Top 10 Hacker Attack Tools

Posted by Oyya-Info on Thursday, October 15, 2009 In : Security 

Computer security "agents" must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of scanning network data and extracting what is known as interesting data, (passwords, e-mail, data files). Listed below you will find 10 programs used to assault and defend networks around the world.

1. Ethereal is the most widely used network protocol analy...


Continue reading...
 

Utilities for Nothing, Security for Free

Posted by Oyya-Info on Thursday, October 15, 2009 In : Security 

Free utilities may lack the polished interface and some of the features you typically get with commercial software, but for most people, free security software can be a cost-effective way to protect one or more PCs.

Protecting your PCs from online threats isn't as simple or inexpensive as it once was. Just like there's no single pill that covers everything from a headache to a sore throat, there's no one piece of software that will protect your system from the various Internet-borne nasties ...


Continue reading...
 

NewFolder.exe Virus

Posted by Oyya-Info on Sunday, October 11, 2009 In : Security 

The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono.


NewFolder.exe File Behaviour

NEW FOLDER.EXE has been seen to perform the following behavior:
  • The Process is packed and/or encrypted using a software packing process
  • Found on infected systems and resists interrogatio...

Continue reading...
 
 
 

 

Make a free website with Yola