30 Eylül 2012 Pazar
Tech think tank's website rejects browser do-not-track requests
The website for the Information Technology and Innovation Foundation (ITIF) now tells visitors it will not honor their browsers' do-not-track requests as a form of protest against the technology pushed by privacy groups and parts of the U.S. government.
The tech-focused think tank on Friday implemented a new website feature that detects whether visitors have do-not-track features enabled in their browsers and tells them their request has been denied.
nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32
Robot police drones could put disabled cops back on the beat
nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri
Rogue:W32/SystemTool
Australian telcos warn of criminal advantage in data retention
Criminals could take to smaller telcos or internet service providers to escape the Federal Government's proposed data retention regime, Telstra and iiNet have warned.
The telcos fronted a parliamentary committee inquiring into the retention proposal, which aims to keep telecommunications metadata for two years.
Representatives for Australia's largest carriers warned that criminals could simply move to smaller internet service providers and telcos to escape the purview of spy agencies hoping to use captured metadata to make associations or connections between suspects.
Backdoor:OSX/Olyx.C
nod32 full indir nod32 full download full nod32 download est nod32 serial
Cyberspying effort drops 'Mirage' on energy firms
nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
Facebook Embraces Bubbles in Messenger iPhone Upgrade
Trojan:W32/Ransomcrypt
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
Exploit:W32/D-Encrypted.Gen
New ZitMo for Android and Blackberry
Ten months ago we�ve published an article about ZeuS-in-the-Mobile which contains an overview of everything we knew about ZitMo at that moment. The paper finishes with the following prediction: �they [attacks involving ZitMo] will become more specifically targeted against a smaller number of victims�. This prediction appears to have been correct. It�s not that often when we hear/find new wave of ZeuS-in-the-Mobile (or SpyEye-in-the-Mobile) attack. So every new piece of information about these types of malware and/or attacks involving them is very important and helps to understand the evolution of one of the most interesting threats in mobile space so far. Just a small reminder: ZeuS-in-the-Mobile is almost 2 years old. And this blog is about new samples (and probably new wave of attack)) of ZitMo for Android and Blackberry.
New samples overview
We�ve got 5 new files of ZitMo: 4 for Blackberry and 1 for Android. As you may know, the Blackberry platform has never been actively targeted by malware. And here we have 4 different samples of ZeuS-in-the-Mobile for Blackberry at once: 3 .cod files and 1 .jar file (with one more .cod inside). Yes, finally we�ve got a ZitMo dropper file for Blackberry.
As for Android, there is only one .apk dropper. But this ZeuS-in-the-Mobile for Android has been modified and now looks like a �classic� ZitMo with same commands and logic.
Countries and C&C numbers
All samples of ZitMo we�ve seen so far target users from various European countries (Spain, Poland, Germany, etc). This case is no exception. Here is a list of countries from which users are threatened by new ZeuS-in-the-Mobile with C&C number from the sample.
Blackberry:
- Germany +46769436094
- Spain +46769436073
- Italy +46769436073
- Spain +46769436073
Android
- Germany +46769436094
To summarize, there are 3 countries (Germany, Spain and Italy) and 2 C&C numbers (both are Swedish). We found out that these cell phone numbers belong to Tele2 mobile operator in Sweden.
Power Nap With This Head-Consuming Ostrich Pillow
Packed:W32/PeCan.A
Your car, tracked: the rapid rise of license plate readers
Tiburon, a small but wealthy town just northeast of the Golden Gate Bridge, has an unusual distinction: it was one of the first towns in the country to mount automated license plate readers (LPRs) at its city borders?the only two roads going in and out of town. Effectively, that means the cops are keeping an eye on every car coming and going.
A contentious plan? Not in Tiburon, where the city council approved the cameras unanimously back in November 2009.
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
Trojan-Dropper:OSX/Revir.B
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
Which Are the Most Social Colleges? [INFOGRAPHIC]
Packed:W32/PeCan.A
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
5 Easy Steps To Make Your Job Descriptions Go Viral
Jason Webster is a social recruiting enthusiast and co-founder of Ongig, a platform that creates shareable, visually-appealing job descriptions. He has spoken at multiple social recruiting events, where his passion for candidate experience is the primary topic. Connect with Jason and Ongig on Twitter, Facebook, and LinkedIn.
nod32 turkce nod32 full indir nod32 full download full nod32 download
EuSecWest 2012: That thing in your pocket

AMSTERDAM -- As part of my job monitoring security threats and trends for Kaspersky Lab's global research team, I'm exposed to a healthy dose of paranoia from white hat researchers who find it trivial to hack into modern operating systems and platforms.
After a few days of hanging out in the hallways with exploit writers, I find myself clutching my laptop to my chest a little tighter and constantly peeking at my mobile phone to make sure nothing out of the ordinary is happening.
None of this paranoia is misplaced. Just pay attention to the lessons from the Pwn2Own challenges organized by the CanSecWest/EuSecWest folks (shout-out to Dragos Ruiu for putting together top-notch events) and you get a real-world understanding of why it's near impossible to keep away a motivated adversary.
This week, I had the opportunity to interview the hacking teams that used zero-day vulnerabilities and clever exploitation techniques to compromise fully patched iPhone 4S and Android 4.0.4 (Samsung S3) and the big message from these hackers was simple: Do not use your mobile device for *anything* of value, especially for work e-mail or the transfer of sensitive business documents.
For many, this is not practical advice. After all, your mobile device is seen as an extension of the computer and there is a legitimate need to access work e-mail on iPhone/iPad, Android and BlackBerry smart phones. However, whether you are a businessman, a celebrity or the average consumer, it's important to start wrapping your mind around the idea of separating work from play on mobile devices.
güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key
29 Eylül 2012 Cumartesi
Chicago looks to Twitter for answer to gun problem
Featured apps from the Appolicious community of iOS developers
Defcon is 20 Years Old in 2012
Defcon 2012 marked its 20th anniversary with unexpected speakers, some pretty tough content, and the cultural dark magic that buzzes the conference every year.
The Dark Tangent welcomed Mark Weatherford. an ex-Navy and Raytheon security guy that became the CISO of the State of Colorado and California and then CSO at the highly regulated NERC before recently moving on to a top spot at the Department of Homeland Security. Weatherford provided some insight into the amount of attacks he sees every day, and then moved on to explaining that some of the best people he is working with don't have a college degree and some recruiting - they are hiring.
The next, huge name that Dark Tangent brought out was General Keith Alexander, Commander of the US Army CyberCom and Director of the NSA/CSS. It seems to be a sign of the times that the hacker community would be approached by the individual building out what is becoming the largest group of "cyberwarriors" in the world, attempting to draw shared principles and parallels between the groups. The guy was genuinely funny, rolling out jokes throughout his talk and Q&A answers, inviting kids onstage and showing off multiple tshirts. Aside from the explanation of their mission and the recruiting talk, a couple other interesting topics came up. According to Alexander, folks should know better than claiming that the NSA maintains files on every individual in the US, and he thinks that the Cybercom doesn't need to become larger than the current US Navy, partly because of the power that automation and smart work provides. Oh, and they are hiring. It was a repeated theme this past week.
A couple of the talks were shocking in their presentation. FX from Phonoelit and Recurity Greg analysed just how bad Huawei router code really is from a security perspective, it was almost unbelievable for a product line from a $21 billion company. Their preso began with a Code Quality slide that they claimed was almost left empty. Every slide's content made it seem like Huawei security practices and implementation couldn't be worse than suggested by the previous slide, but it did. And it was bad. After pouring over the router codes' open services and inability to be disabled, they described a lack of security advisories and updates, interrupt tables with RWX access, a Chinese-only debug interface, a lack of any communication channel whatsoever for reporting vulnerabilities, and a lack of real security development lifecycle throughout the code development, they followed Huawei's lead and copy/pasted their decades old Cisco IOS exploit code into exploits developed for these Huawei routers, targeting 90s style vulnerabilities. The company clearly has't also taken security lessons learned from Cisco's experience in this space.
At first, I was disappointed that the "Dr Strangelove" nuclear power plant SCADA system talk was cancelled without notice to attendees until arrival at the talk. It was replaced with a talk on SCADA HMI (or human-machine interfaces) security issues from Wesley McGrew titled "SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor". At face value, it sounded comparably uninteresting. But, it was eye-opening. The talk itself weaved through known, commonly approached technical problems that were met with disturbingly juvenile, incorrect security implementations - these systems are critical infrastructure and security requirements are not being met. This talk was complemented by Alberto Garcia Illera's pen-testing adventures in the transportation systems of Spain, using simple, unforeseen flaws in publicly accessible systems, to peel layers back until they reached the poorly protected SCADA systems called "How to Hack All the Transport Networks of a Country". The first talk revealed incredibly weak implementations in SCADA systems, and the second revealed exactly why those weaknesses need to be fixed and better understood by their developers and vendors.
eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri
Twitter users may be victims of direct message malware
nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32
Rogue:OSX/FakeMacDef.A
nod32 full download full nod32 download est nod32 serial 64 bit nod32
HP could be headed for another multibillion-dollar write off
Even if the worst is over for HP (HPQ), the company may not yet be done writing off losses from past acquisitions. The�San Jose Business Journal�interviewed a few analysts to get predictions on what HP?s analyst meeting will reveal next week, and Jefferies?�Peter Misek says that the electronics giant could be poised to write off $3 billion in losses linked to its 2011 acquisition of�enterprise information technology firm Autonomy. Last quarter, HP took a $8 billion charge related to its 2008 acquisition of Electronic Data Systems.�Overall,�Misek has recommended that investors sell their HP shares and has projected that the company?s stock price will drop to as low as $14 over the next year. Read
Other:W32/Generic
indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key
Trojan:W32/Murofet.A
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
Trojan:BASH/QHost.WB
esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download
Google can't enforce German Microsoft injunction: ruling
SAN FRANCISCO (Reuters) - A U.S. appeals court on Friday ruled that Google Inc's Motorola Mobility unit cannot enforce a patent injunction that it obtained against Microsoft Corp in Germany, diminishing Google's leverage in the ongoing smartphone patent wars. The injunction would have barred Microsoft from "offering, marketing, using or importing or possessing" in Germany some products including the Xbox 360 and certain Windows software. The ruling against the German injunction came from the 9th U.S. Circuit Court of Appeals in San Francisco. ...
Mikko's world: Governments, factories and washing machines
WHEN the Stuxnet virus was first detected back in June 2010, its true purpose was unknown.
�
Security experts were only able to confirm that it was a Windows worm that spread via USB sticks and once inside an organization, it could also spread by copying itself to network shares if they had weak passwords.
�
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
Canada aware of two cyber attacks, won't say if China involved
OTTAWA (Reuters) - Canada said on Friday it was aware of an attempt by hackers to target a domestic energy company, the second time in 24 hours Ottawa had acknowledged a cyber security attack against a Canadian firm. In both cases the Canadian government declined to comment on reports which suggested a Chinese connection. The news comes at an awkward time for Canada's Conservative government, which is deciding whether to approve a landmark $15.1 billion bid by China's CNOOC Ltd to take over Canadian oil producer Nexen Inc. ...
indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key
Exploit:Java/Blackhole
nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key
New Java flaw could hit 1 billion users
Android owners minimize cellular data usage in response to new shared data plans
The two largest carriers in the U.S., Verizon (VZ) and AT&T (T), have been heavily promoting their shared data plans since they launched this past summer. Now that the days of unlimited data are coming to an end, users are more cautious about what they download. New research from NPD Group revealed that Android smartphone users have begun to prioritize Wi-Fi over cellular networks, Fierce Wireless reports. The research firm found that users downloaded an average of 2.5GB per month on Wi-Fi, compared to roughly 870MB of data on cellular networks. A further breakdown of the numbers revealed that young adults aged 18 to 24 unsurprisingly use the largest amount of cellular data, averaging 1.05GB per month, compared to adults
nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
USSD attack not limited to Samsung Android devices, can also kill SIM cards
A variation of the recently disclosed attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers say.
Ravishankar Borgaonkar, a research assistant in the Telecommunications Security department at the Technical University of Berlin, recently demonstrated the remote data wiping attack at the Ekoparty security conference in Buenos Aires, Argentina.
nod32 turkce nod32 full indir nod32 full download full nod32 download
28 Eylül 2012 Cuma
Trojan:Android/AutoSPSubscribe.A
Virus:W32/Ramnit.N
Other:W32/False Positive
est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce
Thoughts from the IDC Security Roadshow in South Africa
Greetings from the IDC Security Roadshow in Johannesburg, South Africa! I am sitting here in the hotel lobby looking out at the Nelson Mandela Square listening to the explosive track from DJ Fresh - The Feeling (Ft. RaVaughn) (Metrik Remix), reflecting on the last couple of days and the discussions I�ve had with various people.
I have been giving a few interviews and I was also presenting at the IDC security conference; my presentation is called �The Diary of a Security Geek� and it includes material from a one year long research project I have had. It basically contains observations made during these conferences and some really interesting facts on how security managers see IT security, how they prioritize and some interesting false perceptions on IT security and risks. I know that some of you might be interested in this research, so don�t worry - I will publish my research at a later date and I will also be giving the same presentation on quite a few conferences around the world this year.
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
WebOS opens up at last [video]
WebOS, the dearly departed mobile operating system developed by Palm and purchased by HP (HPQ), is open source at last. HP on Friday took the wraps off of�Open webOS 1.0, which has ?an�OpenEmbedded�build�that allows a full webOS experience running inside an OE emulator,? along with core email and browsing applications that can be ported onto different devices. HP says it will continue adding key features to Open webOS in the coming months, including open sourced media and audio components, the�BlueZ Bluetooth stack and optimized�SysMgr rendering architecture. A video demonstration of how to port Open webOS onto an HP device is posted below. Read
Avira kills its pop-up for 2013, sort of
iOS 6 allows tweets, Facebook posts from locked device
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
Backdoor:OSX/Tsunami.A
güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32
Feds snoop on social-network accounts without warrants
Federal police are increasingly gaining real-time access to Americans' social-network accounts -- such as Facebook, Google+, and Twitter -- without obtaining search warrants, newly released documents show.
The numbers are dramatic: live interception requests made by the U.S. Department of Justice to social-networking sites and e-mail providers jumped 80 percent from 2010 to 2011.
nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key
The Benefits of a More Vigorously Vibrating iPhone
The new iPhone 5 has a different motor that powers its vibrations than its predecessors and while it's been described as "louder and rougher and just more 'violent,'" this is a change for the�better. The new phone part was first noticed during an� �but those are� .�CNET's Don Reisinger also describes it as a "louder, harsher effect." Those may not be words often equated with good things, but the change will please at least some iPhone owners, who complained of the phone's faint buzz.�
Research in Motion lost less than expected in second quarter
Research In Motion Ltd. posted its third straight quarterly loss, but the struggling BlackBerry maker did increase its subscriber base and cash position.
The company's loss narrowed to $235 million in its fiscal second quarter from $329 million a year ago as RIM tamed costs through a restructuring process that included widespread layoffs and closing manufacturing facilities.
Nokia cuts smartphone prices before new models arrive
HELSINKI (Reuters) - Struggling phone maker Nokia has knocked 10-15 percent off the prices of two of its top of the range smartphones, hoping to boost sales before newer models arrive in markets in November. Nokia has cut the price of the Lumia 800 by around 15 percent and the Lumia 900 by 10 percent in Europe, according to device pricing data compiled by British research firm CCS Insight. Nokia declined to comment. Earlier this month, Nokia launched Lumia 820 and 920, which many see as crucial for the Finnish company's survival. ...
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
Artificial Intelligence Used to Home in on New Fossil Sites
The iPhone 5 delivers solid talk time so far
To get a better handle on the iPhone 5's battery life we decided to subject the company's first 4G LTE smartphone to talk time tests. After all the dust settled, our tests produced respectable and surprising call time numbers
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
HowAboutWe for Couples Mixes Love and Local Deals
One of the golden rules of online dating says: Turn off your profile after you?ve successfully found a mate. For two years, singles have flocked to the dating website HowAboutWe to meet their future significant others. As its users get engaged and married, HowAboutWe loses its best customers.
nod32 full indir nod32 full download full nod32 download est nod32 serial
Using TS RemoteApp as an attack vector
So in today's session at SMBNation that I spoke at, I showed how to use TS RemoteApp with TS Gateway on SBS2008 to deliver remote applications through Remote Web Workplace. It is one of the most cool features in the Windows Server 2008 operating system. But we have to remember what its doing.
Part of the conversation we had was on the difference between local desktop display in TS RemoteApp vs just having a full desktop to the Terminal Server. One issue that came up was that as a RemoteApp, you can't run other applications.
Well, that is not actually true. If you think that, then a TS RemoteApp has the ability to be an attack vector for you. What do I mean? Well below is a screen shot of what happens if you hit CTRL-ALT-ENTER with the cursor focused on the RemoteApp window (in this case MS Paint running remotely):
At this point, you can run Task Manager.... then hit File->Run and run something else. In my case, I showed a few people afterwards how to start cmd and start exploring the network. Now, you will only have the privileges of the user account logged in as, but it is still something you have to be careful about. If you think a RemoteApp bundle prevents access to other application sor the network... you are wrong.
So is this bad? No. Is it really an attack vector? No. You just need to understand that when allowing ANY type of Terminal Services based access, you have to restrict the policies and access accordingly. No matter if its local or remote. Running a TS RemoteApp bundle of Office will display on the local desktop, but is STILL running on the Terminal Server. So it will be browsing the network the Terminal Server is connected to as the local net. It will also browse your own drives mapped via tsclient. So you have to remember that.
Hope thats useful. A TS RemoteApp bundle does NOT mean you won't have access to the TS desktop when displaying remotely on your personal desktop. And that's not a bad thing. TS Remote App is a convenient way to extend the workspace to your local machine, anywhere in the world. No pun intended. That's its power... and the benefit. Great remote productivity enhancement in Windows Server 2008. Use it. (Safely of course)
nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32
Camera+ Arrives on the iPad
Camera+ -- one of the most popular photo apps for the iPhone -- is now available for the iPad.
nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32
27 Eylül 2012 Perşembe
Accenture bets on outsourcing business to drive growth
New ZitMo for Android and Blackberry
Ten months ago we�ve published an article about ZeuS-in-the-Mobile which contains an overview of everything we knew about ZitMo at that moment. The paper finishes with the following prediction: �they [attacks involving ZitMo] will become more specifically targeted against a smaller number of victims�. This prediction appears to have been correct. It�s not that often when we hear/find new wave of ZeuS-in-the-Mobile (or SpyEye-in-the-Mobile) attack. So every new piece of information about these types of malware and/or attacks involving them is very important and helps to understand the evolution of one of the most interesting threats in mobile space so far. Just a small reminder: ZeuS-in-the-Mobile is almost 2 years old. And this blog is about new samples (and probably new wave of attack)) of ZitMo for Android and Blackberry.
New samples overview
We�ve got 5 new files of ZitMo: 4 for Blackberry and 1 for Android. As you may know, the Blackberry platform has never been actively targeted by malware. And here we have 4 different samples of ZeuS-in-the-Mobile for Blackberry at once: 3 .cod files and 1 .jar file (with one more .cod inside). Yes, finally we�ve got a ZitMo dropper file for Blackberry.
As for Android, there is only one .apk dropper. But this ZeuS-in-the-Mobile for Android has been modified and now looks like a �classic� ZitMo with same commands and logic.
Countries and C&C numbers
All samples of ZitMo we�ve seen so far target users from various European countries (Spain, Poland, Germany, etc). This case is no exception. Here is a list of countries from which users are threatened by new ZeuS-in-the-Mobile with C&C number from the sample.
Blackberry:
- Germany +46769436094
- Spain +46769436073
- Italy +46769436073
- Spain +46769436073
Android
- Germany +46769436094
To summarize, there are 3 countries (Germany, Spain and Italy) and 2 C&C numbers (both are Swedish). We found out that these cell phone numbers belong to Tele2 mobile operator in Sweden.
güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32
Instant view: RIM reports quarterly loss but cash pile grows
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
New Zealand government to Kim Dotcom: Sorry for the illegal spying
Imagine how embarrassed President Barack Obama would feel if he had to issue a formal apology to Snooki. Well, something very similar has happened in New Zealand, as the The Wall Street Journal reports that Prime Minister John Key has apologized to Megaupload founder and tabloid magnet Kim Dotcom for government security officials who illegally spied on his communications without first obtaining a warrant. The apology to Dotcom comes in the wake of a report released by New Zealand?s inspector-general of intelligence and security earlier this week that admitted the government conducted ?unlawful interception of communications of certain individuals involved in the Megaupload case.? Read
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
Microsoft's Bing bods exploit fanbois' Apple maps misery
Microsoft?s Bing team is taking advantage of Apple?s map app misery to make a push for Redmond's own cartographic efforts.
In a cheeky blog post, Microsoft invites iPhone 5 users to use Bing Maps to get around instead of Apple?s own shoddy substitute for Google Maps. The blog is titled Just Got a New Phone? Time to Download the Bing App, and avoids explicitly naming the iPhone 5, which launched last week, while making its point clear. Microsoft says:
Trojan:Android/YZHCSMS.A
nod32 full download full nod32 download est nod32 serial 64 bit nod32
First Solar names executive to help grow in China
Microsoft: Critical Vista Patch Coming
Rootkit:W32/ZAccess
Rootkit:W32/Zxshell.B
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
Trojan-Downloader:W32/Kazy-17907
nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key
Major Windows 7 gotcha you should know about that may block you from upgrading
OK, so anyone who knows me expects that I stay up on the bleeding edge when it comes to dev tools and operating systems. Yes, I have been using Windows 7 for almost a year now and have been loving it. However, I never ran it on my production dev environment as I felt I did not what to disrupt our software development workflow until Windows 7 was in final release. With it out to RTM now, I felt it was as good as time as any to migrate, especially since we recently released our latest build of our own product and have a bit of time to do this.
So last week I deployed Windows 7 to both of my production dev systems, as well as the primary QA lab workstations. It was the worst thing I could ever have done, halting all major development and test authoring in our office due to a MAJOR gotcha Microsoft failed to let us know about during the beta and RC.
Ready for this....
You cannot run Virtual PC 7 (beta) in Windows 7 WITHOUT hardware virtualization. OK, I can live with that, since the new XP mode (which is an excellent feature) may very well need it. That didn't concern me. It was my fall back that failed to work that blew my mind...
You cannot run Virtual PC 2007 in Windows 7, as they have a hard block preventing it from being installed on Windows 7 due to compatibility issues. So the same machine that I have been using for development using Vista for a few years has now become a glorified browsing brick. I cannot do any of my kernel mode and system level development or debugging as I am not ALLOWED to install Virtual PC 2007 on the same hardware that worked before. *sigh*
What surprised me is that Ben, the Virtual PC Guy at Microsoft blogged that it was possible to run Virtual PC on Windows 7, and in his own words:
While all the integration aspects of Virtual Machine Additions work (mouse integration, shared folders, etc...) there is no performance tuning for Windows 7 at this stage - so for best performance you should use a system with hardware vitalization support.
That sounds to me like it will still work without hardware virtualization. Seems that is not the case.
Since Windows 7 is already to RTM, if this is a block due to Windows, it isn't going to be fixed anytime soon. So hopefully they can do something in the Virtual PC side of the equation, or they are going to disappoint a lot of unknowing developers.
This just became a MAJOR blocking issue for many dev shops that are using Virtual PC for isolated testing.
If this concerns you, then I recommend you download Intel's Processor Identification Utility so you can check to see if your dev environment is capable of running hardware virtualization.
Failing to do so might get you stuck like I did, now having me decide if I want to degrade back to Windows Vista just to get work done. There goes another day to prep my main systems again. *sigh*
UPDATE: Fellow MVP Bill Grant has provided me a solution to my delimma. It appears the issue is because Virtual PC 7 (beta), a built in component for Windows 7 when installed, is causing the blocking issue. By going into "Turn Windows features on or off" and removing Virtual PC support (and effectively removing XP mode support), Virtual PC 2007 can then be installed on machines that do not have hardware virtualization support.
This isn't the most optimal behaviour, but acceptable. Since without VT support in my CPU I can't use XP mode anyways, removing it does not limit WIndows 7 from functioning. I have reported to Microsoft on this odd behaviour since:
- Virtual PC 7 and XP Mode simply shouldn't be installing if my CPU isn't supported
- When the Customer Experience dialog pops up there is an option to "Check for Solutions Online". This is a PERFECT time where they could explain to uninstall Virtual PC 7 and XP mode support built into Windows 7 so Virtual PC 2007 will not block. Right now it reports that no solution is available.
So if you do NOT have VT support in your CPU, please uninstall Virtual PC 7 support if you installed it. VPC 2007 will then properly install for you.
nod32 full download full nod32 download est nod32 serial 64 bit nod32
Libratone Zipp is the first and only AirPlay speaker that doesn?t need a Wi-Fi network
Apple?s (AAPL) wireless AirPlay technology beats Bluetooth for two reasons. First, it can stream audio in uncompressed CD-quality. And second, unlike Bluetooth speakers that only work within 30 feet of a paired device, AirPlay speakers work over Wi-Fi, so distance is not a problem. But what happens when a Wi-Fi network is not available? Libratone?s 10.2-inch tall and 4.8-inch wide (diameter) battery-powered Zipp AirPlay speaker is here to solve the problem. Instead of using a router-based Wi-Fi network, it connects to any iOS device, Mac or PC by creating a direct Wi-Fi network using Libratone?s PlayDirect technology. What about sound quality? The Zipp?s 360-degree cylindrical design is supposed to?disperse sound in all directions.? The only kicker is that the Zipp
26 Eylül 2012 Çarşamba
Trojan-Downloader:OSX/Flashback.B
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
Chase site hiccups following similar Bank of America issues
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
Full Analysis of Flame's Command & Control servers
Our previous analysis of the Flame malware, the advanced cyber-espionage tool that's linked to the Stuxnet operation, was initially published at the end of May 2012 and revealed a large scale campaign targeting several countries in the Middle East.
The Flame malware, including all of its components, was very large and our ongoing investigation revealed more and more details since that time. The news about this threat peaked on 4th June 2012, when Microsoft released an out-of-band patch to block three fraudulent digital certificates used by Flame. On the same day, we confirmed the existence of this in Flame and published our technical analysis of this sophisticated attack. This new side of Flame was so advanced that only the world's top cryptographers could be able to implement it. Since then, skeptical jokes about Flame have disappeared.
Later in June, we definitively confirmed that Flame developers communicated with the Stuxnet development team, which was another convincing fact that Flame was developed with nation-state backing.
We also published our analysis of the Flame command-and-Control (C&C) servers based on external observations and publicly available information. That helped our understanding of where the C&C servers were located and how they were registered.
With this blog post, we are releasing new information that was collected during forensic analysis of the Flame C&C servers. This investigation was done in partnership with Symantec, ITU-IMPACT and CERT-Bund/BSI.
esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download
Backdoor:OSX/Imuler.A
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
iPhone 4S, Samsung Galaxy S3 hacked in contest
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key
Nintendo Wii U to launch with 23 games on November 18th
What games will buyers be able to pick up for the Nintendo (NTDOY) Wii U when it launches on November 18th? As promised by Nintendo, the console will see a diversified lineup of 23 launch games that?ll cater to both hardcore and casual gamers. In addition to the 23 games that will be available for purchase on launch day, Nintendo also revealed the 29 other ?launch window? games that will trickle in between November 18th and March 2013. Nintendo will sell the Wii U in two bundles: a ?Basic Set? that includes white console and controller with 8GB of internal storage for $299.99 and a ?Deluxe Set? with a black console and 32GB of storage for $349.99. Wii U software
Insight: Italy's slow Internet set for reboot
MILAN/PARIS (Reuters) - IMM Hydraulics, a small exporter of hoses for industries such as agriculture and mining, is the kind of firm that should be at the center of Italy's efforts to rekindle its stagnant economy. Instead, the company, located in the Abruzzo region of central Italy, is wrestling with a basic impediment to profitability: a woefully slow broadband connection. With just 2 megabits (MB) per second, IMM Hydraulics' broadband connection lags behind the 5 MB typical in Italian cities, which in turn is well behind an average of 12 MB in France and 16 MB in Germany. ...
Bromium secures computers by holding apps in isolation
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
Insight: Italy's slow Internet set for reboot
MILAN/PARIS (Reuters) - IMM Hydraulics, a small exporter of hoses for industries such as agriculture and mining, is the kind of firm that should be at the center of Italy's efforts to rekindle its stagnant economy. Instead, the company, located in the Abruzzo region of central Italy, is wrestling with a basic impediment to profitability: a woefully slow broadband connection. With just 2 megabits (MB) per second, IMM Hydraulics' broadband connection lags behind the 5 MB typical in Italian cities, which in turn is well behind an average of 12 MB in France and 16 MB in Germany. ...
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir