Friday 3 June 2011

Mac Games Download

Mac Games Download: "

The most impressive computer machines in last years have been the Mac ones provided by Apple. The industry of software and application found as a consequence a new market for Mac users. The ones who would like to play on such computers should know that the game market offers for them a wide range of games.

<-300x250 Medium Rectangle - center->


One of them is the Cooking Dash 2: Thrills and Spills. Mr. Big is a guy that has lots of troubles. He borrowed a large sum of money from his father and now his business is not working at all. You are the new employee and you are about to save his business in time, before his father comes to visit the Park. For playing this game you should have some management skills. You have to help the one that is employed in the fast-food area to deal with customers. To make them visit your park you should improve the serving system. If you keep the customers happy, they will keep coming. Make money to upgrade the fast-food and get more customers. With the money you won you could buy more items, such as: beautiful decorations and faster equipment.



Another simulation game is “Built-a-lot” provided by the same site mentioned above. In this game you are helping the mayor to improve the infrastructure of the town. All this operation should be finished in time, because you are working against the clock. You are not working alone, in fact you have a workers equip and take care of them. Furthermore, take care because you are having a well-determined sum of money to deal with. Here besides the management skills, you should have construction skills. From the Strategy category of games comes Empire Builder-Ancient Egypt. You have to help the pharaohs to build up their empire. They count on you to build the pyramids and all other famous constructions along the Nile. This game is really challenging due to the fact that you have to protect your equip from walking mummies and plagues. An interesting puzzle game is “Awakening: The dreamless castle”. If you are a patient person and you want to develop your logic skills, then go ahead and collect as many clues as you can. After this first step, you should solve some tricky puzzles to unlock one by one the rooms of the castle.



The graphic will surely impress you, as the 3D details are very well designed. When it comes to music, the sound is natural and not bothering at all. Finally, if you are more into word games, go ahead and download the Bookworm Deluxe or Jigwords. This game is a hybrid between puzzle games and word games. Once you find out a word you can unlock a beautiful picture. An interesting word game is Faded Reality. She just had an eye operation and now she sees things from the donor’s past.

"


Source : Google Reader

5 Best DVD Burning Software

5 Best DVD Burning Software: "

While opting for the finest software program for CD or DVD, it is wise to precise your needs. CD and DVD burning programs are designed for authoring CDs and DVDs for photos, games, music, movies, data or other digital file. Are you looking for supreme software for DVD burning? Good news. The following account is richly splashed with 5 best DVD burning programs. Check them out and see which one best suits your requirements.


BurnAware Free



This interface department provides a step-by-step process for your burning projects. BurnAware Free is amongst the most renowned free DVD, CD, Blu-ray Disc burning software for Windows. With this software, you can easily generate and burnMP3 and Audio CD, ISO and Cue Image, erase or format rewritable disc, Data and DVD-Video disc, copy your DVD or CD to ISO image. This software is only for personal home use. It is easy to navigate your directories with BurnAware’s file management system and adding files. BurnAware offers adequate features for maximum burning projects.


InfraRecorder


InfraRecorder is an established project that has been famous for fairly a long time. It supports every common feature equipped with a good burning application. It functions with all types of DVDs and CDs including twofold layer discs, full command line support like CDBurnerXP. With InfraRecorder, you can burn and fashion images with support for author rewriteable discs, bootable discs and form audio CDs and video DVDs. The interface is simple and clean.


ImgBurn


If doing a basic burn is your aim, you may be confused by ImgBurn’s advanced features. Exploring the menus at ImgBurn will reveal maximum of what is required. It has many modes like reading, building, writing, verifying and discovery. Each of them performs a different task.


Ashampoo Burning Studio


This software is intuitive and simple to use. If you want file backup with these traits, try out Ashampoo Burning Studio 6.77. It contains several small improvements making the program easier and more effective. If you want your discs burnt easily and fast with least fuss and good quality, then this program will suit your needs. It is advantageous as it adds multi-disc file backups and restores on DVD, CD and Blu-Ray.


CD Burner XP


If you are familiar to use Nero, then it is especially brilliant. CD Burner XP has extra features to rip your audio CDs and finding track information on the Web. It adds sessions to multisession discs, verifies burns, burns on-the-fly, creates audio discs, erases rewritable media, creates video DVDs and command line version. It also has LightScribe cover printing support with basic designer supporting custom background images and is multilingual. The included audio player helps you ensure you have captured the desired tracks. It supports common optical discs’ types like DVD, CD and Blue-Ray discs with double layer mediums. It natively supports 32 and 64 bits version of Windows 7.


Above mentioned 5 best DVD burning programs give you an insight about the excellence of these software. Use any of them and according to your wish and need and you will not be disappointed. That’s for sure.

"



Source :Google Reader

Free Text To Speech Software

Free Text To Speech Software: "

Sometimes we get bored of reading hundreds of pages and besides we get easily tired. Especially when we are about to create a paper foe some audience we are well ware of the fact that a person attention ends after half page of written text Taking this into consideration, the IT companies developed some programs to make it easier for us to present written text in an attractive way, so the text to speech converter software are available for free on the Internet.

<-300x250 Medium Rectangle - center->


The first software to be presented is Natural Reader. The main advantage of using this software is that it can read loud all your texts from the computer. It supports any types of format: Word, emails or PDF documents. If you are a student and you are just on the exam’s eve, do not worry for having hundreds of pages. Connect your headphones to the computer and listen them all. For some of us the audio memory is stronger that the visual one. This software is also really helpful for those who face reading or learning problems, due to the fact that every pronounced word is highlighted.



Furthermore, it could make the language learning process easier, for instance if you would like to learn some foreign language, go ahead and listen carefully to the pronunciation. If you about to deliver a speech in public and you have written your discourse, hearing it on a natural tone will help you correct any phrases that sound unfamiliar. This software also could help those who have visual problems to manage better electronic texts. Believe it or not, the PC can even read a story to your child if you are not at home when sleeping time is. Other software might come in hand is Verbose Text to Speech. This program allows you to drag and drop into his interface any of the documents you have on your PC and even the Internet pages. Moreover it converts your documents into MP3 files. This allows you to take the recording wherever you go, because you can move it to the iPod or MP3 player. Another innovative fact is the option of changing the voice, so you can choose another voice tone and adjust speed, volume or pitch. If you want to use this recording for radio, you can edit your recording in any audio editing program.



Finally, there is a program Read Please, which reads for you any text that is written on the screen, either Word docs or instant messages from chat. If you want some help with the Internet pages as well, you can download Read Please toolbar and all the content from an Internet page will be loudly read. The Read Please Plus is even more helpful, it translates you even the emoticons. The graphic interface is customizable, so you can choose the colors you want to see and the typeface font.

".

Source :Google Reader

Free Lie Detector Software

Free Lie Detector Software: "

A lie is to tell an untruth to intentionally mislead anyone. Almost all cultures believe that lie is something morally wrong, and all religions considered a sin. Although lying is considered as something wrong, almost everyone lies, for instance parents lie to their children to convince certain characters even exist. In some cases, it is essential to find out if a person is lying or not, for those times the companies developed series of software that you can download from the Internet.

<-300x250 Medium Rectangle - center->


First of all, KishKish Lie Detector is available for free online. This software is helpful if you want to discover if the person you are talking to on Skype or other programs is lying to you. The mechanism is simple, the person is talking and in the same time the detector analyzes the level of stress from his or her voice. Seeing the level of stress, you can modify your question and see how the interlocutor’s status is changing. Believe it or not, you can test with this program even a phone call. Go ahead and record the person’s speech and then analyze on your computer the whole conversation.



Another detector is the Lie Detector Advanced. It is available for free online . This software takes into consideration the nervousness from your voice, due to the fact that when we lie the tone is changing. The program is available for iPhone, so that you can take it anywhere. Software free online that could be helpful is Lie Detector available for iPhone. It takes into account the pitches, peaks and frequency of your spoken words and files a report. Furthermore, another software program to download and use while using your iPhone is Lie Detector Pro. This software is both funny and easy to use. Download the program, install it and read the instructions. After reading the instructions, this funny test that will show you if you are a truthful person or a liar. Hold the phone in one hand and listen to the questions, and then answer to them in load voice. There are easy questions such: what is your name but at a certain point there are some personal questions, such as: are you in love? Well, if you have friends with sense of humor then go ahead and ask them some of those questions. The tremor from their voice will inform the software whether they are lying or not.



Finally, there is another lie detector for entertainment use only: Agile Lie Detector for iPhone. You should know that in order to have this software you have to download the iTunes in the first place. To have this application you are about to pay almost 8$. This program analyses the stress from your voice and displays the result instantly on the screen. The best part of using this is that you can also record a phone conversation and analyze how the voice changes while asking less comfortable questions.

"

Source :Google Reader

Converting VHS Tapes to DVD

Converting VHS Tapes to DVD: "

Converting VHS tapes to DVD is a wonderful way to save, share and enhance old tapes that may not be aging with poise. Do it yourself tape to DVD transfer can be easy and reasonable. If you want to convert VHS tapes to DVD, there are numerous options for the VHS to DVD conversion. If done the correct way, the DVDs can look even better than the original VHS tapes.


Use a Combination Unit



A combination of VHS/DVD machine will enable you to transfer data easily from a VHS tape to a DVD. If DVD component of your DVD/VHS machine has a recording option, then insert a blank DVD R or DVD-RW into the DVD tray of your machine. Put in the VHS tape you want to convert into the VCR portion of the machine and follow the guidelines in your particular machine’s instruction manual. If you want to modify the menus or chapters, don’t use this method. Using a combination unit is the fastest and simplest type of VHS to DVD converter to copy VHS tapes to DVD.


Use a Computer


An analog-to-digital converter is required to be used as a middleman between your VCR and computer to change VHS data into a format that your computer can identify. Variety of converters is there. Decide which one suits you best. Also ensure that your computer can burn DVDs but it doesn’t mean that it burns DVDs also. Some devices provide analog-to-digital transfer and the DVD burning hardware in one machine.


Use an External DVD Burner


If there are ample VHS tapes to convert to DVD, it will be prudent to buy an external device. Then you can successfully record VHS to DVD. $100-$150 can fetch you a well-mannered DVD burner that hooks right up to your VCR and fashion DVDs from your VHS tapes. Burning DVDs is quite easy. Once you burn a DVD, you can copy it as many times as you wish.


Use a VHS to DVD Conversion Service


Various VHS to DVD conversion services are available that create a free DVD for you. Sometimes, these companies copy protected VHS to DVD. Some sites transfer your VHS tapes to DVD for anywhere depending on what particular services you need.


Use a Video Camera


You can use your digital video camcorder as an intermediary for converting your VHS tapes to hook your VCR up to your video camera with composite video cables. Connect these cables to the video in port on your camcorder and your VCR’s video out port. Carefully read your camcorder’s instruction manual to decide the accurate steps. Pressing a few buttons will make you have your VHS data on video camcorder. Then transfer that data to a DVD by connecting your camcorder to your computer/DVD burner.


With above mentioned tips for converting VHS tapes to DVD, you can effectively transfer the data of home tapes to your DVD. Just remember that if you use a method which includes camcorders or VCRs, ensure that the tape heads are not dirty. Be aware of any flaws on VHS tape that will be more apparent when you transfer VHS to DVD.

"


Source :Google Reader

Return of the Playstation Network

Return of the Playstation Network: "

Today is May 17, almost exactly a month after the massive breach of Sony’s PSN network. If you live in North America then you may be pleased to know that the Playstation network has finally come back online. Due to the enormous amount of subscribers to the service, the restart has been a bit shaky, with reports of password reset emails clogging ISP mail servers. Despite the hiccups, it seems that the service is gradually returning.

If you are a customer of the Sony service, you will need to immediately change your password as well as install a firmware update to your system. Sony has pledged a much stronger security environment to its customers and partners, and this appears to be the beginning of many changes. Sony has previously stated that they have rebuilt the entire network from scratch and moved their PSN infrastructure to a new data center in an undisclosed location. I’m not sure why this emphasis on security wasn’t a focus of the original model, but maybe Sony can prevent future mishaps. Perhaps all the additional outside scrutiny will help, but only time will tell.

"


Source : Google Reader

Facebook profile: No, it doesn’t work!

Facebook profile: No, it doesn’t work!: "

We are currently investigating a new malicious campaign on Facebook mostly targeting French-speaking users. When visiting infected users’ profiles, you see the following:

Translation: Wow, it really works! Find out who is viewing your profile!

The various links that are used rotate quite fast and lead unwitting victims to a website that explains what they need to do. Here’s what it looks like:

Basically, there are 2 steps.

  • The first one is to copy a Javascript code using CTRL+C
  • The second is to visit Facebook.com, paste the Javascript in your address bar and press “Enter”.

"
Source : Google Reader

Lab Matters - Travel Tips: Stay Secure on the Road

Lab Matters - Travel Tips: Stay Secure on the Road: "

For business travelers, the use of a laptop to stay connected to access business documents and connect to office resources is an absolute necessity. In this Lab Matters webcast, Kaspersky Lab malware researcher Stefan Tanase provides some general travel tips and advice to assist in protecting you, your laptop and your corporate data while you are on the road.

"



Source : Google Reader

Rootkit Banker - now also to 64-bit

Rootkit Banker - now also to 64-bit: "

Yesterday Kaspersky Lab detected the first rootkit banker created to infect 64-bit systems. It was detected in a drive-by-download attack made by Brazilian cybercriminals.

We found a malicious Java applet inserted in a popular Brazilian website. The attack was made using a malicious applet in such a way as to infect users running old versions of the JRE (Java Runtime Environment) and was prepared to infect users running versions of both 32 and 64 bits systems.

Inside this applet we found some interesting files:

The entire malicious scheme is simple yet interesting. The file add.reg will disable the UAC (User Account Control) and modify the Windows Registry by adding fake CAs (Certification Authorities) in the infected machine:

"


Source : Google Reader

Smart money?

Smart money?: "

The BBC today reported the announcement of the first UK 'mobile wallet', allowing people to pay for things using their mobile phone.

It sounds very convenient. I use my mobile phone for so many other things these days - why not as an alternative to cash? And on the face of it, isn't this just an extension of the same concept behind the Oyster Card? For those not familiar with the Oyster Card, it's an alternative to buying tickets to travel across London. You use a card instead: you put credit on the card at your convenience and the cost of the trip is debited automatically when you travel.

There's a key difference of course. If I lose my Oyster Card my loss is limited to the credit I've put on the card. The consequences could be far more serious if it's my smartphone, since someone could get access to my entire online identity. If my phone is my wallet too, it becomes even more of a target - to real-world criminals as well as cybercriminals.

We know from experience that convenience typically wins out over security. Keep watching.

"


Source : Google Reader

Dangerous colours

Dangerous colours: "

New techniques for obfuscating malicious code on websites are a good way to mislead both users and protection software alike. Recently, I came across an interesting attack against the osCommerce online shopping platform in which malicious script was injected into PHP files by exploiting a Remote File Inclusion vulnerability in osCommerce software.

This PHP script works as an infector and is used to add the following code just after specified tags in HTML files and at the top of JavaScript files:

At first glance, this code doesn't look as suspicious as it usually does - there is nothing that stands out: no <iframe> tag, no unescape() function, nor is there an eval(). Instead, we just have a function which seems somehow related to colours displayed on the web page and an array filled with values pretending to be a hex representation of these colours. Unwary users could overlook this code assuming that it's legitimate and belongs to the page, but if we follow it, we can see what it really does. The code takes the values from the array, converts them in some way and builds an ASCII string, so it can then use either the document.write or document.createElement method to append text to the web page source code. It the latter case, the created element has a type of text/javascript.

Now does it look suspicious enough to you? :)

If the second parameter of the div_pick_colours() function is specified, the function returns:

in which the last value always differs and depends on the current date and time. Otherwise, it returns the same URL but without <script> tags. The given address is not active anymore, so we couldn't tell what kind of threat it used to lead to.

Kaspersky Lab detects this malware as Trojan-Downloader.PHP.JScript.a and Trojan.JS.Redirector.px. According to Virus Total, at the time of writing only one other AV vendor was able to detect the PHP part of this malware. For script injected into JS and HTML the ratio was as low as 20%.

How to secure your website from being infected with such malware and what to do in case of infection?

Two most important things are backup copies and regular scanning of all the files on the server. If you are using osCommerce or any other e-Commerce solution, you should always check for the software updates and install them as soon as they're being released. Sometimes the time between disclosing a vulnerability and publishing patch can be shamefully long, so maybe it's worth considering to reject some buggy features and delete vulnerable files from the server. Setting up password on the root directory is also a very good idea, as it prevent malware from modifying core files.

"


Source : Google Reader

Shirahama Symposium 2011

Shirahama Symposium 2011: "

”The 15th Cyber Crime Symposium, Shirahama" with theme "Cloud Security" was held on May 26th - 28th at the "Big U" Information Exchange Center in Wakayama Prefecture, Japan. Approximately 220 people, including government delegates, information security researchers, lawyers, law enforcement and academia attended the event. Experts were presenting about topics like benefits and security risks of cloud computing as well as other related technical matters.

Besides the presentations in the official program, there was also plenty of chance for human networking, with the venue surrounded by beautiful nature and cultural heritage, hot springs and delicious Japanese cuisine.

During the presentations, which were also broadcasted via ustream, tweets tagged with #sccs2011 were shown cycling on a separate screen. This yearly event is targeting Japanese audience and no translation services were offered. If you plan to attend this event in the future, be sure to brush up your Japanese, it most certainly is worth it. Past content of the same event covered themes like “Threat of Malware/Virus” (2009) and “How can we protect the children and ourselves from harmful contents” (2010).

"



Source : Google Reader

Democratic Party of Hong Kong Website Compromised and Serving Spyware

Democratic Party of Hong Kong Website Compromised and Serving Spyware: "

The Democratic Party of Hong Kong's website was compromised and malware uploaded to the web server. Interestingly, the server was distributing malicious flash and spyware nearly identical to the compromised UK Amnesty International servers at the beginning of this month. The server is being cleaned up.

The english version of the website did not include injected iframe links pointing to the exploit.html page, which in turn delivers three different version-appropriate malicious variants of flash detected by Kaspersky as 'Exploit.SWF.CVE-2011-0611'. The malicious flash was 0day at the beginning of this month, and will be effective on unpatched systems.

"


Source : Google Reader

Fake virustotal website propagated java worm

Fake virustotal website propagated java worm: "

The infection strategies using java script technology are on the agenda and that because of his status as a 'hybrid', criminals looking to expand its coverage of attack recruiting infected computers regardless of the browser or operating system you use.

In terms of criminal activities, the techniques of Drive-by-Download by injecting malicious java script in different websites, are a combo of social engineering that requires users to increasingly sharpen the senses of 'detection'.

During this weekend, we encountered a fake website of the popular system analyzes suspicious files Virustotal, by Hispasec company, touted to infect users through the methods mentioned above.

"

Source : Google Reader

“You sh0t the sheriff”

“You sh0t the sheriff”: "

This week I had the chance to deliver a presentation at one of the most famous and prestigious security conference in Brazil called “You sh0t the sheriff” now in its 5th edition.

"

Source : Google Reader