Welcome, Guest |
You have to register before you can post on our site.
|
|
|
Welcome Guest!
|
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered.
You will need to Register before you can make posts, chat or enter the forum giveaways.
Be sure to also visit the Help/FAQ page.
|
Latest New Releases & Updates Sept 4, 2016: |
Posted by: mrtrout - 09-05-2016 , 12:50 AM - Forum: Freeware
- No Replies
|
|
Latest New Releases & Updates Sept 4, 2016: Clean Master for Android, Dr. Web CureIT September 4, 2016, Dr. Web LiveCD-LiveUSB 9.0.0 (09/04/2016), Kaspersky Virus Removal Tool 15.0.19.0 (2016.04.09) ,
|
|
|
Meltytech, LLC. Shotcut [Free, Open Source, Cross-Platform Video Editor] |
Posted by: giveaway_junkie - 09-04-2016 , 03:39 PM - Forum: Freeware
- Replies (1)
|
|
Meltytech, LLC. Wrote:Shotcut is a free, open source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k.
More Information https://www.shotcut.org/
Features https://www.shotcut.org/features/
Tutorial Videos https://www.shotcut.org/tutorials/
FAQ https://www.shotcut.org/FAQ/
Discussion Forum https://forum.shotcut.org/
Current Version: 16.09 – 64-bit Only
Linux (Mint 17+, Ubuntu 14.04+, Debian 8+, Fedora 21+, openSUSE 13.2+, Arch/Manjaro) https://github.com/mltframework/shotcut/...01.tar.bz2 (download is 59.1 MB)
OS X (64-bit OS X 10.8+) https://github.com/mltframework/shotcut/...160901.dmg (download is 60.7 MB)
Windows (64-bit Windows 7+) https://github.com/mltframework/shotcut/...160901.exe (download is 183 MB)
Release Notes https://www.shotcut.org/download/releasenotes/
Meltytech, LLC. Wrote:OS X Users
Since the application is not signed, you need to control-click the app icon and choose Open from the context menu the first time you run it.
Linux Users
So install required, simply extract the archive and run it. You can drag the Shotcut folder to copy and move it wherever you want. If double-clicking the icon in your file manager does not launch Shotcut, open Shotcut.app, and try double-clicking the shotcut shell script. Do not try to run bin/shotcut directly. You may need to install the following dependencies from their distribution (the exact names may vary): SDL, libexif, and JACK plus whatever LADSPA plugins you want. Here is a page https://www.shotcut.org/notes/linux-dependencies/ that lists some required packages for specific distributions.
Meltytech, LLC. Wrote:We pledge that our downloads are always free of malware, spyware, and adware. Furthermore, we refuse to bundle any software unrelated to Shotcut such as browser toolbars or download managers. However, we can only provide that guarantee if you come to this website to download.
|
|
|
Reg Organizer [for PC] |
Posted by: asus73 - 09-04-2016 , 08:42 AM - Forum: External Giveaways/Freebies
- Replies (44)
|
|
Reg Organizer is a set of efficient tools to tweak, optimize, and clean Windows, designed to effortlessly free up system resources and rev performance to the max. The set includes a visual autostart manager, an advanced uninstaller featuring search for leftovers of uninstalled programs in the system, functions to purge unnecessary data, a powerful registry editor to quickly search and replace keys and data, and much more – all to keep your system healthy.
With Reg Organizer, you can efficiently free up system resources and maximize performance of your computer. And you don’t have to be a tech savvy to do this as the interface is refreshingly simple.
The easy-to-use uninstaller tool allows you to quickly remove unnecessary applications as well as all traces and leftovers they may have left in the system. This includes folders, files, and registry keys that typically stay in the system forever after the standard uninstalling.
Thanks to the autostart manager tool, you can make Windows start a lot faster by turning off unnecessary apps and suspending the start of the less important ones. A visual diagram explicitly illustrates the actual speed increase of the boot process.
System clean up functions allow removing unnecessary and outdated information from the computer to free up some additional space. For instance, you can remove the older version of the operating system, outdated updates, temporary folders, and more. Sometimes, this results in reclaiming an additional 15-20 GB of disk space.
The advanced registry editor (featuring the automated search and replace function), the tweak manager, and the system snapshot tool gives experienced users a leverage to work with the system registry and configuration files on a much more efficient basis.
Terms and Conditions
This is a 2-computer lifetime license, for noncommercial use
No free updates; if you update the program, you may lose it
No free tech support
You must redeem the license key before this offer has ended
May not be resold
Technical Details
Developed by ChemTable
Version is v7.4
Download size is 10.6 MB
Supports Windows XP, Vista, 7, 8/8.1, and 10 (32-bit and 64-bit)
expired 3 days
http://sharewareonsale.com/s/reg-organiz...oupon-sale
|
|
|
McAfee GetSusp: sniff out undetected malware |
Posted by: mrtrout - 09-03-2016 , 11:51 PM - Forum: Security News
- No Replies
|
|
http://www.ghacks.net/2016/09/03/mcafee-...d-malware/ McAfee GetSusp: sniff out undetected malware
by Martin Brinkmann on September 3, 2016 in Security - Last Update:September 3, 2016 3
McAfee GetSusp is a free program for Microsoft Windows devices designed to sniff out malware that resident security solutions did not detect.
The program is not new, it was last updated in 2013, but uses McAfee's Global Threat Intelligence (GTI) File Reputation database, to determine whether a file is suspicious.
Word of warning: the program will submit files to McAfee by default for analysis according to the terms of service that you need to accept not only before download but also before you run the program.
While that may not be a problem for most home users, as the program concentrates on executable files, it will likely be one for privacy conscious users and businesses.
The main issue with the approach is that you don't get a say during the scanning. It would be user friendly if the program would display prompts for any file that it plans to transfer to the service for further analysis. That's however not the case.
McAfee GetSusp
mcafee getsusp
The application itself is portable, and one of those click a button and wait until the scan completes type of programs that gives you little options or control over the process.
You may disable the submission of results to McAfee and the reporting of all scanned files, but that is about it.
Simply click on the preferences icon in the program interface to make those changes.
McAfee GetSusp found quite a few suspicious files on the test computer system; a total of 41 to be precise. The list included several Google Chrome dll and executable files, Veeam EndPoint files, the main Private Internet Access application, and several downloaded programs such as AutoHotKey.
The program leaves you alone after listing what it considers suspicious files, and it is up to you to make sure the files are clean.
This cannot be done from within the program unfortunately which means that you will have to go through the listing one by one, and either scan each file with third-party security software, or an online service like Virustotal.
Obviously, you may be able to refute certain claims right away.
Closing Words
So how useful is McAfee GetSusp. I'd say it is not overly useful. You may get much better results by downloading and running second opinion scanners like Malwarebytes Anti-Malware, Bitdefender QuickScan, Dr.Web CureIt, or any of the other programs designed specifically for that purpose.
The results are likely better, and you get options to do something about them right away as well.
Also, some second opinion scanners don't require an Internet connection at all to scan the system which will please anyone who does not want data to be transferred to remote Internet servers without having a say in the matter.
GetSusp, all in all, is a rather weak program, and that is probably one reason why it was not updated by Intel Security in well over three years.
Software NameMcAfee GetSusp
Operating SystemWindows
Software CategorySecurity
Landing Pagehttp://www.mcafee.com/us/downloads/free-tools/getsusp.aspx
|
|
|
USBee Malware Turns Regular USB Connectors into Data-Stealing Weapons. |
Posted by: scot - 09-03-2016 , 05:33 PM - Forum: Security News
- No Replies
|
|
USBee Malware Turns Regular USB Connectors into Data-Stealing Weapons
USBee attack inspired by NSA's COTTONMOUTH cyber-weapon
Researchers from the Ben-Gurion University in Israel have discovered a novel method of using USB connectors to steal data from air-gapped computers without the need of special radio-transmitting hardware mounted on the USB.
Their attack scenario relies on infecting a computer with malware they've created calledUSBee.
An NSA cyber-weapon inspired the research
Researchers said that NSA cyber-weapons inspired their research, namely, theCOTTONMOUTH hardware implant included in a catalog of NSA hacking tools leaked by Edward Snowden via the DerSpiegel German newspaper.
USBee is superior to COTTONMOUTH because it does not need an NSA agent to smuggle a modified USB connector/dongle/thumb drive into the location from where they want to steal data, nor does it involve implants in USB firmware and drivers to work.
The malware created by researchers can be spread like regular computer malware, and once it reaches a high-value target, it will work with any USB connector plugged into the computer, regardless if it's an USB dongle, thumb drive, or cable interconnecting the PC with a nearby device.
USBee steals data via electromagnetic emissions
In a simple explanation of the attack, the USBee malware sends hidden commands to the USB connector's data bus, which gives out electromagnetic emissions as it is processing the commands.
Researchers have found a series of operations that can make the USB's data bus give off electromagnetic emissions at two very different frequencies, which they use to represent binary "1" and "0."
The malware takes information it wants to steal, breaks it down to its 1-s and 0-es, and then transmits the data via the USB connector, to a nearby radio antenna.
The first "weird" data-theft attack to be feasible in real life
In the past, the same researchers from the Ben-Gurion University have created attacks that steal data from air-gapped PCs using the sounds emanated by a computer's GPU fan (Fansmitter attack); that can steal data using HDD sounds (DiskFiltration attack); that can steal data using the heat given off by a computer's internal components (BitWhisper attack); and attacks that can steal data using a computer's coil whine noise and overall electromagnetic field.
All these scenarios mentioned above have very small transmission speeds, usually no more than 10 bits per minute, and can send data to a very short distance, usually at maximum 3-5 meters.
USBee can transmit data up to 80 bytes per second, and at larger distances than all previous attacks (researchers did not specify maximum distance in meters).
This breakthrough makes USBee the first theoretical attack the team developed that can be deployed in real-world scenarios right away and be effective.
Source: http://news.softpedia.com/news/usbee-mal...7918.shtml
|
|
|
|