Welcome, Guest |
You have to register before you can post on our site.
|
|
|
Welcome Guest!
|
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered.
You will need to Register before you can make posts, chat or enter the forum giveaways.
Be sure to also visit the Help/FAQ page.
|
PortableApps.com Platform 15.0.2 Released |
Posted by: mrtrout - 05-18-2018 , 11:18 PM - Forum: Freeware
- Replies (1)
|
|
https://portableapps.com/news/2018-05-17...2-released PortableApps.com Platform 15.0.2: Quick fixes for the big 15.0 release
John T. Haller's picture Submitted by John T. Haller on May 18, 2018 - 3:34pm
PortableApps.com is proud to announce the PortableApps.com Platform 15.0.2 release. This new version adds some quick fixes to the platform eject, adds long touch right click, and adds support for Vista's unofficial TLS update. The 15.0 release added .NET apps, high DPI display support, better support for app downloads with TLS 1.1/1.2 encrypted hosting, high contrast theme detection, swipe scrolling of the app list, locale updates, and lots of bug fixes and features. Read on for all the details...(permalink)
Existing Platform users can automatically update by clicking Help - Check for Updates. : https://portableapps.com/platform/changelog PortableApps.com Platform Changelog
Each release of the PortableApps.com Platform includes bug fixes and new features. They are detailed below.
15.0.2 [2018-05-17]
ADDED: Detection of unofficial Vista TLS update
FIXED: Long touch right-click support in app list
FIXED: Eject failing to eject drive : https://portableapps.com/download Download The PortableApps.com Platform 15.0.2!
your computer, without the computer™
The PortableApps.com Platform™ is a full-featured portable software system that ties all your portable apps together and lets you build your own custom portable app suite for use in your synced cloud folder, on your local PC, or on a portable USB drive.
Awesome Features: Complete App Store | App Organization
Automatic Software Updates | Themes and Customization
Portable Fonts | Integrated Backup and Restore | And More!
The PortableApps.com Platform is 100% Free. Free to use. Free to share. And fully open source. Download from DuckDuckGo
Version 15.0.2 for Windows, 55 Languages
5MB download / 12MB installed Operating Systems: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP
Also Works With: Linux, Unix, BSD, etc via Wine & Mac OS X via CrossOver, Wineskin, WineBottler, PlayOnMac
32-bit and 64-bit Support: Automatically adjusts support and performance to each PC
Publisher: PortableApps.com
Date Updated: 2018-05-17 (Platform Changelog)
License: Free / Open Source (GPL, some MIT, some CC images, trademarks and trade dress not included)
Source Code: PortableApps.com Platform (Menu, App Store, etc)
MD5 Hash: c02fc058be0e9985cc56aa4073a207af
Downloads: over 26 million : 100% Scanned Malware Free & Clean With Kaspersky Total Security & Application : PortableApps.com Platform Vendor : PortableApps.com Trusted ( Kaspersky Security Network) Fewer than 100 Kaspersky Security Network users have used this application Digital Signature: ( Rare Ideas, LLC)
|
|
|
CryptoMiner, WinstarNssmMiner, Has Made a Fortune By Brutally Hijacking Computers |
Posted by: mrtrout - 05-18-2018 , 05:26 PM - Forum: Security News
- No Replies
|
|
https://blog.360totalsecurity.com/en/cry...-computer/ CryptoMiner, WinstarNssmMiner, Has Made a Fortune By Brutally Hijacking Computers
May 16, 2018360TS
Recently, 360 Security Center has found that a new CryptoMiner is spreading fast. The distributor has made tremendous profit via mining Monero on infected computers. According to our statistics, 360 Total Security has intercepted its attack over 500 thousands times in 3 days. Our analyst has named it “WinstarNssmMiner.” This malware is very hard to remove since victims’ computers crash as soon as they found and terminate the malware. Interestingly, this malware is acting snobbish when facing different antivirus software. It turns off antivirus protection of defenseless foes and backs off when facing sharp swords. As a result, users without a decent antivirus product have to live with the slowness and the blue screens of their computers.
Analysis
We’re quite surprised to see a CryptoMiner being so brutal to hijack victims’ computers by adopting techniques of stubborn malware:
1. Launch a system process, svchost.exe, and inject malicious code into it.
2. Set spawned process’ attribute to CriticalProcess.
3. Computers crash when their owners terminate the malware.
After getting into victims’ computers, this malware attempts to locate any decent antivirus software, Such as Kaspersky, Avast. If any found, this malware will quit automatically to avoid direct confrontation.
Figure 1: How this malware avoid antivirus software.
Then, this malware injecting the code to svchost.exe it created. There are actually two svchost.exe processes created. One performs the mining tasks. The other runs in the background for sensing the antivirus protection and avoiding detection.
Figure 2: It creates two processes
Though WinstarNssmMiner has the ability to deceive antivirus software. It’s in its nature still a CryptorMiner and its implementation is based on the open source project, XMRIG. It comes with four ming pool and is able to determine mining pool based on the parameters passed to it.
Figure 3: Addresses of mining pools
At the time we published this analysis, this CryptoMiner has already acquired 133 Monero which is approximately equivalent to 28 thousands US dollars.
Figure 4: The profit earned
Due to the nature of digital currency mining, CryptoMiners use up victims’ processing power for the sake of their distributors. Some savvy users are able to identify and terminate the CPU consuming applications. Hence, WinstarNssmMiner protects itself by configuring its ming process’s attribute to CriticalProcess so infected computers crash when users terminate it.
Relevant file hash in MD5
184001cbd326cb3c03987c350c3ada6a
cf3e0eaf26c74db2bb5f8ba7e2607e2f
0be8a2b5f8a2fc9ad74d8ab9fcf5f583
Reminder
Recently, we have found that a lot of CryptoMiner malware are actively spreading in the wild. We strongly recommend users to enable antivirus software while installing new applications. Users are also recommended to run virus scan with 360 Total Security to avoid falling victim to CryptoMiner.
|
|
|
Epubor Ebook Manager 2.0.6 |
Posted by: longin - 05-18-2018 , 09:33 AM - Forum: Giveaway of the day
- Replies (1)
|
|
Epubor Ebook Manager 2.0.6
Epubor eBook Manager helps manage your eBooks from different sources. It enables you to classify, modify, convert and transfer your eBooks. Make managing your ebook collections easier. - Batch convert and transfer encrypted eBooks without any quality loss. Supports the books from Amazon Kindle, Barnes and Noble Nook, Sony, Kobo, Google Play;
- Catalog eBooks and modify metadata. Epubor can catalog eBooks from your devices, Kindle, Adobe Digital Editions, Calibre and iTunes by automatic scanning. Your books will be sorted by authors, languages, publishers and formats;
- Web server and online converter included.
This software includes free 1-year license.
https://www.giveawayoftheday.com/ebook-manager/
|
|
|
Vole PDF Creator Professional LTUD v3.72 |
Posted by: longin - 05-18-2018 , 08:20 AM - Forum: External Giveaways/Freebies
- Replies (5)
|
|
Vole PDF Creator Professional LTUD
Vole PDF Creator Professional LTUD helps you create professional PDF via built-in Super WordPad.
Key Features:
1. Create multi-level bookmarks.
2. Integrate Office Word style tables.
3. Add, delete, and merge rows and cells in table
4. Insert images, hyperlinks
5. Rich Text
6. Built-in previewer
And also supports Notepad and other Word processing software.
https://sharewareonsale.com/s/free-vole-...0-discount
Download:
https://downloads.sharewareonsale.com/fi...UD_hub.exe
DIRECTIONS
The download for Vole PDF Creator Professional LTUD is given above. To register the software, you need to obtain your LICENSES FILE. To get it, do the following:
- Click here to go to the account registration page https://sanwhole.com/Account/Loginand register a free Sanwhole account (or log into your existing account)
- Once logged in, click the top-right option that says HI to go to your account
- Once you're on your account dashboard, click IMPORT PURCHASE and enter/paste the follow giveaway license key:
- SharewareOnSale exclusive license key:
- Click IMPORT PURCHASE button to confirm
- Next, go to DOWNLOAD LICENSES FILE page from within your account and click the DOWNLOAD LICENSES FILE button. It will prompt you to download and save a VOLELICENSES.TXT file. You need to save this file to your computer.
Once your have downloaded VOLELICENSES.TXT, download and install Vole PDF Creator Professional LTUD from the download link we give you above. After install, run Vole PDF Creator Professional LTUD, click on the blue i button at the top-right, go to SPECIFY LICENSES FILE, and insert the same VOLELICENSES.TXT that you downloaded earlier. Once you do that, simply click RENEW CODE MANAGER and that's it.
Terms and Conditions
This is a 1-computer lifetime license, for noncommercial use
You get free updates for the same major version
You get free tech support
|
|
|
Auslogics Disk Defrag Pro 4.9.1.0 Released |
Posted by: mrtrout - 05-18-2018 , 12:35 AM - Forum: Paid
- No Replies
|
|
100% Scanned Malware Free & Clean With kaspersky Total Security & Application: Auslogics Disk Defrag Professional Installation File Vendor Auslogics Trusted ( Digital Signature) Fewer than 100 Kaspersky Security Network users have used this application. Digital Signature: ( Auslogics Labs Pty Ltd) : http://www.auslogics.com/en/software/disk-defrag-pro/ Auslogics
Disk Defrag Pro
Get your drives optimized for top speed and maximum efficiency with this powerful program's smart algorithms and boot-time defrag technology.
DOWNLOAD NOW
Compatible with
Win XP, Vista, 7, 8.1, 10
Latest ver. 4.9.1.0 (05/17/2018)
Total downloads: over 4 million Auslogics Disk Defrag Pro - Version History
4.9.1.0
Resolved a few task scheduler issues.
Fixed all known bugs.
|
|
|
Hackers Combine Microsoft, Adobe Flaws in Devastating Windows Exploit |
Posted by: mrtrout - 05-16-2018 , 09:52 PM - Forum: Security News
- No Replies
|
|
https://news.softpedia.com/news/hackers-...1149.shtml Hackers Combine Microsoft, Adobe Flaws in Devastating Windows Exploit
Vulnerabilities already fixed by both companies this month
May 16, 2018 09:54 GMT · By Bogdan Popa · Share:
Two different vulnerabilities in Microsoft and Adobe software were used by hackers in a combined exploit targeting Windows systems before eventually being addressed by both companies in their patching cycles earlier this month.
Security vendor ESET says in an in-depth analysis that it discovered a malicious PDF on a public mirror that was supposed to be used for launching attacks against Windows hosts. The document included JavaScript code and a crafted JPEG2000 image to take advantage of vulnerability CVE-2018-4990 in Adobe Reader.
Successfully exploiting the remote-code execution flaw in this application would have provided attackers with rights ro read and write in memory.
In order to break the sandbox, hackers would have then turned to a second vulnerability documented as CVE-2018-8120 and representing a privilege escalation bug in Windows.
Fancy Bear-inspired approach
This time, the security issue affects the Win32k component, which can be hijacked to run arbitrary code on the compromised system, which technically means that hackers would have obtained full control over the target computer.
“The use of the combined vulnerabilities is extremely powerful, as it allows an attacker to execute arbitrary code with the highest possible privileges on the vulnerable target, and with only the most minimal of user interaction,” ESET security researcher Anton Cherepanov, who also discovered the vulnerabilities and reported them to parent companies, explained in the analysis.
There’s evidence, however, that the exploit was still under development when it was detected, as the PDF sample did not contain a final payload.
On the other hand, Cherepanov notes that combining exploits is a very advanced technique that hackers like the Russian group Fancy Bear is believed to be using. However, there’s no proof that Russian hackers have been involved in these attacks.
Microsoft and Adobe have already released patches for the two vulnerabilities combined in this exploit, so users are recommended to install them as soon as possible.
|
|
|
Ashampoo® WinOptimizer 16 Pre-order & save |
Posted by: AAU - 05-16-2018 , 04:30 PM - Forum: Hot Deals & Discounts
- Replies (2)
|
|
Ashampoo® WinOptimizer 16 kicks into overdrive! Experience a new start page packed with eight powerful optimization tools and a redesigned navigation bar for instant access to all features. Conserve power efficiently and prolongs the battery life of your mobile devices with Energy Manager and uncover and delete hidden browser extensions with Browser Extension Manager. Popular modules like Tweaking, DiskSpace Explorer or System Information have been updated and performance-enhanced. All cleaning modules have been optimized for the latest Windows to provide an even leaner, faster and more secure system!
Here's something to look forward to
Conserve energy efficiently and preserve battery life
Start page with eight optimization tools
No more unwanted browser extensions
Ingenious navigation bar with access to all features
Clean multiple user accounts simultaneously
Brilliant visuals at any resolution on any display
Ready for future Windows updates
New Windows 10 customization tweaks
New and dramatically faster DiskSpace Explorer
Over 80 new and faster components
Got curious?
The new Ashampoo® WinOptimizer 16 impresses with important new features like Energy Manager that lowers your electricity bill and battery degradation and Browser Extension Manager that wipes unwanted and dangerous extensions off your browser. The new start page shines with eight optimization functions while the new navigation bar provides instant access to all features! The popular cleaners have once again been enhanced and fully adapted to the latest Windows and our new tweaking and privacy settings allows for more customization and security.
Pre-order now for $19.99 instead of $39.99
Release date: June 11, 2018
Operating System: Windows® 10, Windows® 8.1, Windows® 8, Windows® 7
|
|
|
Google Pizza |
Posted by: hamede - 05-15-2018 , 02:14 PM - Forum: General Computer Chat
- No Replies
|
|
-Domino's Pizza
-No, oh .. Google Pizza
- The number is wrong, I want Domino's Pizza
- The number is correct, Google bought Dominoes
- Congratulations, Google, can I ask for a pizza
- Sure, do you want your usual order
-and how do you know my usual order? You just bought it!
- Obviously we have, you ordered chicken pizza in the last 15 times for you
-Ok, I want chicken one
- What is your opinion on trying vegetable pizza, we have noticed that you suffer from cholesterol
- And how did you know this?
- The hospital you are dealing with is linked to Google.
- !!! I do not want vegetables and I want chicken, I use cholesterol medication!
- You stopped taking medicine, because you did not buy medicine a month ago, the pharmacy you deal with is tied with Google
- I bought the medicine from another pharmacy
- But no medication was purchased during the last month of your credit card
- Cash paid, from the Wal-Mart pharmacy
- According to our information, you did not deal with Wal-Mart during the previous month, Wal-Mart linked to Google
- I do not want pizza, I do not want Google, I do not want Facebook, I do not want Twitter ... I do not want to instagram ... I will go to a remote island and I will live there, there is no Internet and no spy on my privacy
- Oak, you can go to Geferton Island in Hurghada, because you were impressed by a photo of a friend of yours when he was on the island, in Facebook.
- I will travel to a special place and you will not know where
- Sure we will know through which airline you will travel on .... Do not forget to renew your passport, finished two weeks ago
|
|
|
RegSeeker 4.57 (free for personal use only) |
Posted by: Jeanjean - 05-14-2018 , 05:55 PM - Forum: Freeware
- Replies (1)
|
|
"Some RegSeeker features included: Powerful registry search and cleaner, Startup and Application, Junk files management (privacy cleaning), Process navigator, process and files live monitor, Repair box, drivers backup, Windows Tweaks and much more ...
Now includes a powerful scripts engine !
Take full control of your computer
With RegSeeker you'll exactly know what is installed and running on your PC.
RegSeeker is working for Windows XP/Vista/7/8/10 ( x86 and x64 platforms)"
site : http://www.hoverdesk.net/
download (portable) : http://www.hoverdesk.net/download/RegSeeker47.zip
|
|
|
DVDFab Mother's Day Promo | Save up to 50% on a Gift to Spoil Mom on Her Day |
Posted by: victorhan2012 - 05-14-2018 , 08:54 AM - Forum: Latest Software Updates
- No Replies
|
|
Hi,all users! DVDFab Mother's Day Promo has been launched! This time we offe you many chances to save up to 50% on the most-wanted gift for dear mom.
1.Up to 50% OFF to Existing Customers
DVDFab All-In-One is a 17-In-1 solution bundle, depending on what you currently have, you can save up to 50% on any of the rest inside the package.
2.You can enjoy 35% OFF for DVDFab All-In-One Lifetime Gift Purchase
DVDFab All-In-One Lifetime Gift is the all-inclusive bundle to copy, rip and create DVD/Blu-ray/4K Ultra HD Blu-ray, convert video, bypass Cinavia, remove DRM and record iOS screen.
3.Up to 55% OFF Passkey for DVD & Blu-ray (Lifetime)
Promo time ends on May 23,2018.
For more info,please visit the promotion page here: https://www.dvdfab.cn/promotion.htm
|
|
|
360 Total Security saves its users from crypto-mining malware |
Posted by: mrtrout - 05-14-2018 , 03:59 AM - Forum: Security News
- No Replies
|
|
https://ambcrypto.com/360-total-security...g-malware/ NEWS 360 Total Security saves its users from crypto-mining malware Rajath Kumar Published 20 hours ago on May 13, 2018 By Rajath Kumar
360 Total Security Center released a blog post stating that they had received some information about a malware infection which will use the victim’s computer to mine cryptocurrency.
360 Security is an internet company that provides antivirus to users to protect their computers from a virus or any type of malware. It is popular and is used in most of the computers around the world.
The malware enters the victim’s computer after installing the application One System Care. The malware then infects the computer with a cryptocurrency miner in which DNS settings will be altered and ads will be displayed. It will also have constant updates by creating a PowerShell script which will hide the malware from the systems scheduled tasks. The miner will then proceed to mine cryptocurrency.
How the PowerShell script is created and schedules tasks
The malware would run a scheduled time and would be used to mine cryptocurrency. Even if the victim deletes the malware, it would recreate itself as long as the PowerShell script would remain in the computer.
The Malware would work in such a way that it would disguise itself with a legit software and use PowerShell to avoid antivirus detection. It would also encrypt its own command and control protocol to avoid interception of the firewall.
The malware affected over a million computers and 360 total security received various complaints from customers. The company took care of the problem and saved all the computers. They also reminded customers to enable/update the new antivirus software to protect themselves from future viruses like these.
Marvell, a Twitter user says:
“My computer was infected with this malware but thanks to 360 it is safe. They responded quickly and solved the problem as soon as possible.”
Jade, another Twitter user says:
“People need to be really aware on what they install if they install applications without knowing if they are legit or not they will fall into these traps which will end up costing them a lot of money.”
Rajath Kumar
Rajath Kumar is an intern at AMBCrypto. He became aware of the crypto-world through gaming and has been a part of it for two years now. Rajath does not hold any value in any cryptocurrencies or its projects.
|
|
|
|