Monthly Archives: January 2010

Zemana AntiLogger Server Attacked by Bots

It’s often said that “no good deed goes unpunished”. Generally, this statement means that one can attempt to be helpful to others, and despite good intentions, end up paying an unexpected price.

That seems to be the case in Zemana’s good deed, in providing a free license for their superb security application; AntiLogger.

Over the course of the last few days, in conjunction with Zemana, Tech Thoughts, has been offering a free license for AntiLogger and the response has been very gratifying. For more information on this offer please read “Free Licenses for Zemana AntiLogger – 3 Days Only”, on this site.

Unfortunately, cybercriminals, who as we know are driven by opportunity, obviously saw in this free license giveaway, an opportunity to be disruptive by launching a distributed denial-of-service attack, driven by a bot network, against the Zemana license server.

If you’re unfamiliar this this type of attack, Wikipedia explains it, in part, as follows:

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.


There are very sensible business reasons why a company, such as Zemana, gets involved in this type of promotion, but at the end of the day, it’s the individual who receives a free license who benefits immediately.

While this attack has been extremely disruptive, and very inconvenient for those readers who choose to take advantage of Zemana’s generous offer, in a real sense this attack emphasizes the level of cybercriminal activity on the Internet, and the lengths to which these Neolithic idiots will go to threaten our enjoyment of the Net.

Inadvertently, those responsible for this attack have proven how important it is to ensure, that you as an Internet user are adequately protected against cybercriminal activity. The very definition of irony.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under cybercrime, Don't Get Scammed, Don't Get Hacked, downloads, Free Full Versions, Personal Perspective, Software, Software Giveaways, Windows Tips and Tools

Tech Thoughts Daily Net News – January 31, 2010

Firefox for Mobile Makes Its Debut – Want the power and add-ons of the Firefox browser in the palm of your hands? That dream is quickly becoming a reality, starting with the Maemo OS and owners of the Nokia N900. Mozilla has officially introduced Firefox for Maemo, the first officially launched version of Firefox for Mobile.

Google phasing out support for IE6 – Starting March 1st, Internet Explorer users must be running at least version 7 of the browser in order to properly use Google Docs and Google Sites.

Tech Thoughts Daily Tech News 2

Google To Pay Bounties for Chrome Browser Bugs – Google has unveiled a bug-bounty program that will pay researchers $500 for each vulnerability they report in the Chrome browser and its underlying open-source code.

Is eBay facing seller revolt? – The auction site made modifications to listing fees recently that company representatives say have gone over quite well. Some members, however, say it just amounts to a big fee increase.

Adobe Plays the Porn Card in Flash Campaign Against iPad – Apple has clearly hurt Adobe’s feelings. When Steve Jobs demonstrated an iPad at Wednesday’s tablet event, its Safari browser clearly did not support Flash.

How unique and trackable is your web browser? – Is your browser configuration rare or unique ? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits.

3 Strikes Coming To The United States Via The Back Door? – 3 Strikes” is a regime being introduced in various countries around the world to try to deal with illicit file-sharing. Already Taiwan, South Korea and France are putting their versions of the plan into action and other countries have similar proposals under discussion. In one form or another, could the same be coming to the United States?

Windows 7’s XP Mode: what it is, how it works, who it’s for – Ars takes you inside one of Windows 7’s most talked-about and misunderstood features: Windows XP Mode. Learn what it is, how it works, and who Microsoft intended this feature for.

Off Topic:

Lifehacker: Top 10 Tips and Tools for Freelancers – Freelancing isn’t something you should just jump into, but it makes sense for a good number of workers. If you’re looking into, or getting started with, working on your own, here are 10 resources we think every freelancer can learn from.

Scientists Discover a New Form of Lightning – The lightning observed during the eruption of Mt. Redoubt in 2009, researchers have determined, is an entirely new variety. Using radio antennas, scientists noticed that the bolts were shorter, lasting only a few milliseconds, and much more frequent than typical lightning.

How to Suck at Facebook – a comic depicting the 9 worst types of Facebook users.

Today’s Quote:

“I don’t know if God exists, but it would be better for His reputation if He didn’t”.

–     Jules Renard

Today’s Free Downloads:

Picasa – Organize, edit, and share pictures with this free photo manager.

SharePod – Apple makes extracting your music from your iPod unnecessarily difficult, which is where SharePod comes in. This fast freeware tool efficiently transfers your music collection to your hard drive, making it easy to back up or restore your music, videos, and photos. It also transfers playlists, album art, and ratings, both to your hard drive and directly into iTunes.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Tech Thoughts Daily Net News – January 31, 2010

Filed under Beta Software, Internet Security Alerts, Tech Net News

Playing Russian Roulette With Malware

Russian roulette 1

I’m a games player, and I bet you are too. But unlike many computer users, I do not play games with my computer’s security.

I don’t play games where the odds are stacked against me, and neither should you.

Playing a game of Russian Roulette with cyber crooks on the Internet is a mugs game – the pistol is loaded with SIX bullets. Unfortunately, you get to go first, and ducking is not an option in this game.

The bad guys will win; you will lose – there is little doubt about that. But hey, you might get lucky!

Playing this game essentially consists of any of the following forms of behavior. Go ahead – try your luck!

Download files and software through file-sharing applications such as BitTorrent, eDonkey, KaZaA and other such programs.

Make sure you click links in instant messaging (IM) that have no context or are composed of only general text.

Download executable software from web sites without ensuring that the site is reputable.

Use your USB stick on public computers, or other computers that are used by more than one person.

Be sure to open email attachments from people you don’t know.

Make it a practice of opening email attachments without first scanning them for viruses.

Open email attachments that end in a file extension of .exe, .vbs, or .lnk.

Don’t worry about it – just run your Windows computer as an administrator while on the Internet. You have to play the game, right?

laptop RIP

Additional actions you can take to ensure your computer system becomes infected.

Always run programs of unknown origin.

Don’t keep all applications (including your operating system) patched.

Don’t disable Java, JavaScript, and ActiveX.

Don’t disable scripting features in email programs.

Don’t make regular backups of critical data.

Don’t make a boot disk in case your computer is damaged or compromised.

Don’t turn off file and printer sharing on the computer.

Don’t install a personal firewall on the computer.

Don’t install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet.

Don’t worry about making sure your anti-virus software scans all e-mail attachments.

Now, you don’t have to follow all of the above suggestions. Just follow a few, and I guarantee you – you will become infected. You will lose the game.

Oh, did I mention, if you really want to mess things up, you should surf the Net without adequate Internet Browser protection such as WOT – the best Internet browser protection available.

This article may sound facetious, and to some extent, perhaps even cynical – nevertheless, the behavior points listed, (sorry – the game rules), are often the common behaviors of a large percentage of unaware, undereducated, and less security conscious computer users.

Is it any wonder the cyber criminals are winning this game?

Don’t be a loser. Don’t play this game. Ensure you have adequate knowledge to protect yourself. If you lack this knowledge the answer is simple – get it. The Internet (including this site), can be mined for information on free protective software, and tips and hints to keep you safe.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Browser add-ons, cybercrime, Don't Get Scammed, Don't Get Hacked, Internet Safety, Online Safety, Windows Tips and Tools, WOT (Web of Trust)

Tech Thoughts Daily Net News – January 30, 2010

First look at Windows Home Server – A deep look inside the pre-beta next-generation version of Windows Home Server.

10 Things Netbooks do better than the iPad – Most Netbooks, even low-end ones, now have webcams enabling basic video chat over Skype or any other program. The iPad, however, does not.

Tech Thoughts Daily Tech News 2

Lifehacker: Crack a Wi-Fi Network’s WEP Password with BackTrack, the Fancy Video Version – Last summer we detailed how to crack a Wi-Fi network’s WEP password using BackTrack. Now video blog Tinkernut revisits the subject with a great video step-by-step of the process.

Download Over 150 Free Advanced PowerPoint Slides to Jazz Up Your Presentations – Microsoft has released a collection of PowerPoint slide sets that show how you can push the envelope in slide design and get away from boring slides.

Survey of Executives Finds a Growing Fear of Cyberattacks – A survey of 600 computing and computer-security executives in 14 countries suggests that attacks on the Internet pose a growing threat to the energy and communication systems that underlie modern society.

Another Bogus Virus Warning Disrupts Facebook – The clever scam had Facebook users sharing and posting the bogus virus alert throughout the social networking site.

New Attack Uses Internet Explorer’s Own Features Against It – Microsoft investigating threat, considering patch, or offering guidance for protection

Off Topic:

Born to run barefoot: Is jogging barefoot a craze or just crazy? – Recent studies suggest humans running barefoot isn’t crazy at all and causes less jarring to the joints than running in sneakers. Less jarring equates to fewer injuries.

Behold The Great Light Bulb Scam! – Compact Fluorescent Light bulbs (CFLs) are showing up everywhere. Traditional light bulbs we’ve all used are about to be a thing of the past. CFLs are another example of good intentions gone bad. It should really be called “Green Insanity”. (submitted by Dar).

Australia’s effort to ban violent games has backfired – Has the Australian government’s most recent attempt at technological book-burning backfired? Last month, the government gave the green light to controversial plans to censor the internet and now fans of computer games have started a political party to protest the censorship of globally best-selling adult games.

Microsoft To Patch Hole In Ozone – Microsoft has announced plans to deliver a half dozen security updates next Tuesday, including patches for Internet Explorer, Windows Media Player, and the hole in the Earth’s ozone layer. (submitted by Dar).

DNA Evidence Can Be Fabricated, Scientists Show – Scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases. (submitted by Dar).

Today’s Quote:

“History is more or less bunk.”

–     Henry Ford

Today’s Free Downloads:

InstantMask – InstantMask lets you rapidly select which portions of a photo to keep and which to discard, and gives you a perfectly trimmed image with just your subject in a plain white background.

Sikuli Automates Almost Anything with Screenshot Ease – Windows/Mac/Linux: Ever wanted to write a script for some repetitive task, but don’t know how to code? Sikuli makes it possible for pretty much anyone to automate tasks, by telling it what to do with just some screenshots and simple commands.

Giveaway of the Day: Try iCare Data Recovery to take your lost files back! – iCare Data Recovery Software is a unformat, undelete and comprehensive recovery tool to help users recover files from formatted drive like hard disk drive, external hard drive, sd card, memory card, flash drive. Besides unformat, it can bring files back when partition is unreadable, inaccessible, partition deleted, mbr damged, boot sector damaged, virus attacked.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Tech Thoughts Daily Net News – January 30, 2010

Filed under Internet Security Alerts, Tech Net News

Manage Win 7 and Vista Services With Free Vista Services Optimizer

Reducing the number of running services can often turn a sluggish PC around. There’s no magic to it. Running with fewer services, especially a service that you don’t use, or need, puts less strain on both the CPU and system memory.

Tweaking services however is not without its hazards. For example, if a particular service is disabled, any other service/services that explicitly depend on it will fail to start. Worse, adjusting a service setting incorrectly has the potential to leave a computer in an unbootable condition. I know – I’ve managed to do just that, a time or two, over the years.

Recently, a free application that promises to allow a user to tweak Windows services in a safe and easy way, caught my attention. Vista Services Optimizer, an open source Windows tweaking utility, which despite its name has been optimized to run in Windows 7, makes good on this promise.

Vista Services Optimizer 1

The casual user with a few mouse clicks can easily optimize Windows services to increase performance and security, automatically. A more experienced user gets a little more leeway, and can manually tweak using a more in-depth feature list. In case your tweaking goes a step too far, recovery is just a mouse click away by simply using the built in Smart Rescue Center.

I don’t think it could be any easier to tweak Windows services than this. All the user needs to do is tick the appropriate check boxes, and Vista Services Optimizer takes care of the rest.

Vista Services Optimizer 4

Vista Services Optimizer 2

Fast facts:

System analysis highlights services that can be turned off

Automatic tune-up based on user’s system requirements

Profile building

Automatic service state snapshots

Gaming mode

Tweak your Windows services in an easy, automatic and safe way based on how you use your computer without requiring any technical knowledge.

Control Windows services in an easy, safe and advanced way without getting involved with Windows services names and dependencies.

Manual TuneUp

Services Diagnostics

Smart Rescue Center can restore default Windows services configurations in case of any problems using Services Snapshots

System requirements: Windows Vista with SP1 or higher (32-bit or 64-bit), Windows 7 (32-bit or 64-bit), Microsoft .NET Framework 3.5 with Service Pack 1

Download at: Smart PC Utilities

For those who need a portable tweaker you’re in luck – a portable version is available. However, Microsoft .NET Framework 3.5 with Service Pack 1, must be resident on the host machine.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Computer Maintenance, downloads, Freeware, Geek Software and Tools, Software, System Tweaks, System Utilities, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista

Tech Thoughts Daily Net News – January 29, 2010

10 ways to detect computer malware – In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware.

Is the U.S. Headed for a Cyber War? – With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? Military officials readily admit that government information systems are subject to constant attack from hackers domestic and abroad, with some commissioned by authorities in enemy nations.

REVIEW: avast! Free Antivirus 5.0 – You won’t recognize the latest version of the free avast! antivirus. It looks completely different and it’s got more power under the hood as well.

Tech Thoughts Daily Tech News 2

Google Rolls Social Search Beta Out to All Users – Google today announced that Social Search has graduated from Labs. The feature is now available in beta form to all users with a Google Profile. Once logged in and enabled, search a key term will bring up results from your friends on those networks toward the bottom of the page.

Testing AMD’s Five New CPUs – AMD is filling out its product line with five new CPUs, which offer price and performance across the spectrum. How do they compare to other AMD and Intel chips?

Identity Thieves Successfully Targeting Wealthy Victims, Study Says – Affluent individuals who live ‘the good life’ are 43 percent more likely to be victims, according to Experian.

Report: 48% of 22 million scanned computers infected with malware – The recently released APWG report shows that 48% of the 22 million scanned computers are infected with malware. Over a million and a half are infected with crimeware/banker trojans.

TechCrunch Hacked Again: Foul-Mouth Hacker Embarrasses Top Blog – The team behind one of the world’s top blogs have been left with egg on their faces after the site was hacked once again.

Off Topic:

The Problem with the Apple iPad – Steve Jobs worked his charm, attempting to wow the world with the Apple iPad, a new, super-slim computer he touted as the missing link between iPhones and laptops. It’s an undeniably beautiful device, but it also represents some serious problems.

Why You Should Think Twice About Freelancing – You’ll see a lot of encouragement to start freelancing on tech-obsessed blogs (ahem), often pitched with an eye toward some kind of ultimate freedom. The Freelance Folder blog drops a bit of work-from-home reality on would-be freelancers.

Science Channel Refuses To Dumb Down Science Any Further – Frustrated by continued demands from viewers for more awesome and extreme programming, Science Channel president Clark Bunting told reporters Tuesday that his cable network was “completely incapable” of watering down science any further than it already had.

Why we hear better than our parents did – It’s all that rock music, you see. Whether you were into the Dead, Springsteen or Blondie, the concerts you went to were loud and often ran long. You probably heard from your parents you would go deaf listening to that stuff. The concerns were valid, but it was your parents who were going deaf.

Today’s Quote:

“An economist is a man who states the obvious in terms of the incomprehensible”.

–     Alfred A. Knopf

Today’s Free Downloads:

Weave 1.0 Syncs Nearly Everything About Your Firefox Setup – Mozilla’s out with the 1.0 of its Weave project, and it delivers on what it first promised—quiet, complete syncing of bookmarks, passwords, preferences, history, and even open tabs. It also heralds the coming of a really cool mobile experience.

Giveaway of the Day: Online Armor, Defeats Threats That Antivirus Apps Miss! – Online Armor is known to one of the best if not the best desktop Firewall’s available and so it made sense to combine it with a leading Anti-virus scanning engine. As well as virus you will be able to scan, detect and delete Malware and Rootkits. Online Armor is usually 59.95 USD and for the next 24 hours you can get it Free.

Google Chrome – Google Chrome is a browser that combines a minimal design with sophisticated technology to make the Web faster, safer, and easier. Use one box for everything–type in the address bar and get suggestions for both search and Web pages.

Google Voice Notifier – The Google Voice extension for Google Chrome adds a button to the toolbar, which displays the number of unread messages in your Google Voice inbox.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

1 Comment

Filed under Internet Security Alerts, Tech Net News

WinPatrol – Today Only 99 Cents (A Great Addition to Your Geek Toolbox)

image Do you want to get a better understanding of what programs are being added to your computer? Then WinPatrol, a neat system utility that’s compatible with Windows 95 through to Windows 7, is the program for you.

WinPatrol monitors system areas that malicious programs must attack and use. If anything changes, Scotty (the system tray Icon) will alert you.

WinPatrol to go 1

In most cases, it will be a legitimate program you have recently installed. You can decide to keep it, remove it, or disable it, based on information provided by WinPatrol.

WinPatrol to go 2

Fast facts:

Remove Un-Wanted Auto Start crapware.

Disable Un-Needed Automatic Windows Services

Remove Annoying Toolbars and BHO’s

Create Reports that provide a snapshot of potential problems

Disable ActiveX Controls & MORE!

Compatible with Windows 95 – Windows 7

There are a host of additional features that make WinPatrol a very powerful addition to your security toolbox.

Take a look at the following from the developer’s site:

Enhanced Keylogger Detection

The use of keyloggers for illegal purposes has exploded. A Schenectady man was recently jailed for up to three years for felony eavesdropping after putting a keylogger on his wife’s computer. I’ve heard too many stories of abuse made possible due to keyloggers so it’s time for it to stop. While WinPatrol PLUS had always detected keyloggers we’ve enhanced this feature and it’s now available to free users so everyone is protected.

Optimized Detection of New Services

As more and more programs move to the Windows Service model it become apparent that this may be a popular avenue of attack in the future. The routine used to monitor and detect new Window Services has been optimized to make this process transparent.

Decrease CPU Usage and Conflicts

Conflicts with some other registry intense programs may have resulted in abnormally high CPU usage on past versions. WinPatrol 14 includes some intelligent routines to allow complete protection without fighting over resources with other security suites and system level programs.

Default -expressboot option

WinPatrol now includes a -expressboot option which will be used when machines boot up for the first time. This new feature optimizes boot time and allows other applications to maximize their initialization routines.

Regular Registry Cleanup

Some registry cleaners have complained that we don’t clean up some data stored in the registry quickly enough. This version will remove information that is no longer needed and “First Detected” information on a regular basic when the file no longer exists.

Download at: BillP Studios

For a comprehensive security article on this Blog, “The Top 10 Free Security Applications Your Security Toolbox Can’t be Without!” –  Click here.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under downloads, Geek Software and Tools, System File Protection, System Security, System Tweaks, System Utilities, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Free Licenses for Zemana AntiLogger – 3 Days Only

Last week, we ran a highly successful free license giveaway, for Zemana AntiLogger. The response from readers was overwhelming, and as a result, Zemana Software has agreed, once again, to provide free licenses for Zemana AntiLogger (retail value $34.00 U.S. each), in support of Tech Thoughts “Stay Safe on the Internet Campaign”.

In this latest giveaway, we have streamlined the process for downloading a licensed version of Zemana AntiLogger. Simply click on the link at the end of this review, and you will be provided with a free license instantly. This giveaway will end February 1, 2010, at 12:00 PM Eastern Standard Time (North America). This is a one day extension of the original offer, courtesy of Zemana.

Hundreds of readers missed out on the last offer since we simply ran out of licenses – if you missed out; this is your opportunity to get your license direct.

Update: January 31, 2010 @ 10:30 EST – Zemana’s license server may have intermittent problems in issuing a license.Cyber crimininals have launched a denial of service attack against Zemana, which included 100,00o requests per second from a network of bots. Zemana has hardened its defenses as a result, so we don’t expect this issue to continue. We apologize for the inconvenience. All license requests will be honored by Zemana.

For more information on this attack, please read our just posted article – Zemana AntiLogger Server Attacked by Bots.

If you have any problems installing the free license, or issues with the software, please contact Zemana support directly for assistance. You’ll find them to be fast, efficient, and courteous.

Here’s a graphic of the landing page (be sure to click on the link at the end of this article to get to this page).

Zemana Registration Page

Despite the best efforts by anti-malware developers to meet new threats head-on, cybercriminals will respond, as they always have, by generating even more diverse threats to evade detection and elimination. So, button up your overcoat and get your rain gear ready; 2010 is going to be the stormiest malware year to date!

After reading the following review of Zemana AntiLogger, I’m sure you’ll agree, this is an application that will increase your sense of safety as you surf the Internet.

Zemana AntiLogger – An Ounce of Prevention

Detective We’ve previously discussed Keylogger malware here, and how to employ an ounce of prevention by using highly regarded SnoopFree Privacy Shield, a free application, which unfortunately, is compatible with Windows XP only.

Because Keyloggers, are a particularly sinister type of malware, that, amongst other tasks, monitors every keystroke a user types on a computer’s keyboard, are often executed as part of a rootkit, or a remote administration (RAT) Trojan horse, they can be extremely difficult to detect, and remove.

While it’s true, that many good quality malware and spyware detection tools should capture Keyloggers, and a properly configured Firewall should prevent all authorized connections, the reality is – this is definitely NOT always the case. Keyloggers in fact, can disable Firewalls, and anti-malware tools.

Since my personal home machines now run on Windows 7, I can no longer protect against Keyloggers using SnoopFree Privacy Shield, so I had to find an alternative. Unfortunately, I could not find a freeware substitute application. However, I did find a competitively priced application, Zemana AntiLogger, following a reader’s recommendation, which I’ve been testing for just under 30 days.

I was immediately impressed by this application, particularly the system defense function. The application intercepted proposed changes to system files NOT picked up by other security applications on my system.

Since I use a Webcam extensively for communicating, I was more than happy to see the active Webcam protection offered by Zemana AntiLogger, which was immediately apparent.

Zamana Antilogger 2

Test Screens:


This is an example of a Zemana warning, triggered by my launching an anonymous proxy application which by design, injects code into my primary Browser. By checking an appropriate check box I established a rule, permitting this action in future.


This is an example of a Zemana warning, triggered by my updating both Microsoft Security Essentials and Malwarebytes definition databases which, in each case, will make changes to system files. Simply checking a check box establishes a rule, which will permit this action in future.


This is an example of a Zemana warning, triggered by a screen capture utility I was in the process of using. If this had been an illegal activity. I would of course, have received the same warning. Again, simply checking a check box establishes a rule, which will permit this action, by this utility, in future.

Part of the testing procedure in testing the ability of Zemana AntiLogger to block Keyloggers, included the use of Anti-Keylogger Leak Tester, which tests for 7 different keylogging attacks. All attacks were easily defeated by Zemana AntiLogger.

Fast facts:

Secure your Internet banking and financial transactions

Protect information in emails and Instant Messages

Protect keystrokes from spyware

Protect all screen images

Webcam Logger protection

System Defense

No need to download latest virus signatures

No need to know or detect the malware’s signature

No need to wait for updates from a virus lab

No need to scan files

Proactively looks for suspicious activity

Catches not just the usual suspects, but also sophisticated “zero day” malware

Prevents theft of data via secure connections (HTTPS / SSL)

Does not slow down your PC

Easy to download, install and use


System requirements: Windows Vista, XP and Windows 7.

First: Download Zemana AntiLogger from here. If you have a problem with this link, use this link.

Next: Download your free license from: Zemana – (you’ll receive your free license immediately). The license must be activated by the end of the day, February 1, 2010.

All the signposts point to 2010 being a banner year for cyber-criminals. Being prepared and being aware, while not a panacea, will continue to be a key element in mitigating risk exposure. Adding Zemana AntiLogger to your layered defenses, will have positive impact on your ability to manage your risk exposure.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Anti-Keyloggers, Anti-Malware Tools, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Full Versions, Free Security Programs, Software, Software Giveaways, Spyware - Adware Protection, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Facebook Fake Virus Alert Reports PandaLabs

PandaLabs and Panda Security’s malware analysis and detection laboratory, has detected the massive propagation of a fake virus alert among Facebook users in the last 24 hours. According to the company, this is another attempt by cybercriminals to infect users with fake antivirus programs.

The fake warning is being distributed via e-mail and users are forwarding it or publishing it on Facebook walls, further spreading the hoax. The text of the fake warning reads as follows:

ALERT >>>>> Has your facebook been running slow lately? Go to “Settings” and select “application settings”, change the dropdown box to “added to profile”. If you see one in there called “un named app” delete it… Its an internal spybot. Pass it on. about a minute ago….i checked and it was on mine.

There is no associated link, but if users search the Web for more information, they will encounter numerous malicious websites designed to download fake antiviruses. For example, some look like this:


The fake antivirus (or rogueware), used in this fake virus alert is called LivePcCare. Following are additional screenshots that demonstrate what these warnings look like:



PandaLabs advises users against contributing to the propagation of this fake virus warning. In addition, consumers are urged to ensure their computers have the latest protection technologies and run frequent on-demand scans of their computers.

More information about these and other malicious codes is available in the Panda Security Encyclopedia. You can also follow Panda Security’s online activity on its Twitter and PandaLabs blog.

The computer security software industry has formed an organization called the Common Computing Security Standards Forum, to combat the rise of Rogue Anti-Virus. Among other things, it publishes a list of legitimate Computer Security Software Companies. Before installing any security application on your computer, you are advised to check it out on this site.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under Don't Get Scammed, Don't Get Hacked, FaceBook, Malware Advisories, Panda Security, PandaLabs, Rogue Software, scareware, Windows Tips and Tools

Download Prey – A Free Recovery Solution to a Lost or Stolen Laptop

image I’ve been planning for some time on writing an update on lost or stolen Laptops, the costs involved, and the consequences that often follow.

Following last night’s news story on “Laptops containing sensitive records belonging to thousands of Ontario teachers have been stolen”, on my local (Toronto) CBC News – now seems like the perfect time. So, let me mount my soapbox for just a moment.

What I found particularly offensive in this news story:

The Laptops were stolen December 3, 2009, and yet it took until January 27, 2010 to notify the affected parties. This, despite the fact, that stolen information of this type can be used to obtain false passports and fake credit cards, or for re-mortgaging a victim’s home.

As is often the case in this type of situation, the data on the Laptops was not encrypted.

Officials involved in this debacle were quoted as saying “but the computers were password-protected”. Officials, who obviously have no understanding, that readily available and legal, free software, can be downloaded from the Internet that can break, or reset passwords, in minutes.

This type of occurrence begs the question: is this just a “one off” or, is this type of occurrence a continuing problem?

If we are to be guided by recent survey results from the Ponemon Institute, which indicate that more than 10,000 laptops are lost, or stolen, each week at U.S. airports alone, coupled with statistics which indicate that a laptop is stolen, not lost but stolen, every 53 seconds,  it would be hard to dismiss this as an isolated occurrence.

Reportedly, 65% of lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information, which, in most cases, is not encrypted.

One would assume, that encrypting sensitive data on enterprise or government laptops, or portable media, would be SOP. Instead, it seems that when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – “200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week”.

There are substantial hard costs incurred in the loss or thief of a Laptop, and again, statistics available from the Ponemon Institute “Cost of a Lost Laptop”, indicate that these hard costs can approach $50,000 per occurrence, for enterprise.

It’s not only business or government that should be concerned with the loss, or theft, of a Laptops – it’s every bit as likely to happen to individual Laptop owners.

If you are a Laptop owner, you should consider what can you do now, to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you.

One solution is offered by Prey, an open source application, that can enhance recovery chances. Stolen laptop recovery is always a hit and miss proposition, but without an application such as Prey on board, the chances of recovery, at least statistically, are virtually nil.

Prey  web service

According to the developer:

Prey helps you locate your missing laptop by sending timed reports with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and – in case your laptop has an integrated webcam – a picture of the thief.

Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. The thief will never know his movements are being watched.


There is no guarantee that even with Prey on board that a stolen, or lost Laptop, will be recovered – but it seems sensible to make every effort to increase that likelihood. Prey, may be just the solution you’ve been looking for.

Fast facts:

Wifi autoconnect – Prey checks if there’s an active internet connection to send the information.

Geo-location aware – Prey uses wifi hotspots to locate devices geographically. This not only includes lat/lng coordinates, but also an altitude indicator.

Lightweight – Prey is written in bash which means it has virtually no dependencies, only what it different modules need to work. This also means Prey is portable and should run in just about any computer.

Modular architecture – You can add, remove and configure the different parts of Prey as you wish. Prey is composed by modules, each one performing a specific task.

Powerful report system – Get the list of current running programs, the recently modified files, active connections, running uptime, take a screenshot of the running desktop or even a picture of the guy who’s using the computer.

Messaging/alert system – You can alert the thief  he’s being chased at by sending messages which will appear on screen. You can also trigger alarms to make the message clear not only to him but also to whomever is nearby.

Module auto-installer – You don’t have to reinstall Prey to keep up with the latest and greatest modules. We keep a repository from where Prey will fetch what it needs to get the job done.

System requirements: Windows 2000, XP & Vista, Mac OS, Ubuntu Linux, Linux – other distributions.

Download at: The Prey Project

For a review and download links to free encryption software please read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this site.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.


Filed under downloads, Free Laptop Tracking Software, Freeware, Laptop recovery, Open Source, Software, Windows Tips and Tools