Здесь может быть Ваша реклама

2baksa.ws2baksa.ws
Помощь сайту | Donate
Webmoney
Webmoney WMZ: 826074280762
Webmoney WME: 804621616710
PayPal
E-mail E-mail
YooMoney
YooMoney4100117770549562
Помощь проекту
Спасибо за поддержку!
Поиск по сайту
Вход на сайт
Меню
Последние комментарии
21:31 | Haul2006
21:15 | DIRKES
01:27 | Wanker
21:33 | ExaFlop
06:57 | eduard33
06:51 | eduard33
06:49 | eduard33
09:46 | diim
18:57 | diim
16:19 | Assur
15:58 | Pepa112
21:17 | Trashman
12:57 | mxhxbug
07:20 | Haul2006
19:15 | Carhel
16:53 | mrjok
09:17 | m4657
03:20 | Haul2006
16:36 | eduard33
14:52 | tinbin
Заказ рeклaмы

Купите у нас
рекламу !

Your advertising could be here !


E-mail для связи:
E-mail для связи
Партнёры
Для вас работают
Правила для авторов новостей >>
admin diim (админ)
admin brodyga (админ)
admin marlon
admin leteha
admin Ledworld
admin Mansory1
admin Masarat
admin manivell17
admin Sanchezzz
admin sibius777
admin Sergv


Anti-Rootkits AIO - Protect Your PC (For Win/Linux/BSD) by The.Undead.Mineons
Новость от: slam
Просмотров: 1697
Anti-Rootkits AIO - Protect Your PC (For Win/Linux/BSD) by The.Undead.Mineons — подборка программ "все-в-одном" для защиты Вашего ПК от rootkit'ов - скрытых программ-шпионов полученных по почте через локальную или интернет сеть и собирающих Ваши данные - пароли и прочую секретную информацию. ******************************************************************************************* Anti-Rootkits AIO - Protect Your PC (For Win/Linux/BSD) by The.Undead.Mineons — protect your PC from rootkits.

Full images: http://img106.imageshack.us/img106/3411/righttl5.jpg http://img113.imageshack.us/img113/6816/002760origpt1.jpg http://img71.imageshack.us/img71/7862/003003origth9.jpg A rootkit is a program that is designed to hide itself and other programs, data, and/or activity including viruses, backdoors, keyloggers and spyware on a computer system. A Rootkit can keep itself, other files, registry keys and network connections hidden from detection and this is why they are so dangerous. Rootkits are used to hide the existence of Spyware, Trojans, Keyloggers and other malware on computers. They are also commonly used by hackers to hide the backdoors they install on computers. The rise in the use of Rootkits can be seen at the moment as more Spyware creators trying to hide their installation from the evolving Spyware scanners and virus writers trying to hide their existance. Applications Included: Windows Anti-Rootkit Apps: Rootkit Revealer F-Secure BlackLight Process Master HookExplorer GMER UnHackMe IceSword Darkspy System Virginity Verifier Rootkit Hook Analyzer HiddenFinder LavaSoft ARIES Rootkit Remover Windows Rootkit Prevention Apps: AntiHook Pro Process Guard GesWall Personal Defense Wall HIPS SocketShield Neoava Guard Defense Plus Linux/BSD Apps: CHKRootkit RkHunter Zeppoo AntiHook AntiHook is a unique desktop-based Host Intrusion Prevention (HIP) product. AntiHook dynamically protects your privacy, operating system and applications from malicious software, such as Spyware, Rootkits, Keyloggers, Code Injection, and Trojans. Exhaustive Real-time Protection AntiHook is kernel mode protection that detects and prevents attacks in real-time. It can be trained to isolate malicious activity. ARIES Rootkit Remover The ARIES Rootkit Remover developed by Lavasoft provides the means to locate and permanently remove the Sony rootkit from the system and disable the rootkit's ability to run once more after reboot. This standalone tool is a reliable, trustworthy, and safe way of removing the rootkit--unlike Sony's own rootkit remover that has been known to cause blue screens. This primarily protects consumers and ensures privacy. The tool is developed by Lavasoft in line with our common goals to steer computing environment towards better standards. F-Secure Blacklight F-Secure BlackLight Rootkit Elimination Technology detects objects that are hidden from users and security tools and offers the user an option to remove them. The main purpose is to fight rootkits and all kinds of malware that use rootkits. The F-Secure BlackLight Rootkit Elimination Technology works by examining the system at a deep level. This enables BlackLight to detect objects that are hidden from the user and security software. F-Secure BlackLight can detect and eliminate active rootkits from the computer. Traditional antivirus scanners can't detect active rootkits. On a normal system F-Secure BlackLight does not confront the user with a long list of suspected objects. This makes F-Secure BlackLight useful even for non-technical users. F-Secure BlackLight Rootkit Elimination Technology can be used in the background during normal system operation. Other available scanners require a reboot during scan or may produce false positives if the system is used during scanning. DefenseWall HIPS DefenseWall HIPS (Host Intrusion Prevention System) is the simplest and easiest way to protect yourself from malicious software (spyware, adware, keyloggers, rootkits, etc.) when you surf the Internet! Using the next generation proactive protection technologies, sandboxing and virtualization, DefenseWall HIPS helps you achieve a maximum level of protection against malicious software, while not demanding any special knowledge or ongoing online signature updates. GeSWall Personal Edition GeSWall Personal Edition from Gentle Security who are based in Luxembourg have brought out a nice and FREE application that "dynamically isolates web browsers, e-mail, chat, P2P, IRC clients and other applications that may serve as entry points for malicious software or intrusions. Viruses, trojans, spyware and exploits cannot pass through an isolated application and so cannot cause any damage." This application also protects the kernel which in turn stops rootkits from taking hold. GMER Gmer is a new hidden services, hidden registry, hidden file scanner and also other features. It is a very nice piece of software and has a very nice user interface which makes it very easy for non technical people to use GMER can detect.... hidden processes, hidden services, hidden files, hidden registry keys, hidden drivers, drivers hooking SSDT, drivers hooking IDT, drivers hooking IRP calls. GMER also allows to monitor the following system functions: processes creating drivers loading libraries loading file functions registry entries TCP/IP connections. HiddenFinder HiddenFinder is a advanced security utility which instantly detects and kills the hidden processes and drivers. Hidden process and driver can be the result of sophisticated spyware, backdoor, rootkit and virus attack. HiddenFinder explorers the system in kernel level and shows all running processes and drivers including hidden. The termination of hidden process immediately stops the major portion of spyware, virus and Trojan attack. HookExplorer HookExplorer is a small utility designed to scan a target process and identify any user land hooks that may be installed by unknown code. Detects IAT and detours style hooks, and allows the user to define an 'ignore list' to help cut through results. IceSword IceSword has a Windows Explorer-like interface but displays hidden processes and resources that Windows Explorer would never show. It isn't a "click-here-to-delete-rootkits" product but a sophisticated discovery tool that can protect against sinister rootkits if used before they infect a machine. Neoava Guard Neoava Guard using Malware Action Detection and Protection (MADP) technology helps you protect your computer against malicious softwares. Neoava Guard allows you to completely control any suspicious action in your computer. The only things you should do is to help Neoava Guard identify useful applications in your computer, so there will be very little wrong alerts. Also you can disable/enable the filters and change the level of security the Neoava Guard. By the way, Neoava is the first program that use this unique technique to control your computer against malicious software. ProcessGuard ProcessGuard is a powerful new cutting-edge program that greatly increases the security of your computer by preventing processes from being able to attack each other. It is considered by experts to be a must-have program for all users of Windows, and is the only program available that can prevent the infection of all known rootkit trojans. Process Master Process Master is an advanced utility for hidden processes detection and killing. It successfully detects the presence of such famous rootkits as HackerDefender and Fu. Even if your favourite anti-virus or anti-spyware program can not detect hidden process, you have the chance to detect it manually using Process Master. It is a necessary tool for every advanced user. Advanced viruses, spyware and rootkits work by changing API results. Process Master compares the API results with the results of advanced low-level system technics. It is theoretically possible for viruses, spyware and rootkits to hide from Process Master. But Backfaces Team is continuously researching new methods of hidden processes detection Rootkit Hook Analyzer RootKit Hook Analyzer is a security tool which will check if there are any rootkits installed on your computer which hook the kernel system services. Kernel RootKit Hooks are installed modules which intercept the principal system services that all programs and the operating system rely on. If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active. Rootkit Revealer RootkitRevealer is an advanced patent-pending root kit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects all persistent rootkits published at http://www.rootkit.com/, including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). SocketShield Zero-day exploits are traded online for financial reward. International cyber-gangs cruise the web, constantly on the lookout for software vulnerabilities to exploit. Actively seeking to make money by defrauding computer users, these gangs lurk behind the scenes on legitimate websites and use drive-by download techniques to deliver their poisonous payloads - without your knowledge or permission. Software vulnerabilities are a fact of life. What's needed is a way to prevent the bad guys from exploiting the risk window — the time between discovery and patching of a vulnerability. This risk window is getting wider as the criminals get smarter — zero-day exploits can be in circulation within minutes of a vulnerability being announced, while software companies take an average of two months to distribute a fully-tested patch. SocketShield stops exploits from getting on to computers during the risk window. Easy to use, it protects vulnerable systems against drive-by-downloads and other web-based zero-day exploits. Developed by the people behind PestPatrol and ZoneAlarm, SocketShield delivers the first truly effective protection against zero-day exploits System Virginity Verifier The idea behind SVV is to check important Windows System components, which are usually altered by various stealth malware, in order to ensure system integrity and to discovery potential system compromise. UnHackMe is specially designed to detect and remove Rootkits. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits. Zeppoo With Zeppoo you can detect if a rootkit is installed on your system. It also allows you to detect hidden tasks, modules, syscalls, some corrupted symbols and also hidden connections. For that, Zeppoo uses mainly /dev/kmem to inspect directly the kernel memory and when it's possible /dev/mem. 42.6 MB
Download/Скачать
Rar pass: www.2baksa.net

Чтобы Скачать с rapidshare !
Кликаем по ссылке, далее еще раз внизу страницы на кнопу "Free", ждем 20-40 секунд до появления картинки с символами.
Вводим эти символы в поле и кликаем "Start Download".
Thx to yashar and friends!

Уважаемые пользователи nowa.cc и 2baksa.ws. У нас сложилось тяжёлое финансовое положение. Мы работаем для вас вот уже более 15 лет и сейчас вынуждены просить о помощи. Окажите посильную поддержку проектам. Мы очень надеемся на вас. Реквизиты для переводов ниже.
Webmoney Webmoney WMZ: 826074280762 Webmoney WME: 804621616710
PayPal PayPal_Email E-mail для связи по вопросу помощи
Кошелек для вашей помощи YooMoney 4100117770549562
YooMoney Спасибо за поддержку!

Раздел: Наборы AIO | 13.08.06 | 18:13

Внимание! Всегда проверяйте анти-вирусом файлы, полученные по ссылкам в комментариях!
Attention! Always check files you download from links in comments with your anti-virus software!
LEOKRASS 13.08.06 | 23:52:44

SLAM!!! Огромное СПАСИБО за потрясающую подборку Anti-Rootkits!!! Это - КЛАСС!!!
slam 14.08.06 | 00:14:42

LEOKRASS, спасибо The.Undead.Mineons за подборку, респект крякерам и отдельный поклон yashar'у! / Thx to The.Undead.Mineons, credits to patchers, and give my respect to yashar! idea Ну....а нам все остальное redface
teo 14.08.06 | 03:54:47

biggrin biggrin biggrin
wiseman55 15.10.06 | 03:50:55

Thanks for the share!! biggrin biggrin idea idea
geniusppang 29.06.07 | 14:48:16

idea idea idea
Для добавления комментариев необходимо зарегистрироваться на сайте
Здесь может быть Ваша реклама
Здесь может быть Ваша реклама
Design by DolpHin | Disclaimer
Реклама | E-mail для связи: E-mail для связи | Skype: diim_diim | ICQ: 400632