Welcome, Guest |
You have to register before you can post on our site.
|
|
|
Welcome Guest!
|
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered.
You will need to Register before you can make posts, chat or enter the forum giveaways.
Be sure to also visit the Help/FAQ page.
|
IBM Bans the Use of Removable Drives to Transfer Data |
Posted by: tarekma7 - 05-10-2018 , 08:54 PM - Forum: General Computer Chat
- Replies (1)
|
|
Quote:IBM has allegedly issued a worldwide ban against the the use of removable drives, including Flash, USB, and SD cards, to transfer data. This new policy is being instituted to prevent confidential and sensitive information from being leaked due to misplaced or unsecured storage devices.
According to a report by TheRegister, IBM's global chief Information security officer Shamla Naidoo issued an advisory stating that the company “is expanding the practice of prohibiting data transfer to all removable portable storage devices (eg: USB, SD card, flash drive).”
This advisory further stated that this policy is already in effect for some departments, but will be further enforced throughout the entire company.
TheRegister's reporting says the reason for this stricter policy is to prevent "the possible financial and reputational damage from misplaced, lost or misused removable portable storage devices must be minimised."
Instead, IBM employees are advised to use IBM's "sync ‘n’ share" service to transfer data between employees and devices.
Security data is important but can lead to headaches
In today's constant reports of data leaks, theft, and privacy breaches, it is not surprising for a company to want to secure their data and to do so in a way that they can keep track of where it goes and who has it. At the same time, strict policies like this can be a huge headache for a company's IT department that routinely relies on removable storage to transfer installation files, drivers, firmware, patches, and utilities between computers.
At this time, it is not know if this new policy will strictly be for data files or for all files including those used by IT support. Bleeping Computer has contacted IBM for comment and was told "We regularly review and enhance our security standards and practices to protect both IBM and our clients in an increasingly complex threat environment." .
SOURCE
|
|
|
Free Video Player 2.0.0 Released |
Posted by: mrtrout - 05-09-2018 , 07:43 PM - Forum: Freeware
- No Replies
|
|
http://www.gilisoft.com/free-video-player.htm Free Video Player
100% Free, Fast and Powerful Media Player
Windows 2000/2003/XP/Vista/ 7/8/10 (32 bits &64 bits)
Free Download
Version: 2.0 OverviewDownload
What Does Free Video Player?
Not only is Free Video Player a completely FREE video player, with its built-in support for all the most popular video and Media Player formats, tons of advanced features, extreme customizability, and the Codec Finder service, Free Video Player is sure to fulfill all of your playback needs. With millions of users in hundreds of countries, Free Video Player is one of the world`s most popular video players.
With Free Video Player, all video and audio files open with one click! A powerful video and audio player, Free Video Player is the last media player you will need to download. The best part is that this is completely FREE software!
Exclusive Features of Free Video Player
Free
Free Video Player is completely free for everyone to download and use. Our team was not happy with the current media player offerings on the internet. We are dedicated to building the best media player for your free use.
Comprehensive File Support
Free Video Player can easily support virtually any kind of Video, Audio, Image formats. It can play all the most popular video formats by default: AVI, MP4, MKV, FLV, WMV, MOV, and more.
Support GEM Format
GEM is a multimedia encryption format designed with GiliSoft. GEM supports most of the video and audio formats, support multiple files, support volume. Free Video Player can play GEM format.
Just Plays Everything
If you want to play music or video files in just about any format, Free Video Player is your best answer. An all-in-one FUHD media player software brings you MP3 player, FLV player, WMV player, MKV player, as well as a video music library to unleash all your digital media.
Automatic Updates
Our team is dedicated to providing great and timely updates to our software, and now you never have to worry about manually updating again!
Player for mobile
Free Video Player will be available in Android and iOS versions. You can enjoy watching videos not just on your PC, but also on your mobile device. Enjoy watching videos easily with Mobile Free Video Player any time, anywhere
Easy to use
Take control of your media with intuitive play and volume controls. No more fussing with overly complicated players.
Audio Player
By popular demand, Free Video Player now features an integrated audio player for formats such as MP3, MP2 and MID. 2005-2018 GiliSoft International LLC. : BitDefender Log File
Product : Bitdefender Total Security
Scanning task : Contextual Scan
Log date : Wednesday, May 9, 2018 3:36:32 PM
Path : C:\Users\mrtro\Desktop\free-video-player.exe
[-]Detailed Scan Summary
[-]Basic
Scanned items : 64
Infected items : 0 (no infected items have been detected)
Suspicious items : 0 (no suspected items have been detected)
Resolved items : 0 (no threats have been detected during this scan)
Unresolved items : 0 (no issues remained unresolved)
[+]Advanced
[-]Scan Options
[-]Target Threat Types:
Scan for viruses : Yes
Scan for adware : Yes
Scan for spyware : Yes
Scan for applications : Yes
Scan for dialers : Yes
Scan for rootkits : No
Scan for keyloggers : Yes
[-]Target Selection Options:
Scan registry keys : No
Scan cookies : No
Scan boot sectors : No
Scan memory processes : No
Scan archives : Yes
Scan runtime packers : Yes
Scan emails : Yes
Scan all files : Yes
Heuristic Scan : Yes
Scanned extensions : none configured
Excluded extensions : none configured
[-]Target Processing:
Default primary action for infected objects : None
Default secondary action for infected objects : None
Default primary action for suspicious objects : None
Default secondary action for suspicious objects : None
Default action for hidden objects : None
Default action for password-protected objects : Prompt for password
|
|
|
Office 365 Zero-Day Used in Real-World Phishing Campaigns |
Posted by: tarekma7 - 05-09-2018 , 12:21 AM - Forum: Security News
- No Replies
|
|
Quote:A new zero-day vulnerability known as baseStriker allows miscreants to send malicious emails that bypass security systems on Office 365 accounts.
Discovered last week, on May 1, 2018, by security researchers from Avanan, baseStriker is a flaw in how Office 365 servers scan incoming emails.
The HTML tag at the center of baseStriker
At the center of this vulnerability is the < base > HTML tag. This is a seldom used tab, but developers declare it in the < head > section of an HTML document (web page), and its purpose is to establish a base URL for relative links.
For example, a website might declare a base URL like this:
Code: < base href = "https://www.example.com" / >
Once declared, developers can include links to content hosted on the base URL without typing the whole thing, like so:
Code: < img src = "/images/slider/photo-1.png" / >
Under the hood, the HTML rendering engine (usually a browser) will merge the base URL with the relative path and come with:
Code: https://www.example.com/images/slider/photo-1.png
Office 365 doesn't support the "base" HTML tag
The problem, according to Avanan, is that Office 365's security systems don't appear to support base URLs.
An attacker can simply send out a rich-text-formatted email with the following structure and Office 365 won't be able to scan and detect any malware hosted on the URLs.
Read the article:
HERE
|
|
|
Adobe Patch Tuesday Is Out With Fixes for Flash Player, Creative Cloud, Connect |
Posted by: tarekma7 - 05-09-2018 , 12:18 AM - Forum: Security News
- No Replies
|
|
Quote:Minutes ago, Adobe published this month's batch of security fixes, part of the company's regular Patch Tuesday outing.
For the month of May 2018, Adobe fixed five vulnerabilities — one in Flash Player, three in the Creative Cloud Desktop application (the app that starts Photoshop, Illustrator, InDesign, and the rest of the Creative Cloud apps), and one in Connect, its web conferencing software.
By far, the most dangerous was the Flash Player vulnerability, which allowed for code execution on the user's computer. The good news is that none of these flaws had been exploited in the wild, and recent reports confirm Flash's demise [1, 2].
Adobe Security Update Summary:
APSB18-16 Security update available for Adobe Flash Player
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities in Adobe Flash Player 29.0.0.140 and earlier versions. Successful exploitation could lead to arbitrary code execution in the context of the current user. The latest Adobe Flash Player version number is now: 29.0.0.171.
APSB18-12 Security update available for Adobe Creative Cloud Desktop Application
Adobe has released a security update for the Creative Cloud Desktop Application for Windows and MacOS. This update resolves a vulnerability in the validation of certificates used by Creative Cloud desktop applications (CVE-2018-4991), and an improper input validation vulnerability (CVE-2018-4992) that could lead to privilege escalation. The latest Creative Cloud Desktop Application version number is now: 4.5.0.331.
APSB18-18 Security update available for Adobe Connect
An important authentication bypass vulnerability (CVE-2018-4994) exists in Adobe Connect versions 9.7.5 and earlier. Successful exploitation of this vulnerability could result in sensitive information disclosure. he latest Adobe Connect version number is now: 9.7.5.
FULL ARTICLE:
HERE
|
|
|
Microsoft May 2018 Patch Tuesday Fixes 67 Security Issues, Including IE Zero-Day |
Posted by: tarekma7 - 05-09-2018 , 12:16 AM - Forum: Security News
- No Replies
|
|
Quote:Microsoft published earlier today the Patch Tuesday security bulletin for May 2018, containing fixes for 67 security issues.
This month, Microsoft fixed security flaws in Microsoft Windows, Internet Explorer, Microsoft Edge, ChakraCore, .NET Framework, Microsoft Exchange Server, Windows Host Compute Service Shim, and Microsoft Office and Microsoft Office Services and Web Apps.
Microsoft patches two zero-days
The biggest issue patched this month is a zero-day in Internet Explorer that has been abused by a cyber-espionage campaign earlier this month. The zero-day (CVE-2018-8174) affects not only IE but also any other projects that embed the IE web rendering engine. Microsoft credited researchers from both Qihoo 360 Core Security and Kaspersky Lab for discovering this issue.
The second zero-day is CVE-2018-8120, an elevation-of-privilege vulnerability in the Win32k component.
"An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft says. But the flaw is not as dangerous as it sounds, as an attacker already needs a foothold on Windows systems to run his malicious code in the first place, to elevate his access rights.
Microsoft also patched CVE-2018-8141 (Windows Kernel Information Disclosure Vulnerability) and CVE-2018-8170 (Windows Image Elevation of Privilege Vulnerability), for which exploitation details became public. Despite info about these two flaws being published online, Microsoft says none were exploited in the wild.
Flash fixes also included
Last but not least, the Microsoft May 2018 Patch Tuesday also included a patch for an Adobe Flash Player vulnerability (CVE-2018-4944) that Adobe patched earlier today.
Below is a table listing of all the security issues Microsoft fixed this month. We used PowerShell and the Microsoft API to assemble the table below, but the report is much longer. We hosted the full report on GitHub, here.
If you're not interested in all security updates and you'd like to filter updates per product, you can use Microsoft's official Security Update Guide, available here.
FULL ARTICLE:
HERE
|
|
|
Amazing bundle: 3 programs, 9 licenses only $9,99 |
Posted by: AAU - 05-08-2018 , 08:53 PM - Forum: Hot Deals & Discounts
- Replies (1)
|
|
All programs are the current sales versions with a value of $149,97!
The following programs are included, including installation on up to 3 devices:
Ashampoo® WinOptimizer 15
- Safe, fast and clean - with just a few clicks!
- Power like never before
- More privacy, security and hard drive space
- The classic: one-click optimization
- Privacy Control for Windows 10
Ashampoo® UnInstaller 7
- Removes unwanted programs down to the last byte!
- Uninstall without remnants
- Surf the Internet Faster and Safer
- No problem with nested installations
- Clean uninstallations even without protocol
Ashampoo® Driver Updater
- Optimum performance thanks to the latest drivers!
- Scan - Install - Done
- Problems? Can be solved!
- Maximum speed in games
- Pure safety
https://shop.ashampoo.com/10/purl-online...rrency=USD
|
|
|
Ashampoo Backup 2018 for free |
Posted by: AAU - 05-08-2018 , 06:41 PM - Forum: External Giveaways/Freebies
- Replies (14)
|
|
The backup solution for everyone - easy, fast and secure
If you ever sat in front of a black screen because your Windows refused to start, you know the value of backups. And it's so easy to keep your data safe! Backup entire disk partitions in just a few clicks and restore your files even in the event of a total system failure - that's what Ashampoo® Backup 2018 is all about. This application was specifically designed to do the heavy lifting for you, that means safety without the need for constant user interaction or system slowdown. It's simple, it's fast and it's safe!
Install, customize, done
Ashampoo® Backup 2018 covers all the essentials of backup creation and restoration. Simply select a disk partition, a target location and a time and you're all set! From now on, Ashampoo® Backup 2018 will backup your files securely in the background. Experience maximum safety with minimal effort, no technical knowledge required.
Ready for emergencies
Restoring backups is just as easy as creating them. Restore your files with Ashampoo® Backup 2018 or use the emergency disc / flash drive in the event of a total system failure to recover your data fast and securely. You can also view and restore individual files through Windows Explorer. It doesn't get any easier than that!
Highly advanced backup technology
Thanks to incremental backup technology your backups are always up to date and still require 50% less disk space than backups created with competing products. Even massive hard disks with more than 2 terabytes are supported making it easy to create huge archives. And during each backup process, all data is constantly verified to eliminate errors before they happen even for complex backups.
Full speed for your PC
A good backup solution should not interfere with your daily PC work. That is why Ashampoo® Backup 2018 pauses automatically whenever your PC is heavily used but even if it doesn't you will barely notice it.
- Fully automated data backups
- Backup and restore any file with ease
- Backup and restore entire operating systems
- Secure encryption to protect your privacy
- User-friendly and self-explanatory
- Huge space savings through maximum compression
- Self-explanatory, no technical knowledge required
- Easy data recovery through program or Windows Explorer
- Rescue disc against total system failure
- No computer slow downs, backups will pause automatically when needed
Product page: https://www.ashampoo.com/en/usd/pin/0859...ackup-2018
|
|
|
Dimo DVDmate |
Posted by: ahmed - 05-08-2018 , 09:02 AM - Forum: Giveaway of the day
- Replies (13)
|
|
About:
The first full-featured DVD converting software that can read all kinds of DVD discs/ISOs/folders, convert them to any mainstream audio formats, 2D & 3D video formats, or devices in support of media playback, downloading and file sharing.
Main features: - Convert DVD to various video formats or extract audio content from source DVD
- Rip DVD disc of any kind regardless of disc protection and region code
- Trim DVD video length, crop DVD video size, add watermark, adjust effects, etc.
- Play DVD movies with desired subtitles or audio tracks using the built-in player
- Adjust settings (encoder, frame Rate, video bitrate, resolution, etc.) to optimize output quality
- Take snapshots or make GIF from your favorite movie scenes of DVD discs
- One-click to stream ripped DVD files to TV or mobile devices wirelessly
Giveaway Page:
https://www.giveawayoftheday.com/dimo-dvdmate/#
OR
Registration:
https://www.mediadimo.com/dvdmate-giveaway
OR
Download & Key:
|
|
|
A serious security vulnerability has been found in 7-Zip |
Posted by: Otaku Lee - 05-08-2018 , 06:19 AM - Forum: Security News
- Replies (1)
|
|
7-Zip is free, open-source file archiving software that's been around for an awfully long time—nearly two decades, according to Wikipedia. It's barebones, it's simple, and it works, which is why we included it in our list of essential applications for a fresh PC. Unfortunately, as discovered by the Center for Internet Security, it also suffers from a pretty serious security vulnerability that can enable "arbitrary code execution."
What that means, basically, is that someone who successfully exploits this security flaw could install programs on your PC, view, edit, or delete data, or create new user accounts with full access rights. The good news is that CIS says there are no reports of this actually happening, but the bad news is that the security flaw is present in all versions of 7-Zip prior to 18.05. That version was just released on April 30, which means that unless you've updated sometime within the last four days, your PC is exposed.
Fortunately, the solution is simple. Go to 7-zip.org, download the latest version (it's tiny), and install it. Boom! Problem solved, and you'll be pleased to know that the hot new version of 7-Zip looks exactly the same as the old crappy one.
CIS also recommended that all software should be run as a non-privileged user, and to apply the "Principle of Least Privilege" to all systems and services, so that if your PC does fall prey to a sploitz-jerk, the damage will be minimized. As a general approach, that's probably not a bad idea.
Source
|
|
|
|