Welcome, Guest
You have to register before you can post on our site.



  Adobe Creative Cloud Direct Download Links – Availability Update
Posted by: tarekma7 - 14 minutes ago - Forum: Paid - No Replies

This morning, Adobe unveiled the all-new CC 2018 Release, which they say is the biggest product launch since Adobe first introduced Creative Cloud over five years ago. From what we’ve seen so far, it looks to be true. There are major updates across the entire suite of tools and services, including entirely new CC desktop tools as well as significant new features and performance improvements to existing applications, and even some surprises. As always, all upgrades to all CC apps are available for download by Creative Cloud members as part of their membership at no additional cost. 

You are not allowed to view links. Register or Login to view.

You are not allowed to view links. Register or Login to view.

Print this item

  How Windows Defender’s New Exploit Protection Works (and How to Configure It)
Posted by: mrtrout - 2 hours ago - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.        How Windows Defender’s New Exploit Protection Works (and How to Configure It)
by Chris Hoffman on October 20th, 2017

Microsoft’s Fall Creators Update finally adds integrated exploit protection to Windows. You previously had to seek this out in the form of Microsoft’s EMET tool. It’s now part of Windows Defender and is activated by default.

How Windows Defender’s Exploit Protection Works

What’s New in Windows 10’s Fall Creators Update, Available Now
We’ve long recommended using anti-exploit software like Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) or the more user-friendly Malwarebytes Anti-Malware, which contains a powerful anti-exploit feature (among other things). Microsoft’s EMET is widely used on larger networks where it can be configured by system administrators, but it was never installed by default, requires configuration, and has a confusing interface for average users.

Typical antivirus programs, like Windows Defender itself, use virus definitions and heuristics to catch dangerous programs before they can run on your system. Anti-exploit tools actually prevent many popular attack techniques from functioning at all, so those dangerous programs don’t get on your system in the first place. They enable certain operating system protections and block common memory exploit techniques, so that if exploit-like behavior is detected, they’ll terminate the process before anything bad happens. In other words, they can protect against many zero-day attacks before they’re patched.

However, they could potentially cause compatibility problems, and their settings might have to be tweaked for different programs. That’s why EMET was generally used on enterprise networks, where system administrators could tweak the settings, and not on home PCs.

Windows Defender now includes many of these same protections, which were originally found in Microsoft’s EMET. They’re enabled by default for everyone, and are part of the operating system. Windows Defender automatically configures appropriate rules for different processes running on your system. (Malwarebytes still claims their anti-exploit feature is superior, and we still recommend using Malwarebytes, but it’s good that Windows Defender has some of this built-in now as well.)

This feature is automatically enabled if you’ve upgraded to Windows 10’s Fall Creators Update, and EMET is no longer supported. EMET can’t even be installed on PCs running the Fall Creators Update. If you already have EMET installed, it will be removed by the update.

How to Protect Your Files From Ransomware With Windows Defender’s New “Controlled Folder Access”
Windows 10’s Fall Creators Update also includes a related security feature named Controlled Folder Access. It’s designed to stop malware by only allowing trusted programs to modify files in your personal data folders, like Documents and Pictures. Both features are part of “Windows Defender Exploit Guard”. However, Controlled Folder Access isn’t enabled by default.

How to Confirm Exploit Protection is Enabled

This feature is automatically enabled for all Windows 10 PCs. However, it can also be switched to “Audit mode”, allowing system administrators to monitor a log of what Exploit Protection would have done to confirm it won’t cause any problems before enabling it on critical PCs.

To confirm that this feature is enabled, you can open the Windows Defender Security Center. Open your Start menu, search for Windows Defender, and click the Windows Defender Security Center shortcut.

Click the window-shaped “App & browser control” icon in the sidebar. Scroll down and you’ll see the “Exploit protection” section. It will inform you that this feature is enabled.

If you don’t see this section, your PC probably hasn’t updated to the Fall Creators Update yet.

How to Configure Windows Defender’s Exploit Protection

Warning: You probably don’t want to configure this feature. Windows Defender offers many technical options you can adjust, and most people won’t know what they’re doing here. This feature is configured with smart default settings that will avoid causing problems, and Microsoft can update its rules over time. The options here seem primarily intended to help system administrators develop rules for software and roll them out on an enterprise network.

If you do want to configure Exploit Protection, head to Windows Defender Security Center > App & browser control, scroll down, and click “Exploit protection settings” under Exploit protection.

You’ll see two tabs here: System settings and Program settings. System settings controls the default settings used for all applications, while Program settings controls the individual settings used for various programs. In other words, Program settings can override the System settings for individual programs. They could be more restrictive or less restrictive.

At the bottom of the screen, you can click “Export settings” to export your settings as an .xml file you can import on other systems. Microsoft’s official documentation offers more information about deploying rules with Group Policy and PowerShell.

On the System settings tab, you’ll see the following options: Control flow guard (CFG), Data Execution Prevention (DEP), Force randomization for images (Mandatory ASLR), Randomize memory allocations (Bottom-up ASLR), Validate exception chains (SEHOP), and Validate heap integrity. They’re all on by default except the Force randomization for images (Mandatory ASLR) option. That’s likely because Mandatory ASLR causes problems with some programs, so you might run into compatibility issues if you enable it, depending on the programs you run.

Again, you really shouldn’t touch these options unless you know what you’re doing. The defaults are sensible and are chosen for a reason.

Why the 64-bit Version of Windows is More Secure
The interface provides a very short summary of what each option does, but you’ll have to do some research if you want to know more. We’ve previously explained what DEP and ASLR do here.

Click over to the “Program settings” tab, and you’ll see a list of different programs with custom settings. The options here allow the overall system settings to be overridden. For example, if you select “iexplore.exe” in the list and click “Edit”, you’ll see that the rule here forcefully enables Mandatory ASLR for the Internet Explorer process, even though it’s not enabled by default system-wide.

You shouldn’t tamper with these built-in rules for processes like runtimebroker.exe and spoolsv.exe. Microsoft added them for a reason.

You can add custom rules for individual programs by clicking “Add program to customize”. You can either “Add by program name” or “Choose exact file path”, but specifying an exact file path is much more precise.

Once added, you can find a long list of settings that won’t be meaningful to most people. The full list of settings available here is: Arbitrary code guard (ACG), Block low integrity images, Block remote images, Block untrusted fonts, Code integrity guard, Control flow guard (CFG), Data Execution Prevention (DEP), Disable extension points, Disable Win32k system calls, Do not allow child processes, Export address filtering (EAF), Force randomization for images (Mandatory ASLR), Import Address Filtering (IAF), Randomize memory allocations (Bottom-up ASLR), Simulate execution (SimExec), Validate API invocation (CallerCheck), Validate exception chains (SEHOP), Validate handle usage, Validate heap integrity, Validate image dependency integrity, and Validate stack integrity (StackPivot).

Again, you shouldn’t touch these options unless you’re a system administrator who wants to lock down an application and you really know what you’re doing.

As a test, we enabled all the options for iexplore.exe and tried to launch it. Internet Explorer just showed an error message and refused to launch. We didn’t even see a Windows Defender notification explaining that Internet Explorer wasn’t functioning because of our settings.

Don’t just blindly attempt to restrict applications, or you’ll cause similar problems on your system. They’ll be difficult to troubleshoot if you don’t remember you changed the options, too.

If you still use an older version of Windows, like Windows 7, you can get exploit protection features by installing Microsoft’s EMET or Malwarebytes. However, support for EMET will stop on July 31, 2018, as Microsoft wants to push businesses toward Windows 10 and Windows Defender’s Exploit Protection instead.

Print this item

  [WinXDVD Giveaway] WinX DVD Copy Pro License Code & Setup
Posted by: litek - 6 hours ago - Forum: External Giveaways/Freebies - No Replies

You are not allowed to view links. Register or Login to view., No Free Upgrade

Support old and new DVDs, even DVDs with 99-title and Disney's Fake. Make 1:1 DVD backup with 9 copy modes: Clone DVD to DVD, ISO image, folder, MPEG2 files; back up DVD chapter; extract audio video; mount DVD Mount ISO image, burn DVD,

You are not allowed to view links. Register or Login to view.

1. Please activate license code before Nov.4, 2017.

2. Giveaway License can only activate the current version and let you enjoy the full function of this program. But it does not support free upgrade to newer version.

Print this item

  O&O ShutUp10 1.6.1393 Released
Posted by: mrtrout - 6 hours ago - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.         Changelog: What’s new in this version?
Version 1.6.1393 – released October 20, 2017

Support for high contrast mode revamped and enhanced
System Restore Points can now be created multiple times consecutively
“Disable the Windows Customer Experience Improvement Program” revamped (now affects local computers, no longer group policies)
Available in German, English, French, Italian and Russian.  :  You are not allowed to view links. Register or Login to view.      O&O ShutUp10:Free antispy tool for Windows 10
Version 1.6.1393, File size 779KB.
Released on: October 20, 2017
O&O ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated.

O&O ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!

More control over your operating system
Adapt your security settings
Protect your privacy
Control location services
Control Windows Updates
Do not pass on your user data and diagnostics
Further information
Portable Version – no installation required
Free of charge for private users,
companies and educational institutions
Operating System: Microsoft® Windows 10
Supports Windows 10 Fall Creators Update
Windows 10 wants to give users the easiest possible daily experience and in doing so very rarely forces you to actually read and confirm a security notice. Unfortunately, this simplified approach from Microsoft means much more data is passed onto them than many users would like.

Microsoft uses most data to display personalized information to you that is aimed at making your computer life easier. As an example, Windows 10 can remind you to set off to the airport 30 minutes earlier due to traffic en route. In order to deliver this information to you, however, Windows 10 has to access your calendar entries, your mails (i.e. the airline confirmation email), your location and it has to have access to the internet to get traffic news.

Free Windows 10 Anti Piracy Tool

Some services protocol your entire keyboard entries, share your WLAN access data with your facebook contacts or connect your computer without asking permission to a public – and potentially unprotected – network. While this means that you and your contacts do not have to grapple with complicated WLAN passwords, it also poses a significant security risk.

Decide for yourself how important your “comfort” is when weighed up with your privacy and how to protect it. O&O ShutUp10 presents you with all important settings in one location – you need no previous IT knowledge and there is no need to manually change the Windows 10 system settings.

O&O ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!
You are not allowed to view links. Register or Login to view.        0 / 66

No engines detected this file
SHA-256 db16e2f26bbdb009053bcd608e41959cfe26ad1fe5645c108d0517c05b39e17e
File name OOSU10.exe
File size 785.56 KB
Last analysis 2017-10-20 16:09:50 UTC         File Names
Signature Info
Signature Verification
Signed file, valid signature
File Version Information
Copyright Copyright © 2015-2017 O&O Software GmbH. All rights reserved.
Product O&O ShutUp10
Description O&O ShutUp10
Original Name OOSU10.exe
Internal Name OOSU10.exe
File Version 1.6.1393.1
Comments O&O ShutUp10
Date Signed 11:12 AM 10/20/2017
O&O Software GmbH
VeriSign Class 3 Code Signing 2010 CA
Counter Signers
Symantec Time Stamping Services Signer - G4
Symantec Time Stamping Services CA - G2
Thawte Timestamping CA

Print this item

  Age & Year Born
Posted by: Mike - 9 hours ago - Forum: Off Topic Chat - Replies (3)

[Image: 0cZkQV6.jpg]

Print this item

  VPN Gate and Softether
Posted by: tywyll2017 - Yesterday, 07:58 AM - Forum: Freeware - Replies (1)

Here is another VPN client that you guys may be interested in.
Tested and found AIO.
Totally free.

There are 2 components.
1--The server setup
2--The client setup.
You can use the client setup independently and connect to VPN Relay servers around the world.
There are quite a lot, in many different countries.
See list of countries and servers You are not allowed to view links. Register or Login to view.
[Image: 7iAParM.jpg]
Install options
[Image: 1gzEPfC.png]
Choose VPN Client here, as it includes admin tools too.
[Image: ZZPhAd6.png]
Utilize app
Choose Public VPN here
[Image: oMVpGc5.png]

I see that they got good reviews. Read review You are not allowed to view links. Register or Login to view..

Some points from review at VPN Mentor
Located in the National University of Tsukuba (Japan), VPN-Gate is an academic research project designed to study the distribution of public VPN relay servers globally. Having begun their operations in 2013, they claim their service can break through most firewalls and have more advantages than traditional VPN providers. So, if they’re not a bog standard VPN provider, what attributes do they have that make them distinct from the rest?
First, they are kept alive by volunteers rather than relying on paid users. Volunteers are not only located in Tsukuba but internet users around the world who host their own relay server by supplying their ISP bandwidth and CPU power. Other users around the world can then connect to one of these IP addresses to access the web and benefit from all the positive functions that a VPN can offer: unblock restricted content, surf anonymously and maintain privacy. Volunteers come and go on a frequent basis, so the range of IP addresses change regularly which has the advantage of offering users a wider range of servers based in various locations around the globe.
Unblocking restricted content in your geographical area is another incentive with VPN-Gate.
Firewalls are known to purposefully blacklist a whole range of IP addresses in an attempt to thwart users accessing certain content but with VPN-Gate’s continually changing pool of servers to choose from and dynamic (frequently changing) IP addresses, this could be particularly useful tool to burst through most firewalls. Many commercial VPN services provide static IP addresses and often have a limited amount of servers which can hinder the ability to burst through Firewalls, so VPN-Gate may very well live up to their claim of being to able to overcome this obstacle.
Servers are typically based in the Asian continent, such as South Korea, Japan, Taiwan, Singapore and Thailand, with other volunteers offering servers in Europe, the Middle East, as well as North and South America. A real time list of available servers are provided on their main website, followed by the instructions on how to connect. So, users can hide their true IP address and access foreign content – whether it’s controversial news websites or even streaming services like Netflix, Spotify or YouTube.
It’s a totally free service to use with no registration required and works on Windows, Macs, iOS and Androids. All of the common protocols are used: L2TP/IPsec, OpenVPN, SSL-VPN (SoftEther VPN) and Microsoft SSTP protocol, which significantly augments the potential to break through firewalls such as Great Firewall of China or even simply get around blocks created by Universities or Colleges.
VPN-Gate can certainly become a useful tool to have while surfing public WiFi hotspots, which are notorious targets for hackers, snoopers and criminals who want to intercept unencrypted traffic from unsuspecting surfers. By connecting to VPN-Gate you’ll shield yourself from eavesdropping as traffic will be encrypted making it nearly impossible for an attacker to sift through your data.
There is no native software for any device but VPN-Gate does supply setup guides for each device depending on which protocol you wish to use. To get going, you’ll either need third-party software such as Tunnelblick for the Mac, SoftEther VPN Client for Windows, or in some cases manually configuring your network settings is required.
Unfortunately, they do collect user data logs which is a huge blow for those seeking to surf anonymously. This is often the case with free VPN services, however there are plenty of paid options out there to solve this dilemma.
In terms of reliability this VPN is perhaps a more volatile and risky option compared to commercially established providers who run a business supported by paid users, not volunteers. Why is this? Only the good nature of the volunteers is what keeps this service alive, and also the willpower of its owners who at any time could decide to abruptly discontinue operations. After all, this was merely a research project, with no obligation to its foreign users, and has stated an intention to only last a few more years.

Whether this VPN appeals to you will depend on your internet activities.

VPN-Gate does have drawbacks for their users by collecting logs (2 weeks, I see) and there’s also no real guarantee that this service will continue as it’s solely relying on volunteers for its upkeep. However, if you’re simply in need of a tool to unblock specific (perhaps not too private) websites or services then the abundance of server choices and varying protocols make VPN-Gate a worthy option.

  • Totally free to use
  • Break through firewalls with ease
  • Wide choice of servers
  • Works on Windows,OSX and Android
  • Safe and secure surfing on WiFi hotspots
  • Setup guides available
  • You are not allowed to view links. Register or Login to view.
Money Back Guarantee (Days): 0
Mobile app:  
Devices per license: 1
VPN Plans: You are not allowed to view links. Register or Login to view.

You are not allowed to view links. Register or Login to view.

You can download SoftEther VPN Client + VPN Gate Client Plugin directly from us, or from the World's most popular download site -- Download.com by CNET. You may try using CNET Download.com if you cannot download from our primary download server.

Read more You are not allowed to view links. Register or Login to view.

You are not allowed to view links. Register or Login to view.

Print this item

  Tenorshare iTransGo for Win (1 year license)
Posted by: AAU - Yesterday, 04:18 AM - Forum: External Giveaways/Freebies - No Replies

  • Tenorshare iTransGo is an easy tool to transfer contents from iPhone to iPhone with only one simple click. This amazing program allows you to transfer data between iOS devices without using iTunes.  
  • Key Features:
  • Directly clone everything from one iPhone to another with one click
  • Selectively transfer specific files to save much valuable time
  • Lighting transfer speed, a full transfer of 128GB data can be done in 5 minutes
  • Sync and share purchased music with different Apple IDs, no need to use iTunes
  • Automatically install apps and sync app data to new device after migration
  • Intuitive interface and simple operating steps make it easy to use for everyone

You are not allowed to view links. Register or Login to view.

Print this item

  Monthly Mega Giveaway - 13
Posted by: Mike - Yesterday, 12:22 AM - Forum: Official & Exclusive Promo2day Giveaway Winners - Replies (1)

[Image: 06TQpBA.png]

Winner of the Monthly Mega Giveaway - 13 is pito. Please message Mike within 1 week to claim your win or the win will be void.

Print this item

  XnView2.43 Released
Posted by: mrtrout - 10-19-2017 , 09:00 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.         
Author of XnView
Posts: 28064
Joined: Mon Oct 13, 2003 7:31 am
Location: France
Contact: Contact xnview
XnView 2.43
Postby xnview » Thu Oct 19, 2017 11:44 am
Dear user,
XnView 2.43 for Windows is available. Versions are available on the normal XnView Download page.
Please note that the XnView Download page offers packages with German/French Setup and German/French Online help.
Direct links to the English Standard version are:
You are not allowed to view links. Register or Login to view. (English Setup, Multi language)
You are not allowed to view links. Register or Login to view. (ZIP file, Multi language)
XnView Shell Extension 32bits:
You are not allowed to view links. Register or Login to view.
You are not allowed to view links. Register or Login to view.
XnView Shell Extension 64bits:
You are not allowed to view links. Register or Login to view.
You are not allowed to view links. Register or Login to view.
XnView-win.exe: A17ABD62CECFDF141623A904A4939B165D74AFB6A7E857F7D726BE3328138549
XnView-win.zip: CA047C7EA8568E58374A1169B6A7E4F411DD96EB3F9FD8417DFC2088E4B759DA
XnView-win-full.exe: 059F980A34906427BF7F73A4E6805BAE37625B0F1BEB0D3ADC21250A7CB635E9
XnView-win-full.zip: E4C486BF3924E3C78836A48A9513C0925F4DBDC75688D6B688BC56D47420A1FF
XnView-win-small.exe: B58534AAD89EDECC29224F1E048A173F52BBA0CF02E4E3A8F4258E74C7A3A2C5
XnView-win-small.zip: 90368321F70863F435BE13AB41719A76BC3C01E4BEDF80E586AA2468640EB45F
____ 2.43 Changelog
Better HEIF support - You are not allowed to view links. Register or Login to view.
Unwanted file types shown in Viewer - viewtopic.php?f=36&t=35484
Alpha glitch - viewtopic.php?f=36&t=36454
Folder browsing via command line - viewtopic.php?f=36&t=36434
Lossless crop corruption - viewtopic.php?f=36&t=36378

Print this item

  WizTree 3.15 Released
Posted by: mrtrout - 10-19-2017 , 08:58 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.        Features
Finds the files and folders using the most space on your hard drive
VERY Fast! WizTree reads the master file table (MFT) directly from NTFS formatted hard drives (similar to the way Everything Search Engine works)
Visual Treemap allows you to spot large files and large collections of smaller files at a glance
Finds the largest files on your hard drive. Every single file on your hard drive can be sorted in order of size.
File Name Search - quickly locate files by name or wildcard match
Sort the contents of your entire hard drive by folder size and optionally delete files and folders
Scan ALL hard drive file system types (NTFS, FAT, FAT32, network, etc) and/or individual folders  :   What's new?
WizTree 3.15 (19 October 2017)
(Only external translation files have changed in the installer/portable version)
German translation by de-heidjer
Updated Japanese translation
Updated French translation

Print this item

  Revo Uninstaller 2.04 Free Released
Posted by: mrtrout - 10-19-2017 , 08:56 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.        Release history of Revo Uninstaller Freeware
Oct 19, 2017 Revo Uninstaller Freeware version 2.0.4
Improved Scanning for leftovers
Fixed Minor bugs
Updated language files :  You are not allowed to view links. Register or Login to view.         Revo Uninstaller is a freeware uninstall utility. It has powerful features to uninstall programs scanning for left-over files, folders and registry entries after uninstall. With its unique 'Hunter mode' it offers you some simple, easy to use but effective and powerful approaches to manage (uninstall, stop, delete, disable from auto starting) and to get information about your installed and/or running application. Many cleaning tools included!
Revo Uninstaller Free is fully compatible with 32-bit and 64-bit versions of Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Server
Free Download
Version: 2.0.4

Print this item

  norton security standard 1pc 1 year
Posted by: dhruv2193 - 10-19-2017 , 03:11 PM - Forum: Personal Giveaways - Replies (11)

comment something nice about Promo2day to be entered. and why you want to win also.
i will randomly pick winner on 22nd october 2017.
Note i may add more info later on if required.

Print this item

  WonderFox 2017 Halloween Carnival
Posted by: AAU - 10-19-2017 , 02:51 PM - Forum: External Giveaways/Freebies - No Replies

WonderFox has paired up with 9 awesome software partners such as: IObit,Soda PDF,AdGuard and more to offer the sweet prize-software 100% off. Until Nov 5th, the total value $500 software needs to be taken, let’s take them away!

You are not allowed to view links. Register or Login to view.

Print this item

  Tenorshare iAnyGo
Posted by: longin - 10-19-2017 , 09:06 AM - Forum: Giveaway of the day - No Replies

[Image: tvdNoLm.png]
Tenorshare iAnyGo 1.0

An easy tool to upgrade or downgrade iOS system on iPhone, iPad 
Tenorshare iAnyGo is an easy tool to upgrade or downgrade iOS system on iPhone, iPad and iPod without using iTunes. This handy software is designed to help people avoid any iOS stuck or data damage after update or downgrade.
Key Features

  • One-click to complete iOS upgrade or downgrade without iTunes or data loss.

  • Allow to select the firmware version to install or uninstall freely.

  • Offer an option to import the downloaded firmware on computer directly.

  • An alternative to restore iPhone smoothly and quickly.

  • User-friendly interface and simple procedures make it easy for everyone to operate.

  • Support all iOS and beta versions, including the latest iOS 11.03/11.02/11.01.
You are not allowed to view links. Register or Login to view.

Print this item

  Syvir PC Build 2
Posted by: longin - 10-19-2017 , 08:56 AM - Forum: External Giveaways/Freebies - Replies (2)

[Image: UYRhbuG.png]
When trying to check a PCs hardware specification sometimes the only reliable means is to open up the box and see for yourself what’s inside the system case. Clearly this is time consuming and can be impractical. You are not allowed to view links. Register or Login to view. scans up to 10 hardware items on your PC and builds a near identical 3D model of these components along with the motherboard. An inventory list of these hardware details is shown next to the 3D model.
You are not allowed to view links. Register or Login to view.

Print this item

  How You Can Protect Yourself From KRACK WiFi Vulnerability
Posted by: daljeet - 10-19-2017 , 07:14 AM - Forum: Guides, Tips & Tricks - No Replies

What Exactly is KRACK Wi-Fi Vulnerability?

The WPA2 encryption protocol was previously considered to be fully secure, however, because of the recently discovered KRACK vulnerability, hackers can intercept some of the traffic between your device and the router. Because of this vulnerability, a hacker can:

  • View and store your unencrypted data transmitted via Wi-Fi
  • Manipulate data on a Wi-Fi network
  • Steal your passwords, financial data, and other sensitive information
  • Access and control your IoT devices
How You Can Protect Yourself from the KRACK Wi-Fi Vulnerability
When it comes to protecting yourself from this new menace, there are some simple ways to go about it. To begin with, you can
  • Update the firmware of your router immediately
  • Use Ethernet instead of Wi-Fi
  • Use cellular data instead of Wi-Fi on cellphones
Sadly, not everyone can afford the continuous use of cellular data, and using an Ethernet cable is just not viable since it takes away the mobility we have all grown accustomed to.
So, when it comes to a complete solution for KRACK Wi-FI protection, the best tool to trust is a VPN

Ensure Your Security, Especially on Public Wi-Fi Hotspots
Public Wi-Fi hotspots are hunting grounds for hackers, and it’s probably where you will be targeted via the KRACK Wi-Fi vulnerability.
In order to protect yourself from the KRACK Wi-FI vulnerability, make sure your VPN is activated and connected whenever you connect to a public Wi-Fi. This way, all the data you transmit, even via a public Wi-Fi router, will be encrypted and hidden from prying eyes.

Print this item

  VirtualBox 5.2 (released 2017-10-18) This is a major update.
Posted by: mrtrout - 10-18-2017 , 09:34 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.         Changelog for VirtualBox 5.2
This page lists all changes of the VirtualBox 5.2 Downloads.
All branches: 5.2 · 5.1 · 5.0 · 4.3 · 4.2 · 4.1 · 4.0

VirtualBox 5.2 (released 2017-10-18)

This is a major update. The following major new features were added:

VM export to Oracle Cloud (OPC)
Unattended guest installation (bug #5810; see the manual for more information)
Overhauled VM selector GUI (improved tools VM / global tools handling, new icons)
Added experimental audio support for video recording
In addition, the following items were fixed and/or added:

VMM: fixed reason for recent Linux kernels on also recent CPU models warning about "XSAVE consistency problem"
GUI: Virtual Media Manager rework allowing to manage media attributes, like size, location, type and description
GUI: Host-only Network Manager implemented to simplify managing corresponding networks and their attributes
GUI: Snapshot Pane rework allowing to manage snapshot attributes, like name and description; reworked snapshot details which looks more clear, corresponds to VM Details pane and reflects current VM state difference according to last snapshot taken
GUI: Audio settings extended with possibility to enable/disable audio input/output; corresponding changed were done to Audio and Video Capture settings pages; VM Devices menu and status-bar extended with corresponding actions and indicator as well
GUI: improvements with accessibility support
GUI: Fixed double mouse cursor when using mouse integration without Guest Additions, actually a Qt 5.6 bug fixed with QT 5.6.3 (Mac OS X hosts only; bug #15610)
Audio: implemented (optional) device enumeration support for audio backends
Audio: implemented support for host device callbacks (e.g. when adding or removing an audio device)
Audio: HDA emulation now uses asynchronous data processing in separate threads
Audio: implemented ability to enable or disable audio input / output on-the-fly
Storage: implemented support for CUE/BIN images as CD/DVD media including multiple tracks
Storage: implemented support for the controller memory buffer feature for NVMe
Storage: first milestone of the I/O stack redesign landed
E1000: Fix for Windows XP freeze when booting with unplugged cable
NAT network: do not skip some port forwarding setup when multiple VMs are active (Windows hosts only; bug #17041)
Serial: fixed extremely rare misbehavior on VM poweroff
EFI: better video mode handling, supporting custom video modes and easier configuration (bug #6783)
BIOS: properly report floppy logical sectors per track for unusual formats
BIOS: update ATA disk parameter table vectors only if there is actually a corresponding ATA disk attached
PXE: speed up booting by better handling pending packets when the link is not up yet
VBoxManage: handle CPUID sub-leaf overrides better
Windows Additions: fix several 3D related crashes
Solaris hosts: allow increasing MTU size for host-only adapter to 9706 bytes to support jumbo frames
Linux Additions: on systems using systemd, make sure that only the Guest Additions timesync service is active
many unlisted fixes and improvements

Print this item

  K-Lite Codec Pack 13.5.5 and newer (Basic/Standard/Full/Mega)
Posted by: mrtrout - 10-18-2017 , 08:45 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.        version 13.6.0 ~ 20.2 MB ~ October 18th 2017

Update for:

K-Lite Codec Pack 13.5.5 and newer (Basic/Standard/Full/Mega)


Updated LAV Filters to version 0.70.2-79-g12810
Updated MadVR to version 0.92.7
Type: Download Location: Hosted By:
HTTP Mirror 1 Codec Guide
HTTP Mirror 2 Codec Guide
  show more...  
HTTP Mirror 3 majorgeeks.com
HTTP Mirror 4 BetaNews
Filename: klcp_update_1360_20171018.exe
Size: 20754 KB
MD5: b1bdefbbf1c69f93cb91f98aef1d22de
SHA256: 9928594a5610bd7894b24f0ecfb160ca38ae6e63e7a734cfcd1ac581a4fe0441

Print this item

  Google Chrome 62.0.3202.62 Released
Posted by: mrtrout - 10-18-2017 , 05:56 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.        Stable Channel Update for Desktop
Tuesday, October 17, 2017
The Chrome team is delighted to announce the promotion of Chrome 62 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.
 Chrome 62.0.3202.62 contains a number of fixes and improvements -- a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 62.
 Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.
 This update includes 35 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.
 [$7500+$1337][762930] High CVE-2017-5124: UXSS with MHTML. Reported by Anonymous on 2017-09-07
[$5000][749147] High CVE-2017-5125: Heap overflow in Skia. Reported by Anonymous on 2017-07-26
[$3000][760455] High CVE-2017-5126: Use after free in PDFium. Reported by Luật Nguyễn (@l4wio) of KeenLab, Tencent on 2017-08-30
[$3000][765384] High CVE-2017-5127: Use after free in PDFium. Reported by Luật Nguyễn (@l4wio) of KeenLab, Tencent on 2017-09-14
[$3000][765469] High CVE-2017-5128: Heap overflow in WebGL. Reported by Omair on 2017-09-14
[$3000][765495] High CVE-2017-5129: Use after free in WebAudio. Reported by Omair on 2017-09-15
[$3000][718858] High CVE-2017-5132: Incorrect stack manipulation in WebAssembly. Reported by Gaurav Dewan (@007gauravdewan) of Adobe Systems India Pvt. Ltd. on 2017-05-05
[$N/A][722079] High CVE-2017-5130: Heap overflow in libxml2. Reported by Pranjal Jumde (@pjumde) on 2017-05-14
[$5000][744109] Medium CVE-2017-5131: Out of bounds write in Skia. Reported by Anonymous on 2017-07-16
[$2000][762106] Medium CVE-2017-5133: Out of bounds write in Skia. Reported by Aleksandar Nikolic of Cisco Talos on 2017-09-05
[$1000][752003] Medium CVE-2017-15386: UI spoofing in Blink. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-08-03
[$1000][756040] Medium CVE-2017-15387: Content security bypass. Reported by Jun Kokatsu (@shhnjk) on 2017-08-16
[$1000][756563] Medium CVE-2017-15388: Out of bounds read in Skia. Reported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-08-17
[$500][739621] Medium CVE-2017-15389: URL spoofing in OmniBox. Reported by xisigr of Tencent's Xuanwu Lab on 2017-07-06
[$500][750239] Medium CVE-2017-15390: URL spoofing in OmniBox. Reported by Haosheng Wang (@gnehsoah) on 2017-07-28
[$500][598265] Low CVE-2017-15391: Extension limitation bypass in Extensions. Reported by João Lucas Melo Brasio (whitehathackers.com.br) on 2016-03-28
[$N/A][714401] Low CVE-2017-15392: Incorrect registry key handling in PlatformIntegration. Reported by Xiaoyin Liu (@general_nfs) on 2017-04-22
[$N/A][732751] Low CVE-2017-15393: Referrer leak in Devtools. Reported by Svyat Mitin on 2017-06-13
[$N/A][745580] Low CVE-2017-15394: URL spoofing in extensions UI. Reported by Sam @sudosammy on 2017-07-18
[$N/A][759457] Low CVE-2017-15395: Null pointer dereference in ImageCapture. Reported by Johannes Bergman (johberlvi@) on 2017-08-28
 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.
As usual, our ongoing internal security work was responsible for a wide range of fixes:
[775550] Various fixes from internal audits, fuzzing and other initiatives
Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.
 Interested in switching release channels? Find out how.  If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.
 Abdul Syed
Google Chrome

Print this item

  NordVPN Review | After Extended Use The PC Security Channel [TPSC] Published
Posted by: mrtrout - 10-18-2017 , 05:54 PM - Forum: Video Reviews - No Replies

You are not allowed to view links. Register or Login to view.     NordVPN Review | After Extended Use        The PC Security Channel [TPSC]
Published on 18 Oct 2017

My full review of NordVPN after extended use. (3 months)
My Affiliate Link: You are not allowed to view links. Register or Login to view....
Science & Technology
Standard YouTube Licence

Print this item