Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





 
  How to transfer your data from an old PC to a new PC
Posted by: tarekma7 - 3 hours ago - Forum: Guides, Tips & Tricks - Replies (3)

[Image: surface-pro-3-jez.jpg?itok=7aWn-zb1]

Quote:Take advantage of one of these five ways to move your data from an old PC.

Moving to a new Windows 10 PC is an exciting time — shiny new hardware and a snappy system are sitting there waiting to be used. The problem is that your familiar files are sitting on the old PC, and you don't want to start over entirely anew. To ease your transition between PCs, here are five ways you can transfer your data.

Use OneDrive to transfer your data
Use an external hard drive to transfer your data
Use a transfer cable to transfer your data
Use PCmover to transfer your data
Use Macrium Reflect to clone your hard drive

Read the full guide You are not allowed to view links. Register or Login to view.

Print this item

  CrazyTalk Animator 3 Pro Review and Giveaway
Posted by: tarekma7 - 4 hours ago - Forum: Official & Exclusive Promo2day Giveaways - No Replies

    [Image: FCVwd3e.png]    [Image: 5jpb4dl.png]

I would like to thank You are not allowed to view links. Register or Login to view. team for sponsoring this exclusive giveaway for Promo2day users

The giveaway will run from May 20 to June 15, 2018

[Image: HA9qUbA.png]

You are not allowed to view links. Register or Login to view. is the world's easiest 2D animation software that enables all levels of users to create professional 2D animations with the least amount of effort. With CTA3, anyone can instantly bring an image, logo, or prop to life by applying bouncy Elastic Motion effects, or one of many motion templates available. For the character part, CTA3 is built with 2D character templates, valuable motion libraries, a powerful 2D bone rig editor, facial puppets, and audio lip-syncing tools to give users unparalleled control when animating 2D talking characters for videos, web, games, apps, and presentations.

CrazyTalk Animator now provides a fully functional PSD in-and-out solution to not only help 2D Animators, but also Graphic Designers by saving lots of time on character creation and animated content development. Thanks to the round-trip PSD pipeline, Graphic Designers can bring their artwork to life, and animators can instantly edit their source animation files with Photoshop’s powerful editing features.

Homepage:
You are not allowed to view links. Register or Login to view.

Current version: v3.22.2426.1 

Release date: January 4th, 2018

Download link:

You are not allowed to view links. Register or Login to view.[url=https://www.reallusion.com/crazytalk-animator/download.html]You are not allowed to view links. Register or Login to view.

Pipeline version users need to login and download the complete resource pack from their member account.

Size:  657 Mb

System requirements:

Windows 10 /Windows 8 /Windows 7 (Both 32-bit and 64-bit operating system). Dual core CPU or higher, 2 GB RAM, 5 GB free HDD, Display Resolution of 1024 x 768, Graphics Card: Nvidia GeForce 8800 GT or higher /ATI Radeon HD 3850 or higher, 512MB RAM Video Memory

Additional Requirements:
3-button mouse, DirectX 9 and WMEncoder 9 are required for WMV exporting in x86 version of CrazyTalk Animator, Internet connection required for online activation. Stereo devices and player are required for viewing contents with stereo vision.

Purchase:

[Image: HYZoIh2.png]

You will need the program if you are in the following groups:

[Image: ocy9AxZ.png]

You are not allowed to view links. Register or Login to view.

PSD IMPORT AND EXPORT

As a graphic designer, you may be very familiar with working in Adobe Photoshop. But Photoshop, though very powerful, isn't good for everything—just try to animate something more advanced than a bouncing ball! Luckily, there are other programs you can use to animate a character created directly in Photoshop, so that you can design in the software meant for designing, and animate in the software meant for animating.


CrazyTalk Animator 3 now provides a fully functional PSD in-and-out solution to not only help 2D Animators, but also Graphic Designers by saving lots of time on character creation, photo animation and animated content development. Thanks to the round-trip PSD pipeline, Graphic Designers can bring their artwork to life, and animators can instantly edit their source Photoshop animation files with Photoshop’s powerful editing features.

Read the full review You are not allowed to view links. Register or Login to view.

We have 5 Licenses for CrazyTalk Animator 3 Pro, if you want to share; FOLLOW these simple rules:

Reply below about your favorite features and why you want to win a free license

Share with us your experience in using the program

Share the review and giveaway on your social media or other websites

Winners will be selected by Random.org

You have 2 days to claim your license after winner announcement 

Your claim must include name and e-mail address

Print this item

  CrazyTalk Animator Review
Posted by: tarekma7 - 5 hours ago - Forum: Written Reviews - Replies (3)

[Image: Uwk7UM6.png]


CrazyTalk Animator (CTA) is the world's easiest 2D animation software that enables all levels of users to create professional 2D animations with the least amount of effort. With CTA3, anyone can instantly bring an image, logo, or prop to life by applying bouncy Elastic Motion effects, or one of many motion templates available. For the character part, CTA3 is built with 2D character templates, valuable motion libraries, a powerful 2D bone rig editor, facial puppets, and audio lip-syncing tools to give users unparalleled control when animating 2D talking characters for videos, web, games, apps, and presentations.

CrazyTalk Animator now provides a fully functional PSD in-and-out solution to not only help 2D Animators, but also Graphic Designers by saving lots of time on character creation and animated content development. Thanks to the round-trip PSD pipeline, Graphic Designers can bring their artwork to life, and animators can instantly edit their source animation files with Photoshop’s powerful editing features.

Homepage:
You are not allowed to view links. Register or Login to view.

Current version: v3.22.2426.1

Release date: January 4th, 2018

Download link:

You are not allowed to view links. Register or Login to view.

Pipeline version users need to login and download the complete resource pack from their member account.

Size:  657 Mb

System requirements:

Windows 10 /Windows 8 /Windows 7 (Both 32-bit and 64-bit operating system). Dual core CPU or higher, 2 GB RAM, 5 GB free HDD, Display Resolution of 1024 x 768, Graphics Card: Nvidia GeForce 8800 GT or higher /ATI Radeon HD 3850 or higher, 512MB RAM Video Memory

Additional Requirements:

3-button mouse, DirectX 9 and WMEncoder 9 are required for WMV exporting in x86 version of CrazyTalk Animator, Internet connection required for online activation. Stereo devices and player are required for viewing contents with stereo vision.

Installation:

[Image: gMCqXod.gif]

This is very easy, just double click on the installer you have downloaded then follow simple on screen instructions till the program installation is complete

Installation of the resource Pack:

[Image: m5vFcyh.gif]

Free trial:

You will enjoy 15 days free trial of the pipeline version. G3 Character PSD Template for Trial Users:  G3 Character human template and 3 x fully functional PSD project are provided for trial users to test the CTA 3 PSD import & export feature.

Check for updates:

[Image: 6tAtVdS.png]

User Interface:

[Image: I1nfHPr.png]

[Image: N0KklMw.png]

[Image: S7PQrSq.png]

[Image: xUNkzIQ.png]

Menus:

[Image: nqMRksK.gif]

Purchase Options and compare editions:

The program is available in three editions; standard, Pro and Pipeline in addition to the trial version

You are not allowed to view links. Register or Login to view.

[Image: HYZoIh2.png]

Now let’s ask do you need the program?

The answer is yes if you are one of the following groups then you will need it

[Image: ocy9AxZ.png]

[Image: XEwIQZQ.png]

What are the Character types you need to know?

G1 (generation 1) characters can be found in CrazyTalk Animator Version 1 and are designed facing either front or side views (implied by the directions of the left feet of the character). There is no way to change the direction of this type of character in CTA Version 1. If you apply this type of characters to CTA v2 or above, then the character will be put into all 10 different slot angles.

G2 Characters with Multiple Angles: created by CTA Version 2 or above. It is designed to have 10 angles in order to have the character face to different direction when you turn the character. The thumbnails of this type of heads will be marked with G2 at the corner.

[Image: 8RgKQXn.jpg]

The G3 characters embedded in CTA v3.  They are built with fixed regulated bone structures and are divided into four categories; G3 Human, G3 Animals, G3 Spine, and G3 Wings.

Free Bone Character:

[Image: ybNMZy7.jpg]

These can be created with CTA 3, or above. It is built with free structures of bones and can be human or non-human.

Mix-match Composite Characters from Library:

By mixing up the bodies and heads from the Content library, you can create various types of characters that are suitable for your projects.

New features and changes:

You are not allowed to view links. Register or Login to view.

[Image: HA9qUbA.png]





Features:

Create 2D Characters:

With this one-for-all 2D animation software, anyone can easily turn any image into an animated character by using the free bone tools or character templates.

The 2D Bone Editor has all the tools to structure sophisticated bone rigs. Users can use pins to constrain areas to selected bones, and optimize subdivision topology for smoother bending effects.

The easiest way to create a 2D character is by simply aligning bones along an image shape.

[Image: 8pUavLH.png]

[Image: tR4fDQY.png]

When creating a complex humanoid sprite character, use the Mask Editor to cutout images into separate sprite layers. Change the sprite layer order in the Layer Manager to determine their display priority (e.g. move one hand in front or behind body). The Sprite Editor allows you to manage multiple sprites in a target body part such as; various hand gestures and mouth shapes for animation. You can easily import new image sprites, or replace existing sprites.

G3 Character Template:
 
[Image: sCkNcvS.png]

To save effort on custom bone-rigging and key frame animation, the app has full facial and body rigged character templates to allow users to utilize shared bones structures while enjoying a huge library of cartoon motions. There is a vast motion library for any designs so that you can directly drag motion to animate your character

[Image: cyHvmHV.png]

Custom Templates for Free Bone Actors:

Now you can create new bone structures for unique creature species, and allow them to share the same structured motion assets

Animated Accessory Systems:

[Image: mb6Y2DW.jpg]

With this powerful accessory system, you can apply a chosen item directly to the target body part like a hat to the head, or a watch to the arm. You can also freely compose an accessory using several prop items. This will enable you to use the Right-click menu to trigger animations from the selected accessory, or play them all together if they are under the same named group.

Quick Perform List:

Simply right-click to open the Action Menu for a entire list a frequently used Perform motions. The menu can contain voice, facial expressions, and body movements that can be custom designed by you.

[Image: KaHc37n.jpg]

Animate 2D Characters

Access to a vast professional motion library for humans, quadrupeds, winged and spinal creatures inside this 2D animation software. Discover a Timeline with IK/FK motion editing and sprite layer controls.

Animate body motions with up to 16 individual body segment tracks, with facial motion tracks that are divided into voice scripts, morphs and sprite-based categories. Loop or extend motion clips to repeat animation and control speed

Import 3D Animations for multi-dimensional characters: 3D motions contain data for multi-dimensional movements that can only be applied to multi-dimensional G2 characters. 3D motions make your 2D characters turn around and change angles by automatically switching and stretching their body sprites.

Human IK  3D Motion Editing: 3D motion control and universal skeleton lets users turn 2D characters in multiple angles, giving them total control over perspectives and 3D movements. You can manually move character limbs in a three-dimensional space, allowing you to use the Human IK system to drag and balance connecting limbs.

Curve-based Motion Key Editor for G3 Characters: FK and IK pose editing for all G3 bone-based characters. By combining pose keys with motion curves, you can instantly create professional cartoon animation results in seconds.

[Image: Am8qHIE.png]

Body Puppeteering: Use a mouse or any other handheld device to create a character's body animation. Simply select the body parts and puppet behavior, and control the animation as you playback or record in real-time.

Facial Puppeteering:





10 default profiles instantly define a character's facial animation.

Puppeteer with personality thanks to embedded profiles including; Dog, Cat, Horse, Elastic Folks, and other 5 human types.
Six emotion styles - neutral, delightful, sad, angry, happy, and surprised; each with advanced select and de-select layer editing capabilities. 

Facial Key Editor enhanced with Free Form Deformation:

Select individual or multiple facial features, and puppet their behaviors by dragging the mouse cursor around the editing area.
Full control over facial features, mouth openings, eye rolling, emotional expressions, and more.

Use sliders to precisely blend unique feature shapes from the Detailed Face Key Settings.

Audio Scrubbing:

Now you can hear the audio at the playhead position as you drag the playhead so that you can quickly find a particular sound in the audio file.

Audio Lip-syncing:

Import a WAV file or record your own voice with the built-in audio capture feature. Enjoy a vast phoneme databank that automatically lip-syncs to your image. Text-to-Speech offers better quality for all end-users, plus additional solutions for text-driven voice performances.

Animate Props

Key frame editing for opacity, transform, visibility, link, path animation, deformation, sprite switching, and flipping with blending effects.

PSD Import & Export:

[Image: CkhFI30.jpg]

With the launch of CrazyTalk Animator 3.2, character designers and Photoshop users will find their work process become five times faster than if they didn’t use the software. This is because they’ll have access to the software’s new PSD character modification and PSD graphic design tools.

CTA 3 now provides a fully functional PSD in-and-out solution to not only help 2D Animators, but also Graphic Designers by saving lots of time on character creation, photo animation and animated content development. Thanks to the round-trip PSD pipeline, Graphic Designers can bring their artwork to life, and animators can instantly edit their source Photoshop animation files with Photoshop’s powerful editing features.

With the CrazyTalk Animator 3.2 Pipeline; you can convert your 2D artworks or photos to G3 Characters through PSD Templates. This will allow you to easily auto-rig your new characters from PSD files for easy avatar and Photoshop animation, thanks to hundreds of professional motion libraries.

Turn Animations into Graphic Illustrations: With the PSD export capabilities, CTA3 is now your go-to animation tool that helps you freely pose illustrated characters, quickly swap outfits & accessories, and create custom facial expressions. After combing all your custom creations, you can then export them in layers for re-editing and compositing - saving you lots of effort and time for comic creations, magazine covers, infographics, banner designs, and much much more.

Customize your own graphic design: Send props or characters to Photoshop in PSD layers for further custom editing. You can prepare your character, use photoshop tools for image editing and graphics design, create facial expressions and animate it

[video=youtube]You are not allowed to view links. Register or Login to view.[/video]

Quickly Create Animated Content

With the capability to launch Photoshop and synchronize updates, CTA3 can send props or characters to Photoshop in layers for further custom editing. You can easily design clothes, alter color shading, or apply filter effects to your animatable assets.
Once you setup one character, then you can quickly add new assets in Photoshop to generate abundant styles. These assets can be reused, and characters are free to posed and animated.

Compatible Tools

The PSD import feature is compatible with popular graphic tools that support full PSD compatibility for layering, grouping, aligning, and masking.

[Image: BcnGJtO.png]

How to Create an Animated Character with Photoshop and CrazyTalk Animator 3?

As a graphic designer, you may be very familiar with working in Adobe Photoshop. But Photoshop, though very powerful, isn't good for everything—just try to animate something more advanced than a bouncing ball! Luckily, there are other programs you can use to animate a character created directly in Photoshop, so that you can design in the software meant for designing, and animate in the software meant for animating.

This tutorial will show you how to use CTA 3, to animate a character created in Photoshop. You need to know how to prepare the character for editing, how to add the bones, import it to CTA, and then how to animate its body and facial features using both simple and advanced techniques.

You can read more information about this here:

You are not allowed to view links. Register or Login to view.

Production Environment:

COMPLETE 2D ANIMATION ENVIRONMENT:

Categorized movie elements: Actor, Animation, Scene, Prop Dynamics, and Special Effects.
In-screen object editing Gizmo (select, transform, opacity, link, flip) and Navigation (camera zoom, pan, rotate) tools.
Two Editing Engines: Composer Mode for character and prop setup, and Stage Mode for animation editing.
Timeline editor for sequencing animation control.

Content Management System:

Full editing environment for Actor, Animation, Scene and Special Effects; each with its corresponding content libraries.
Drag and drop stage compositing.
Drag to replace existing motion clips, or drop directly to timeline destination.

3D Camera System

Use the Preview Camera to review scenes, and the Live Camera to animate camera positions with key frames.
Customize camera views with pan, rotate, and zoom tools.
Quickly switch between Perspective and Orthographic views for a 2D or 3D sensations.
Navigate scenes in Perspective mode to experience realistic 3D camera movements.





Smoothly Animate Along a Path

Create path anchors in different time frames for character and object motions.
Customize path anchors with position adjustments and speed control.
Freely control facing, and fade In/Out by using the Flip and Transparency features.
Attach and move subsidiary elements with the Link/Unlink features.

Prepare your Scene with the Safe Zone

Quickly adjust your project’s output size/fram
e and aspect ratio before rendering and final export.
Easily manage presence, and movements of characters and props.
Current frame render button helps users instantly preview their output quality settings.

Render Style for Vector-based Content

Instantly change scene styles to match different project scenarios.
Find various color profiles and quickly change color groups to match the tone of the environment.
Apply render style to multiple selections at once.

Multiple-track Selection and Editing

Select an object and its subsidiary tracks for fast group editing.
Copy & paste, Time Shift, and Time Scale adjustment over multiple element tracks.

Simulate Cartoon Physics with Motion Curves

[Image: NM4Dw97.jpg]

Create cartoon-style animations by applying Transition Curves to Transform Keys, and Time Warp to Motion Clips.
Simulate real-world physics like slowing down, speeding up, free falling, bouncing, floating, or accelerating a linear motion clip.

Create 2D Talking Heads:

 [Image: LSWFtOu.png]

Enhanced Sprite-based Head System for Talking Character:

The Generation 3 (G3) head system can finally be applied to both human and animals. It allows you to do much more with fewer sprites. The FFD tool (Free-Form Deformation) gives smooth transitions between expressions, and the Transform tool provides continuous sprite movement.

Multi-angle 2D Head System:

[Image: MZObFcV.png]

The Generation 2 (G2) Head is made by 10 angle heads. You can customize them with unique personalities from a ton of facial templates, using fully interchangeable facial parts to set up a character. G2+ has further enhanced G2 heads, giving smoother animated results by using Free Form Deformation between expressions, requiring a minimal amount of sprites.

Basic Sprite-Based 2D Head System (Single Angle):

G1 head systems are composed of different facial features. These features are Eyes, Eyebrows, Face, Mouth, Ear, Nose and Hair, there are a full list of variants for mouth and eyes so that your character can blink and talk. You can also adjust position, and size of each feature.

Morph-based Head System:

With the classical CrazyTalk face-fitting technology, Morph-based characters are created from 2D photos, allowing users to create smooth facial animations and talking expressions by morphing the images.

[Image: 59OpWTh.png]

Add a Face and Make Them Talk:

Turn any photo, sketch, or image into talking character. Put Lips on any object to employ the lip-sync talking animation feature. Create hybrid actors by combining morph-based heads with vector-based cartoon bodies.

Project settings:

[Image: fdnnAka.png]

Preferences:

[Image: LXsxIvH.png]

To get started with your FIRST Project:





Important Links for you:

Tutorial resources:
You are not allowed to view links. Register or Login to view.

For full tutorial list of videos:
You are not allowed to view links. Register or Login to view.

Online manual:
You are not allowed to view links. Register or Login to view.

Import PSD files to create cartoon characters:
You are not allowed to view links. Register or Login to view.

Export PSD for character illustration and photoshop creation:
You are not allowed to view links. Register or Login to view.

A COMPLETE STEP-BY-STEP COURSE FOR CREATING 2D ANIMATIONS:
You are not allowed to view links. Register or Login to view.

Support home:
You are not allowed to view links. Register or Login to view.

Bonus content:
You are not allowed to view links. Register or Login to view.

Pros:

The best 2d animations software
Suitable for all user levels
2D character templates,
Valuable motion libraries,
Powerful 2D bone rig editor
Facial puppets, and audio lip-syncing tools
And many more

Cons:

The program is expensive and needs training before starting to use specially if you are a new user

Conclusion:

CrazyTalk Animator 3 is a professional animation software that made it easy to create your own characters. You will be able to import in your custom design via a Photoshop PSD file. The program has an intuitive and powerful character animation tools for the face and the body. You will have yourself an excellent production pipeline to bring your character designs to life in no time at all. You will enjoy and have a lot of fun

Print this item

  CyberGhost Refer a friend program
Posted by: Mike - 5 hours ago - Forum: Hot Deals & Discounts - No Replies

The Best Ghostie program enables you to safeguard up to 3 of your best buddies’ online privacy. In exchange, you’ll each be rewarded with 30 free days of CyberGhost!

I have 3 invites if anyone has plans on buying a subscription.
Get 30-days premium extra by using my link to buy a subscription!

You are not allowed to view links. Register or Login to view.

You are not allowed to view links. Register or Login to view.

You are not allowed to view links. Register or Login to view.

Print this item

  Sophos Home Premium
Posted by: Mike - 6 hours ago - Forum: Affiliate Software Sales - No Replies

Business-grade cybersecurity. Now available for home users.


Why include a trial of Premium? 

Premium includes Advanced Malware Removal, so it’ll thoroughly clean your computer of any current malware Infections, plus a host of advanced protection technologies. After trial, you will automatically revert to the Free features unless you choose to upgrade to Premium.



Comparison of Sophos Home Free and Sophos Home Premium You are not allowed to view links. Register or Login to view.

Get your 30 day Free trial license You are not allowed to view links. Register or Login to view.

Get 20% off your license from our Promo2day purchase link:
 You are not allowed to view links. Register or Login to view.

Print this item

  Traktion T6 DAW for free
Posted by: longin - 9 hours ago - Forum: Freeware - Replies (1)


THE WORLD'S BEST, FULLY FEATURED, COMPLETELY UNLIMITED FREE DAW FOR ALL MUSIC CREATORS


[Image: bgymcXt.png]
This is no ‘Lite’ version, we do not impose track limits, plugin limitations or other such constraints commonly found in other low cost offerings. Why? – we think you will enjoy using the app so much, you will discover the value in investing in our latest versions and the expanded features we are voraciously adding. Innovation and creativity is what drives us – join the ride today and download T6 for Mac, Windows, or Linux operating systems.

 

PERFECT APP TO START RECORDING YOUR MUSIC
Like all Tracktion DAW applications, T6 features an intuitive, single-screen interface. Input, waveform and mixer – including EQ, level, pan and plugins – are laid out from left-to-right. Simply drag-and-drop additional features and automation on any track as needed. Unlimited numbers of audio and MIDI tracks, combined with a professional feature set, allow you to compose, record, edit, mix and share your music with ease. Modest CPU requirements make T6 ideal for use on nearly any Mac, Windows or Linux computer 

You are not allowed to view links. Register or Login to view.

download:
You are not allowed to view links. Register or Login to view.
You just need to create an account with an email address and a password then when you install the program and run it you will see that it says it is a demo version but if you click on Unlock you can enter the email address and password you created your account with and it removes any limits.

Print this item

  Comodo Cybersecurity to Showcase Innovative Platform that Renders Attacks Useless
Posted by: mrtrout - Yesterday, 11:33 PM - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.      Comodo Cybersecurity to Showcase Innovative Platform that Renders Attacks Useless at Gartner Security and Risk Management Summit 2018
GARTNER SECURITY AND RISK SUMMIT – June 2018 – Comodo Cybersecurity, a global innovator of cybersecurity solutions and a division of Comodo Security Solutions Inc., will showcase its integrated platform – which renders attacks useless across the LAN, Web and Cloud – at the Gartner Security & Risk Summit, June 4-7, 2018 in National Harbor, MD. As a premier sponsor of the event, Comodo Cybersecurity will demonstrate a range of capabilities that help protect against even the most sophisticated cyber threats, including zero day attacks.

Comodo Cybersecurity’s presence at the event includes:

In-booth technology demonstrations: At booth 543, Comodo Cybersecurity will demonstrate capabilities across the Comodo ONE platform, including endpoint security; managed detection and response; secure cloud and internet access; and threat intelligence.
Mission Impossible inspired hospitality suite: On Tuesday, June 5, 2018 from 5:30 – 8:30 pm EST, Comodo Cybersecurity will host a MISSION: IMPOSSIBLE inspired hospitality suite. Guests will have an opportunity to participate in a fully immersive virtual reality game, becoming Mission Impossible agents taken on a sky-high assignment against attacks, suspended from a helicopter.

Additionally, Comodo Cybersecurity’s Senior Research Scientist and cyberwar expert, Kenneth Geers is presenting: “World Map of Malware: The Geography of Hostile Code” on Thursday, June 7, 2018 at 9:15 am. Geers will analyze the relationship between geopolitical events and the world’s hottest cyber-attack zones; as well as offer insight into how cyber defenders benefit from spending more time on strategic cyber defense analysis, and retain actionable tactical intelligence for cybersecurity specialists. The session draws on data from Comodo Cybersecurity’s Threat Intelligence team’s analysis of 300 million malware incidents during the first five months of 2018.

To kick-off the summit, you can join Comodo Cybersecurity at their booth #543 during the Welcome Reception on Monday, June 4th at 5:45pm for the following experience

Meet the firm’s team of experts
Mingle with cybersecurity personnel
Scan your badge for a chance to win a Segway during their giveaway

About Comodo Cybersecurity

In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers globally. For more information, visit comodo.com or our blog. You can also follow us on Twitter (@ComodoDesktop) or LinkedIn.

Contact:
Montner Tech PR
Deb Montner, dmontner@montner.com
203-226-9290

Print this item

  CPix 1.7.4 A compact and fast photo viewer
Posted by: mrtrout - Yesterday, 08:23 PM - Forum: Freeware - No Replies

You are not allowed to view links. Register or Login to view.     CPix - A compact and fast photo viewer that supports MPO, encryption, format conversion, resizing and more
 Features

View images in popular formats: JPEG, GIF, PNG, TIFF, BMP, WBMP.
MPO(a Multi-Picture file format): View, Create from JPEG files, Extract JPEG files from MPO file.
EJPG(the Encrypted JPEG file format): View, Convert to and from JPEG files.
DualPhoto(a file format that contains two JPEG images in a single file, the 2nd image is encrypted): View, Create from JPEG files, Extract the 2nd image, Remove the 2nd image.
PL(the Photo List file format): View, Create from JPEG files, Extract JPEG files from PL file.
EMPO(the Encrypted MPO): View, Convert to and from MPO.
EPL(the Encrypted PL): View, Create from JPEG files, Extract JPEG files from EPL file.
Format Conversion: GIF/PNG/TIFF/BMP/WBMP to JPEG (All frames of GIF/TIFF are saved).
Format Conversion: GIF/TIFF to PNG (All frames are saved).
Format Conversion: Create multi-frame TIFF from BMP/JPEG/PNG files.
Image Resizing: JPEG, BMP, PNG.
Photo orientation (JPEG/TIFF) is supported in loading and format conversion.
Background color: you can either select one of the predefined colors or select your own favorite color.
Auto-play: you can let multi-frame images (TIFF/MPO/EMPO/PL/EPL) play animations automatically or not.
Animation speed: animation speed of multi-frame images (GIF/TIFF/MPO/EMPO/PL/EPL) can be changed.
View images with effects: eg. you can increase brightness of the image to view dark regions of the image more clearly, or you can view it in warm/cold color, etc.
Maximal memory: you can set maximal memory used by this program.
Switch directory: you can switch images in sibling directories.
Frame by frame viewing: you can view multi-frame images (GIF/TIFF/MPO/EMPO/PL/EPL) frame by frame.
Lock display region: this can be very useful when you compare two images of the same size.
Rotate or flip the image without affecting the image file.
Image order: by file name, file format, file size or last modification date and time.
 Free download for Windows (Version 1.7.4, Last update: 5/19/2018)

Download  : 100% Scanned Malware Free & Clean With Avast Free Antivirus & Not Digitally Signed

Print this item

  SoftMaker FreeOffice 2018
Posted by: longin - Yesterday, 09:04 AM - Forum: Freeware - No Replies

SoftMaker FreeOffice 2018

[Image: deQHRIx.png]

Get FreeOffice and FlexiPDF Basic now.
They are free for home and business use.

You are not allowed to view links. Register or Login to view.

Print this item

  WizFile 1.06 (19 May 2018) Released & Portable version
Posted by: mrtrout - Yesterday, 01:47 AM - Forum: Freeware - Replies (1)

You are not allowed to view links. Register or Login to view.       Features 
Find files by name on your hard drives almost instantly
VERY Fast scanning! WizFile reads the master file table (MFT) directly from NTFS formatted hard drives so it's ready for use very quickly after start up.
Search by file name or full path name
Multiple search terms supported
Wild card file search (* and ? wild cards supported)
Monitors for file changes while active - your visible file search results will always be up to date
Keeps track of folder sizes - any changes made to the file system will automatically update the folder sizes
Does not require a separate database file - all file data is kept in memory      What's new?
WizFile 1.06 (19 May 2018)
Donate button would not disappear the first time after entering in a supporter code (required PC to be restarted) - fixed.  :  Trusted ( Digital Signature)  Digital Signature: ( Antibody Software Limited)  100% Scanned Malware Free & Clean With Kaspersky Total Security Both The Standard Exe & Portable Version were both Scanned Malware Free & Clean With Kaspersky Total Security & Both Are Digitally Signed By The Software Vendor Too

Print this item

  Google Chrome to Remove “Secure” Indicator From HTTPS Pages in September
Posted by: tarekma7 - Yesterday, 12:28 AM - Forum: Security News - No Replies

[Image: GoogleChrome68.png]



Quote:Google announced earlier today plans to drop the "Secure" indicator from the Chrome URL address bar and only show a lock icon when the user is navigating to an HTTPS-secured website.

The move is scheduled to take effect with the release of Chrome 69, scheduled for September, this year.

Emily Schechter, Product Manager for Chrome Security, said the company is now comfortable making this move as a large chunk of Chrome's traffic is now via HTTPS.

Since most traffic is HTTPS anyway, it's not necessary to draw the user's attention to the "Secure" indicator anymore.

Instead, Chrome will focus on highlighting situations when the user is accessing an insecure HTTP website. That's why, Google will be marking all HTTP sites as "Not Secure" starting with Chrome 68, set for release in July.


Furthermore, Google plans to improve the "Not Secure" indicator in Chrome 70 with the addition of an animation that turns the "Not Secure" text to red whenever the user is entering data inside a form on an HTTP site.

These updates are part of a plan that Google references as "HTTPS 100%" that aims to have all sites loaded in Chrome via HTTPS.

"We hope these changes continue to pave the way for a web that’s easy to use safely, by default," Schechter said. "HTTPS is cheaper and easier than ever before, and unlocks powerful capabilities -- so don’t wait to migrate to HTTPS!"

You are not allowed to view links. Register or Login to view.

Print this item

  The Facebook Android App Is Asking for Superuser Privileges and Users Are Freaking Ou
Posted by: tarekma7 - Yesterday, 12:26 AM - Forum: Security News - No Replies

[Image: Facebook-su.jpg]


Quote:The Facebook Android app is asking for superuser permissions, and a bunch of users are freaking out about granting the Facebook app full access to their device, an understandable reaction following the fallout from the Cambridge Analytica privacy scandal.

"Grants full access to your device," read the prompts while asking users for superuser permissions.

Prompts originate from the official Facebook app
These popups originate from the official Facebook Android app (com.facebook.katana)" and are started appearing last night [UTC timezone], continuing throughout the day.

Panicked users took to social media, Reddit, and Android-themed forums to share screengrabs of these suspicious popups and ask for advise or what's going on


This is not the first time that the Facebook app has requested superuser permissions. Facebook users reported similar superuser request prompts on May 8, albeit that event wasn't as widespread as the one today.

Users reported seeing the first wave of superuser request dialogs with the Facebook Android app 172.0.0.12.93, while today's second wave appears to have been triggered with v172.0.0.66.93, based on user reports.

Bleeping Computer has reached out to a Facebook spokesperson to clarify why users are seeing these popups today, but we have not received a reply before this article's publication.

Most likely a coding error
Several Android security researchers who spoke with Bleeping Computer suspect the popups are appearing because of a coding error.

Avast mobile security researcher Nikolaos Chrysaidos has taken a look at the Facebook app's source code and believes the offending party is an SDK (software development kit) embedded in the Facebook app.

The package that appears to be triggering the superuser popup is the WhiteOps SDK, a software development kit for detecting ad fraud and implementing domain white/black-lists.

"Yes, it could be a coding error. Most possible yes," Chrysaidos told Bleeping Computer in a private conversation today. "The dialog started popping up on users that are in the beta channel."

"Along with other various checks. Facebook is probably integrating WhiteOps SDK, and they forgot to re-implement the ROOT checking functionality," Chrysaidos says.

If there was a time for Facebook developers to screw up their code, this is about the worst time to do so. With all the privacy implications of the Cambridge Analytica scandal, users are now piling up new paranoid accusations with every new angry tweet and forum reply, blaming the social network of new nefarious spying attempts.

You are not allowed to view links. Register or Login to view.

Print this item

  What is VPN? A short introduction plus test
Posted by: tarekma7 - Yesterday, 12:15 AM - Forum: Guides, Tips & Tricks - Replies (2)

[Image: VPN_1.jpg]



Quote:The term "VPN" frequently shows up on the Internet. This technology is old hat for some and a mystery to others. Read on to learn what VPN means and what it looks like in practice.

The idea behind VPN
Even back in the Middle Ages, people knew that, to get from A to B unseen, a tunnel was a good choice. The idea behind VPN (virtual private network) is quite similar: create a tunnel, i.e. an encrypted connection between two PCs. Whether you're working from home and connecting to an office machine or to a server that is acting as a gateway to the Internet makes no difference. I will focus on the latter case: accessing the Internet through a VPN service provider. This requires dedicated software on both machines. Your advantage: the connection is bugproof and the Internet doesn't see your machine but the VPN server only. Not only does this offer great protection against hackers but also nosy governments and data collectors that would otherwise gather every bit of information they can about you. Any attempt to trace the connection back to you ends at the VPN server. You're invisible to the web even when you're on a public WLAN in a café or hotel and, since the VPN software adds an additional encryption layer, public WLAN providers won't be able to see any of your data.


Other use cases
VPN is also ideal to get around geoblocking, i.e. access restrictions based upon a user's geographical location. If you wanted to watch your favorite show from abroad or, in my case, a series in the original language, chances are you'll see the dreaded "This video is not available in your country" message because you're outside the required region. Circumventing this restriction is possible with VPN but you'll likely violate the content provider's terms of use who, in the case of streaming portals, might even suspend your account as a result. Such cases are rare though and, to my knowledge, no legal action has been taken to date. Another thing to consider is that many countries sanction media consumption based on ideology and, naturally, local restrictions are also perfectly circumventable through VPN - provided that VPN itself hasn't already been outlawed.

How to spot decent VPN providers
Good providers offer Onion routing (see my article on the TOR network) on top of the regular encrypted connection and send traffic back and forth between multiple encrypted servers for maximum anonymity - but without the notoriously slow speeds TOR is known for. The location of the service provider also plays a role since some countries like the US require providers to hand out all connection data if requested by law enforcement while others generally prohibit connection logging to protect the privacy of their citizens. So it's worth taking a closer look at the provider's location and the associated privacy policies. Some providers even offer a kill switch and will immediately terminate the Internet connection should the VPN service fail instead of letting users continue browsing without protection unknowingly. It all comes down to the price-performance-ratio. While Internet quotas used to be common place, most providers now also offer flatrate plans. If you're interested, check out the many online reviews for details.

How to set up a VPN
To describe the procedure in depth, I will test a VPN provider for you including registration, software installation and general use. Nord VPN has become something of a shooting star recently and the company is undertaking huge financial investments to gain a firm foothold in the market making it the perfect test candidate for me. As always, I do not get paid neither in cash nor free VPN access for my review - I prefer to stay neutral. The first thing I did was to visit the Nord VPN website and register a new account which only took me a minute. I then selected a monthly subscription for $11.95 which is not particularly cheap. There are other subscription models available which bring down the cost significantly depending on their duration. It's refreshing how little information Nord VPN required during the registration. An email address, a password and a payment method (direct debit, PayPal or anonymously through cryptocurrencies) was all it took. Once I purchased my monthly license, I received an email with further instructions.


The software
A dedicated software is required on each device (PC, cellphone, tablet) to establish the VPN connection. Nord VPN's license supports up to 6 devices with unlimited data plans. The Windows version installed quickly and provided me with a minimalistic login window with email address and password fields. Once entered, I was presented with a world map that displayed all Nord VPN server locations - and there were a lot. Costa Rica, Russia, United States, Argentina or England are just a few of the supported locations with a total of over 4000 servers in 62 countries. Though you are free to select an individual list of locations acceptable to you, by default, the program selects the one with the lowest network load for speed reasons.

Additional security on demand
General settings include the usual suspects like "Launch with Windows" or "Connect automatically". Users can further adjust their machines' visibility in their local networks and the level of notifications - no special computer knowledge required here. The "CyberSec" feature piqued my curiosity and I had to give it a go. Apparently, it's an all-in-one ad-blocker and anti-malware solution that, alas, lacks more in-depth details. I want to know more about a product before I start using it! Since many sites seemed allergic to CyberSec anyway (they were either glitchy or didn't display at all), I disabled the feature and relied on my own security software instead.

Speed check and further tests
I connected to a US server to run a speed benchmark. I had determined my home Internet connection speed to be 48 Mbit beforehand - and, initially, that didn't change at all with the VPN connection. Only my ping (response time) was fairly slower which won't affect normal web browsing but could be a no-go for online gamers especially with action games. Later on, I noticed occasional lags (the server in Azerbaijan is obviously a C64) but there were always faster alternatives I could switch to. I had a few disconnects but restarting the program took care of that. In conclusion, my experience was somewhat smooth but not perfect. I also watched a few online videos usually inaccessible with a German IP address and they worked flawlessly. Finally, I visited a few websites that specialize in obtaining as much information about their visitors as possible to point out security issues. All they reported was my (then) Indian IP and not much else, just as I had hoped.


A message from Microsoft and Google
Shortly thereafter, I received an email from Microsoft with the subject "Unusual login activity". Microsoft obviously detected that I logged in from another country and wanted to make sure it was me and not some hacker. Google also checked my identity the next time I logged into their services which is somewhat reassuring. Hacker's from other countries would have a hard time posing as me with these security checks in place. Browsing the web also felt less restricted under the cover of anonymity. I have absolutely no plans to do anything illegal online (I'm too old for that) but I like the thought of moving freely through the web without having to worry about my activities being tracked and logged - as long as I don't log into a particular user account! Nord VPN doesn't log my past website visits because they simply don't care. And since the company is located in Panama, strict rules as present in so many countries nowadays probably don't apply to them.

Conclusion
VPN has certainly grown on me! The knowledge alone that my surfing habits are no longer being tracked, logged and analyzed is a genuine comfort. So far (this is day number seven of my test), I haven't broken any laws and I don't plan to. Being able to move through the web with a new IP, watch content from various countries unfettered and stop worrying about hacking is sheer bliss. I'll likely keep using VPN, if not necessarily from the same provider. Star ZenMate, CyberGhost, Express VPN and Avira are next on my list, provided VPNs remain legal, of course. If you believe the online rumors, efforts are under way in many countries to (mostly) put an end to or even outlaw anonymous Internet use - someone seems to be scared of online anonymity!
You are not allowed to view links. Register or Login to view.

Print this item

  How to Secure your PC after a Fresh Windows Installation [Updated 2018]
Posted by: tarekma7 - Yesterday, 12:12 AM - Forum: Guides, Tips & Tricks - No Replies

[Image: Windows-updates-settings.png]



Quote:11 security measures you need to take after a fresh Windows installation

You chose to install Windows operating system on your computer or, maybe, for various technical reasons, you had to reinstall it. No matter your reasons, it’s important to keep in mind various security layers after this procedure, so your computer is safe from threats.

How to secure your PC after a fresh Windows installation
After finishing the Windows installation, whether it’s Windows 7, 10 or another operating system, we encourage you to follow these security measures below to enhance protection:

1. Keep your Windows operating system up to date
Probably the most important step to do is checking for the latest security updates and patches available for your Windows operating system.

To get the security updates automatically, go to “Control Panel” and check if your automatic updating system is enabled or follow these steps:

Access the search box in your Windows operating system, type Windows Update.
Select Advanced options.
Click on Automatically download updates in case it is not already selected/turned on.
After checking for available updates for your Windows operating system, keep the automatic update turned on in order to download and install the important updates that can help protect your PC against new viruses or next-generation malware.

Always remember to keep your OS up to date with the latest security available. Software patching remains an essential key to improve online safety and security experts make a good case of emphasizing its importance. Cybercriminals still try to benefit from security holes found in users’ systems and PCs. That’s one of the reasons why cyber attacks still work and they make a lot of money of it.


2. Update your software
You don’t have to update only the Windows operating system, but your software as well. Therefore, make sure all the latest updates and security patches for your main programs and apps are installed.

Needless to say that most popular pieces of software (such as Java, Adobe Flash, Adobe Shockwave, Adobe Acrobat Reader), especially the outdated ones, are always under threat from malicious actors who exploit them to get easier access to your sensitive data.

Since these pieces of software are always under threat from criminal minds, don’t just rely on your memory to manually update every program or application you have installed.

A better option would be to start using a dedicated cyber security solution for you and keep your software program up to date.

3. Create a restore point
If you already installed the security updates for Windows OS, the next step recommended is to create a restore point in Windows.

You can do this by clicking on the Start button, then select Control Panel -> System and Maintenance (or System and Security) -> System. Then select System protection and click the Create button.

After installing Windows, you can create the Restore Point and name it Clean installation, and continue installing drivers and applications.

If one of the drivers causes issues on the system, you can always go back to the Clean installation restore point.

Read the full guide You are not allowed to view links. Register or Login to view.

Print this item

  PortableApps.com Platform 15.0.2 Released
Posted by: mrtrout - 05-18-2018 , 11:18 PM - Forum: Freeware - Replies (1)

You are not allowed to view links. Register or Login to view.       PortableApps.com Platform 15.0.2: Quick fixes for the big 15.0 release
John T. Haller's picture Submitted by John T. Haller on May 18, 2018 - 3:34pm
PortableApps.com is proud to announce the PortableApps.com Platform 15.0.2 release. This new version adds some quick fixes to the platform eject, adds long touch right click, and adds support for Vista's unofficial TLS update. The 15.0 release added .NET apps, high DPI display support, better support for app downloads with TLS 1.1/1.2 encrypted hosting, high contrast theme detection, swipe scrolling of the app list, locale updates, and lots of bug fixes and features. Read on for all the details...(permalink)

Existing Platform users can automatically update by clicking Help - Check for Updates.  :  You are not allowed to view links. Register or Login to view.     PortableApps.com Platform Changelog
Each release of the PortableApps.com Platform includes bug fixes and new features. They are detailed below.

15.0.2 [2018-05-17]
ADDED: Detection of unofficial Vista TLS update
FIXED: Long touch right-click support in app list
FIXED: Eject failing to eject drive  :   You are not allowed to view links. Register or Login to view.      Download The PortableApps.com Platform 15.0.2!
your computer, without the computer™
The PortableApps.com Platform™ is a full-featured portable software system that ties all your portable apps together and lets you build your own custom portable app suite for use in your synced cloud folder, on your local PC, or on a portable USB drive.

Awesome Features: Complete App Store | App Organization
Automatic Software Updates | Themes and Customization
Portable Fonts | Integrated Backup and Restore | And More!

The PortableApps.com Platform is 100% Free. Free to use. Free to share. And fully open source.    Download from DuckDuckGo
Version 15.0.2 for Windows, 55 Languages
5MB download / 12MB installed      Operating Systems: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP
Also Works With: Linux, Unix, BSD, etc via Wine & Mac OS X via CrossOver, Wineskin, WineBottler, PlayOnMac
32-bit and 64-bit Support: Automatically adjusts support and performance to each PC
Publisher: PortableApps.com
Date Updated: 2018-05-17 (Platform Changelog)
License: Free / Open Source (GPL, some MIT, some CC images, trademarks and trade dress not included)
Source Code: PortableApps.com Platform (Menu, App Store, etc)
MD5 Hash: c02fc058be0e9985cc56aa4073a207af
Downloads: over 26 million  : 100% Scanned Malware Free & Clean With Kaspersky Total Security & Application : PortableApps.com Platform  Vendor : PortableApps.com   Trusted ( Kaspersky Security Network) Fewer than 100 Kaspersky Security Network users have used this application     Digital  Signature: ( Rare Ideas, LLC)

Print this item

  CryptoMiner, WinstarNssmMiner, Has Made a Fortune By Brutally Hijacking Computers
Posted by: mrtrout - 05-18-2018 , 05:26 PM - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.      CryptoMiner, WinstarNssmMiner, Has Made a Fortune By Brutally Hijacking Computers
May 16, 2018360TS

Recently, 360 Security Center has found that a new CryptoMiner is spreading fast. The distributor has made tremendous profit via mining Monero on infected computers. According to our statistics, 360 Total Security has intercepted its attack over 500 thousands times in 3 days. Our analyst has named it “WinstarNssmMiner.” This malware is very hard to remove since victims’ computers crash as soon as they found and terminate the malware. Interestingly, this malware is acting snobbish when facing different antivirus software. It turns off antivirus protection of defenseless foes and backs off when facing sharp swords. As a result, users without a decent antivirus product have to live with the slowness and the blue screens of their computers.



Analysis
We’re quite surprised to see a CryptoMiner being so brutal to hijack victims’ computers by adopting techniques of stubborn malware:
1. Launch a system process, svchost.exe, and inject malicious code into it.
2. Set spawned process’ attribute to CriticalProcess.
3. Computers crash when their owners terminate the malware.

After getting into victims’ computers, this malware attempts to locate any decent antivirus software, Such as Kaspersky, Avast. If any found, this malware will quit automatically to avoid direct confrontation.


Figure 1: How this malware avoid antivirus software.

Then, this malware injecting the code to svchost.exe it created. There are actually two svchost.exe processes created. One performs the mining tasks. The other runs in the background for sensing the antivirus protection and avoiding detection.


Figure 2: It creates two processes

Though WinstarNssmMiner has the ability to deceive antivirus software. It’s in its nature still a CryptorMiner and its implementation is based on the open source project, XMRIG. It comes with four ming pool and  is able to determine mining pool based on the parameters passed to it.


Figure 3: Addresses of mining pools

At the time we published this analysis, this CryptoMiner has already acquired 133 Monero which is approximately equivalent to 28 thousands US dollars.



Figure 4: The profit earned

Due to the nature of digital currency mining, CryptoMiners use up victims’ processing power for the sake of their distributors. Some savvy users are able to identify and terminate the CPU consuming applications. Hence, WinstarNssmMiner protects itself by configuring its ming process’s attribute to CriticalProcess so infected computers crash when users terminate it.

Relevant file hash in MD5
184001cbd326cb3c03987c350c3ada6a
cf3e0eaf26c74db2bb5f8ba7e2607e2f
0be8a2b5f8a2fc9ad74d8ab9fcf5f583

Reminder
Recently, we have found that a lot of CryptoMiner malware are actively spreading in the wild. We strongly recommend users to enable antivirus software while installing new applications. Users are also recommended to run virus scan with 360 Total Security to avoid falling victim to CryptoMiner.

Print this item

  Auslogics Disk Defrag Pro 4.9.1.0 Released
Posted by: mrtrout - 05-18-2018 , 12:35 AM - Forum: Paid - No Replies

100% Scanned Malware Free & Clean With kaspersky Total Security & Application: Auslogics Disk Defrag Professional Installation File  Vendor Auslogics  Trusted ( Digital Signature) Fewer than 100 Kaspersky Security Network users have used this application. Digital Signature: ( Auslogics Labs Pty Ltd)  :   You are not allowed to view links. Register or Login to view.      Auslogics
Disk Defrag Pro
Get your drives optimized for top speed and maximum efficiency with this powerful program's smart algorithms and boot-time defrag technology.
DOWNLOAD NOW
Compatible with
Win XP, Vista, 7, 8.1, 10
Latest ver. 4.9.1.0 (05/17/2018)
Total downloads: over 4 million         Auslogics Disk Defrag Pro - Version History
4.9.1.0
Resolved a few task scheduler issues.
Fixed all known bugs.

Print this item

  Hackers Combine Microsoft, Adobe Flaws in Devastating Windows Exploit
Posted by: mrtrout - 05-16-2018 , 09:52 PM - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.        Hackers Combine Microsoft, Adobe Flaws in Devastating Windows Exploit
Vulnerabilities already fixed by both companies this month
May 16, 2018 09:54 GMT  ·  By Bogdan Popa ·  Share:      
Two different vulnerabilities in Microsoft and Adobe software were used by hackers in a combined exploit targeting Windows systems before eventually being addressed by both companies in their patching cycles earlier this month.

Security vendor ESET says in an in-depth analysis that it discovered a malicious PDF on a public mirror that was supposed to be used for launching attacks against Windows hosts. The document included JavaScript code and a crafted JPEG2000 image to take advantage of vulnerability CVE-2018-4990 in Adobe Reader.

Successfully exploiting the remote-code execution flaw in this application would have provided attackers with rights ro read and write in memory.

In order to break the sandbox, hackers would have then turned to a second vulnerability documented as CVE-2018-8120 and representing a privilege escalation bug in Windows.

Fancy Bear-inspired approach
This time, the security issue affects the Win32k component, which can be hijacked to run arbitrary code on the compromised system, which technically means that hackers would have obtained full control over the target computer.

“The use of the combined vulnerabilities is extremely powerful, as it allows an attacker to execute arbitrary code with the highest possible privileges on the vulnerable target, and with only the most minimal of user interaction,” ESET security researcher Anton Cherepanov, who also discovered the vulnerabilities and reported them to parent companies, explained in the analysis.

There’s evidence, however, that the exploit was still under development when it was detected, as the PDF sample did not contain a final payload.

On the other hand, Cherepanov notes that combining exploits is a very advanced technique that hackers like the Russian group Fancy Bear is believed to be using. However, there’s no proof that Russian hackers have been involved in these attacks.

Microsoft and Adobe have already released patches for the two vulnerabilities combined in this exploit, so users are recommended to install them as soon as possible.

Print this item

  Ashampoo® WinOptimizer 16 Pre-order & save
Posted by: AAU - 05-16-2018 , 04:30 PM - Forum: Hot Deals & Discounts - Replies (2)

Ashampoo® WinOptimizer 16 kicks into overdrive! Experience a new start page packed with eight powerful optimization tools and a redesigned navigation bar for instant access to all features. Conserve power efficiently and prolongs the battery life of your mobile devices with Energy Manager and uncover and delete hidden browser extensions with Browser Extension Manager. Popular modules like Tweaking, DiskSpace Explorer or System Information have been updated and performance-enhanced. All cleaning modules have been optimized for the latest Windows to provide an even leaner, faster and more secure system!

Here's something to look forward to
Conserve energy efficiently and preserve battery life
Start page with eight optimization tools
No more unwanted browser extensions
Ingenious navigation bar with access to all features
Clean multiple user accounts simultaneously
Brilliant visuals at any resolution on any display
Ready for future Windows updates
New Windows 10 customization tweaks
New and dramatically faster DiskSpace Explorer
Over 80 new and faster components

Got curious?
The new Ashampoo® WinOptimizer 16 impresses with important new features like Energy Manager that lowers your electricity bill and battery degradation and Browser Extension Manager that wipes unwanted and dangerous extensions off your browser. The new start page shines with eight optimization functions while the new navigation bar provides instant access to all features! The popular cleaners have once again been enhanced and fully adapted to the latest Windows and our new tweaking and privacy settings allows for more customization and security.

You are not allowed to view links. Register or Login to view.

Release date: June 11, 2018 
Operating System: Windows® 10, Windows® 8.1, Windows® 8, Windows® 7

Print this item

  Google Pizza
Posted by: hamede - 05-15-2018 , 02:14 PM - Forum: General Computer Chat - No Replies

-Domino's Pizza

-No, oh .. Google Pizza

- The number is wrong, I want Domino's Pizza
- The number is correct, Google bought Dominoes

- Congratulations, Google, can I ask for a pizza
- Sure, do you want your usual order

-and how do you know my usual order? You just bought it!
- Obviously we have, you ordered chicken pizza in the last 15 times for you

-Ok, I want chicken one
- What is your opinion on trying vegetable pizza, we have noticed that you suffer from cholesterol

- And how did you know this?
- The hospital you are dealing with is linked to Google.

- !!! I do not want vegetables and I want chicken, I use cholesterol medication!
- You stopped taking medicine, because you did not buy medicine a month ago, the pharmacy you deal with is tied with Google

- I bought the medicine from another pharmacy
- But no medication was purchased during the last month of your credit card

- Cash paid, from the Wal-Mart pharmacy
- According to our information, you did not deal with Wal-Mart during the previous month, Wal-Mart linked to Google

- I do not want pizza, I do not want Google, I do not want Facebook, I do not want Twitter ... I do not want to instagram ... I will go to a remote island and I will live there, there is no Internet and no spy on my privacy
- Oak, you can go to Geferton Island in Hurghada, because you were impressed by a photo of a friend of yours when he was on the island, in Facebook.
- I will travel to a special place and you will not know where

- Sure we will know through which airline you will travel on .... Do not forget to renew your passport, finished two weeks ago

Sick

Print this item