Share For All: September 2009

Tuesday, September 15, 2009

PC Activity Monitor Pro 6.5.1


PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis.

The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.

Program works in background, transparent for user, and captures the following events:

- Application start

- Switching between applications/windows. In addition program saves

static text elements and windows edit controls:

- Window content of most chat clients (ICQ, AIM, Yahoo etc.)

- Content of Internet browser window (Internet explorer)

- Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express

- etc.

- Keystrokes

- Pasting text from clipboard

- File operations

- System registry operations

- Application installation/uninstallation

- Putting programs in Startup folder

- Visiting web sites.

Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended).

Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis (NET and PRO versions only).

The important advantage of PRO version is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.
Short tags:
security, monitoring, intelligence, access control, parental control, investigation, surveillance, detective, espionage, spy, key loger, keylogger, trojan, hack, hacking, cheating spouse, internet
System Requirements:
None
Change Info:
support for Portuguese/Brasilian, Romanian and Hungarian languages is added; bugs in Log Viewer are fixed.

----DOWNLOAD NOW----

Monday, September 14, 2009

Hack Yahoo Password Yahoo 2009




------klik here to download------

Top 10 Windows Hacking Tools

1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

4. Retina – Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

5. SamSpade – SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

6. N-Stealth – N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

7. Solarwinds – Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

8. Achilles – The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!

9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

10. Netcat (The Network SwissArmy Knife) – Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.

Korsel Siapkan 3.000 Polisi Cyber


SEOUL - Korea Selatan berencana melatih 3.000 orang untuk dijadikan sebagai polisi cyber. Nantinya, mereka akan mengawal situs bisnis dan pribadi dari serangan-serangan di dunia maya.

"Para polisi cyber tersebut akan kami tugaskan untuk melindungi informasi perusahaan dan mencegah kebocoran rahasia industri dari serangan penjahat dunia maya," demikian keterangan dari pemerintah yang dilansir Yonhap dan dikutip AFP, Senin (14/9/2009).

Untuk mengatasi serangan cyber pula, Badan Intelijen Nasional Korsel akan membentuk sebuah gugus tugas yang terdiri dari warga sipil maupun pegawai pemerintah, untuk menangkal ancaman online. Kehadiran polisi cyber ini untuk memperkuat unit cyber militer yang sebelumnya telah ada.

Negeri Ginseng memang sering menjadi sasaran empuk serangan para penjahat dunia maya yang menyerang situs-situs kepresidenan, kementerian pertahanan, parlemen, maupun perbankan. Para penyelidik Departemen Luar Negeri Amerika Serikat sejauh ini gagal menelusuri siapa di balik aktivitas peretasan itu.

Kendati belum berhasil mengungkap dalang aksi tersebut, Korsel menuduh Korea Utara yang bertanggung jawab atas sejumlah serangan.

Korea Selatan sendiri memiliki akses internet yang paling kencang. Sebanyak 95 persen penduduknya sudah menggunakan broadband di rumahnya. Maka tak mengeherankan jika sebuah survei yang berbasis di Boston, Amerika Serikat, memilih Korsel sebagai negara dengan akses internet paling cepat di dunia.


ShoutMix chat widget

Followers

 

Copyright © 2009 by Share For All