السبت، 4 أغسطس 2012

McAfee SuperDAT

The SuperDAT utility allows you to upgrade your scanning engine and your virus signature (DAT) files. The regular DAT (X-DAT) utility only updates the DAT files. New engines are only created as needed, approximately every 3 to 6 months, so updating with the SuperDAT is not always necessary.
Trusted by individual users and large companies alike, McAfee VirusScan is the world's premier virus detection and removal solution for a major source of infection: your desktop and remote machines, as well as handheld devices.

VirusScan Professional Edition includes quick cleanup of your PC, complete shredding for privacy, and advanced virus protection for two computers!

Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.


How to update McAfee VirusScan:

We suggest you to check this page for details.

McAfee SuperDAT

The SuperDAT utility allows you to upgrade your scanning engine and your virus signature (DAT) files. The regular DAT (X-DAT) utility only updates the DAT files. New engines are only created as needed, approximately every 3 to 6 months, so updating with the SuperDAT is not always necessary.
Trusted by individual users and large companies alike, McAfee VirusScan is the world's premier virus detection and removal solution for a major source of infection: your desktop and remote machines, as well as handheld devices.

VirusScan Professional Edition includes quick cleanup of your PC, complete shredding for privacy, and advanced virus protection for two computers!

Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.


How to update McAfee VirusScan:

We suggest you to check this page for details.

McAfee SuperDAT

The SuperDAT utility allows you to upgrade your scanning engine and your virus signature (DAT) files. The regular DAT (X-DAT) utility only updates the DAT files. New engines are only created as needed, approximately every 3 to 6 months, so updating with the SuperDAT is not always necessary.
Trusted by individual users and large companies alike, McAfee VirusScan is the world's premier virus detection and removal solution for a major source of infection: your desktop and remote machines, as well as handheld devices.

VirusScan Professional Edition includes quick cleanup of your PC, complete shredding for privacy, and advanced virus protection for two computers!

Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.


How to update McAfee VirusScan:

We suggest you to check this page for details.

Lookout Mobile Security for Android



Lookout Mobile Security protects your phone from mobile threats with award-winning security that’s easy to use.


Lookout Mobile Security delivers all-in-one protection for Android tablets, as well as Android smartphones.

Features of Lookout Mobile Security for Android 7.15:

• Security & Privacy
· Keep your phone or tablet safe and secure. Lookout provides the most trusted protection for your most personal device
• Backup
· Your phone has your most valuable personal information. Back up your information without lifting a finger.
• Missing Device
· Find your phone almost as quickly as you lost it. Lookout can help you find your lost or stolen phone, restore or wipe your data.
• Management
· Use the web to manage your phone and backed-up data, and find your phone. Lookout gives you complete control over the air anytime, anywhere.

Lookout Mobile Security for Android



Lookout Mobile Security protects your phone from mobile threats with award-winning security that’s easy to use.


Lookout Mobile Security delivers all-in-one protection for Android tablets, as well as Android smartphones.

Features of Lookout Mobile Security for Android 7.15:

• Security & Privacy
· Keep your phone or tablet safe and secure. Lookout provides the most trusted protection for your most personal device
• Backup
· Your phone has your most valuable personal information. Back up your information without lifting a finger.
• Missing Device
· Find your phone almost as quickly as you lost it. Lookout can help you find your lost or stolen phone, restore or wipe your data.
• Management
· Use the web to manage your phone and backed-up data, and find your phone. Lookout gives you complete control over the air anytime, anywhere.

Lookout Mobile Security for Android



Lookout Mobile Security protects your phone from mobile threats with award-winning security that’s easy to use.


Lookout Mobile Security delivers all-in-one protection for Android tablets, as well as Android smartphones.

Features of Lookout Mobile Security for Android 7.15:

• Security & Privacy
· Keep your phone or tablet safe and secure. Lookout provides the most trusted protection for your most personal device
• Backup
· Your phone has your most valuable personal information. Back up your information without lifting a finger.
• Missing Device
· Find your phone almost as quickly as you lost it. Lookout can help you find your lost or stolen phone, restore or wipe your data.
• Management
· Use the web to manage your phone and backed-up data, and find your phone. Lookout gives you complete control over the air anytime, anywhere.

Kaspersky Internet Security 2013



Kaspersky Internet Security is a comprehensive computer defense system from all types of electronic threats, such as malware, hacker exploits, spam, rootkits, spyware, phishing messages, persistent popup ads, etc.


In addition to the Anti-Viruses, the application includes a new generation personal Firewall, a Proactive Defense component offering protection from unknown threats, a Privacy Control component providing protection from Internet fraud, and an Anti-Spam component which filters out unsolicited emails.

Kaspersky Internet Security Version includes a number of improvements which expand its functionality and the level of protection significantly. Thus, the new Parental Control module monitors users' browsing activity and blocks access to web resources containing violence, pornography, promotion of drugs or limits time online. The Confidential Data Protection module of the Privacy Control component prevents theft of important information, such as, email addresses, passwords, banking information, and credit card numbers.

Even with the added functionality and comprehensive protection, controlling the Kaspersky Internet Security application has become even simpler and more convenient: a beginner would be able to select an application installation type and a protection mode to suit his or her needs from the provided list of options.

Kaspersky Internet Security was initially developed for the new Microsoft Windows Vista operating system. It is fully compatible both with the 32 and the 64-bit versions of the operating system. The product interface follows the style of Microsoft Windows Vista and integrates naturally with its graphic environment.

Features of Kaspersky Internet Security :

• The Best Anti-Virus Protection
· Ranked #1 for anti-virus detection
· The industry's fastest response time to new Internet threats
· Standard automated hourly anti-virus updates (Tiny at ~50 Kb each!)
· The most monthly updates available
· Real-time e-mail, file and web scanning for safe surfing
• Robust Spyware Protection
· #1 in spyware & adware detection
· Prevents rootkits and keyloggers from stealing personal data
· Automatically removes hidden spyware
· Detects unauthorized activity & probes
· Blocks unwanted pop-ups & banners
• Anti-Hacker Protection
· Fully integrated personal firewall
· New generation Intrusion Detection/Prevention System (IDS/IPS)
· Privacy controls protect passwords and confidential data
· Parental controls limit online time and access to forbidden sites (with tracking)
· Stealth mode to remain invisible online
• Anti-Spam Protection
· Sophisticated self-learning system
· Robust phishing protection against identity theft
· E-mail header previewing before down-loading messages
· Blacklist and whitelists for addresses and phrases
· Analysis of graphics in spam
• Impressive System Performance
· The least processor, memory and bandwidth resources required
· Rapid iSwiftT and iCheckerT virus scanning for accelerated performance
· Automatic balancing of scan speeds with increased user activity
· Ideal for instant messaging and WiFi
• Minimize Any Downtime
· Easy-to-create rescue disk instantly restores your system if damaged
· Rapidly rollback any malicious changes including restoring encrypted data

What's New in Kaspersky Anti-Virus 2012 :

• Improvements :
· Implemented support for Microsoft Windows 7.
· Improved methods of dealing with complex threats.
· Improved vulnerability scan, which facilitates security threats' search and elimination in the applications installed on your computer and in operating system settings.
· Improved module of Kaspersky Lab news delivery – News agent.
· Compatibility problems between safe environment and some applications.
• Bug Fixed :
· Problem with system instability after long period of program operation has been fixed.
· Error causing BSOD while updating the emulator driver has been fixed.
· Pop-up message in the URL checking module has been fixed (for the Spanish version).
· Problem with pausing the scan task while third party programs are running in full-screen mode has been fixed.
· Problem with the update task freezing at system startup has been fixed.
· Vulnerability that allowed disabling of computer protection using an external script has been eliminated.
· Driver crash in rare cases while processing a write operation has been fixed.
· Crash while processing data incompliant with the protocol of Mail.Ru Agent has been fixed.

Kaspersky Internet Security 2013



Kaspersky Internet Security is a comprehensive computer defense system from all types of electronic threats, such as malware, hacker exploits, spam, rootkits, spyware, phishing messages, persistent popup ads, etc.


In addition to the Anti-Viruses, the application includes a new generation personal Firewall, a Proactive Defense component offering protection from unknown threats, a Privacy Control component providing protection from Internet fraud, and an Anti-Spam component which filters out unsolicited emails.

Kaspersky Internet Security Version includes a number of improvements which expand its functionality and the level of protection significantly. Thus, the new Parental Control module monitors users' browsing activity and blocks access to web resources containing violence, pornography, promotion of drugs or limits time online. The Confidential Data Protection module of the Privacy Control component prevents theft of important information, such as, email addresses, passwords, banking information, and credit card numbers.

Even with the added functionality and comprehensive protection, controlling the Kaspersky Internet Security application has become even simpler and more convenient: a beginner would be able to select an application installation type and a protection mode to suit his or her needs from the provided list of options.

Kaspersky Internet Security was initially developed for the new Microsoft Windows Vista operating system. It is fully compatible both with the 32 and the 64-bit versions of the operating system. The product interface follows the style of Microsoft Windows Vista and integrates naturally with its graphic environment.

Features of Kaspersky Internet Security :

• The Best Anti-Virus Protection
· Ranked #1 for anti-virus detection
· The industry's fastest response time to new Internet threats
· Standard automated hourly anti-virus updates (Tiny at ~50 Kb each!)
· The most monthly updates available
· Real-time e-mail, file and web scanning for safe surfing
• Robust Spyware Protection
· #1 in spyware & adware detection
· Prevents rootkits and keyloggers from stealing personal data
· Automatically removes hidden spyware
· Detects unauthorized activity & probes
· Blocks unwanted pop-ups & banners
• Anti-Hacker Protection
· Fully integrated personal firewall
· New generation Intrusion Detection/Prevention System (IDS/IPS)
· Privacy controls protect passwords and confidential data
· Parental controls limit online time and access to forbidden sites (with tracking)
· Stealth mode to remain invisible online
• Anti-Spam Protection
· Sophisticated self-learning system
· Robust phishing protection against identity theft
· E-mail header previewing before down-loading messages
· Blacklist and whitelists for addresses and phrases
· Analysis of graphics in spam
• Impressive System Performance
· The least processor, memory and bandwidth resources required
· Rapid iSwiftT and iCheckerT virus scanning for accelerated performance
· Automatic balancing of scan speeds with increased user activity
· Ideal for instant messaging and WiFi
• Minimize Any Downtime
· Easy-to-create rescue disk instantly restores your system if damaged
· Rapidly rollback any malicious changes including restoring encrypted data

What's New in Kaspersky Anti-Virus 2012 :

• Improvements :
· Implemented support for Microsoft Windows 7.
· Improved methods of dealing with complex threats.
· Improved vulnerability scan, which facilitates security threats' search and elimination in the applications installed on your computer and in operating system settings.
· Improved module of Kaspersky Lab news delivery – News agent.
· Compatibility problems between safe environment and some applications.
• Bug Fixed :
· Problem with system instability after long period of program operation has been fixed.
· Error causing BSOD while updating the emulator driver has been fixed.
· Pop-up message in the URL checking module has been fixed (for the Spanish version).
· Problem with pausing the scan task while third party programs are running in full-screen mode has been fixed.
· Problem with the update task freezing at system startup has been fixed.
· Vulnerability that allowed disabling of computer protection using an external script has been eliminated.
· Driver crash in rare cases while processing a write operation has been fixed.
· Crash while processing data incompliant with the protocol of Mail.Ru Agent has been fixed.

Kaspersky Internet Security 2013



Kaspersky Internet Security is a comprehensive computer defense system from all types of electronic threats, such as malware, hacker exploits, spam, rootkits, spyware, phishing messages, persistent popup ads, etc.


In addition to the Anti-Viruses, the application includes a new generation personal Firewall, a Proactive Defense component offering protection from unknown threats, a Privacy Control component providing protection from Internet fraud, and an Anti-Spam component which filters out unsolicited emails.

Kaspersky Internet Security Version includes a number of improvements which expand its functionality and the level of protection significantly. Thus, the new Parental Control module monitors users' browsing activity and blocks access to web resources containing violence, pornography, promotion of drugs or limits time online. The Confidential Data Protection module of the Privacy Control component prevents theft of important information, such as, email addresses, passwords, banking information, and credit card numbers.

Even with the added functionality and comprehensive protection, controlling the Kaspersky Internet Security application has become even simpler and more convenient: a beginner would be able to select an application installation type and a protection mode to suit his or her needs from the provided list of options.

Kaspersky Internet Security was initially developed for the new Microsoft Windows Vista operating system. It is fully compatible both with the 32 and the 64-bit versions of the operating system. The product interface follows the style of Microsoft Windows Vista and integrates naturally with its graphic environment.

Features of Kaspersky Internet Security :

• The Best Anti-Virus Protection
· Ranked #1 for anti-virus detection
· The industry's fastest response time to new Internet threats
· Standard automated hourly anti-virus updates (Tiny at ~50 Kb each!)
· The most monthly updates available
· Real-time e-mail, file and web scanning for safe surfing
• Robust Spyware Protection
· #1 in spyware & adware detection
· Prevents rootkits and keyloggers from stealing personal data
· Automatically removes hidden spyware
· Detects unauthorized activity & probes
· Blocks unwanted pop-ups & banners
• Anti-Hacker Protection
· Fully integrated personal firewall
· New generation Intrusion Detection/Prevention System (IDS/IPS)
· Privacy controls protect passwords and confidential data
· Parental controls limit online time and access to forbidden sites (with tracking)
· Stealth mode to remain invisible online
• Anti-Spam Protection
· Sophisticated self-learning system
· Robust phishing protection against identity theft
· E-mail header previewing before down-loading messages
· Blacklist and whitelists for addresses and phrases
· Analysis of graphics in spam
• Impressive System Performance
· The least processor, memory and bandwidth resources required
· Rapid iSwiftT and iCheckerT virus scanning for accelerated performance
· Automatic balancing of scan speeds with increased user activity
· Ideal for instant messaging and WiFi
• Minimize Any Downtime
· Easy-to-create rescue disk instantly restores your system if damaged
· Rapidly rollback any malicious changes including restoring encrypted data

What's New in Kaspersky Anti-Virus 2012 :

• Improvements :
· Implemented support for Microsoft Windows 7.
· Improved methods of dealing with complex threats.
· Improved vulnerability scan, which facilitates security threats' search and elimination in the applications installed on your computer and in operating system settings.
· Improved module of Kaspersky Lab news delivery – News agent.
· Compatibility problems between safe environment and some applications.
• Bug Fixed :
· Problem with system instability after long period of program operation has been fixed.
· Error causing BSOD while updating the emulator driver has been fixed.
· Pop-up message in the URL checking module has been fixed (for the Spanish version).
· Problem with pausing the scan task while third party programs are running in full-screen mode has been fixed.
· Problem with the update task freezing at system startup has been fixed.
· Vulnerability that allowed disabling of computer protection using an external script has been eliminated.
· Driver crash in rare cases while processing a write operation has been fixed.
· Crash while processing data incompliant with the protocol of Mail.Ru Agent has been fixed.

الجمعة، 3 أغسطس 2012

Enable “Inline AutoComplete” Feature in Windows Explorer and Run Dialog Box



Almost all modern web browsers come with "Inline AutoComplete" feature which automatically fills the matching URL in addressbar as soon as you start typing text in browser addressbar. This feature is quite handy and saves lots of time.

Did you know the same "Inline AutoComplete" feature also exists in Windows Explorer and Run dialog box? That's true. Windows has this functionality built-in but doesn't come with this option enabled by default.

In this tutorial, we'll tell you how to enable this useful "Inline AutoComplete" feature in Windows Explorer and Run dialog box.

Following are a few screenshots which will help you in understanding this cool feature:

Windows Explorer without Inline AutoComplete feature (default):



Windows Explorer with Inline AutoComplete feature:



Run box without Inline AutoComplete feature (default):



Run box with Inline AutoComplete feature:



So without wasting time, lets start the tutorial:

1. To enable this feature, you'll need to open Internet Options window. You can open it using Control Panel or Internet Explorer.

Or directly launch it by providing inetcpl.cpl command in RUN or Start Menu search box.

2. Now go to "Advanced" tab, scroll down a bit and enable "Use inline AutoComplete in Windows Explorer and Run Dialog" option.



PS: In Windows XP, the option is a little bit different. You'll need to enable "Use inline AutoComplete (Outside of Internet Explorer)" option. Thanks to our reader "Shanmukh" for mentioning it.

3. Apply the changes and enjoy the inline AutoComplete feature in Windows Explorer and Run dialog box.

If you want to disable the feature again, simply uncheck the checkbox mentioned in step 2 and apply the changes.

NOTE: If you want the opposite and want to disable inline AutoComplete feature in Internet Explorer, disable the option "Use inline AutoComplete in the Internet Explorer Address Bar and Open Dialog" as shown in the above screenshot.

Enable “Inline AutoComplete” Feature in Windows Explorer and Run Dialog Box



Almost all modern web browsers come with "Inline AutoComplete" feature which automatically fills the matching URL in addressbar as soon as you start typing text in browser addressbar. This feature is quite handy and saves lots of time.

Did you know the same "Inline AutoComplete" feature also exists in Windows Explorer and Run dialog box? That's true. Windows has this functionality built-in but doesn't come with this option enabled by default.

In this tutorial, we'll tell you how to enable this useful "Inline AutoComplete" feature in Windows Explorer and Run dialog box.

Following are a few screenshots which will help you in understanding this cool feature:

Windows Explorer without Inline AutoComplete feature (default):



Windows Explorer with Inline AutoComplete feature:



Run box without Inline AutoComplete feature (default):



Run box with Inline AutoComplete feature:



So without wasting time, lets start the tutorial:

1. To enable this feature, you'll need to open Internet Options window. You can open it using Control Panel or Internet Explorer.

Or directly launch it by providing inetcpl.cpl command in RUN or Start Menu search box.

2. Now go to "Advanced" tab, scroll down a bit and enable "Use inline AutoComplete in Windows Explorer and Run Dialog" option.



PS: In Windows XP, the option is a little bit different. You'll need to enable "Use inline AutoComplete (Outside of Internet Explorer)" option. Thanks to our reader "Shanmukh" for mentioning it.

3. Apply the changes and enjoy the inline AutoComplete feature in Windows Explorer and Run dialog box.

If you want to disable the feature again, simply uncheck the checkbox mentioned in step 2 and apply the changes.

NOTE: If you want the opposite and want to disable inline AutoComplete feature in Internet Explorer, disable the option "Use inline AutoComplete in the Internet Explorer Address Bar and Open Dialog" as shown in the above screenshot.

Enable “Inline AutoComplete” Feature in Windows Explorer and Run Dialog Box



Almost all modern web browsers come with "Inline AutoComplete" feature which automatically fills the matching URL in addressbar as soon as you start typing text in browser addressbar. This feature is quite handy and saves lots of time.

Did you know the same "Inline AutoComplete" feature also exists in Windows Explorer and Run dialog box? That's true. Windows has this functionality built-in but doesn't come with this option enabled by default.

In this tutorial, we'll tell you how to enable this useful "Inline AutoComplete" feature in Windows Explorer and Run dialog box.

Following are a few screenshots which will help you in understanding this cool feature:

Windows Explorer without Inline AutoComplete feature (default):



Windows Explorer with Inline AutoComplete feature:



Run box without Inline AutoComplete feature (default):



Run box with Inline AutoComplete feature:



So without wasting time, lets start the tutorial:

1. To enable this feature, you'll need to open Internet Options window. You can open it using Control Panel or Internet Explorer.

Or directly launch it by providing inetcpl.cpl command in RUN or Start Menu search box.

2. Now go to "Advanced" tab, scroll down a bit and enable "Use inline AutoComplete in Windows Explorer and Run Dialog" option.



PS: In Windows XP, the option is a little bit different. You'll need to enable "Use inline AutoComplete (Outside of Internet Explorer)" option. Thanks to our reader "Shanmukh" for mentioning it.

3. Apply the changes and enjoy the inline AutoComplete feature in Windows Explorer and Run dialog box.

If you want to disable the feature again, simply uncheck the checkbox mentioned in step 2 and apply the changes.

NOTE: If you want the opposite and want to disable inline AutoComplete feature in Internet Explorer, disable the option "Use inline AutoComplete in the Internet Explorer Address Bar and Open Dialog" as shown in the above screenshot.

NETCUT ARP exploitation, how it works, how to avoid



Well, lets see, who doesn’t know about netcut ? Netcut has been around for sometimes as a handy little tools to wreak havoc on local computer networks and disable the victim from connecting to the internet. But how exactly is this things works ? what does it have to do with ARP ? what is ARP anyway ? I’ll give out a brief explanation on this topic, keep reading

Okay, what is ARP ?

The Address Resolution Protocol (ARP) is a computer networking protocol for determining a network host’s Link Layer or hardware address when only its Internet Layer (IP) or Network Layer address is known. Thats what wiki said. In simple explanation, its a method for a machines that connected to the local network to determine a PC location only using its IP.

How ARP works ? How the hell it is exploitable anyway ?

Okay, networking 101, we all know that when a PC, lets say, PC-A (192.168.1.1), wants to send a package to PC-B which has IP 192.168.1.2, then PC-A won’t be able to unless PC-A know what is PC-B machine address (MAC ADDRESS). The first thing it will do is asks the whole network, who has IP 192.168.1.2, and eventually PC-B will answer its call like “Hey, I am 192.168.1.2, my MAC are 1f:00:24:12:22“. After that, the package then sent to PC-B.

Eventually, without even being asked, a PC can sent a package which broadcast that he is what he is. Its like “Hey, I am PC-C, my IP is 192.168.1.3 and my MAC Address is 1f:00:24:12:23“. All the other PC on the network will keep the record on a cache called ARP Table. The problem is, they won’t authenticate the validity of the broadcasts. They will just accept the broadcast and update its ARP Table.

That being said, now here comes the dirty thing.

What will happen if suddenly PC-D with IP 192.168.1.4 claimed and sent an ARP package saying that he is PC-B ? well, PC-A will just believe it and send the package to PC-D instead. IT IS EXPLOITABLE!

So, how netcut works then ?

I will explain on simple analogy based on our PC above, with additional PC-Z as a gateway with IP 192.168.1.254
PC-Z 192.168.1.254 knows in its ARP Table that PC-B has MAC 1f:00:24:12:22
PC-B 192.168.1.2 knows that PC-Z has MAC 1f:00:24:12:99
PC-C 192.168.1.3 is the attacker, he sent ARP package to PC-Z saying that he is 192.168.1.2 with MAC1f:00:24:12:23
PC-Z believed so, and he will save that PC-B has MAC 1f:00:24:12:23
PC-C sent another ARP package to PC-B, saying he is 192.168.1.254 with MAC 1f:00:24:12:23
PC-B believed so, and he will save that PC-Z has MAC 1f:00:24:12:23
By then, every traffic from B -> Z and Z -> B will go through C, so C can do everything he wanted with the package, whether its blocking it completely (Packet Poisoning), or altering it (Packet Injection).

So, what netcut did, was simply lying to both PC-B and PC-Z, then render PC-B unable to connect to the internet completely.

How do we avoid netcut arp exploitation then ?

So far, what we can do against this kind of attack is to make our ARP Table static, and read only. That so if an ARP package or ARP broadcasts comes, then our machines will ignore it.

There are a lot of small tools out there like Anti-ARP for Windows platform and ARPOn for Linux.

Manually in linux, make a record of static ARP so it won’t need to ask around to find the right address for the right package using ARP command :
?

1
arp -v [-t hardwaretype] -s hostname hardwareaddress


We can also use ARPTABLES, a package to maintain package filter rule, do it in root mode or just use sudo, make sure you already have package arptables installed.
?

1
2
3
4
arptables -P INPUT DROP
arptables -P OUTPUT DROP
arptables -A INPUT -s ip.of.gateway.machines --source-mac macaddress:of:gateway:machines -j ACCEPT
arptables -A OUTPUT -d ip.of.gateway.machines --destination-mac macaddress:of:gateway:machines -j ACCEPT


In windows, we can use either netsh or arp.
?

1
netsh -c "interface ipv4" set neighbors "Connection_name" "A.B.C.D" "XX-XX-XX-XX-XX-XX"

?

1
arp -s 10.0.0.200 00-10-54-CA-E1-40


Conclusion

ARP is still exploitable, even with our arptable being static, there are a lot of way to exploit this, I will explain later on another articles. The paranoid way to avoid netcut is by firing up Wireshark or Ettercap and let them sniff the network, so if ever a spoofer or attacker comes in duty, you can take the action necessary, whether its calling out the network administrator, or just slap the attacker in the face, or just spill a hot coffee on their laptop, that would be nice. Anyway, objections, corrections and comments are always welcome
Incoming search terms:
how netcut works
how does netcut work
how netcut work
what is netcut
how to avoid netcut
how to netcut
netcut how does it work
avoid netcut
netcut linux
how net cut works

NETCUT ARP exploitation, how it works, how to avoid



Well, lets see, who doesn’t know about netcut ? Netcut has been around for sometimes as a handy little tools to wreak havoc on local computer networks and disable the victim from connecting to the internet. But how exactly is this things works ? what does it have to do with ARP ? what is ARP anyway ? I’ll give out a brief explanation on this topic, keep reading

Okay, what is ARP ?

The Address Resolution Protocol (ARP) is a computer networking protocol for determining a network host’s Link Layer or hardware address when only its Internet Layer (IP) or Network Layer address is known. Thats what wiki said. In simple explanation, its a method for a machines that connected to the local network to determine a PC location only using its IP.

How ARP works ? How the hell it is exploitable anyway ?

Okay, networking 101, we all know that when a PC, lets say, PC-A (192.168.1.1), wants to send a package to PC-B which has IP 192.168.1.2, then PC-A won’t be able to unless PC-A know what is PC-B machine address (MAC ADDRESS). The first thing it will do is asks the whole network, who has IP 192.168.1.2, and eventually PC-B will answer its call like “Hey, I am 192.168.1.2, my MAC are 1f:00:24:12:22“. After that, the package then sent to PC-B.

Eventually, without even being asked, a PC can sent a package which broadcast that he is what he is. Its like “Hey, I am PC-C, my IP is 192.168.1.3 and my MAC Address is 1f:00:24:12:23“. All the other PC on the network will keep the record on a cache called ARP Table. The problem is, they won’t authenticate the validity of the broadcasts. They will just accept the broadcast and update its ARP Table.

That being said, now here comes the dirty thing.

What will happen if suddenly PC-D with IP 192.168.1.4 claimed and sent an ARP package saying that he is PC-B ? well, PC-A will just believe it and send the package to PC-D instead. IT IS EXPLOITABLE!

So, how netcut works then ?

I will explain on simple analogy based on our PC above, with additional PC-Z as a gateway with IP 192.168.1.254
PC-Z 192.168.1.254 knows in its ARP Table that PC-B has MAC 1f:00:24:12:22
PC-B 192.168.1.2 knows that PC-Z has MAC 1f:00:24:12:99
PC-C 192.168.1.3 is the attacker, he sent ARP package to PC-Z saying that he is 192.168.1.2 with MAC1f:00:24:12:23
PC-Z believed so, and he will save that PC-B has MAC 1f:00:24:12:23
PC-C sent another ARP package to PC-B, saying he is 192.168.1.254 with MAC 1f:00:24:12:23
PC-B believed so, and he will save that PC-Z has MAC 1f:00:24:12:23
By then, every traffic from B -> Z and Z -> B will go through C, so C can do everything he wanted with the package, whether its blocking it completely (Packet Poisoning), or altering it (Packet Injection).

So, what netcut did, was simply lying to both PC-B and PC-Z, then render PC-B unable to connect to the internet completely.

How do we avoid netcut arp exploitation then ?

So far, what we can do against this kind of attack is to make our ARP Table static, and read only. That so if an ARP package or ARP broadcasts comes, then our machines will ignore it.

There are a lot of small tools out there like Anti-ARP for Windows platform and ARPOn for Linux.

Manually in linux, make a record of static ARP so it won’t need to ask around to find the right address for the right package using ARP command :
?

1
arp -v [-t hardwaretype] -s hostname hardwareaddress


We can also use ARPTABLES, a package to maintain package filter rule, do it in root mode or just use sudo, make sure you already have package arptables installed.
?

1
2
3
4
arptables -P INPUT DROP
arptables -P OUTPUT DROP
arptables -A INPUT -s ip.of.gateway.machines --source-mac macaddress:of:gateway:machines -j ACCEPT
arptables -A OUTPUT -d ip.of.gateway.machines --destination-mac macaddress:of:gateway:machines -j ACCEPT


In windows, we can use either netsh or arp.
?

1
netsh -c "interface ipv4" set neighbors "Connection_name" "A.B.C.D" "XX-XX-XX-XX-XX-XX"

?

1
arp -s 10.0.0.200 00-10-54-CA-E1-40


Conclusion

ARP is still exploitable, even with our arptable being static, there are a lot of way to exploit this, I will explain later on another articles. The paranoid way to avoid netcut is by firing up Wireshark or Ettercap and let them sniff the network, so if ever a spoofer or attacker comes in duty, you can take the action necessary, whether its calling out the network administrator, or just slap the attacker in the face, or just spill a hot coffee on their laptop, that would be nice. Anyway, objections, corrections and comments are always welcome
Incoming search terms:
how netcut works
how does netcut work
how netcut work
what is netcut
how to avoid netcut
how to netcut
netcut how does it work
avoid netcut
netcut linux
how net cut works

NETCUT ARP exploitation, how it works, how to avoid



Well, lets see, who doesn’t know about netcut ? Netcut has been around for sometimes as a handy little tools to wreak havoc on local computer networks and disable the victim from connecting to the internet. But how exactly is this things works ? what does it have to do with ARP ? what is ARP anyway ? I’ll give out a brief explanation on this topic, keep reading

Okay, what is ARP ?

The Address Resolution Protocol (ARP) is a computer networking protocol for determining a network host’s Link Layer or hardware address when only its Internet Layer (IP) or Network Layer address is known. Thats what wiki said. In simple explanation, its a method for a machines that connected to the local network to determine a PC location only using its IP.

How ARP works ? How the hell it is exploitable anyway ?

Okay, networking 101, we all know that when a PC, lets say, PC-A (192.168.1.1), wants to send a package to PC-B which has IP 192.168.1.2, then PC-A won’t be able to unless PC-A know what is PC-B machine address (MAC ADDRESS). The first thing it will do is asks the whole network, who has IP 192.168.1.2, and eventually PC-B will answer its call like “Hey, I am 192.168.1.2, my MAC are 1f:00:24:12:22“. After that, the package then sent to PC-B.

Eventually, without even being asked, a PC can sent a package which broadcast that he is what he is. Its like “Hey, I am PC-C, my IP is 192.168.1.3 and my MAC Address is 1f:00:24:12:23“. All the other PC on the network will keep the record on a cache called ARP Table. The problem is, they won’t authenticate the validity of the broadcasts. They will just accept the broadcast and update its ARP Table.

That being said, now here comes the dirty thing.

What will happen if suddenly PC-D with IP 192.168.1.4 claimed and sent an ARP package saying that he is PC-B ? well, PC-A will just believe it and send the package to PC-D instead. IT IS EXPLOITABLE!

So, how netcut works then ?

I will explain on simple analogy based on our PC above, with additional PC-Z as a gateway with IP 192.168.1.254
PC-Z 192.168.1.254 knows in its ARP Table that PC-B has MAC 1f:00:24:12:22
PC-B 192.168.1.2 knows that PC-Z has MAC 1f:00:24:12:99
PC-C 192.168.1.3 is the attacker, he sent ARP package to PC-Z saying that he is 192.168.1.2 with MAC1f:00:24:12:23
PC-Z believed so, and he will save that PC-B has MAC 1f:00:24:12:23
PC-C sent another ARP package to PC-B, saying he is 192.168.1.254 with MAC 1f:00:24:12:23
PC-B believed so, and he will save that PC-Z has MAC 1f:00:24:12:23
By then, every traffic from B -> Z and Z -> B will go through C, so C can do everything he wanted with the package, whether its blocking it completely (Packet Poisoning), or altering it (Packet Injection).

So, what netcut did, was simply lying to both PC-B and PC-Z, then render PC-B unable to connect to the internet completely.

How do we avoid netcut arp exploitation then ?

So far, what we can do against this kind of attack is to make our ARP Table static, and read only. That so if an ARP package or ARP broadcasts comes, then our machines will ignore it.

There are a lot of small tools out there like Anti-ARP for Windows platform and ARPOn for Linux.

Manually in linux, make a record of static ARP so it won’t need to ask around to find the right address for the right package using ARP command :
?

1
arp -v [-t hardwaretype] -s hostname hardwareaddress


We can also use ARPTABLES, a package to maintain package filter rule, do it in root mode or just use sudo, make sure you already have package arptables installed.
?

1
2
3
4
arptables -P INPUT DROP
arptables -P OUTPUT DROP
arptables -A INPUT -s ip.of.gateway.machines --source-mac macaddress:of:gateway:machines -j ACCEPT
arptables -A OUTPUT -d ip.of.gateway.machines --destination-mac macaddress:of:gateway:machines -j ACCEPT


In windows, we can use either netsh or arp.
?

1
netsh -c "interface ipv4" set neighbors "Connection_name" "A.B.C.D" "XX-XX-XX-XX-XX-XX"

?

1
arp -s 10.0.0.200 00-10-54-CA-E1-40


Conclusion

ARP is still exploitable, even with our arptable being static, there are a lot of way to exploit this, I will explain later on another articles. The paranoid way to avoid netcut is by firing up Wireshark or Ettercap and let them sniff the network, so if ever a spoofer or attacker comes in duty, you can take the action necessary, whether its calling out the network administrator, or just slap the attacker in the face, or just spill a hot coffee on their laptop, that would be nice. Anyway, objections, corrections and comments are always welcome
Incoming search terms:
how netcut works
how does netcut work
how netcut work
what is netcut
how to avoid netcut
how to netcut
netcut how does it work
avoid netcut
netcut linux
how net cut works

Hide / Remove “User Picture” in Windows Vista and 7 Start Menu



Windows Vista and Windows 7 show your user picture at top-right corner of Start Menu. You can click on this user picture to directly open user account settings page.

Many times when you use a 3rd party Windows theme, you might want to hide or remove this user picture from Start Menu as it doesn't match with the new theme and ruins the look of Start Menu.

If you also want to hide user picture in Windows Vista or 7 Start Menu, here is a very easy to use and simple solution for you.




Now we are going to share yet another cool feature of "Classic Shell" freeware. It can also hide user picture in Windows Start Menu. Following screenshot shows Windows 7 Start Menu without user picture:



You just need to follow these simple steps to remove user picture from Windows Vista and 7 Start Menu:

1. Download and install Classic Shell using following link:

Download Classic Shell

2. Once you install it, it'll replace Windows Start Menu with Classic Start Menu. Right-click on Start ORB and select Settings option.

3. Now click on "Windows Start Menu" radio button given in "Left Click opens" section as shown in following screenshot:



It'll re-enable Windows Start Menu for left-click. If you want, you can also follow the same steps for "Windows Key opens" section.

4. Now we need to hide user picture in Start Menu.

Go to "Windows Start Menu" tab and enable "Hide User Picture" option as shown in following screenshot:



5. That's it. It'll immediately hide user picture from Start Menu. Enjoy the minimal and clean Start Menu which you always wanted.

Do you know any other cool feature of Classic Shell? Feel free to share it in your comment...

Other similar articles that may interest you:

Hide / Remove “User Picture” in Windows Vista and 7 Start Menu



Windows Vista and Windows 7 show your user picture at top-right corner of Start Menu. You can click on this user picture to directly open user account settings page.

Many times when you use a 3rd party Windows theme, you might want to hide or remove this user picture from Start Menu as it doesn't match with the new theme and ruins the look of Start Menu.

If you also want to hide user picture in Windows Vista or 7 Start Menu, here is a very easy to use and simple solution for you.




Now we are going to share yet another cool feature of "Classic Shell" freeware. It can also hide user picture in Windows Start Menu. Following screenshot shows Windows 7 Start Menu without user picture:



You just need to follow these simple steps to remove user picture from Windows Vista and 7 Start Menu:

1. Download and install Classic Shell using following link:

Download Classic Shell

2. Once you install it, it'll replace Windows Start Menu with Classic Start Menu. Right-click on Start ORB and select Settings option.

3. Now click on "Windows Start Menu" radio button given in "Left Click opens" section as shown in following screenshot:



It'll re-enable Windows Start Menu for left-click. If you want, you can also follow the same steps for "Windows Key opens" section.

4. Now we need to hide user picture in Start Menu.

Go to "Windows Start Menu" tab and enable "Hide User Picture" option as shown in following screenshot:



5. That's it. It'll immediately hide user picture from Start Menu. Enjoy the minimal and clean Start Menu which you always wanted.

Do you know any other cool feature of Classic Shell? Feel free to share it in your comment...

Other similar articles that may interest you:

Hide / Remove “User Picture” in Windows Vista and 7 Start Menu



Windows Vista and Windows 7 show your user picture at top-right corner of Start Menu. You can click on this user picture to directly open user account settings page.

Many times when you use a 3rd party Windows theme, you might want to hide or remove this user picture from Start Menu as it doesn't match with the new theme and ruins the look of Start Menu.

If you also want to hide user picture in Windows Vista or 7 Start Menu, here is a very easy to use and simple solution for you.




Now we are going to share yet another cool feature of "Classic Shell" freeware. It can also hide user picture in Windows Start Menu. Following screenshot shows Windows 7 Start Menu without user picture:



You just need to follow these simple steps to remove user picture from Windows Vista and 7 Start Menu:

1. Download and install Classic Shell using following link:

Download Classic Shell

2. Once you install it, it'll replace Windows Start Menu with Classic Start Menu. Right-click on Start ORB and select Settings option.

3. Now click on "Windows Start Menu" radio button given in "Left Click opens" section as shown in following screenshot:



It'll re-enable Windows Start Menu for left-click. If you want, you can also follow the same steps for "Windows Key opens" section.

4. Now we need to hide user picture in Start Menu.

Go to "Windows Start Menu" tab and enable "Hide User Picture" option as shown in following screenshot:



5. That's it. It'll immediately hide user picture from Start Menu. Enjoy the minimal and clean Start Menu which you always wanted.

Do you know any other cool feature of Classic Shell? Feel free to share it in your comment...

Other similar articles that may interest you:

الأحد، 29 يوليو 2012

Dual GPU Question

I have an AMD A10-5700 APU with Radeon(tm) HD graphics, I have been told this means the GPU is intergrated with the CPU is that right?

And my main question is what is the best GPU I can crossfire with my current GPU and is there a way to replace my current GPU without changing the CPU.

Cheers

Dual GPU Question

I have an AMD A10-5700 APU with Radeon(tm) HD graphics, I have been told this means the GPU is intergrated with the CPU is that right?

And my main question is what is the best GPU I can crossfire with my current GPU and is there a way to replace my current GPU without changing the CPU.

Cheers

Dual GPU Question

I have an AMD A10-5700 APU with Radeon(tm) HD graphics, I have been told this means the GPU is intergrated with the CPU is that right?

And my main question is what is the best GPU I can crossfire with my current GPU and is there a way to replace my current GPU without changing the CPU.

Cheers

The Hardware Shopping MegaThread

This topic is being created to stop the constant questions about which site to use for buying products. We will list sites by Country.

*NOTE*

If this thread gets out of hand AT ALL, meaning that someone posts a site and someone else later comes by and gives them any kind of flak saying the site is junk, there will be instant Infractions given. No pleas, no questions nothing. The first sign of any kind of arguement and all parties involved get infractions. This is the ONE AND ONLY WARNING.

This topic is for informative purposes. It is to help guide people to sites to use for buying parts. It will be edited and sites for other countries added once they are suggested. No site will be bashed for the sheer sake of it. A site will be added once it has been researched.

So please when posting make sure to give the Country you are from or posting for and list the name of the site and a link. Thank you.

USA

NewEgg | TigerDirect | ZipZoomFly | Buy.com | Amazon | SVC.com | eCost | iBuyPower | CyberPowerPC | Frys.com | CompUSA | BestBuy | Dell | eBay | NCIXUS | MicroCenter

UK

Scan | Ebuyer | Dabs | Aria PC | Overclockers UK | Misco | Novatech | Microdirect | LinITX | Overclockers UK | KustomPCs

Australia

ARC Computers | Harris Technology | MSY Computers | PC Case Gear |

Sweden

Inet | Dustin | NetOnNet

Canada

NCIX | Newegg | Dell | DirectCanada | TigerDirect | Canada Computers | BestDirect | PC Cyber Canada



Specialty Shops

FrozenCPU | Performance PCs | Petras | SVC | MNPCTech

The Hardware Shopping MegaThread

This topic is being created to stop the constant questions about which site to use for buying products. We will list sites by Country.

*NOTE*

If this thread gets out of hand AT ALL, meaning that someone posts a site and someone else later comes by and gives them any kind of flak saying the site is junk, there will be instant Infractions given. No pleas, no questions nothing. The first sign of any kind of arguement and all parties involved get infractions. This is the ONE AND ONLY WARNING.

This topic is for informative purposes. It is to help guide people to sites to use for buying parts. It will be edited and sites for other countries added once they are suggested. No site will be bashed for the sheer sake of it. A site will be added once it has been researched.

So please when posting make sure to give the Country you are from or posting for and list the name of the site and a link. Thank you.

USA

NewEgg | TigerDirect | ZipZoomFly | Buy.com | Amazon | SVC.com | eCost | iBuyPower | CyberPowerPC | Frys.com | CompUSA | BestBuy | Dell | eBay | NCIXUS | MicroCenter

UK

Scan | Ebuyer | Dabs | Aria PC | Overclockers UK | Misco | Novatech | Microdirect | LinITX | Overclockers UK | KustomPCs

Australia

ARC Computers | Harris Technology | MSY Computers | PC Case Gear |

Sweden

Inet | Dustin | NetOnNet

Canada

NCIX | Newegg | Dell | DirectCanada | TigerDirect | Canada Computers | BestDirect | PC Cyber Canada



Specialty Shops

FrozenCPU | Performance PCs | Petras | SVC | MNPCTech

The Hardware Shopping MegaThread

This topic is being created to stop the constant questions about which site to use for buying products. We will list sites by Country.

*NOTE*

If this thread gets out of hand AT ALL, meaning that someone posts a site and someone else later comes by and gives them any kind of flak saying the site is junk, there will be instant Infractions given. No pleas, no questions nothing. The first sign of any kind of arguement and all parties involved get infractions. This is the ONE AND ONLY WARNING.

This topic is for informative purposes. It is to help guide people to sites to use for buying parts. It will be edited and sites for other countries added once they are suggested. No site will be bashed for the sheer sake of it. A site will be added once it has been researched.

So please when posting make sure to give the Country you are from or posting for and list the name of the site and a link. Thank you.

USA

NewEgg | TigerDirect | ZipZoomFly | Buy.com | Amazon | SVC.com | eCost | iBuyPower | CyberPowerPC | Frys.com | CompUSA | BestBuy | Dell | eBay | NCIXUS | MicroCenter

UK

Scan | Ebuyer | Dabs | Aria PC | Overclockers UK | Misco | Novatech | Microdirect | LinITX | Overclockers UK | KustomPCs

Australia

ARC Computers | Harris Technology | MSY Computers | PC Case Gear |

Sweden

Inet | Dustin | NetOnNet

Canada

NCIX | Newegg | Dell | DirectCanada | TigerDirect | Canada Computers | BestDirect | PC Cyber Canada



Specialty Shops

FrozenCPU | Performance PCs | Petras | SVC | MNPCTech

Google faces new Street View data controversy

Google
Google admitted in May 2010 its Street View cars had mistakenly collected private information as they photographed homes and landmarks. Photograph: Sean Gallup/Getty Images
Google is facing a fresh privacy blunder after it admitted it had not deleted all of the private data, including emails and passwords, it secretly collected from internet users around the UK.
The search giant was ordered in December 2010 to delete the private information hoovered up by its Street View cars from open Wi-Fi networks.
But on Friday Google told the Information Commissioner's Office that human error prevented it from erasing the data, which could include the emails and passwords of millions of Britons.
Google admitted in May 2010 its Street View cars had mistakenly collected private information as they photographed homes and landmarks around the world.
It is not known exactly what private information was taken in the UK, but regulators in the US found traces of medical records and web browsing history among the so-called "payload" data.
The news that Google has not purged all of the data taken from UK users 19 months after it was instructed to do so will cause further embarrassment for the company.
On Friday, the ICO said the retention of the data appeared to be a breach of the undertaking signed by Google in December 2010.
A spokesman for the ICO said it would now conduct a forensic analysis of the data, meaning Google could be fined up to £500,000 if the material is found to be in breach of the Data Protection Act.
The company will be one of the first to have breached an undertaking by the ICO if the data is found to be in breach of the DPA.
The ICO said in a statement: "The ICO is clear that this information should never have been collected in the first place and the company's failure to secure its deletion as promised is cause for concern."
Google's global privacy counsel, Peter Fleischer, apologised for the error in a letter to the ICO on Friday. Google declined to comment beyond the letter, which was published on the ICO website.
The technology company is already being investigated by the ICO over claims it orchestrated a cover-up of the data collection in 2010.
Google declined to say when it realised it had not deleted all of the data.
Nick Pickles, director of privacy at the pressure group Big Brother Watch, said Google should never have been ordered to erase the information in the first place.
"We now have an opportunity to explore just how sensitive the information was," he said.
"Given that Google failed to respect people's privacy in the first place and subsequently failed to adhere to its agreement with the information commissioner, serious questions need to be asked to understand why Google seemingly sees itself as above the law.
"The information commissioner is hampered by a woeful lack of powers and is forced to trust organisations to tell the truth. Given Google's behaviour has called into question if that really is a proper way to protect our personal data, it must be right to now demand a proper regulator with the powers and punishments to fully protect British people's privacy."

Google faces new Street View data controversy

Google
Google admitted in May 2010 its Street View cars had mistakenly collected private information as they photographed homes and landmarks. Photograph: Sean Gallup/Getty Images
Google is facing a fresh privacy blunder after it admitted it had not deleted all of the private data, including emails and passwords, it secretly collected from internet users around the UK.
The search giant was ordered in December 2010 to delete the private information hoovered up by its Street View cars from open Wi-Fi networks.
But on Friday Google told the Information Commissioner's Office that human error prevented it from erasing the data, which could include the emails and passwords of millions of Britons.
Google admitted in May 2010 its Street View cars had mistakenly collected private information as they photographed homes and landmarks around the world.
It is not known exactly what private information was taken in the UK, but regulators in the US found traces of medical records and web browsing history among the so-called "payload" data.
The news that Google has not purged all of the data taken from UK users 19 months after it was instructed to do so will cause further embarrassment for the company.
On Friday, the ICO said the retention of the data appeared to be a breach of the undertaking signed by Google in December 2010.
A spokesman for the ICO said it would now conduct a forensic analysis of the data, meaning Google could be fined up to £500,000 if the material is found to be in breach of the Data Protection Act.
The company will be one of the first to have breached an undertaking by the ICO if the data is found to be in breach of the DPA.
The ICO said in a statement: "The ICO is clear that this information should never have been collected in the first place and the company's failure to secure its deletion as promised is cause for concern."
Google's global privacy counsel, Peter Fleischer, apologised for the error in a letter to the ICO on Friday. Google declined to comment beyond the letter, which was published on the ICO website.
The technology company is already being investigated by the ICO over claims it orchestrated a cover-up of the data collection in 2010.
Google declined to say when it realised it had not deleted all of the data.
Nick Pickles, director of privacy at the pressure group Big Brother Watch, said Google should never have been ordered to erase the information in the first place.
"We now have an opportunity to explore just how sensitive the information was," he said.
"Given that Google failed to respect people's privacy in the first place and subsequently failed to adhere to its agreement with the information commissioner, serious questions need to be asked to understand why Google seemingly sees itself as above the law.
"The information commissioner is hampered by a woeful lack of powers and is forced to trust organisations to tell the truth. Given Google's behaviour has called into question if that really is a proper way to protect our personal data, it must be right to now demand a proper regulator with the powers and punishments to fully protect British people's privacy."

Google faces new Street View data controversy

Google
Google admitted in May 2010 its Street View cars had mistakenly collected private information as they photographed homes and landmarks. Photograph: Sean Gallup/Getty Images
Google is facing a fresh privacy blunder after it admitted it had not deleted all of the private data, including emails and passwords, it secretly collected from internet users around the UK.
The search giant was ordered in December 2010 to delete the private information hoovered up by its Street View cars from open Wi-Fi networks.
But on Friday Google told the Information Commissioner's Office that human error prevented it from erasing the data, which could include the emails and passwords of millions of Britons.
Google admitted in May 2010 its Street View cars had mistakenly collected private information as they photographed homes and landmarks around the world.
It is not known exactly what private information was taken in the UK, but regulators in the US found traces of medical records and web browsing history among the so-called "payload" data.
The news that Google has not purged all of the data taken from UK users 19 months after it was instructed to do so will cause further embarrassment for the company.
On Friday, the ICO said the retention of the data appeared to be a breach of the undertaking signed by Google in December 2010.
A spokesman for the ICO said it would now conduct a forensic analysis of the data, meaning Google could be fined up to £500,000 if the material is found to be in breach of the Data Protection Act.
The company will be one of the first to have breached an undertaking by the ICO if the data is found to be in breach of the DPA.
The ICO said in a statement: "The ICO is clear that this information should never have been collected in the first place and the company's failure to secure its deletion as promised is cause for concern."
Google's global privacy counsel, Peter Fleischer, apologised for the error in a letter to the ICO on Friday. Google declined to comment beyond the letter, which was published on the ICO website.
The technology company is already being investigated by the ICO over claims it orchestrated a cover-up of the data collection in 2010.
Google declined to say when it realised it had not deleted all of the data.
Nick Pickles, director of privacy at the pressure group Big Brother Watch, said Google should never have been ordered to erase the information in the first place.
"We now have an opportunity to explore just how sensitive the information was," he said.
"Given that Google failed to respect people's privacy in the first place and subsequently failed to adhere to its agreement with the information commissioner, serious questions need to be asked to understand why Google seemingly sees itself as above the law.
"The information commissioner is hampered by a woeful lack of powers and is forced to trust organisations to tell the truth. Given Google's behaviour has called into question if that really is a proper way to protect our personal data, it must be right to now demand a proper regulator with the powers and punishments to fully protect British people's privacy."

Substitute animals



We used to live immersed in the earth. We used to be part of the corporeal earth, along with the other animals, along with the plants, the rocks the dust. Now we are separate, we make concrete models of them and place them in parking lots in strip malls.

Mute, they watch us buying things we don't need, with money we don't have, driving cars we don't own.

This is a tribute to the substitute animals.

http://youtu.be/Ir7FBwn1yPg

The hunter. The lion watches over use.
Ever present.
The heart of the lion.
Coeur de lion.

Humans used to have such a heart. Now the human heart is hardened. It is no longer expansive. It can no longer properly connect the body, mind and soul. The heart is ischaemic, it contracts, it gets blocked.



Humans stuff their heads and hang them on the walls of their bars.



Humans hunt them, eat them, devour them and their homes, their places of refuge. Blasting, extracting, drilling and fracking.

Substitute animals



We used to live immersed in the earth. We used to be part of the corporeal earth, along with the other animals, along with the plants, the rocks the dust. Now we are separate, we make concrete models of them and place them in parking lots in strip malls.

Mute, they watch us buying things we don't need, with money we don't have, driving cars we don't own.

This is a tribute to the substitute animals.

http://youtu.be/Ir7FBwn1yPg

The hunter. The lion watches over use.
Ever present.
The heart of the lion.
Coeur de lion.

Humans used to have such a heart. Now the human heart is hardened. It is no longer expansive. It can no longer properly connect the body, mind and soul. The heart is ischaemic, it contracts, it gets blocked.



Humans stuff their heads and hang them on the walls of their bars.



Humans hunt them, eat them, devour them and their homes, their places of refuge. Blasting, extracting, drilling and fracking.

Substitute animals



We used to live immersed in the earth. We used to be part of the corporeal earth, along with the other animals, along with the plants, the rocks the dust. Now we are separate, we make concrete models of them and place them in parking lots in strip malls.

Mute, they watch us buying things we don't need, with money we don't have, driving cars we don't own.

This is a tribute to the substitute animals.

http://youtu.be/Ir7FBwn1yPg

The hunter. The lion watches over use.
Ever present.
The heart of the lion.
Coeur de lion.

Humans used to have such a heart. Now the human heart is hardened. It is no longer expansive. It can no longer properly connect the body, mind and soul. The heart is ischaemic, it contracts, it gets blocked.



Humans stuff their heads and hang them on the walls of their bars.



Humans hunt them, eat them, devour them and their homes, their places of refuge. Blasting, extracting, drilling and fracking.

الأحد، 17 يونيو 2012

Flash player 11


Flash player 11 
Playing games, watching video and audio streams , multimedia, and all web rich content always enforce your browser demanding Flash player download.
Flash Player is freely available as a plugin for recent versions of web browsers ( such as Internet Explorer, Mozilla Firefox, Opera, and Safari) 



Flash player 11 is the latest flash player release 

Adobe Flash Player is the high performance, lightweight, highly expressive client runtime that delivers powerful and consistent user experiences across major operating systems, browsers, mobile phones and devices. 

Flash player 11


Flash player 11 
Playing games, watching video and audio streams , multimedia, and all web rich content always enforce your browser demanding Flash player download.
Flash Player is freely available as a plugin for recent versions of web browsers ( such as Internet Explorer, Mozilla Firefox, Opera, and Safari) 



Flash player 11 is the latest flash player release 

Adobe Flash Player is the high performance, lightweight, highly expressive client runtime that delivers powerful and consistent user experiences across major operating systems, browsers, mobile phones and devices. 

Flash player 11


Flash player 11 
Playing games, watching video and audio streams , multimedia, and all web rich content always enforce your browser demanding Flash player download.
Flash Player is freely available as a plugin for recent versions of web browsers ( such as Internet Explorer, Mozilla Firefox, Opera, and Safari) 



Flash player 11 is the latest flash player release 

Adobe Flash Player is the high performance, lightweight, highly expressive client runtime that delivers powerful and consistent user experiences across major operating systems, browsers, mobile phones and devices. 

Google Chrome 19.0.1084.56



Google Chrome 19.0.1084.56 the latest Google chrome release
Google Chrome 2012 is a powerful, stable, featured, light, fast, and advanced browser.
Google Chrome runs websites and applications with lightning speed.
You can add more functionality and more features to your Google chrome browser by adding more extensions.
When you type letters and words in the address bar Google chrome gives you suggestions for both search and web pages
Google Chrome extensions  download
The creative, cool and new Google chrome extensions make Google chrome the best of your choices.
Google chrome extension makes you able to customize your browser to fit your interests.
A dd extra functionality to your browser by its free extensions download Google chrome extensions .
Download google chrome 2012 now 


Tags: google chrome, chrome, chrome google, download chrome, chrome download, google chrome download, download google chrome, google chrome 2012, google chrome 2012, download google chrome 2012Google Chrome 19.0.1084.56Google Chrome 19,, chrome beta 19google chrome betachrome 19 downloadchrome 19 download, google chrome 2011