Archive for August, 2009

Immunet releases free cloud-powered antivirus for Windows

Posted in IT Security on August 20, 2009 by cobra

Imagine for a moment that you could leverage the computers of your friends, family and a worldwide global community to harness their collective security. Every time someone in this collective community encounters a threat everyone else in the community gains protection from that same threat in real time. You no longer have to rely on the isolated security of your current AntiVirus vendor. You will be able to protect your friends and family while being better protected yourself.

Collective Immunity by Immunet makes this a reality. By providing a fast and light layer of virus detection and linking everyone in a global community we harness a security sum that is far greater than its individual parts.

Collective Immunity gathers strength daily as the Immunet Community grows and best of all its FREE. Already have AntiVirus? Even better, install Immunet Protect alongside your existing product, and it will make the Immunet community even stronger.

Click here to download Immunet Anitivirus for Windows Now.

Please enter Immunet’s website for more information about the Cloud AV.

Takecare and have a happy & protective cloud computing with Immunet


Free Microsoft Network Monitor 3.3 Tool

Posted in IT Security on August 17, 2009 by cobra

Microsoft Network Monitor is a free tool for Windows PCs that allows you to see each and every networking packet that arrives at or is sent from the PC. It has robust filtering options and can give you excellent insight into the functionality of your applications.

Who’s it for?

Network engineers and system administrators will find this tool invaluable. Many developers, customer support personnel, and QA workers will find it useful as well to analyze application behavior.

What problems does it solve?

It provides a clear view into application and operation system behavior, allowing for accurate and rapid problem solving. Many times, packet capture and analysis will reveal the root cause of problems that application and operation system logs do not provide.

To download the application click here

The 10 Most Dangerous Things Users Do Online

Posted in IT Security on August 9, 2009 by cobra

End users — god bless ‘em. You can’t live with ‘em — but without them, you wouldn’t have a job. They’re the reason you have an IT infrastructure; they’re also the single greatest threat to the security of that infrastructure.

Because, in the end, most users have no idea how dangerous their online behavior is.

No matter how many times they train them, no matter how many classes they hold, most IT professionals still watch helplessly as end users introduce new malware because they “just couldn’t resist looking at the attachment.” Security pros cringe as their users download software for personal use, turn off firewalls to speed up a connection, or leave their passwords stuck to their laptops.

Wouldn’t it be nice if you could give end users a list of the most dangerous things they do online every day, and then tell them why those activities are particularly risky?

Click here to read the list of “The Ten Most Dangerous Things Users Do Online,” along with some explanation of the risks and solutions associated with each.

How to spot a Fake Windows Antivirus program???

Posted in IT Security on August 5, 2009 by cobra

Recently most of us been noticing strange activities occurring in our computers while surfing the web. One of those are Fake Windows Antivirus programs trying to make their way into our machines by fooling us into making us believe that our computers are infected somehow one way or another.

I’m sure you’re very curious to know what is real and what is not.