Tag: Internet Explorer

Top free tools for every Windows desktop

  • 1.   7-Zip:Every desktop user needs 7-Zip. While Windows 8 (finally!) added the ability to look into ISO files — you still need 7-Zip to see them in Win7 — Win8’s Windows Explorer still doesn’t support RAR compressed files, which are becoming more common as Mac use continues to rise. 7-Zip also creates password-protected Zip files, as well as self-extracting Zips.

     You don’t need to register or pay for 7-Zip. To download go to 7-zip.org

   2.  CCleaner:

CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your       computer faster and more secure. Easy to use and a small, fast download.

It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully               featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run)

 Cleans the following:

 Internet Explorer
Temporary files, history, cookies, super cookies, Autocomplete form history, index.dat files.

 Firefox
Temporary files, history, cookies, super cookies, download history, form history.

 Google Chrome
Temporary files, history, cookies, super cookies, download history, form history.

  Opera
Temporary files, history, cookies, super cookies, download history.

Safari

 Temporary files, history, cookies, super cookies, form history.

Other Supported Browsers
K-Meleon, Rockmelt, Flock, Google Chrome Canary, Chromium, SeaMonkey, Chrome Plus, SRWare Iron, Pale Moon, Phoenix, Netscape Navigator, Avant and Maxthon.

 Windows
Recycle Bin, Recent Documents, Temporary files, Log files, Clipboard, DNS Cache, Error Reporting, Memory Dumps, Jump Lists.

  Registry Cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more…

Third-party applications

Removes temp files and recent file lists (MRUs) from many apps including Windows Media Player, eMule, Google                 Toolbar, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more…

   3.    Auslogics Duplicate File Finder:

Auslogics Duplicate File Finder is a basic program that allows users to find and delete duplicate files taking                             up valuable space on their hard drives.

Auslogics Duplicate File Finder is free. It installs and uninstalls without issues. I recommend this program to all                  users; even those with limited system maintenance experience will find it easy to use.

Auslogic

 4. VLC Media Player:

Simple, fast and powerful media player.

Plays everything: Files, Discs, Webcams, Devices and Streams.

Plays most codecs with no codec packs needed:

MPEG-2, DivX, H.264, MKV, WebM, WMV, MP3…

Runs on all platforms: Windows, Linux, Mac OS X, Unix…

Completely Free, no spyware, no ads and no user tracking.

Can do media conversion and streaming. Download VLC player VLC

 5. Revo Uninstaller:  

         well and truly uninstalls programs, and it does so in an unexpected way. When you use Revo, it runs the program’s           uninstaller and watches while the Uninstaller works, looking for the location of the program files and for Registry               keys that the uninstaller zaps. It then goes in and removes leftover pieces, based on the locations and keys that the           program’s Uninstaller took out. Revo also consults its own internal database for commonly-left-behind bits, and                 roots those out as well. To download go to Revo Uninstaller

 6. Recuva:

Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3                                      player. Recuva works on any re-writable media you have.

reuva_logo

If you listen to music on an iPod, Recuva can recover files directly from the iPod’s drive. Even though you can’t                  access files on your iPod directly, Recuva can. You don’t have to worry about losing music from iTunes or your iPod        anymore. To download go to Recuva

  7.  Kaspersky TDSSKiller:

The name may lead you to believe that TDSSKiller kills the TDSS rootkit, but the product does much more simply               because so many common rootkits are based on, or derived from, TDSS. The current version detects and removes             SST, Pihar, ZeroAccess, Sinowal, Whistler, Phanta, Trup, Stoned, RLoader, Cmoser, and Cidox. Unlike most rootkit             killers, this one runs in Windows.

kaspersky

To run the program, fill out the form on the TDSSKiller page, wait for Kaspersky to send you a download link.                       Download the program and run it — no installer, just an EXE. If any rootkits are found, you’ll be given the                               opportunity to Delete/Cure, Copy to quarantine, or Skip each identified interloper.

To download go to Kaspersky TDSSKiller

  8. YTD Video Downloader: 

YTD Video Downloader is a great solution to grab the media you need, straight from YouTube, Facebook, Vimeo and       60+ other websites. YTD allows you to manage downloads and conversions on the fly.

YTD Video Downloader

      KEY  FEATURES  INCLUDE

  • Video Conversion: With YTD you can convert video media to 9 different formats including WMV, AVI and MP3.
  • Conversion Quality: YTD allows you to convert video files in 5 different qualities.
  • Audio Only: With YTD you can grab a video file and then covert the file to audio-only in an MP3 format.

To download go to YTD Video Downloader

9.  Secunia PSI: 

The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in            non-Microsoft (third-party) programs which can leave your PC open to attacks.

Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your     PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it       safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to  maintain a secure PC.

Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.

10. Malwarebytes: 

Malwarebytes is different. The free version is designed to run manually — I run mine once a week. Malwarebytes       picks up all sorts of creepy crawlies that get past AV programs. When combined with the support on the                                   Malwarebytes forum, Malwarebytes is the ultimate fallback for infected systems — whether you know they’re infected       or not. To download go to Malwarebytes.

malwarebytes

Source:  itworld

Data Never Sleeps

How much Data Is Generated Every Minute?

Data never sleeps. Every minute massive amounts of it are being generated from every phone, website and application across the Internet. Just how much data is being created and where does it come from?

For that you should check out this Domo Infographic.

Click twice to View Full-Sized Image

source: Domo

Chrome vs IE vs Firefox

Browser Security Comparison:

Which is the most secure browser around? According to a newly released study by Accuvant, that’s Google’s Chrome.

New study claims that Chrome is the most secure browser.

From the cellular phone to the desktop, the web browser has become a ubiquitous piece of software in modern computing devices. These same browsers have become increasingly complex over the years, not only parsing plaintext and HTML, but images, videos and other complex protocols and file formats. Modern complexities have brought along security vulnerabilities, which in turn attracted malware authors and criminals to exploit the vulnerabilities and compromise end-user systems.

Google Chrome:

Google, Inc. develops the Google Chrome web browser. Google released the first stable version of Chrome on December 11, 2008. Chrome uses the Chromium interface for rendering, the Web Kit layout engine and the V8 Java Script engine. The components of Chrome are distributed under various open source licenses. Google Chrome versions 12 (12.0.724.122) and 13 (13.0.782.218) was evaluated in this project.

 Microsoft Internet Explorer:

 Microsoft develops the Internet Explorer web browser. Microsoft released the first version of Internet Explorer on August 16, 1995. Internet Explorer is installed by default in most current versions of Microsoft Windows, and components of Internet Explorer are inseparable from the underlying operating system. Microsoft Internet Explorer and its components are closed source applications. Internet Explorer 9 (9.0.8112.16421) was evaluated in this project.

 Mozilla Firefox:

Mozilla develops the Firefox web browser. Mozilla released the first version was released on September 23, 2002. Firefox uses the Gecko layout engine and the Spider Monkey JavaScript engine. The components of Firefox are released under various open source licenses. Firefox 5 (5.0.1) was evaluated for this project.

Total vulnerability counts for each browser
Vulnerabilities by severity for each browser

Time to Patch:

The amount of time it takes for a vendor to go from vulnerability awareness to a fix can be seen as a security commitment indicator. However, the reality is not so simple. Internet Explorer has such a deep integration with the Windows operating system that a change in Internet Explorer can have repercussions throughout a much larger code base. In short, the average time to patch is less indicative of a commitment to patch, as it is of complications with providing a good patch.

It is clear that Microsoft’s average time to patch is the slowest. To be fair, this information was based on a much smaller sample set than Firefox and Chrome. Even worse, it may be possible that the advisories for these vulnerabilities had timeline information only because of the fact that they had taken so long to patch.

 Firefox comes in second, taking an average of 50 days less than Microsoft to issue a patch. The browser with the fastest average time to patch is Chrome. With an average of 53 days to patch vulnerabilities, they are nearly three times faster than Firefox and slightly more than four times faster than Microsoft.

Average time to patch for all three browsers

URL Blacklist Services:

The stated intent of URL blacklisting services is to protect a user from him or herself. When a link is clicked inadvertently, via a phishing email or other un-trusted source, the browser warns the user “are you sure?” and displays a warning that the site might be unsafe based on a list of unsafe URLs regularly updated as new malware sites go live and are taken offline. Microsoft’s URL Reporting Service (from here forward, “URS”), formerly “Phishing Filter”, referred to in the browser application as “Smart Screen Filter”, was the first to provide this feature, with Google’s Safe Browsing List (“SBL”) following suit later, utilized initially by Mozilla Firefox, and now by Chrome as well as Safari.

Blacklist overview
Sandbox overview
JIT hardening overview

Conclusion:

A sandbox is a mechanism of isolating objects/threads/processes from each other in an attempt to control access to various resources on a system.

Address Space Layout Randomization (ASLR) attempts to make it harder for attackers to answer the question ‘where do I go’. By taking away the assumption of known locations (addresses), the process implementing ASLR makes it much more difficult for an attacker to use well-known addresses as exploitation primitives. One key weakness of ASLR is the ability for one module to ruin it for the rest, a weak link in an overall strong chain.

Data Execution Prevention (DEP) is one of the first steps in compromising a system is achieving arbitrary code execution, the ability run code provided by the attacker. During traditional exploitation scenarios, this is achieved by providing the compromised application with shell code, data furnished by the attacker to be run as code. Data Execution Prevention (DEP) addresses the problem of having data run as code directly. DEP establishes rules that state: “Only certain regions of memory in which actual code resides may execute code. Safeguard the other areas by stating that they are non-executable”.

 Stack Cookies (/GS) are the common programming errors, archaic APIs and trusted user input, stack-based buffer overflows have been leveraged to gain code execution on Intel-based architecture.

 The URL blacklistingservices offered by all three browsers will stop fewer attacks than will go undetected. Both Google Chrome and Microsoft Internet Explorer implement state-of-the-art anti-exploitation technologies, but Mozilla Firefox lags behind without JIT hardening. While both Google Chrome and Microsoft Internet Explorer implement the same set of anti-exploitation technologies, Google Chrome’s plug-in security and sand-boxing architectures are implemented in a more thorough and comprehensive manner.

In conclusion, overall browser security needs to be considered when attempting to compare browsers from a security standpoint. Drawing conclusions based solely on one category of protection, such as blacklisted URL statistics, doesn’t give a valid perspective on which browser is most secure. Instead, they should be considered in the context of other mechanisms such as anti-exploitation technologies and malicious plug-in protection, which play a more important role in protecting end users from exploits and persistent malware. By these measures, Google Chrome to be the web browser that is most secured against attack.

source: accuvant