Clean PC Tips

Top ten antivirus softwares

Rank
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
Excellent
Very Good
Good
Fair
Poor
BitDefender Antivirus Kaspersky Anti-Virus Webroot Antivirus G DATA AntiVirus ESET Nod32 ParetoLogic Anti-Virus PLUS AVG Anti-Virus Vipre Antivirus + Antispyware F-Secure Anti-Virus Trend Micro
Lowest Price $24.95 $39.95 $39.95 $29.00 $39.99 $39.95 $29.99 $29.95 $39.99 $39.95
Ratings
Ease of Use
Effectiveness
Updates
Feature Set
Ease of Installation
Help/Support
Updates
Automatic Definition Updates
Automatic program Updates
Manual Definition Updates
Manual Program Updates
Features
History/Report logging
Password Protect Settings
ICSA Certified
VB100% Certified
W.C.L Level 1 Certified
W.C.L Level 2 Certified
Virus Defintions Updated Hourly Hourly As needed Every Minute As needed As needed Daily Daily Daily Daily
Supported Configurations
Windows Vista (32 bit)
Windows Vista (64 bit)
Windows XP (32 bit)
Windows XP (64 bit)

Tags:

Thursday, June 18th, 2009 Clean PC Tips Comments Off on Top ten antivirus softwares

Tips to stay away from Virus

Does your system get affected by virus?

Is your files hacked by some others?

Here we have given some tips to be safe from viruses.

Operating system

The best way to improve your safety is by upgrading your system with latest version of o.s. Windows 2000 is safety when comparing to Windows 95. Linux is even better.

Email attachments

Most of the viruses were coming through mails, especially in attachments. So do not open email attachments if you are not sure about the sender.

Anti-virus software

If you are not able to locate the viruses which are hiding inside the files, it is better to run Anti-virus software. Also you should frequently update the virus recognition data file.

This software gives good protection against hackers, as it recognizes the hacking files that were trying to install on your computer.

Patches

If you need greater security, you have to apply patches. Patches are small software add-ons which are intended to deal with specific security holes and other computer problems. You can get all the patches on the Microsoft site itself.

Credit card details

While you are entering your credit card details or any other personal information on a Web site, don’t forget to check for the closed padlock or key symbol in the browser window. Only recognized sites have this logo. So if you can’t find such one, do not enter information on those sites.

Firewall

If your system is running round the clock with connecting through DSL or cable, it is essential to install firewalls. Firewalls check any program that attempt to connect with the Internet, including any hacker files on your computer. It also makes your computer invisible to Internet intruders.

File downloading

Do not download or save all the attachments in mails. Also don’t download files from all sites. You should download software from sites you trust.

Passwords

Use good passwords. Do not give names or the words you can find in a dictionary. It should be tough to predict. Also don’t keep important passwords on your machine.

File sharing

In most of the computers on Internet, file sharing is switched on. This paves the way for hackers to access all our data and information. By default, file sharing is set to “on” in computers built before 2000.You can easily change the setting.

If you take these basic safety measures, you’ve reduced your risk to the minimum and the chances of affected by viruses are extremely low.

Tags: ,

Thursday, May 28th, 2009 Clean PC Tips No Comments

Code Injection – How and Prevention

When software permits the input of user to contain code syntax, it may be possible for a hacker to craft the code in such a way that it will change the proposed control flow of the software. Such a modification possibly will show the way to arbitrary code execution.

An injection problem covers a wide range of issues in different ways. The most significant problem to note is that each and every injection problems share one thing in common — i.e., they permit for the injection of control plane data into the user-controlled data plane. This means that the execution of the process may be misused by transferring the code through genuine data channels, using no other mechanism. While buffer overflows, and many other flaws, engage the use of some further issue to gain execution, injection problems require only for the data to be parsed. SQL injection and format string vulnerabilities are the most typical instantiations of this kind of weakness.

This illustration try to write user messages to a message file and let users to view them.

PHP Example:

[php]
$InfoFile = "seo/codeinject.out";
If ($_GET ["action"] == "Message to write")
{
$name = $_GET ["name"];
$message = $_GET ["message"];
$handle = fopen ($InfoFile, "a+");
fwrite($handle, "<strong>$name</strong> says ‘$message’\n");
Fclose ($handle);
Echo "Message Saved Successfully! \n";
}

Else if ($_GET ["action"] == "ViewMessages")

{

Include ($InfoFile);

}
[/php]

While the programmer proposes for the InfoFile to only include data, an attacker can supply a message such as:
name=h4x0rmessage=%3C?php%20system(%22/bin/ls%20-l%22);?%3E

which will decode as given below:

within php tag type the command given below

system(“/bin/ls -l”);

The programmer thought they were just including the contents of a regular data file, but PHP parsed it and executed the code. Now, this code is executed any time people view messages.

How to overcome

Your code should run in a “jail” or similar sandbox atmospheres that impose firm limitations between the process and the operating system. This may efficiently put a ceiling on code executed by your software.(Ex) Unix chroot jail and AppArmor. On the whole, managed code must be in some protected area.

Imagine all input is malicious. Use good input validation strategy. Decline any input that does not strictly conform to specifications, or transform it into something that does. Use a blacklist to reject any unexpected inputs and detect potential attacks.

To diminish the chances of code injection, use strict whitelists that set boundary which constructs are allowed. If you are dynamically constructing code that invokes a function, then verifying that the input is alphanumeric might be insufficient. An attacker can reference a dangerous function that you did not intend to allow, such as system(), exec(), or exit().

Tags: ,

Tuesday, March 17th, 2009 Clean PC Tips No Comments

To keep your PC’s Cool..

Normally during summer our PC components run themselves much hot abnormally. These computer components were not designed in such a way to work above a certain temperature.

So for a trouble-free computing, please follow the steps provided below to make sure that your PC stays cool.

1) Computer fans are one of most important component in PC’s, without them computer’s processor, hard disk and other very important parts may scorch and in due course fail or may slow down your computer speed or to working intermittently.

a. So once a year or especially beginning of summer is the right time to inspect the all the PC fans(i.e. processor fans, external fans) to ensure that they are working properly or not.

b. Clean the fans regularly as all the fans collect dust and function less efficiently as a result.

2) The Term ‘Overclocking’ is the used to attempts to run your computer parts at higher voltages or speeds than they were designed to support. You may configure the basic input output system (BIOS) by pressing DEL or F2 buttons when your computer boots up. But make sure unless you know what you’re doing and have taken steps specifically to provide extra cooling to your computer, avoid the attraction of Overclocking. If your cooling fails, your components will overheat much faster than otherwise – and may even be damaged permanently.

3) The next main thing is where you are placing your computer, when it comes to keeping your computer cool. It’s better to place your computers on the floor, if possible, since its cooler down there – and move them close to an air conditioning vent, too, if one is available. Do not place them close to other heat-generating devices.

4) One of the next most important computer components is Monitor; it generates a lot of heat when turned on – even when they’re not displaying an image. Get into the habit of turning off your monitor when you step away from the computer for extended periods of time.

You may also install and use few computer software programs which allow you to monitor your pc’s temperature. These utilities will prompt you when your computer components gets too hot.

Tags: ,

Tuesday, June 17th, 2008 Clean PC Tips No Comments
Request a Free SEO Quote