Jump to content

Search the Community

Showing results for tags 'protect'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 7 results

  1. Since there's someone who is looking for tool to protect his exe file, so I just made a thread to help others as well. This tools can pack your exe files, just search on youtube for now of how to use them If I have a time, I'll update this thread. DOWNLOAD LINKS: MoleBoxPro v2.6.5 (2570) [Pre-Activated) Site: https://www.upload.ee Sharecode: /files/9602873/MoleBoxPro_v2.6.5__2570_.rar.html Themida v1.8.5.5 Full Site: http://www.mediafire.com Sharecode: /file/bn8lb33rm28rh17/Themida+v1.8.5.5+Full.rar
  2. Yandex Browser is Chromium based browser. Yandex beta browser beta uses Blink 61.0.3163.100 core. You can select more than 1500 extensions. Yandex Browser Protect: Secure web surfing and protecting the browser against malware. Protect active security technology scans files and websites for viruses, blocks fraudulent webpages, protects your passwords and bank card details, and keeps your online payments safe from theft. When connecting to open Wi-Fi networks or to the points that use a weak WEP-defense, Yandex Browser automatically encrypts traffic between it and the HTTP sites. Yandex browser is the first browser with support for DNSCrypt technology: Choose DNS server with DNSCrypt encryption. Yandex browser homepage Yandex browser beta download page
  3. Years ago, before the advent of the two-step verification, when I did not use a password manager like KeyPass, I was in the habit of forgetting the login credentials of many websites. And then I used to take the usual route of password recovery which basically sends an email containing your password or username or both. I often copy-pasted this password in the email message to the login screen and the password stayed in the clipboard for as long as the Windows PC was running. In a situation like this, just about anybody can steal such sensitive information from the clipboard. In fact when some of the professional hackers target someone’s PC, the clipboard is the first of the few things they check for something useful. And since the clipboard can contain anything from simple text, image or files – you should always clear the clipboard after copy-pasting anything sensitive or private. Manually, it is very easy to erase the contents of the clipboard – all you have to do is just overwrite the clipboard with something else. So just copy anything into the clipboard and it is done. But what if you cannot remember to clear the clipboard. This is where a small utility called ClipTTL might help you. ClipTTL is an unobtrusive little tool that keeps erasing the contents of your Windows’ clipboard after a set time of twenty seconds. It has no options and no user interface – nothing except a system tray icon that can be used to shutdown the ClipTTL when not needed. By default, ClipTTL runs the clipboard cleaning mechanism after every 20 seconds. If this is too small a time duration for you, then you can specify your own time frequency by invoking the ClipTTL with a parameter containing the number of seconds after which you want the clipboard to be cleared. For example, if you run ClipTTL with a command line clipttl.exe 120 then it will flush the Clipboard after every 120 seconds. It would have been better if this functionality (to choose a custom time period) was given in the system tray right-click menu. Verdict: ClipTTL stays out of the way and keeps on cleaning the clipboard contents repeatedly until you choose to shut this tool down. It is a nifty little program to boost your privacy in a Windows PC. Download ClipTTL Article source
  4. SSL is a great way to encrypt and protect data transferred between servers or between browser and servers from any attempt to spy on the data on its way or as known as man in the middle attack, we will focus in this article on HTTPS protocol and the method to attack it and proper way to fight against this attacks. Is HTTPS that important ? first let’s declare the importance of using SSL with HTTP traffic. Imagine the next scenario. you are trying to login to your bank account with your laptop connected in your wifi and you know its secure its you and your little sister who connect in the same wifi, secure right? ? but your wifi uses weak password or vulnerable to exploits, so someone gain access to the same wifi and with a simple tool he can run a packet sniffer and catch all your and your sister’s traffic and look into your password and even change the data if he wants. Imaging the same scenario but your bank is using HTTPS, when you access the website you receive the website certificate signed and your browser validate the signature to make sure that certificate belongs to the website, then your browser encrypt all data then send the encrypted data to the server and do it vice versa, so if our attacker try to sniff the data all what he will get is the encrypted data, cool right ? Lets be honest no one is 100% secure and SSL had a tough couple of years from attacks like Heartblead, DROWN and POODLE , this attacks target the SSL it self , all what you have to do to mitigate this attacks is to be up to date always and apply vendors patches as it appears. But what about sniffing dangerous, does using HTTPS solve it? the answer is not completely, some researchers tried to sniff HTTPS packages by inventing tools like SSL sniff and SSL strip. SSL sniff :- SSL sniff is tool programmed by Moxie Marlinspike based on vulnerability he discovered, let us quickly describe it. When you request a website for example ( example.com ) as we said before you receive the example.com certificate the certificate must be issued by one of the valid vendors, so if follow certificate chain from the root certificate ( root certificate embedded in the browsers by default) to the leaf certificate ( example.com certificate) but what if leaf certificate tried to generate another certificate in the chain? lets say to website like paypal.com! the surprising thing that it worked and no one bothered himself by checking that leaf certificate generated another leaf certificate, but how attacker can use this? the website still be example.com not paypal.com, and that’s why he made SSL Sniff tool. by intercepting the traffic (man in the middle attack) you will intercept the request to paypal.com and with SSL Sniff, then you can generate the paypal.com certificate from the leaf certificate you have example.com and send it back to the browser instead of original paypal.com certificate, when the browser try to validate the certificate it will pass because the chain is correct, then any request between the browser and the server will be signed by the certificate you generate so you can decrypt the data as you want, and then re-transfer it by using the original paypal.com certificate, Boom. fortunately it had been fixed and now the leaf certificate cannot generate another certificate. SSL Strip:- Another tool by the same man Moxie Marlinspike. but in this time he came up with another trick using man in the middle, but what if he changed the request to http instead of HTTPS, and he will request the website on behalf of the user using HTTPS but between the attacker and the user its plain http, and the user will not be so suspicious to notice the difference in his browser. How to defend against this techniques ? Using HTTPS only will not solve it completely, even if you restricted the connection to HTTPS only in the server side, the attacker still can force user to use HTTP by using SSL strip and you will not notice the request still HTTPS in your end, and here HSTS header comes. HTTP Strict Transport Security (HSTS) is a web security policy mechanism it tells the browser that he must only connect to the website using secure HTTPS connection. just send header like this from your server. Strict-Transport-Security: max-age=31536000 The key is Strict-Transport-Security that tells the browser or any other agent to strict the transportation to ssl . the value is maximum age to use this header in seconds 31536000 equal to one non-leap year. Then the user agent will automatically change any url to HTTPS before it send it to the server allowing only secure connections. Bottom line , using HTTPS comes with responsibilities , you must be up to date , patch your system if any vulnerability comes up, renew your certificate on time and don’t forget to use Strict-Transport-Security Policy. Article source
  5. Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits. What is Tor? Tor stands for The Onion Router project. The Onion Router (TOR) is a non-profit setup which runs a network designed to improve personal privacy and increase anonymity online by masking Internet traffic, as well as preventing online domains from gathering information about you and your browsing habits. What is Tor used for? Tor is used by people who are privacy-conscious -- especially after Edward Snowden's disclosures about the NSA, In addition, the network is used by journalists, people avoiding censorship, businesses and traders in underground markets. You can only access the underbelly of the Internet, known as the "Deep Web" and .onion web addresses -- which are not indexed by standard search engines -- through Tor. How does it work? Tor uses relays and nodes ran by volunteers to disguise your traffic and the true origin of your IP address, a de facto network of tunnels rather than a direct line to websites you visit. Instead of sending packets of data directly to a server, this information is bounced to different relay points. By doing so, the network helps you disguise your digital footprint and keep out spying eyes. Does Tor encrypt my data and traffic? The answer is no. Tor is only a traffic anonymizer and does not encrypt your traffic, but the use of virtual private networks (VPNs) in addition to Tor and staying away from HTTP-based websites will help. Use HTTPS whenever possible. Do I have to pay? Tor is free and open-source with a number of developers working on the network, which is compatible with Windows, Mac, Linux/Unix, and Android. How do I use Tor? You simply download the browser for PCs and Orbot for Android devices. The software is already configured for you, but as the network relays traffic indirectly, it is unlikely you will reach the same speed levels as before. How do I access .onion addresses? The "clear web" is the layer of the Internet which is indexed by search engines including Google. Underneath, you have the "deep web" and "dark web," the latter of which is associated with illegal operations. Onion addresses are part of the "deep web," and to access them, you need to know the 16-character code instead of a standard URL. You can find these through deep web search engines, forums and through invitations -- and some companies, such as Facebook, have issued .onion addresses for Tor users. How can I stay safe? If you're going to use Tor, you need to understand some of the basics of Internet security. As a standard tip, disable plugins and software which could leave you open to exploit, such as Flash and Java. You should keep in mind that Tor does not prevent you from operating system security vulnerabilities -- and considering how many flaws are found in software on Windows, you may want to use a different OS to stay as protected as possible. Anonymity isn't fool proof There are still ways that police agents can scrutinize your activity, so do not consider yourself 100 percent protected just because you are using Tor. If you visit illegal domains, buy or sell illegal goods or download explicit, banned material, Tor may not protect you. So, should I use Tor? If you want to help anonymize your traffic, do so -- but for tasks which need a high Internet speed such as torrenting, this is not the right solution. In addition, if you want to use the network for illegal activity, this is at your own risk. Do not consider Tor as the ultimate solution to security -- it is, instead, one aspect. VPNs and sticking to HTTPS are also important components to protecting yourself and your data. Article source
  6. Arbor Networks released global DDoS attack data for the first six months of 2016 that shows a continuing escalation in the both the size and frequency of attacks. Arbor’s data is gathered through ATLAS, a collaborative partnership with more than 330 service provider customers who share anonymous traffic data with Arbor in order to deliver an aggregated view of global traffic and threats. ATLAS data has also been utilized recently in Cisco’s Visual Networking Index Report and the Verizon Data Breach Incident Report. Global DDoS activity DDoS remains a commonly used attack type due to the ready availability of free tools and inexpensive online services that allow anyone with a grievance and an internet connection to launch an attack. This has led to an increase in both the frequency, size and complexity of attacks in recent years. ATLAS has observed an average of 124,000 events per week over the last 18 months. A 73% increase in peak attack size over 2015, to 579Gbps. 274 attacks over 100Gbps monitored in 1H 2016, versus 223 in all of 2015. 46 attacks over 200Gbps monitored in 1H2016, versus 16 in all of 2015. USA, France and Great Britain are the top targets for attacks over 10Gbps. As Arbor’s Security Engineering & Research Team (ASERT) recently documented, large DDoS attacks do not require the use of reflection amplification techniques. LizardStresser, an IoT botnet was used to launch attacks as large as 400Gbps targeting gaming sites worldwide, Brazilian financial institutions, ISPs and government institutions. According to ASERT, the attack packets do not appear to be from spoofed source addresses – and no UDP-based amplification protocols such as NTP or SNMP were used. When average is a problem A 1 Gbps DDoS attack is large enough to take most organizations completely off line. Average attack size in 1H 2016 was 986Mbps, a 30% increase over 2015. Average attack size is projected to be 1.15Gbps by end of 2016. “The data demonstrates the need for hybrid, or multi-layer DDoS defense,” said Darren Anstee, Arbor Networks Chief Security Technologist. “High bandwidth attacks can only be mitigated in the cloud, away from the intended target. However, despite massive growth in attack size at the top end, 80% of all attacks are still less than 1Gbps and 90% last less than one hour. On-premise protection provides the rapid reaction needed and is key against “low and slow” application-layer attacks, as well as state exhaustion attacks targeting infrastructure such as firewalls and IPS.” Time for reflection Reflection amplification is a technique that allows an attacker to both magnify the amount of traffic they can generate, and obfuscate the original sources of that attack traffic. As a result, the majority of recent large attacks leverage this technique using DNS servers, NTP, Chargen and SSDP. As a result, in 1H 2016: DNS is the most prevalent protocol used in 2016, taking over from NTP and SSDP in 2015. Average size of DNS reflection amplification attacks growing strongly. Peak monitored reflection amplification attack size in 1H 2016 was 480Gbps (DNS). Article source
  7. I use this for a little while now.
  • Create New...