Senin, 21 September 2009

Selamat Idul Fitri 1430 H


SELAMAT IDUL FITRI 1430 H

MOHON MAAF LAHIT DAN BATHIN

Rabu, 15 Juli 2009

Computer Software

Free Software and Tutorial Computer


Welcome to the Computer Software blog. Software piracy is a matter of popularity at the time this happens. The dominance of large companies creator software is one of the causes, there are no other options for you in choosing the software you will use. Data

It is a very well done by the Java and Oracle in a variety of open source software to gradually eliminate the company's dominance. Similarly, open source operating system is very useful for our existence.

Why not be the case we study, if you notice that the piracy is a crime so chilling that you will think twice to remember the crime that you will get if you do so. Must be recognized and piracy will also decrease the power creativity and innovation as the creator of your software.

If you have not been able to buy software paid, this is one solution. You can use free software that we provide. We invite to you to avoid the use of illegal software because it is harmful. For that let us use free and open source software in order to maintain the nation's children's creativity.

Free licensed software is not to make the override in the reliability and quality, sometimes free licensed software and more powerful than paid software. And you must remember is that not all software is paid and has the quality and features that are better than the free software. Free software is always there kelemahannya, together with the software paying. However, every software product is always there that the latest update to fix the software's previous version. Thus, diligent-rajinlah you update your software for free for your safety and comfort, yet it will not hurt you.


Thank you for everything ...

(Bahasa Indonesia)

Selasa, 14 Juli 2009

USB FireWall 1.1.2

DOWNLOAD HERE

Download Now (1.88MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 2.5 stars (out of 9 votes) Rate it!
  • Downloads : 46,086
  • Operating Systems : Windows Vista, Windows 95, Windows Me, Windows XP, Windows 2000, Windows NT, Windows 98
  • Additional Requirements : Windows 95/98/Me/NT/2000/XP/2003 Server/Vista
  • Limitations : No limitations
  • Date Added : April 08, 2008


From http://download.cnet.com/windows

DOWNLOAD HERE

ThreatFire AntiVirus Free Edition 4.5

DOWNLOAD HERE

Download Now (7.44MB)
Tested spyware free [Image]
Features

  • License : Free (Buy it now)
  • Editor's Rating : 4.0 stars
  • Average User Rating : 3.0 stars (out of 236 votes) Rate it!
  • Downloads : 1,250,365
  • Operating Systems : Windows 2003, Windows Vista, Windows XP
  • Additional Requirements : No additional requirements
  • Limitations : No limitations

Publisher's description of ThreatFire AntiVirus Free Edition
From PC Tools:

Traditional antivirus solutions cannot protect you until after they've discovered a new threat and produced a signature to counter it. ThreatFire does not rely on signatures, but instead provides behavior-based protection. It is designed to be used alongside your existing antivirus software and it fills the gap in protection between your antivirus signature updates. ThreatFire protects you against major security threats including viruses, worms, trojans, rootkits and even some spyware. Its advanced ActiveDefense technology intelligently analyzes the behavior of processes and programs on a system and immediately halts any malicious action. It continuously monitors all activities on your PC at a very low system level and uses a proprietary combination of analytics, risk algorithms, program histories and tolerance thresholds to identify and shut down threats so you are always protected, no matter how new the threat. ThreatFire is easy to use, instantly effective, and very light on system resources. Best of all, choose between the advanced Pro version or the Free Edition.

Version 4.5 includes on-demand antivirus scanner, new Threat Detection map, System Activity Monitor for viewing detailed process information.

  • Provided by: PC Tools
  • Web site : http://www.pctools.com/
  • Support web site: http://www.pctools.com/support/
  • Support e-mail : support@pctools.com
  • Support phone : 1-800-764-5783



From http://download.cnet.com/windows

DOWNLOAD HERE

Rising Antivirus 2009 Free Edition 21.22.30

DOWNLOAD HERE

Download Now (60.92MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 4.0 stars (out of 145 votes) Rate it!
  • Downloads : 385,606
  • Operating Systems : Windows 2003, Windows Vista, Windows 95, Windows Me, Windows 2000, Windows NT, Windows XP, Windows 98
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : January 30, 2009

Rising Antivirus
Software publisher profile

Rising Technology has been a world leader in Internet security software since 1991. Its security solutions fully protect enterprise and home users from virus, worm, Trojan, spam, hackers and any new kind of threats. Rising Antivirus Software is trusted by more than 40,000,000 users around the world.

  • Provided by : Rising Antivirus
  • Web site : http://www.rising-global.com
  • Support web site : http://support.rising-global.com
  • Support e-mail : Not provided
  • Support phone Not provided


From http://download.cnet.com/windows

DOWNLOAD HERE

PC Tools AntiVirus Free Edition 5

DOWNLOAD HERE

Download Now (21.67MB)
Tested spyware free
Features

  • License : Free (Buy it now)
  • Editor's Rating : 4.0 stars
  • Average User Rating : 3.0 stars (out of 362 votes) Rate it!
  • Downloads : 2,827,709
  • Operating Systems : Windows Vista, Windows XP, Windows 2000
  • Additional Requirements : Windows 2000/XP/Vista
  • Limitations : No limitations
  • Date Added : August 27, 2008

PC Tools
oftware publisher profile

PC Tools is a global leader in innovative software products designed to protect the privacy and security of Windows computer users. PC Tools publishes software and provides technical resources for securing, protecting, and maintaining the Windows operating system. PC Tools products are available right throughout the world, to over 196 countries with offices in the US and Australia as well as a presence in Europe. Products and customer service are offered in multiple languages.


From http://download.cnet.com/windows

DOWNLOAD HERE

Multi Virus Cleaner 2009 9.0.1

DOWNLOAD HERE

Download Now (2.88MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 3.0 stars (out of 80 votes) Rate it!
  • Downloads : 420,620
  • Operating Systems : Windows 2003, Windows Vista, Windows 95, Windows Me, Windows Server 2008, Windows 3.x, Windows 2000, Windows NT, Windows 7, Windows XP, Windows 98
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : April 22, 2009

Publisher's description of Multi Virus Cleaner 2009
Multi Virus Cleaner 2009 screenshot
From AxBx:

Multi Virus Cleaner is a stand-alone utility used to detect and remove major viruses and spyware. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when cleaning infected systems. Multi Virus Cleaner is regularly updated and can detect hundreds of common viruses, worms, Trojans, dialers and spyware (including all variants of the Sober, MyDoom, Nyxem and Bagle viruses). The program offers a scanner that requires minimal processing power for repairing a compromised system. Multi Virus Cleaner detects over 6,400 viruses variants. The new 2009 version also detects and removes major spyware.


From http://download.cnet.com/windows

DOWNLOAD HERE

BitDefender Free Edition 10.0

DOWNLOAD HERE

Download Now (49.06MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 3.5 stars (out of 69 votes) Rate it!
  • Downloads : 211,760
  • Operating Systems : Windows Me, Windows NT, Windows 2000, Windows XP, Windows 98
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : April 20, 2009

SoftWin
Software publisher profile

Founded in 1990, winner of the IST Prize in 2002, SOFTWIN is now considered to be the technological leader of the East-European software industry with annual growth rates of more than 50% in the past five years and 70% of annual turnover from exports. With a team of over 800 qualified professionals, and more than 5000 projects managed so far, SOFTWIN focuses on providing complex software solutions and services which enable fast growing companies to solve critical business challenges and to take advantage of new business opportunities. The SOFTWIN development process is ISO 9001 certified. As it is active on the most advanced IT markets of the US and European Union, SOFTWIN develops on 4 interlinked business lines: eContent Solutions, BitDefender, Business Solutions and Customer Relationship Management. SOFTWIN has branch offices in Germany, Spain and USA.

  • Provided by : SoftWin
  • Web site : http://www.bitdefender.com
  • Support web site : http://kb.bitdefender.com/site/index.html
  • Support e-mail : support@bitdefender.com
  • Support phone : 800 388 8062



From http://download.cnet.com/windows

DOWNLOAD HERE

Avira AntiVir Personal - Free Antivirus 9.0.0.403

DOWNLOAD HERE

Download Now (30.8MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : 5.0 stars
  • Average User Rating : 3.5 stars (out of 2497 votes) Rate it!
  • Downloads : 47,461,059
  • Operating Systems : Windows Vista 64-bit, Windows Vista 32-bit, Windows XP, Windows 2000
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : June 19, 2009


From http://download.cnet.com/windows

DOWNLOAD HERE

AVG Anti-Virus Free Edition 8.5.374

DOWNLOAD HERE

Download Now (63.15MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : 5.0 stars
  • Average User Rating : 4.0 stars (out of 18901 votes) Rate it!
  • Downloads : 204,782,083
  • Operating Systems : Windows Vista, Windows 2000, Windows XP
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : June 17, 2009
AVG Technologies USA
Software publisher profile

Founded in 1991, with corporate offices in Europe and the USA, AVG Technologies (formerly Grisoft) is focused on developing software solutions that provide protection from computer viruses. Distributed globally through resellers and through the internet, the AVG product line supports all major operating systems and platforms. More than 50 million users around the world use AVG products to protect their computers and networks. Employing some of the world's leading experts in antivirus software, specifically in the areas of virus analysis and detection, software development, and antivirus support, AVG Technologies is uniquely positioned to continue its leadership in the industry. AVG Technologies continues to invest in R&D, teaming with leading universities to maintain its technological edge.

  • Provided by : AVG Technologies USA
  • Web site : http://www.avg.com/
  • Support web site : http://www.avg.com/support/
  • Support e-mail : Not provided
  • Support phone : Not provided


From http://download.cnet.com/windows

DOWNLOAD HERE

Avast Home Edition 4.8.1335.90416

DOWNLOAD HERE

Download Now (300.94K)
Tested spyware free
Features

  • License: Free
  • Editor's Rating: 5.0 stars
  • Average User Rating: 4.5 stars (out of 10876 votes) Rate it!
  • Downloads: 51,421,154
  • Operating Systems: Windows Vista, Windows 95, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 7, Windows 98
  • Additional Requirements: No additional requirements
  • Limitations: No limitations
  • Date Added: June 28, 2009

ALWIL Software
software publisher profile

Alwil Software is a Czech-based company, established in April 1991. The company specializes in security software, with Avast antivirus being the flagship product line. During the lifetime of the product line, Avast products have become both award winning and a leader in a number of key markets, as well as increasing market share year-on-year since first international release.

* Provided by: ALWIL Software
* Web site: http://www.avast.com
* Support web site: http://forum.avast.com/
* Support e-mail: support@avast.com
* Support phone: Not provided

From http://download.cnet.com/windows

DOWNLOAD HERE

A-squared Free 4.5.0.1

DOWNLOAD HERE

Software publisher profile

Emsi Software GmbH was founded in Oberndorf, Austria by founder and company headChristian Mairoll in 2003. The security specialist concentrates on behavior-based Malwareblocking in the IT security sector. The behavior analysis module of the main product, asquaredAnti-Malware, monitors all active programs in real-time. To do this, the softwareswitches between operating system and program levels in order to monitor the behavior ofall running programs. If damaging actions are suspected then an alarm is emitted and theMalware can be stopped.

Emsi Software introduced the Mamutu pure Behavior Blocker tothe market in 2007. Whereas a-squared Anti-Malware has "Double real-time protection"and combats pests based on their behavior and using Signatures, "Mamutu" focusessolely on behavior analysis and does not contain a virus scanner.Our goal is to become a leading European supplier of behavior-based technology forcomputer pest defense.

* Provided by: Emsi Software
* Web site:
* http://www.emsisoft.com/
* Support web site:
* http://www.emsisoft.com/en/support/
* Support e-mail:
* cc@emsisoft.com
* Support phone:
* Not provided

A-squared Free 4.5.0.1
Download Now (47.5MB)
Tested spyware free
Features

* License: Free
* Editor's Rating: 4.0 stars
* Average User Rating: 3.5 stars (out of 330 votes) Rate it!
* Downloads: 1,470,148
* Operating Systems: Windows Vista, Windows Server 2008, Windows 7 32-bit, Windows XP
Itanium 64-bit, Windows 7, Windows XP
* Additional Requirements: No additional requirements
* Limitations: No limitations
* Date Added: May 19, 2009


From http://download.cnet.com/windows

DOWNLOAD HERE

AntiVirus Software

Oke, please download any software under here. All Antivirus software is free license but with good performance, and can be secure your system computer, minimalize risk from attacks.

Name / Description

Type

Size

A-squared Free 4.5.0.1

Protect your PC from harmful threats.

Free

47.5 MB

Avast Home Edition 4.8.1335.90416

Protect your PC against the latest viruses and spyware.

Free

300.94 KB

AVG Anti-Virus Free Edition 8.5.374

Protect your computer from viruses and malicious programs.

Free

63.15 MB

Avira AntiVir Personal - Free Antivirus 9.0.0.403

Detect and eliminate viruses, get free protection for home users.

Free

30.8 MB

BitDefender Free Edition 10.0

Detect and remove viruses of all kinds.

Free

49.06 MB

Multi Virus Cleaner 2009 9.0.1

Detect and remove viruses, worms, trojans, dialers, and spyware.

Free

2.88 MB

PC Tools AntiVirus Free Edition 5

Protect your PC against viruses, worms, and trojans with rapid updates and IntelliGuard technology.

Free

21.67 MB

Rising Antivirus 2009 Free Edition 21.22.30

Protect your computer from viruses, trojans, and other malicious programs.

Free

60.92 MB

ThreatFire AntiVirus Free Edition 4.5

Protect your PC against viruses, rootkits, buffer overflows, and malware.

Free

7.44 MB

USB FireWall 1.1.2

Block viruses from a USB device.

Free

1.88 MB

Next

Rabu, 08 Juli 2009

Firewall Software

Name / Description

Type

Size

Defzone SSL 2.13

Establish SSL tunnel(s) towards Defzone Firewalls or OpenVPN endpoints.

Free

7.49 MB

Ipfilter 1

Get a packet filter for TCP/IP.

Free

118.62 KB

MyIdnWebShield 1.3

Protect your computer from all Phishing and Pharming attacks.

Free

1.04 MB

Online Armor Personal Firewall 3.5.0.14

Protect your system from parasites, viruses, and identity theft while surfing the Web.

Free

10.29 MB

PC Tools Firewall Plus 4.0.0.45

Protects computer from intruders.

Free

6.1 MB

Securepoint Personal Firewall & VPN Client 3.6.11

Protect your PC against attacks from the Internet.

Free

1.43 MB

Using Internet Security and Acceleration (ISA) Server 2000 as a Firewall 1

Learn how to design and set ISA Server. Tested spyware free

Free

45.18 MB

WyvernWorks Firewall 2004 5.2

Detect and prevent intrusion from outside as well as internal attacks caused by Trojans.Tested spyware free

Free

2.64 MB

ZoneAlarm 8.0.065

Protect your Internet connection from hackers and other security breaches.

Free

26.48 MB

Comodo Internet Security 3.9.95478.509

Protect your PC from harmful threats. Download Now (72.25MB). Tested spyware free [Image]

Free

72.25 MB

Next

Free Download Database Tools

Free Download Database Tools

Free virus by Norton Internet Security 2008
Title
Licensi
Size
Crack Killer 1.2
Publisher's description
Crack Killer is a database application that enables software authors to track and report web sites hosting cracks, serials and pirated versions of their software. To the program features referred solid database to keep track of active and killed sites; highly configurable SMTP e-mail complaint capabilities; DMCA complaint notice generator; IP check function to help identify relocating and reborn sites; support for multiple companies; HTML and CSV export and import; ability to run SQL queries on the database; database filtering.
Free
1.07 mb
EasyPHP 2.0 beta 1
PHP execution & development tool
EasyPHP is a complete software package allowing you to use all the power and the flexibility that dynamic languages like PHP offer, as well as the efficient use of databases. Package includes an Apache server, a MySQL database, a full PHP execution, as well as easy development tools for your web site or your applications.
Free
12.3 Mb
EMS SQL Manager 2005 Lite for SQL Server 2.7
Publisher's description
(From EMS Database Management Solutions ):

EMS SQL Manager Lite for SQL Server is a light and easy-to-use freeware graphical tool for MS SQL/MSDE administration. It has minimal required set of instruments for those users who are new to MS SQL server and need only it's basic functionality.

It makes creating and editing MS SQL Server database objects easy and fast, and allows you to run SQL scripts, manage users and their privileges, simply edit SQL queries. Version 2.7 added more Database properties, DB Explorer: it is now possible to view brief table information in SQL Assistant. Possibility to modify the schema/owner in object editors. Incremental search has been added to a number of object lists.
Free
13.28 mb
Foxy SQL Free 1.1
Execute SQL commands and queries for any database.
Publisher's description
(From CHARONWARE ):

Foxy SQL Free is a database script and query tool designed for DB professionals. It allows them to execute SQL commands and queries against any database. Connections: Native, ODBC, ADO. Supported DB: Oracle, MS SQL, IB, DB2, MySQL, PostgreSQL, Firebird, Sybase ASE and more. Key features: user-friendly interface, syntax highlighting, users can run queries, insert, edit, delete records, browse data. Version 1.1 may include unspecified updates, enhancements, or bug fixes.
Free
1.81 mb
MDB Browser and Editor 2.3
Modify Access databases with this SQL tool and editor.
Publisher's description
(From Jerry Fugini ):

This application can be used to work with tables from databases created in Access 97 or 2000 in a manner similar to FoxPro 2.6. You can open tables or SQLs from a view window, browse, set, create or delete indexes, set relations, copy to text or another table, append from text or another table and delete records. The application does require some knowledge of SQL but makes the operations easier than having to write SQLs. Users can also create, delete and run queries. A help file provides all necessary information on how to use the dialogs.
Free
5.28 mb
Microsoft Data Access Components (MDAC) 2.80.1022.3
Enable universal data access for your Windows-family operating system.
(From Microsoft ):
Microsoft Data Access Components (MDAC) 2.8 contains core Data Access components such as the Microsoft SQL Server OLE DB provider and ODBC driver. This redistributable installer for the MDAC 2.8 release installs the same Data Access components as Microsoft Windows Server 2003.

This release does not include Microsoft Jet, the Microsoft Jet OLE DB Provider or ODBC driver, the Desktop Database ODBC Drivers, or the Visual FoxPro ODBC Driver.

Free
5.3 mb
Microsoft Jet Database Engine 3.5
Update your copy of Microsoft Jet, version 3.51.0623, to version 3.51.3328.0.
(From Microsoft ):

The Jet35sp3.exe file contains an update of several DLL files that are included with Microsoft Access 97, Microsoft Office 97 Professional Edition, Microsoft Visual Basic (version 5.0 or later), and other products that incorporate Jet 3.5x. Microsoft Jet database engine version 3.51 provides an improved Compact utility that combines Compact and Repair into a single process. Also, the updated version of the Jet database engine generates an error if it encounters a problem during the Compact process, and then creates the table, MSysCompactError, in the destination database.

Free
1.29 mb
SQLyog 7.15
Manage MySQL databases.
Publisher's description
(From Webyog ):

Import data from ODBC datasource, synchronize your database. Execute queries for updation of result. Copy databases between hosts. Generate Schema for your database. Manage Foreign Relationships and all options fully InnoDB compliant. Reorder columns.

SQLyog is an easy to use, compact and very fast graphical tool to manage your MySQL database anywhere in the world. SQLyog is a tool that allows you manage MySQL database.

Free
10.53 mb
StarInix Database Compare 2.0.15
Publisher's description
(From StarInix ):

The Free Database Compare application will allow you to compare the structure of two databases and display all the differences between them. Supported databases include: SQL Server (All Editions), MySQL and Access databases. You can compare two different databases, like access and SQL 2000. It will also allow you to create snapshots of a database and compare a live database to a snapshot. A database structure viewer is included.

Version 2.0.15 may include unspecified updates, enhancements, or bug fixes.
Free
3.03 mb
Writer's Database 1.2
Publisher's description
(From Ultima Thule ):

This program is a database system that enables writers to keep track of the works they have created, the potential publishers they have identified, and any submissions to those publishers. It allows you to quickly and easily see which works are awaiting submission, which submissions are outstanding, and which publishers you have tried. This version features minor bug fixes.

Keep track of potential publishers with this databse for writers.
Free
1.53 mb
Next


The key to network security: intrusion-prevention systems augment the defenses provided by firewalls and antivirus software

Communications News, Sept, 2005 by Mark Heslop

Today, enterprises should seriously consider integrating intrusion-prevention systems (IPS) as a critical element in existing security infastructure to thwart both internal and external network attacks. One of the most misunderstood threats is the one coming from inside the firewall--the credentialed user. The problem is compounded by mobile users with laptops that unwittingly obtain and release threats contracted from other networks they previously interacted with that are less secure than their own enterprise network.

In addition, there are an increasing number of unauthorized services, users and applications living on networks today. These include instant messaging, peer-to-peer applications, rogue e-mail, FTP and Web servers. Most companies have policies in place that prohibit these kinds of services; however, a lack of visibility increases the difficulty in policing this traffic, so many rogue services live on, and networks remain vulnerable.

For example, popular file- and music-sharing applications may open up ports and allow unauthorized back door access, increasing vulnerability. End-users have no idea they are downloading malicious code hidden inside the music, video or other file type.

Worms such as Sobig and Bagle propagate this way and can cause mass mailings to a user's personal contact list, or others can install applications like IRC bots that run at predesignated times and execute specific instructions to cause harm. For example, Internet relay chat bots can issue timed-distributed denial-of-service attacks (DDoS) on well-known Internet sites.

Today's networked businesses are no longer simple architectures requiring just a firewall and antivirus to protect the perimeter. Extension of the business network through virtual private networks (VPNs) and Web-enabled applications has blurred the distinction between internal and external users.

Most businesses are now highly interconnected, and advances in networking and communication technologies, combined with Web-enabled applications, have reduced the financial barriers or the traditional "cost of connectivity." Inexpensive access has created highly efficient communications with both partners and employees, bringing together the right people with essential data and applications at the optimal time.

The benefits of these connections are obvious; however, they come with little control over the security at these "semi-trusted" networks. Traffic of these external networks should be rigorously monitored.

An offshore contractor, for example, directly linked into your software development group, may not be as vigilant regarding security and may deliver some infected traffic into the network. Having an IPS system in place would analyze and mitigate that traffic before it could inflict any significant havoc.

Various emerging threats should cause concern for any network administrator, and could be combated in part or fully by an effective IPS installation. These include:

* Phishing (including pharming and spear phishing). These information traps require some human intervention; however, the reliance on spam to propagate gives the IPS a chance to contribute to their detection and disarming.

* Mobile malicious code. PDAs and smartphones are increasingly becoming targets for viruses and worms. Most of these devices are unprotected and must be monitored as their use for external network access increases.

* Blended threats. Worms with multiple infection and entry methods that require a combination of strong policies, updated signature files and visibility to stop their lightening-quick movement.

* Industrial system security. Power and gas companies, traditionally siloed networks, are becoming internet-worked and increasingly customer facing, which opens up these vital services to external threats.

Today's IPS products support multiple detection methods (signature, protocol anomaly and behavioral anomaly), as well as addressing a range of performance needs. These systems are effective in protecting against a wide range of threats from both inside and outside the network. The real challenge that an IPS faces is in its ability to:

* monitor and manage an ever-increasing volume of network security data;

  • handle a large volume of threats from multiple IPS devices across large enterprise networks; and
  • validate attacks with aggregation and correlation of information from devices like intrusion-detection systems (IDS), firewalls and vulnerability-assessment devices, including accurate analysis and actionable reporting.

A high-performance, low-cost complementary threat-management solution--tightly integrated with the IPS solution and able to manage a wide range of events in real-time across the enterprise--is what is needed. Additionally, these systems should be able to analyze packet flow reports, anomaly warnings and other security information from IPS devices, and rapidly correlate viruses/worms, hackers, spyware and off-policy user behavior.

IPS solutions should scale to manage the volume of security threats occurring across the network. Functionality that aggregates and correlates large amounts of data in real time across hundreds of distributed IPS units is essential. Future IPS requirements will include the ability to collect and analyze threats and data from other devices, such as firewalls, IDS and vulnerability-assessment tools. Improved reporting functionality, including real-time flow monitoring that captures and analyzes every packet flowing through the network, will also become increasingly critical over time.

Rabu, 01 Juli 2009

Database Tools

(from wikipedia free)

A DBMS is a set of software programs that controls the organization, storage, management, and retrieval of data in a database. DBMS are categorized according to their data structures or types. It is a set of prewritten programs that are used to store, update and retrieve a Database. The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data. When a DBMS is used, information systems can be changed much more easily as the organization's information requirements change. New categories of data can be added to the database without disruption to the existing system.

Organizations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for random inquiries and analysis. Overall systems design decisions are performed by data administrators and systems analysts. Detailed database design is performed by database administrators.

Database servers are computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays used for stable storage. Connected to one or more servers via a high-speed channel, hardware database accelerators are also used in large volume transaction processing environments. DBMSs are found at the heart of most database applications. Sometimes DBMSs are built around a private multitasking kernel with built-in networking support although nowadays these functions are left to the operating system.

Developer Tool

From Wikipedia, the free encyclopedia

A software developer is a person or organization concerned with facets of the software development process wider than design and coding, a somewhat broader scope of computer programming or a specialty of project managing including some aspects of software product management. This person may contribute to the overview of the project on the application level rather than component level or individual programming tasks. Software developers are often still guided by lead programmers but also encompasses the class of freelance software developers.

Free Download Developer Tools

Free virus by Norton Internet Security 2008 Web Page Maker 3.1
Create and upload a professional Web page without knowing HTML.
Title
Licensi
Size
Bloodshed Dev-Pascal 1.9.2
Write and compile programs in Pascal.
Free
8 mb
DzSoft PHP Editor 4.2.4.0
Write, edit, and debug your PHP scripts and HTML/XML pages.
Free to try
2.87 Mb
JawaBeginner 1.6.2
Develop and edit Java programs on your PC.
(From pivotonic ):
JawaBeginner has a good editor and many useful functionalities to help develop Java programs. It features real-time compilation for Java, JSP, and XML files; Java and JSP code completion; open source files from compile error and run exception; code navigation; the ability to decompile class file to Java file directly; quick-open file; Ant Builder; and a quick go-to method.
Free
2.72 mb
Microsoft .NET Framework 3.5 SP 1
run-time elements for applications created with .NET
Free
2.82 mb
Perl Builder 2k
Build Perl CGI scripts with this full-featured IDE.
Free to try
2.53 mb
PL/SQL Developer 7.1.5
Handle PL/SQL program units with this integrated development environment.
Free
15.87 mb
Python 3.1
Create large shell scripts using high-level data structures.
Python is a powerful object oriented programming language. Clean syntax, high-level data structures, dynamic typing, and rich support libraries combine to make Python a very productive tool for many types of programming.
Free
13.17 mb
Source Edit 4.0 revision 3
Edit programs in ASP, PHP, Java, C/C++, and other languages.
Free
3.73 mb
UI Builder for Microsoft Access 3.4
Configure and enhance your MS Access projects easily.
Free to try
2.08 mb
Free to try
3.67 mb
Next


Sabtu, 27 Juni 2009

Encryption Software

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. For example, in 2007 the U.S. government reported that 71% of companies surveyed utilized encryption for some of their data in transit. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest.

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. There are two common approaches to network encryption.(free article from wikipedia)

Encryption software to protect data is useful and important information from theft of your property the destroyer. This software with the presence of data to be useful not only for the thief and that you need your data. Use encryption software to secure and safety your data from theft. We provide a decryption and encryption software, you can download it for free.

Free Download Encryption Software

Tested Virus and Spyware Free by Norton Internet Security 2008
Title
Licensi
Size
Kruptos 2 3.0.0.33
Encrypt, decrypt, and protect files and folders on your PC or other storage devices.
Free
2.15 mb
KeyGen RC4 Encryption Key Maker 4.0
Create super cryptic passwords using a RC4 Encryption Algorithm using passphrase and password.
Free to try
3.2 Mb
MD5 Checker 2.31
Verify MD5 checksum download codes.
Free
28.58 kb
RoboForm 6.9.95 Reduce multiple passwords to one single item.
Free to try
2.8 mb
Folder Lock 6.2.5
Password-protect, lock, hide, or encrypt files, folders, drives, and USB drive in seconds.
Free to try
2.8 mb
SecureZIP for Windows 12.20.0021
Secure and compress files made in your Microsoft Office applications.
Free
13.7 mb
Hotspot Shield 1.17
Maintain your anonymity and protect your privacy when accessing free Wi-Fi hotspots.
Free
3.4 mb
SuperEncryptor 9.6.0.0
Secure your private and sensitive information from snoopers.
Free to try
4.15 mb
TrueCrypt 6.2
Encrypt your sensitive data with this open-source software.
Free
3.03 mb
WirelessKeyView 1.27
Retrieve and save wireless network keys in your computer.
Free
48 kb
Sygate Personal Firewall 5.6.2808
Protect your PC from hackers, Trojans, and malicious code intrusions.
Free to try
8.8 mb
Folder Access Pro 2
Password-protect your files and folders.
Free to try
4.11 mb
dirLock 1.4
Protect your folders by hiding or locking them.
Free
141 kb
ID Vault 5.0
Log in to all your online accounts securely and with a single PIN.
Free to try
2.73 mb
Secret Keeper 2.0.2
Keep all your confidential info secure & encrypted in one place.
Free to try
10 mb
BlueGem Keystroke Encryption Pro 1.1.0.4
Protect your keystrokes including password with a 128-bit Keystroke Encryption technology.
Free to try
7.49 mb
BSecureZIP Express 12.2
Secure and compress files made in your Microsoft Office applications.
Free
13.7 mb
Signature995 6.1
Digitally sign PDF documents and Office documents.
Free
478 kb

FlyingBit Password Keeper 1.3.0.32

Store your passwords, serial numbers, and codes.
Free
2 mb
EncryptOnClick 1.3.1.3
Secure files with 256-bit AES encryption.
Free
1.48 mb
Cryptainer LE Free 7.2.3.0
128 bit disk encryption software.
Free
3.06 mb
Next


Jumat, 26 Juni 2009

Worm

Worm considered closely associated with the following programs that can mereplikasi himself and send a copy from computer to computer via a network connection. Once arrived, mereplikasi for the worm is activated and propagasi again. In addition propagasi, worms usually do not want that function.

Network worm uses to spread the relationship network of sitem to other systems. Once active on a system, network worms can apply as bacteria or viruses, or trojan horse program paste or a number of actions to annoy or destroy.

Mereplikasi for himself, the network worm uses a network service, such as:
- Electronic mail facilities,
- A remote execution capability,
- The ability to login remotely.

Response :
  1. Always do a Scan for disk into your PC. Although seemingly trivial, but that this will be a small help to protect your computer from viruses transmitted through exchange of floppy disks switch. If a PC infected by a virus, then inserted the disk to them, will most likely be infected as well. Therefore, do not carelessly open the floppy on the computer belonging to your friend, before the floppy disks that pass the selection scandisk.
  2. Scan the CD into your CD drive. Although it seems more exclusive and secure, but also a CD that has the potential are the same as floppy disks, transmit the virus. Therefore, do not dally! Stay do a scan on a CD that will be installed on your computer, even though the CD was recently purchased from the store.
  3. Make a scan of your hard drive, every time you will begin to work with it. As always checked the five health, your PC must also always be whether the healthy or have been infected by the virus. Moreover with the conduct of the hard disk scan before starting a job, you reduce the risk of disruption caused by the virus during the process of your work. In addition, there is the chance occurrence of damage to your files.
  4. Protect your disk, if you include them in your PC to other people. As mentioned above, if you are forced to enter the disk in your computer to other people, then you need to protected floppy first. Consequently, you can not make changes to files stored on floppy disks are.
  5. Do not indiscriminate downloading attachment. Nowadays many types of worm that sends copies of itself in e-mail attachment. For example, worm Miss world. Therefore you should not open any attachment if the sender address does not you know.
  6. Selective in opening e-mail. The same laws that apply to open in the e-mail. a number of viruses and worms duplicate itself and send copies to the entire e-mail address listed on the Microsoft Outlook address book computer diserangnya Express. Thus, the potential victim will not be put with suspicion and will soon open the e-mail is toxic.
  7. Install and to update the antivirus program on your computer. Sometimes, people are still common in the computer, the feel is secure if it is to install Norton or MacAffee program. You are wrong! Antivirus program has also expired the period such as food cans. Therefore, you should always be to update your antivirus program. because antivirus programs that have expired, will not have more teeth to keep out the virus attack on your computer.
  8. Always follow the news about the latest viruses. Period has expired addition, anti-virus program is also always an update with respect to virus-virus, which continues in the new-release. Experts continue to do development for rival who is also the creator of the virus-race competition to create a more vicious virus from day to day.
  9. Download Microsoft Outlook Security Patch into your computer system. As is known, does not have the perfect software program. That is, there are certain weak point or a bug in the software. as well as going to the Microsoft Outlook Express application. Therefore, with download Microsoft Outlook Security Patch into your computer system, means that you have overcome a bug in the program.
  10. Disabling Windows Scripting Host. As known, many new viruses and worms that developed with visual basic scripting system under windows. To minimize attacks, you should disable the program that works for mengotomatisasi a function. However, please note that not all speak vbs virus can disable the program on hold with this

Virus

Meaning the term virus is considered closely associated with the following code that is placed in a program that causes pengkopian inserted himself to one or more other programs. Program menginfeksi other programs to modify the programs. Modify the program including inserting copies of the virus program can then menginfeksi other programs. Besides only propagasi, one of this malicious programs usually perform the function that is not desired.

Like biological viruses, computer virus found on the instruction code that can make perfect copies, such as himself. When the infected computer related (contact) with software that has not been infected, the virus copies to enter the new program. Infection can spread from one computer to another through the use of this disk, or send the program through the network. In the network environment, the ability to access applications and services computer facility is perfect spread of the virus.

A virus can be routine-a routine that diisikan by virus programmers. Routine routine-this could include the destruction or just display a message

Handling virus
To prevent the occurrence of virus attack, antivirus software is usually installed in the operating system such as the Mine did, AVG, PC-Cillin, Norton Symantec, and others. But the use of anti-virus is not the only way to avoid virus attacks. We need to know that the virus constantly growing both in terms of attack and the damage caused. All bekerjanya characteristics of the virus outside of computer users. Therefore, some of the things that computer users should be made in an effort to prevent virus attacks, among others.

  • To update the antivirus through the Internet or from a package file that is distributed. Usually antivirus update with ability to provide programs and update the database because finding a new virus. If the antivirus is not updated, the antivirus is able to prevent the attack of virus-virus generation old, virus-virus sehinngga new generation will be easy to do the distribution. Update process is better done as often as possible, but if it does not enable the update is done in most long range within 2 weeks.
  • Be careful in the transformation of the file either through floppy disk, hard disk, flash disk, network or the other. Before Peng-an-copy files, scanning should be done to the files concerned to ensure that the file will not copy in-bervirus.
  • If the computer connected to the network should be as individual protective firewall. When this virus-the virus usually attacks the network through the TCP / IP or peer-to-peer. In addition the firewall can also provide the password on the folders that are shared. Restriction policy implementation of centralized network systems will create a more secure.
  • Use e-mail client like Microsoft Outlook, Mozilla Thunderbird, Eudora, and others need to pay attention to each incoming email into the inbox. The spread of the virus via email, including methods that often occur. Inclusion on an email attachment to provide opportunities for effective penetration of the virus in the operating system.
  • Surfing the internet memeliki risk is high enough to attack the virus. Many websites that install hidden applications so that when the website is accessible to the application will perform pentarasi virus in the operating system to the unwitting user. Use of web browser software system that has security as a popup blocker is recommended.
  • Microsoft Windows provide a software-software that works to improve the weakness of the system. To update the operating system security system can reduce the risk of virus dissemination.

Next steps to be implemented so that the system can work normally again.
  • When the system is infected, do the backup data.
  • Scan a hard drive infected with a computer virus-free.
  • If damage occurs after scanning the system, so the system can not work, do the re-installation.
  • Scan the data in the backup computer with a virus-free.
  • Install antivirus program or the latest update.
  • Update antivirus database program.
  • Update the system security operating system.

Trojan horse

Meaning the term is considered closely associated with the following Routine not be documented in a secret program useful. Programs that contain useful hidden code that when executed perform a function that is not desired. Execution of the program routine execution of this secret.

Trojan horse program used to perform functions which are not direct the user is not authorized can not do directly. For instance can access files on another system is used together, users can create a trojan horse program. Trojan horse programs executed when this change will permit license-file so that files can be read by any user.

Trojan horse programs that are difficult to detect that the compiler is modified so that the insert additional code to certain programs when compiled, such as the login program. Trapdoor on the code to create programs that allow creators to login to the system log using a special password. Trojan horse is never can be found only if the program source.

Motifasi of trojan horse is crushing data. The program appears to function as a useful function, such as a calculator, but also to secretly remove the files. Trojan horse to the regular program or routine-routine taken from the BBS, the Internet, and so forth.