Thursday, April 10th, 2008
Anti Keylogger Shield is a powerful, easy to use anti-spy software tool that prohibits operation of any keylogger, either know or unknown, professional or custom made. Once installed, Anti Keylogger Shield will run silently in your System Tray, block the system mechanisms that are exploited by keyloggers, and protect your ...
Posted in Internet, Privacy, Security, Software | No Comments
Thursday, April 10th, 2008
Complement your existing desktop protection (see list below) with Trend Micro Web Protection Add-On—a lightweight add-on trial solution designed to proactively protect your computer against Web threats and bot infiltration. Web Protection Add-On uses Trend Micro’s revolutionary in-the-cloud security technology to monitor outbound Web requests. This real-time protection proactively scans ...
Posted in Internet, Privacy, Security, Software | No Comments
Thursday, April 10th, 2008
The CLSID for an ActiveX control is a GUID for that control. You can prevent an ActiveX control from running in Internet Explorer by setting the kill bit so that the control is never called by Internet Explorer when default settings are used.
The kill bit is a specific value for ...
Posted in Coding, Internet, Security, Windows | No Comments
Wednesday, April 9th, 2008
Online malware attacks are becoming more pervasive, targeted, and refined as the underground threat economy continues to evolve and take on the characteristics of an organized industry.
The latest iteration of Symantec's Internet Security Threat Report -- covering its research over the final six months of calendar 2007 and released on ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, April 9th, 2008
At the RSA Security Conference I caught up with Austin Wilson, Microsoft 's Director of Windows Product Management and learned a few tidbits about security enhancements coming in Internet Explorer 8. IE8 will address three specific areas where security can be a problem: social engineering, traditional browser vulnerabilities, and attacks ...
Posted in Internet, Security, Windows | No Comments