Sunday, April 26, 2009

U.S. Military was Hacked!U.S. Military was Hacked!

Data on New U.S. Military Fighter Jet was hacked
Data on New U.S. Military Fighter Jet was hacked! The data of the U.S. military’s newest and most technologically advanced fighter aircraft, the F-35 Lightning II was stolen!

Hackers seek out to find vulnerable systems that they can gain access. In this case of hackers stealing data from the systems used by contractors of the Pentagon, it could be the situation where the operators may have not proven that they were using the proper level of computer security. Companies that contract with the Department of Defense now have to prove that they are implementing certain security measures even before they are authorized to work on a project. This policy was put into place last year because of the increase of cyber intrusions.

The U.S. government has not, and probably will not, go into detail about the recent breach. Many officials have assured those who speculate certain scenarios of this data breach that no classified information was compromised. In addition, the files compromised only focused on the design, performance statistics of the aircraft and a system used to conduct self-diagnostics during flight, which pretty much limits the possibility of sensitive data being stolen.

The U.S. military’s newest fighter aircraft is designed to become the aircraft used by all branches of service. Several international partners are assisting in the build of the new aircraft. It will be sold to U.S. allied countries which could raise the concern of security levels and practices of other countries involved.

As of now, offices have said that a number of safeguards have been implemented to protect the system that was hacked into. Hackers will not stop at anything until they are caught and put in jail.
Thursday, April 16, 2009

Download Windows Patch avoid WGA (Windows Genuine Advantage)Download Windows Patch avoid WGA (Windows Genuine Advantage)

Download Windows Patch avoid WGA (Windows Genuine Advantage)
How to download Microsoft Windows update without going through WGA (Windows Genuine Advantage)? WGA have created many problems. Where can we download the updates?

You can do without Automatic Updates and Windows Update/Microsoft Update, which can be hamstrung by WGA, by using The Software Patch. This is a free Web service that WS contributing editor Scott Dunn reviewed — along with a handful of other alternative update services.

Examples of patches can be downloaded:

Windows updates - March 2009 Latest updates Read also:

Personal Antivirus Removal ToolPersonal Antivirus Removal Tool

Personal Antivirus Removal Tool









License: Freeware
File size: 58 KB
Personal Antivirus is a rogue anti-spyware program come out from the company called Innovagest 2000. It is installed by a trojan called Zlob, which trys to trick you into buying the alleged rogue anti-spyware program. Once you're infected with Zlob, a fake security message similar to a Windows notification pops up saying your PC is infected with malware. This Personal Antivirus message is used to lure you into purchasing, downloading and installing their program to remove the imaginary spyware. Remove Personal Antivirus is used to remove this fake antivirus from your computer.

Removal Tool:
Remove Fake Antivirus. (Download it here.)

Download Remove Personal Antivirus 1.0 at Softpedia
Download Source code of Remove Personal Antivirus 1.0

Personal Antivirus manual removal guide
Kill Process
(How to kill a process effectively?)
PersonalAntivirus[1].exe
iv.exe
winlogon.exe
services.exe
unins000.exe
PerAvir.exe

Delete Registry
HKLM "SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ITGRDENGINE"
HKLM "SYSTEM\CurrentControlSet\Services\ITGrdEngine"
HKLM "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Personal Antivirus_is1"
HKCU "Software\Microsoft\Windows\CurrentVersion\Run" "Personal Antivirus"
HKCU "Software\Microsoft\Internet Explorer" "PrS"

Remove Folders

$APPDATA\Personal Antivirus
$PROGRAMFILES\Personal Antivirus
$APPDATA\AV1

Remove Files
$WINDIR\system32\log.txt
$APPDATA\Microsoft\Internet Explorer\Quick Launch\Personal Antivirus.lnk
$LOCALAPPDATA\Microsoft\Windows\services.exe
$LOCALAPPDATA\Microsoft\Windows\pguard.ini
$LOCALAPPDATA\Microsoft\Windows\log.txt
$LOCALAPPDATA\Microsoft\Internet Explorer\iPSh.png
$LOCALAPPDATA\Microsoft\Internet Explorer\iMSh.png
$LOCALAPPDATA\Microsoft\Internet Explorer\iGSh.png
$APPDATA\Microsoft\Windows\winlogon.exe
$LOCALAPPDATA\Microsoft\Internet Explorer\iv.exe
$DESKTOP\Personal Antivirus.lnk
$SMPROGRAMS\Personal Antivirus

Read more:
Constants in manual removal guide

Read also: