Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43445
  • Total Topics: 16537
  • Online today: 3233
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 2704
Total: 2706









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Fireberg
« on: 06. November 2009., 13:38:01 »

these  plagues likes microsoft windows..he he he he he !!!

thanx keep us info
Posted by: Samker
« on: 05. November 2009., 08:19:39 »



Out-of-the-box Windows 7 machines are still vulnerable to eight out of ten viruses, according to a test by security firm Sophos.

The experiment proves that the improved User Account Control (UAC) features built into Windows 7 are not enough and that additional anti-virus protection is still required. In fairness to Redmond, Microsoft crystal clear that anti-virus remains a necessary add-on to Windows PCs.

As well as paid-for products a number of free-of-charge products from AVG, Comodo, Avast and Avira are available, along with Microsoft's home-grown Microsoft Security Essentials freeware anti-malware scanner.

In the Sophos experiment, Windows 7 with User Account Control in default configuration and no-anti-malware installed was tested against ten malware samples that arrived in Sophos's labs on 22 October. Seven of these badware packages ran while two failed to work on Win 7 machines irrespective of whether UAC protection was in place or not.

UAC stopped only one example of malware that would otherwise have infected the PC, a strain of autorun malware (called Autorun-ATK by Sophos).

Two Trojans - a variant of Bredo and a banking trojan - failed to work on Win 7 machines. However, a variant of the notorious Zbot Trojan as well as a scareware package slipped through the net infecting Win 7 machines used in the test, irrespective of whether or not Windows UAC was running.

UAC debuted in Windows Vista as a technology designed to prompt users for permission before allowing applications to run. Widely criticised as annoying, Microsoft released a less intrusive version of the software with Windows 7.

"User Account Control did block one sample; however, its failure to block anything else just reinforces my warning prior to the Windows 7 launch that UAC's default configuration is not effective at protecting a PC from modern malware," writes Sophos security researcher Chester Wisniewski: http://www.sophos.com/blogs/chetw/g/2009/11/03/windows-7-vulnerable

"Lesson learned? You still need to run anti-virus on Windows 7."

Wisniewski notes that Vista fared better then other flavours of Windows in a security report by Microsoft released on Monday. The infection rate of Windows Vista SP1 was 61.9 percent less than that of Windows XP SP3.

That, according to Wisniewski, means Vista is the "least ugly baby in its family" and ought not to confer any bragging rights. "You can be sure the next report will highlight its even less ugly younger sibling, Windows 7," he adds.

Bootnote

During a presentation on The Balance of Browser Security and Settings at the RSA Conference in London last month, Microsoft's Ed Gibson referred to the version of UAC that came with Vista as "User Annoyance Control". The terminology by Microsoft’s chief security advisor in the UK was clearly deliberate, and a sign that Redmond acknowledges that the constant pop-ups generated by the technology on Vista boxes were counterproductive.

(Register)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023