Archive for May, 2010

Download : http://personalfirewall.comodo.com/free-download.html
After downloading install Comodo with default settings (Secure DNS …)

Firewall > Stealth Ports Wizard > Block all incoming connections

Firewall > Advanced > Firewall Behavior > Advanced > Check all

Defense + > SandBox >  SandBox Settings > Uncheck Automatically Detect Installers

Defense + > Advanced > Image Execution Control Settings > Aggressive

The antivirus in recomended with default settings only the Heuristics you cand set to High (you can have false positive but high detection rate)

This settings are good for firewall to and as antivirus you can use Panda Cloud


About Combofix is not much to say, is one of the best tools
Before use read the guide (not to have problems later)

How to use ComboFix [ here ]

Download : [ here ]

Ice Sword

Posted: 21 May 2010 in SecurityProducts, Tools
Tags: , ,

IceSword has a Windows Explorer-like interface but displays hidden processes and resources that Windows Explorer would never show. It isn’t a “click-here-to-delete-rootkits” product but a sophisticated discovery tool that can protect against sinister rootkits if used before they infect a machine

[ Download ] Current Version – 1.22 – English

Current Version – 1.22 – English

IceSword122en.zip – MD5: 49582e999155cdf2812a1d645caf0831

This tool is for advance users

Autoruns

Posted: 19 May 2010 in Tools
Tags: , , ,

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys.

You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP.

Autoruns’ Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc.

Download : http://live.sysinternals.com/autoruns.exe

Caution: Do not delete anything just uncheck

Spyware Terminator ( http://www.spywareterminator.com/ )


Scanning :

  • On demand Fast Scan – scans only critical areas of your system, allowing you to quickly assess your computer’s health
  • On demand Full Scan – scans all areas of your system, thoroughly scanning every file on your hard drive and encompassing everything performed during a fast scan.
  • On demand Virus and Spyware Scan – using the optional ClamAV component, this scan offers everything performed during a Full Scan plus checks all files against the ClamAV database of threats.
  • On demand Customized Scan – gives the user the ability to customize how a spyware scan is performed, including the ability to store up to five different custom scan profiles.
  • Scheduled Scan – provides the user with the ability to schedule spyware scans on a daily or weekly basis.
  • System Report – When the scan is finished, detailed scan information is reported about the state of system. This information can be copied into a text editor or posted to any of your preferred security forums on the internet.
  • Context menu scan option – The integrated entry in the right-click context menu allows for scanning of any file or folder you are currently viewing in Windows Explorer. Just right-click the file or folder and click “Scan with Spyware Terminator”.

(more…)

What does “HIPS” mean anyway?

It stands for Host Intrusion Prevention System.

In essence it’s a program that alerts the user to a malware program such as a virus that may be trying to run on the user’s computer, or that an unauthorized user such as a hacker may have gained access to the user’s computer
(more…)

Secure DNS

Posted: 10 May 2010 in SecurityProducts, Tools
Tags: , , , , ,

COMODO Secure DNS : http://www.comodo.com/secure-dns/

More Reliable – Comodo Secure DNS’s server infrastructure currently spans 15 locations (nodes) and five continents around the world. This allows Comodo to offer you the most reliable fully redundant DNS service anywhere. Each node has multiple servers and is connected by several Tier 1 carriers to the Internet.

Faster – Comodo uses strategically placed nodes are located at the most optimal intersections of the Internet. Unlike most DNS providers, the Comodo our request routing technology means that no matter where you are located in the world, your DNS requests are answered by the closest available set of servers, resulting in information becoming available faster and more reliably than ever before.

(more…)