Infection Resolving Team

Re: Security Team

I want to know which is the best Anti-virus protection for the money.


"Take a look at this site. They do independent testing of AV programs and are probably one of the more balanced testers on the net. The "Comparatives" page shows their results for tests carried out. On the Comparatives page click on the on-line results for August 2008 for the latest test results."

AV-Comparatives
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

Cool site norm
thanks.
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

Hey everyone, i know i am clearly not an expert with security so i do have a question about it.
I have been hearing people say that they need to update Java because hackers have found ways in through it. The update is a "patch".

What are they "patching"
and how do they actually use these programs to get in? i thought they just did it through open ports and downloads.

Thanks a ton guys.
BEn+
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

Hi Ben,

You can read this, it's pretty old but the info still applies. Basically you just need to keep java updated so security holes in older versions can't be exploited anymore. The same thing as with any other security update (windows update).
Java's security architecture - JavaWorld
 

My Computer

System One

  • Manufacturer/Model
    Airbot 2.0
    CPU
    Core i7 920 (D0) @ 4Ghz, 26c idle- 65c full load on air
    Motherboard
    Asus P6X58D Premium -Sata 6Gb/s - USB 3.0
    Memory
    12GB Corsair Dominator -CMD12GX3M6A1600C8
    Graphics card(s)
    EVGA Nvidia GTX 480 -Fermi
    Sound Card
    ASUS Xonar D2X
    Monitor(s) Displays
    LG 24" Flatron W2453V-PF Full HD 1080p 2ms response time
    Screen Resolution
    1920x1080@60hz
    Hard Drives
    1 OCZ Vertex2 180GB SSD 1 TB Samsung Spinpoint F1 7200RPM 32MB cache 2 500GB WD Caviar Blacks 7200RPM 32MB cache (WD5001AALS) Pioneer DVD Burner DVR-S18M
    PSU
    Corsair HX1000W
    Case
    Cooler Master HAF 932
    Cooling
    Case Fans -3 230mm, 1 140mm/CPU - Tuniq Tower 120 Extreme
    Mouse
    Logitech Wireless MK700
    Keyboard
    Logitech Wireless MK700
    Internet Speed
    100 MBPS DL 30.17Mbps UL 0.98Mbps
    Other Info
    Windows 7 Processor-7.7 RAM- 7.9 Graphics-7.9 Gaming Graphics- 7.9 HDD- 7.8 W.E.I final score= 7.7 Windows Vista=5.9
Re: Security Team

I know i should update Airbot, I was wondering how they can get into the computer through the program.
If anyone is going to explain it, them P.M. me please so no one gets any infractions.
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

I know i should update Airbot, I was wondering how they can get into the computer through the program.

Ben,
Have you read the article? It explains it in there.
 

My Computer

System One

  • Manufacturer/Model
    Airbot 2.0
    CPU
    Core i7 920 (D0) @ 4Ghz, 26c idle- 65c full load on air
    Motherboard
    Asus P6X58D Premium -Sata 6Gb/s - USB 3.0
    Memory
    12GB Corsair Dominator -CMD12GX3M6A1600C8
    Graphics card(s)
    EVGA Nvidia GTX 480 -Fermi
    Sound Card
    ASUS Xonar D2X
    Monitor(s) Displays
    LG 24" Flatron W2453V-PF Full HD 1080p 2ms response time
    Screen Resolution
    1920x1080@60hz
    Hard Drives
    1 OCZ Vertex2 180GB SSD 1 TB Samsung Spinpoint F1 7200RPM 32MB cache 2 500GB WD Caviar Blacks 7200RPM 32MB cache (WD5001AALS) Pioneer DVD Burner DVR-S18M
    PSU
    Corsair HX1000W
    Case
    Cooler Master HAF 932
    Cooling
    Case Fans -3 230mm, 1 140mm/CPU - Tuniq Tower 120 Extreme
    Mouse
    Logitech Wireless MK700
    Keyboard
    Logitech Wireless MK700
    Internet Speed
    100 MBPS DL 30.17Mbps UL 0.98Mbps
    Other Info
    Windows 7 Processor-7.7 RAM- 7.9 Graphics-7.9 Gaming Graphics- 7.9 HDD- 7.8 W.E.I final score= 7.7 Windows Vista=5.9
Re: Security Team

Sorry airbot forgot to.
Wil get on that.
Thanks,
Ben
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

No need to be sorry Ben, It explains a lot about java security.
 

My Computer

System One

  • Manufacturer/Model
    Airbot 2.0
    CPU
    Core i7 920 (D0) @ 4Ghz, 26c idle- 65c full load on air
    Motherboard
    Asus P6X58D Premium -Sata 6Gb/s - USB 3.0
    Memory
    12GB Corsair Dominator -CMD12GX3M6A1600C8
    Graphics card(s)
    EVGA Nvidia GTX 480 -Fermi
    Sound Card
    ASUS Xonar D2X
    Monitor(s) Displays
    LG 24" Flatron W2453V-PF Full HD 1080p 2ms response time
    Screen Resolution
    1920x1080@60hz
    Hard Drives
    1 OCZ Vertex2 180GB SSD 1 TB Samsung Spinpoint F1 7200RPM 32MB cache 2 500GB WD Caviar Blacks 7200RPM 32MB cache (WD5001AALS) Pioneer DVD Burner DVR-S18M
    PSU
    Corsair HX1000W
    Case
    Cooler Master HAF 932
    Cooling
    Case Fans -3 230mm, 1 140mm/CPU - Tuniq Tower 120 Extreme
    Mouse
    Logitech Wireless MK700
    Keyboard
    Logitech Wireless MK700
    Internet Speed
    100 MBPS DL 30.17Mbps UL 0.98Mbps
    Other Info
    Windows 7 Processor-7.7 RAM- 7.9 Graphics-7.9 Gaming Graphics- 7.9 HDD- 7.8 W.E.I final score= 7.7 Windows Vista=5.9
Re: Security Team

Hey everyone, i know i am clearly not an expert with security so i do have a question about it.
I have been hearing people say that they need to update Java because hackers have found ways in through it. The update is a "patch".

What are they "patching"
and how do they actually use these programs to get in? i thought they just did it through open ports and downloads.

Thanks a ton guys.
BEn+


"A patch (sometimes called a "fix") is a quick-repair job for a piece of programming. During a software product's beta test distribution or try-out period and later after the product is formally released, problems (called bugs) will almost invariably be found. A patch is the immediate solution that is provided to users; it can sometimes be downloaded from the software maker's Web site. The patch is not necessarily the best solution for the problem and the product developers often find a better solution to provide when they package the product for its next release. A patch is usually developed and distributed as a replacement for or an insertion in compiled code (that is, in a binary file or object module). In larger operating systems, a special program is provided to manage and keep track of the installation of patches. "

What is patch? - a definition from Whatis.com

Most exploits/ Hacks don't gain access to your computer through ports etc. You invite them in through your browser and the existence of malicious scripts on a website you visit that uploads something to your system that exploits a vulnerability in the interface between the internet and your computer. A fairly common source of exploitation uses unchecked buffers or free memory.

Buffer overflows are a favourite exploit for hackers. The vast majority of Microsoft's available patches fix unchecked buffer problems


"A buffer overflow is an exploit that takes advantage of a program that is waiting on a user's input. There are two main types of buffer overflow attacks: stack based and heap based. Heap-based attacks flood the memory space reserved for a program, but the difficulty involved with performing such an attack makes them rare. Stack-based buffer overflows are by far the most common.
spacer.gif

spacer.gif


In a stack-based buffer overrun, the program being exploited uses a memory object known as a stack to store user input. Normally, the stack is empty until the program requires user input. At that point, the program writes a return memory address to the stack and then the user's input is placed on top of it. When the stack is processed, the user's input gets sent to the return address specified by the program.
However, a stack does not have an infinite potential size. The programmer who develops the code must reserve a specific amount of space for the stack. If the user's input is longer than the amount of space reserved for it within the stack, then the stack will overflow. This in itself isn't a huge problem, but it becomes a huge security hole when combined with malicious input.
For example, suppose a program is waiting for a user to enter his or her name. Rather than enter the name, the hacker would enter an executable command that exceeds the stack size. The command is usually something short. In a Linux environment, for instance, the command is typically EXEC("sh"), which tells the system to open a command prompt window, known as a root shell in Linux circles.
Yet overflowing the buffer with an executable command doesn't mean that the command will be executed. The attacker must then specify a return address that points to the malicious command. The program partially crashes because the stack overflowed. It then tries to recover by going to the return address, but the return address has been changed to point to the command specified by the hacker. Of course this means that the hacker must know the address where the malicious command will reside. To get around needing the actual address, the malicious command is often padded on both sides by NOP instructions, a type of pointer. Padding on both sides is a technique used when the exact memory range is unknown. Therefore, if the address the hacker specifies falls anywhere within the padding, the malicious command will be executed.
The last part of the equation is the executable program's permissions. As you know, most modern operating systems have some sort of mechanism to control the access level of the user who's currently logged on and executable programs typically require a higher level of permissions. These programs therefore run either in kernel mode or with permissions inherited from a service account. When a stack-overflow attack runs the command found at the new return address, the program thinks it is still running. This means that the command prompt window that has been opened is running with the same set of permissions as the application that was compromised. Generally speaking, this often means that the attacker will gain full control of the operating system. "

http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1048483,00.html"How an Exploit Works

How an Exploit works (Linux - but works the same in Windows)

"Take any exploit downloaded from the internet that promises you an easy root shell on a remote machine, and examine its source code. Find the most unintelligible piece of the code; it will be there, for sure. Most probably, you will find a several lines of strange and unrelated symbols; something like this:
char shellcode[] =
"\x33\xc9\x83\xe9\xeb\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x8a"
"\xd4\xf2\xe7\x83\xeb\xfc\xe2\xf4\xbb\x0f\xa1\xa4\xd9\xbe\xf0\x8d"
"\xec\x8c\x6b\x6e\x6b\x19\x72\x71\xc9\x86\x94\x8f\x9b\x88\x94\xb4"
"\x03\x35\x98\x81\xd2\x84\xa3\xb1\x03\x35\x3f\x67\x3a\xb2\x23\x04"
"\x47\x54\xa0\xb5\xdc\x97\x7b\x06\x3a\xb2\x3f\x67\x19\xbe\xf0\xbe"
"\x3a\xeb\x3f\x67\xc3\xad\x0b\x57\x81\x86\x9a\xc8\xa5\xa7\x9a\x8f"
"\xa5\xb6\x9b\x89\x03\x37\xa0\xb4\x03\x35\x3f\x67";
This is shellcode, also sometimes referred to as "bytecode." Its content is not a magic word or random symbols. This is a set of low-level machine commands, the same as are in an executable file. With a shellcode, you can also reboot a system, send a file to an email, etc. The main task for an exploit program is therefore to make this shellcode work.
Take, for example, a widely known error-buffer overflow. Developers often check data that has been received as input for functions. A simple example: the developer creates a dynamic array, allocates for it 100 bytes, and does not control the real number of elements. All elements that are out of the bounds of this array will be put into a stack, and a so-called buffer overflow will occur. An exploit's task is to overflow a buffer and, after that, change the return address of system execution to the address of the shellcode. If a shellcode can get control, it will be executed. It's pretty simple."

How Shellcodes Work | O'Reilly Media

Another reference

Buffer Exploits — Security

A really good article here

Introduction to Buffer Overflow

Java Exploits

Java is inherently a secure system, because JRE uses so-called sandboxing that allows it to operate as a virtual machine to block access to other parts of the system. However as developers create JavaScript applications that require more capabilities, they begin to call up .dll files from the system. As soon as the programs reach outside the virtual machine for system files, the security protection of the sandbox is negated.

Exploit code can be embedded in a small Java application that launches from a browser window and can deliver a malicious payload very quickly.


New Java exploits brewing - vnunet.com


"An example of a Java exploit for Java VM (not to be confused with JavaScript). This means that, in order to run the exploit, a vulnerable Java VM has to be installed on the machine.

The exploit comes in a small class file:

$ file java.class
java.class: compiled Java class data, version 46.0
$ md5sum java.class
0b67d360d5b1839820c0a39810b40498 java.class


As you probably know, Java class files contain bytecode, which is a machine language for the Java virtual machine. Luckily, bytecode has *a lot* of extra information which makes decompilation much easier (and viable, when comparing to x86 machine code, for example).

After analyzing the exploit, I found out that it’s using an old vulnerability (CVE-2007-0243) that has been patched since January. Mark also wrote about this vulnerability here. According to the CVE article, Sun JRE 5.0 Update 9 or earlier, SDK and JRE 1.4.2_12 or earlier and SDK and JRE 1.3.1_18 or earlier are all vulnerable. The vulnerability allows an applet to gain privileges through a GIF image.

This is exactly what our exploit does – it creates a malicious image that is then displayed on the victims machine. This causes a memory corruption which leads to code execution."

SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc


Some exploits can still attack a system with the latest patches etc IF the system contains elements of a previous Java installation that include .Dll's the malicious code can call. You should always uninstall older versions and clean their folders.

Norm
 
Last edited:

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

Thanks Norm,

Another excellent explanation :geek:

The most important thing for general users is the last bit

Some exploits can still attack a system with the latest patches etc IF the system contains elements of a previous Java installation that include .Dll's the malicious code can call. You should always uninstall older versions and clean their folders.

As the java update mechanism is not the best in the world at un-installing the previous versions from the machine. This leaves many users who update there machines without fail still vulnerable. I would advise anyone who has not checked recently to check the un-install list for entries for old versions of Java and uninstall all but the latest version.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro x64 Latest Release Preview
    Monitor(s) Displays
    Acer G276HL 27", (DVi) + Samsung 39" HDTV (HDMI)
    Screen Resolution
    2 x 1920x1080 @50Hz
  • Manufacturer/Model
    Real World Computers (Custom by Me)
    CPU
    AMD FX8350 Vishera 8 Core @4GHz
    Motherboard
    Asus M5A78L-M USB3
    Memory
    32GB [4x8GB] DDR3 1600 MHz
    Sound Card
    ASUS Xoner DG + SPDIF to 5.1 System + HDMI
    Monitor(s) Displays
    Samsung 32" TV
    Screen Resolution
    1920 x 1080
    Hard Drives
    Internal Crucial CT256MX100SSD1 256GB SSD, Seagate ST2000DM001-1CH1 2TB, External (USB3) Seagate Backup+ Hub BK SCSI Disk 8TB 2.5/3.5 Hot Swap Cradle, USB3 + eSata (client HDDs) NAS 4TB
    PSU
    Aerocool Templarius Imperator 750W 80+ Silver
    Case
    AeroCool X-Warrior Red Devil Tower
    Cooling
    Hyper103 CPU, Rear 120mm, Front 2x120mm, Side 2x120mm
    Internet Speed
    68 MB Down 18.5 MB Up
    Other Info
    Six Sensor Auto / Manual Digital cooling (Fan) control with Touch control Panel
Re: Security Team

Just an update to explain the latest IE patch


"Security Update for Internet Explorer 7 in Windows Vista (KB960714)
Published 18th December 2008
Update type: Important

Security issues have been identified that could allow an attacker to compromise a system running Microsoft Internet Explorer and gain control over it. You can help protect your system by installing this update from Microsoft.


While that doesn’t tell us much, the knowledge base article (or “KB”) 960714 referenced does spill the beans.

Fundamentally, it was discovered that program code – of a malicious person’s construction – be executed on your computer, if a user views a specially crafted web page with IE.

In particular, a rogue script can allocate a block of memory (an array) then apparently release it without updating the array’s length, meaning that the block of memory still remains preserved.

Then, if data binding is enabled (which it is, by default), a rogue web page can take advantage of an incorrect handling of certain XML tags within IE to cause the browser to pass control to the supposedly free memory location.

If the script had pre-filled that memory with actual executable instructions then the author has effectively been able to cause your computer to do something of their bidding, under your user credentials."
iTWire - Why the latest IE flaw proves Linux got it right from the start
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

Norm,
Thanks a ton for that post man. Wicked inforative and gave me a ton of info. I had to read it 3-4 times before everything sank in but now i understand.

Also do you think Comodo's Memory firewall is worth installing?
I think i might give it a try. It is suppose to protect ageinst oveflows so i think i might give it a try.

Also, people can write test codes to test there AV and such. Is there any way to do this for a overflow?
Just a yes or no would be great.
No one wants an infraction:D:D:D:D:D
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

Norm,
Thanks a ton for that post man. Wicked inforative and gave me a ton of info. I had to read it 3-4 times before everything sank in but now i understand.

Also do you think Comodo's Memory firewall is worth installing?
I think i might give it a try. It is suppose to protect ageinst oveflows so i think i might give it a try.

Also, people can write test codes to test there AV and such. Is there any way to do this for a overflow?
Just a yes or no would be great.
No one wants an infraction:D:D:D:D:D


"Also do you think Comodo's Memory firewall is worth installing?"

Well, a reserved yes. It is is not that well tested, but works the same as No-Script in Firefox (I think) by denying scripts from running, unless you agree. If you are using IE I don't think it would hurt. But, I don't think you should be using IE at the moment. I still recommend Firefox with No-script and/or Browser Defender. ( These both do a similar job, Browser Defender doesn't block scripts, but gives you a visual warning of safe or unsafe sites.

"Also, people can write test codes to test there AV and such. Is there any way to do this for a overflow?"

I don't know why you'd want to unless you were a pretty clued in programmer. There is a stack of info out there on buffer overflows, and nothing you could write would, I think, be as sophisticated as the nasties that AV's and browsers already protect against. You'd need a really good understanding of the target program's code. And it takes a really bright spark to come up with a new twist. A buffer overflow is simply bad programming, and that's why they need to patch with better, tighter code to eliminate the programming error.

Norm

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

Hi there! I am knew to this fourm i dont have much experyance but i can tell u that from my experyance thet norton 2009 w/internet security is doing it job i had old laptop w/win xp every time some tipe of virus gets in i think it was trojen horce it dosent remove it unles the virus is active i have contacted there tech support they wanted to charge me 40 per insedent when there software spose to remove it and it wasnt i tryed avg it found it and removed it ......nedless to if i could be of any help please rely on me thanks and keep up the good work!!!!!!!!!!!!!!
 

My Computer

Re: Security Team

Hi there! I am knew to this fourm i dont have much experyance but i can tell u that from my experyance thet norton 2009 w/internet security is doing it job i had old laptop w/win xp every time some tipe of virus gets in i think it was trojen horce it dosent remove it unles the virus is active i have contacted there tech support they wanted to charge me 40 per insedent when there software spose to remove it and it wasnt i tryed avg it found it and removed it ......nedless to if i could be of any help please rely on me thanks and keep up the good work!!!!!!!!!!!!!!


Hi GHOHO and welcome to the forums. Good to have you here

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

NormCameron
Just finished reading your posts in here. We are very lucky to have you :)
 

My Computer

System One

  • Manufacturer/Model
    Hewlett Packard
    CPU
    3.40Ghz / 2.20Gz Duo Core
    Memory
    2GB / 3GB
    Hard Drives
    160 GB / 160 GB

My Computer

System One

  • Manufacturer/Model
    H/P dv7 Notebook PC
    CPU
    Intel(R) Core(TM)2 Duo CPU T5800 @ 2.00GHz
    Motherboard
    Compal ID 30F4 Version 99.67
    Memory
    4.096
    Graphics card(s)
    NVidia GeForce 9600M GT
    Screen Resolution
    1440x900
    Hard Drives
    WDC WD3200BVET-60ZTC0 ATA DEVICE
    Mouse
    Synaptics PS/2 Port TouchPad HID-compliant mouse
    Keyboard
    IBM ENHANCED (101 or 102) keyboard
Re: Security Team

Well noted GHOHO.
How familiar are you will Security?
Just wondering.
Ben
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

I recently installed Norton Inrternet Security 2009. Its one of the best security suite i have ever seen. Also, takes less CPU and memory resources.

Here are some of its features: -
  • Antivirus
  • Spyware protection
  • Two-way firewall
  • Identity protection
  • Antiphishing
  • Network security
  • Botnet protection
  • Rootkit detection
  • Browser protection
  • Internet worm protection
  • Intrusion prevention
  • OS and application protection
  • Web site authentication
  • Pulse updates
  • Norton™ Insight
  • SONAR™ behavioral protection
  • Antispam
  • Parental Controls & confidential
    information blocking More Info
  • Recovery Tool*
  • Norton Protection System
Find out more on www.symantec.com
 

My Computer

System One

  • Manufacturer/Model
    Compaq
    CPU
    intel core 2 duo T 5550 @ 1.83 MHz
    Motherboard
    intel 965 chipset family
    Memory
    2 GB DDR 2 SD RAM @ 667 MHz
    Graphics card(s)
    On board upto 358 MB RAM
    Sound Card
    Onboard
    Monitor(s) Displays
    15"
    Hard Drives
    160 GB WDC
Back
Top