International Number from any number of your choice.
At 19, Sunny has found loopholes like "Session Hijacking" & "Cross Site Scripting" in popular Social Networking Website www.orkut.com.
At 20,Sunny has successfully solved numerous cases of Cyber Crimes for Ahmedabad Crime Branch including Phishing Cases, Biggest Data Theft Case, Espionage Case, Credit Card Fraud Case, Several Orkut Fake Profile Impersonation Cases etc.
Sunny traced the origin of the Terror E-Mail Trail of the Ahmedabad Serial Bomb Blast Terror Mail Case and has played a vital role in investigation of the same. In the infamous 26/11 Mumbai Bombings, he successfully accomplished task of obtaining confidential information on the banned organization JAMAT ud DAWAH for MUMBAI Anti Terrorist Squad (ATS).
Sunny’s exceptional talent and expertise is widely recognized in India and abroad. He was bestowed with Rajiv Gandhi Young Achiever's Award as the IT Expert of state of Gujarat by Gujarat Congress at a mere age of 20 year in 2007. Further Sunny is been awarded many national and state level awards for his Research Papers on SMS & VoIP Technology.
Sunny has conducted more than 140 workshops on topics like“ANTIVIRUS, Vulnerability Assessment, Penetration Testing, Cyber Crime Investigation & Forensics” at various institutions all across India. He is a frequent guest to engineering colleges & and India Inc. to deliver session on "Mobile Security & Web Security”.
He runs Certified Training program on Ethical Hacking, Cyber Crime Investigation,Cyber Forensics & Information Security at Ahmedabad & various centres across India which is appreciated by students, professionals, lawyers & law enforcement officials. The same program was attended by Cyber Cell, Crime Branch, Ahmedabad,Ministry of Home affairs,Malaysia & many Cooperative Banks of Ahmedabad.
Recently He has conducted boot camp Training program at Chennai which was attended by Professionals from YAHOO!, Google, ISACA,K7 Antivirus, ZOHO, HCL, TCS, Infosys, Sify, Deloitte, KPMG, Temenos,Cyber Crime Branches etc.
At Present, He is Director & Chief Technical Officer at TechDefence Consulting Pvt Ltd which is rapidly growing security services & investigation consulting organization focusing on Cyber Crime Investigations,Cyber Law Consulting,Vulnerability Assessment & Penetration Testing,Information Security Training.                 for More information.... 
I want to say only you can't succeed in this field if you are not passionate about hacking. 
Final conclusion- Appin..., Ankit fadia... not recommended
Innobuzz..., Kyrion.... you can try CEH. but among all of them i would say the best is Sunny vaghela:-

TechDefence Consulting Pvt Ltd
 

 @AtulPurohit


Digg it StumbleUpon del.icio.us

5/26/2011 BackTrack 5 Countdown | Time to release on 10th may,2011






BackTrack 5 Countdown | Time to release



BackTrack 5 is going to release and its going to rock & hack again. Thanks to BackTrack-Linux.org for giving us such a great thing.

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), and will (finally) support both 32 bit and 64 bit architectures. We will be officially supporting KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment (DE). Tool integration from our repositories will be seamless with all our supported DE’s, including the specific DE menu structure.


http://pinoytutorial.com/techtorial/wp-content/uploads/2011/05/Backtrack_5-motorola-logo-1.jpg 



http://place4geek.com/blog/wp-content/uploads/2011/05/Backtrack-5.png 



http://www.fileden.com/files/2007/2/24/814034/bt5_armitage/bt5-armitage1.jpg 



 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH65W2eu2EfyQgpvvBwjRz1K8JC9VAQjY0_9qz_T_8d5A-gkhr6Q7OLfS7ughPHlcdMUvz1OIA9Li8WXcOmF9igBorpfcENwvsX4wqucE06YdqYhJDEnFCyCbaBqTR1h1VzoSBRhljUKg/s1600/bt5.png 



http://pctechtips.org/wp-content/uploads/2011/05/backtrack5.png 



https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6tVb3vg_XdEMzqzc_xxfzRqnOrk_4rsbmDQKkTde_8CmuP3k7fwRLNVSBVgT9tu7tJ1LOrBjNkqxMecSdxkBbQ1rc5QZKTUbhnxx11ZFnn-Thyphenhyphen3ucIbQIUp1ffh31v6s8hwh57mURxlA/s1600/BT5+Backtrack+5+Linux+Released+Pictures.JPG 


Perhaps most importantly BackTrack 5 “revolution” will be our first release to include full source code in it’s repositories. This is a big thing for us, as it officially joins us to the open-source community and clears up any licensing issues which were present in BackTrack 4.The absence of source code availability in BT4 was mainly due to lack of resources when we initially structured the BT4 development environment. Newly armed with our support from Offensive Security, we have now built a *proper* development environment, which allows us to do some pretty awesome things.Our tool list has completely been revamped and refreshed. Each tool’s functionality was assessed and decided upon before inclusion to BT5. Obviously, we are constantly staying up to date with interesting new tools and are adding them to our repositories when appropriate. In addition, our menu structure has been much optimized – streamlined with both the PTES and OSSTMM standards. This will make finding and using the right tools much easier.We are finally able to update our roadmap and pin down a date for the release – May 10th, 2011. Information Source
Digg it StumbleUpon del.icio.us

5/25/2011 Hack the Hacking/Craking check for the information on it!

 
Today the day was soooo boring.... but at end of the days i started writing  an Article on Hack the Hacking.
Here It is:-
                                 

Hacking as i  told the word does not need any definition because in google the word is well famous and as well know but the use and perpese is not so clearly define and wrote.
Friends dnt get confused in the word CRACKERS & HACKERS.

Crackers are the guys those who known how to crack the system means the programming part of the software or the system while Hacker are the guys who steels the data or site or the information available in that  system and program.

 Myself Atul Purohit had started writing blog on Hacking News & Updates and i was interested in it too much so i wann to make awareness to the fan or the hack lovers to get it right and clear so i will try my best to define the word Hack the Hacking to my best.....

Hacking is mainly divided into three type as i had defined it:-

1. White Hat Hacking.
2. Gray Hat Hacking.
3. Black Hat Hacking.

First of all White Hat Hacking/Hacker as the are known as white hat hackers because the work or the hacking done by this hacker is completely ethical and harmless or we can say it eco-friendly and this is mainly use for the educational perpese as now a days it is offical tought by manny univesity and institute how to do it ethical for self protection its all need because the world is towards the advancement and the well of security should be increse to secure your data and sites so it has became now necessary to protect ourself and so ethical hacking plays an important role in todays IT sector.
                        
Gray Hat Hacker/Hacking is also the same but the advance part of the ethical hacking, this hackers are the hackers which helps to detect or solve out the problem, where this hackers play an important role in cyber security and look after the security.  this hacker lies between both white and black hat hacker because as they use their knowledge for good perpese but to archive success they might misuse it and can be referred them as black hat hackers. The word gray hat was coined by a hacker group called lopht in 1998. In the year 2002 the word "Gray Hat" was published to the public by the Anti-Soc Community who worked in the security center at that date.Following the rise and eventual decline of the Full Disclosure vs Anti-Sec "golden era" and the subsequent growth of Ethical Hacking philosophy of the term grey hat began to take on all sorts of diverse meanings till that date. In the year 2008 the EFF Following the rise and eventual decline of the Full Disclosure vs Anti-Sec "golden era" - and the subsequent growth of Ethical Hacking philosophy—the term grey hat began to take on all sorts of diverse meanings voilent the law in the effort or feild of effort.
Black Hat Hacking/Hacker:-                    

Black Hat Hacking/Hacker the word itself define some part of its meaning ya guys you are right the word Black means dark, as this guys are really dangerous as this title is given to those guys who are the master minded in this field as i had use the word Hack the Hacking ya this is possible by the Black Hatters as they are the one who misuses the knowledge and power to perform crime so you guys can call them as Villains too. As they hack the system to get the necessary information and to earn profit out of that information but guys keep in mind the cyber laws which are so strict and really won;t leave you if u are not a good hacker but the black hat are well trained and so they are named black hatter as they say nothing is impossible in their case.

                      
·         Viruses - most common form of attack
·         Denial of service attacks
·         Trojans (or trojan horses)
·         Brute-force and social engineering password          attacks
·         Port scanning and spoofing
·         Phishing
·         Ransomware
@Atul Purohit.
Digg it StumbleUpon del.icio.us
Related Posts Plugin for WordPress, Blogger...

Recent Posts


Popular Posts

Facebook Comment

Trade traffic with me using 2leep.com system