About Me

United States
www.krishnavedam.googlepages.com/vedam's hi everyone, Interested to do something more to our college or to our friends,and to make ourselves be special one among all others then cmon share your views and ideas suggestions here cmon in. help each other in answering their questions and through others ways. just post here ur question or else answer the posts as far and as many as u can

Friday, November 9, 2007

ANTI VIRUS!!!!!!!!!!!!!!!!

Hi friends

i am back,Now a days i have seen many of my friends worrying about virus attacks on their systems,So i thought to do something in order to solve or even try to do this.
here i provide some anti virus software and their needs

NORTON ANTI VIRUS


Features

* Improved performance delivers faster scans NEW
* One click access to expert support NEW
* Works quietly in the background. NEW
* Network mapping provides a view of your home network. NEW
* Detects and removes spyware and viruses
* Blocks spyware and worms automatically
* Protects email and instant messaging from viruses
* Prevents virus-infected emails from spreading
* Rootkit detection finds and removes hidden threats
* Includes protection updates and new product features as available throughout the renewable service period *

SYSTEM REQUIREMENTS

Windows Vista® Home Basic/ Home Premium/Business/Ultimate**
Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center Edition

* 300MHz or higher processor
* 256MB of RAM
* 300MB of available hard disk space

** Must meet minimum Windows Vista operating system requirements.
Email scanning supported for POP3 and SMTP compatible email clients.
Supported instant messenger clients:

* AOL® – 4.7 to 5.9
* Yahoo!® – 5.x and 6.x
* Microsoft® – 6.0 or higher
* Trillian™ – 3.1 or higher

AVAST ANTI VIRUS:



Features:
* Standard Shield — Real-time protection
* IM shield — Instant Messenger protection
* P2P shield — P2P protection
* Internet Mail — E-mail protection
* Outlook/Exchange — Microsoft Outlook/Exchange protection
* Web Shield — HTTP protection (localtransparent proxy)
* Script blocker — script checker (Pro version only)
* Network Shield — basic protection against well-known network worms. Acts as a lightweight Intrusion Detection System
* Audible alarms — vocal warnings such as "Caution, a virus has been detected!"
* Boot-time scan — through the program interface, a user can schedule a boot-time scan to remove viruses that load during Windows startup and are therefore difficult to remove.

AVG ANTIVIRUS

All-In-One Protection

* Anti-Virus protects from viruses, worms and trojans
* Anti-Spyware protects from spyware, adware and other malicious programs
* Anti-Spam filters spam and protects against phishing attacks
* Firewall protects from hackers

Features

* All-in-one, easy to use protection - install and forget
* New program versions and updates automatically applied for free for the duration of your subscription
* Quality proven by all major antivirus certifications (VB100%, ICSA, West Coast Labs Checkmark)
* 24/7 technical support provided at no extra cost
* Improved virus detection based on better heuristics and NTFS data streams scanning
* Unique automatic threat-removal anti-spyware engine
* Automatic firewall profile switching for improved security and usability
* 100% virus detection — AVG’s scanning engine has received numerous awards for its excellent detection of “in the wild” viruses, including the VB100% award. Its unique combination of detection methods provides full protection against viruses, worms and trojans.
* Cutting-edge anti-spyware technology — Using the latest state-of-the-art detection technology, AVG detects spyware, adware, DLL-trojans, keyloggers, and much more. Malware hidden in data streams, archives, or the Windows registry is also detected.
* Full on-access protection — The powerful AVG Resident Shield provides maximum protection by scanning every file opened, executed, or saved. It also prevents the opening or executing of infected files.
* Flexible intelligent scanning — The AVG Resident Shield can include/exclude files from being scanned based on individual file extensions and can handle exceptions for potentially unwanted programs such as adware.
* Full e-mail protection — AVG checks every e-mail sent or received, providing full protection from e-mail-borne threats. AVG supports all leading e-mail clients, including MS Outlook, The bat!, Eudora, and all other SMTP/POP3-based e-mail clients, such as Outlook Express. Encrypted connections using SSL are also supported.
* E-mail spam and phishing filtering — AVG checks every e-mail received, using the latest technology and up-to-the-minute spam signatures to ensure maximum detection rates for spam and phishing attacks.
* Automatic threat handling — AVG can automatically heal or remove infected files and other threats such as trojans, worms and spyware.
* Control over all network access — The AVG Firewall monitors all communication to and from the computer, blocking external attacks and preventing trojans from exporting confidential data. The AVG Firewall configuration wizard automatically creates access rules for all popular software. In addition the firewall can switch profiles automatically, based upon the current conection type, ensuring seamless changeover for notebooks.
* Powerful scheduling — AVG automatically provides recommended daily schedules for scanning and updating, and also allows you to create custom-scheduled events.
* Multiple language support — No need to buy a special language version.

Supported platforms

Platform
[Operating System] AVG Internet Security
MS Windows 98 * Yes
MS Windows Me * Yes
MS Windows NT * Yes
MS Windows 2000 Yes
MS Windows XP Yes
MS Windows XP Pro x64 Edition Yes
MS Windows Vista Yes
MS Windows Vista x64 Edition Yes
MS Windows NT Server 4.0 No
MS Windows 2000 Server No
MS Windows 2003 Server No
MS Windows 2003 Server x64 Edition No
Linux i386 No
FreeBSD No
Symbian No
Platform
[Application]
MS Exchange Server 5.x No
MS Exchange Server 2000/2003 No
MS Exchange Server 2007 No
Kerio MailServer 5/6 (MS Windows) No
Kerio MailServer 5/6 (Linux i386) No
Lotus Domino (MS Windows) No
Lotus Domino (Linux i386) No
PostFix No
QMail No
SendMail No
Exim No
Important notice

* * Operating systems marked with an asterisk (MS Windows 98, MS Windows ME and MS Windows NT) will only be supported until August 2008.
* Anti-Spyware on-access scanner is available only on Windows 2000 SP4 + Update Rollup 1, Windows XP SP2, Windows XP Pro x64 Edition SP1 and Windows Vista/Vista x64 Edition.


Free Customer Support

* AVG's world-class product support is provided at no extra cost to all registered AVG customers.
* 24/7 technical support by e-mail
* FAQ and online documentation
* Up-to-the-minute updates available "around-the-clock" as AVG virus experts react rapidly to new and emerging threats. High speed delivery via worldwide networks guarantees maximum protection levels for users.

Minimum System Requirements

* Windows Vista, Windows XP, Windows 2000, Windows NT, Windows Me, Windows 98. Note: AVG home and small office products do not have support for server operating systems (Windows NT Server, Windows 2000/2003 Server, etc.). If you are interested in server protection, please continue with Small Business solutions.
* 1,2 GHz Processor
* 70 MB free hard drive space
* 256 MB RAM

Licensing

* AVG Internet Security requires 1 license per computer and can be purchased in packs for 1,2,3 and 5 computers.
* Licenses can be purchased for 1 or 2 years.
* Each license includes all program and database updates and full technical support for the license duration.
* For more information and special licensing please contact Sales Support.

Hiding your IP from detection

Running the Tor client on MS Windows

Note that these are the installation instructions for running a Tor client on MS Windows (98, 98SE, NT4, 2000, XP, Vista, Server). If you want to relay traffic for others to help the network grow (please do), read the Configuring a relay guide.

Step One: Download and Install Tor

The install for MS Windows bundles Tor, Vidalia (a GUI for Tor), and Privoxy (a filtering web proxy) into one package, with the three applications pre-configured to work together. Download either the stable or the experimental version of the Windows bundle from the download page.

If the bundles don't work for you, you can download Tor by itself from the download page, and then install and configure Privoxy on your own.

tor installer splash page

If you have previously installed Tor, Vidalia, or Privoxy you can deselect whichever components you do not need to install in the dialog shown below.
select components to install


After you have completed the installer, the components you selected will automatically be started for you.

Step Two: Configure your applications to use Tor

After installing Tor and Privoxy, you need to configure your applications to use them. The first step is to set up web browsing.

If you're using Firefox (we recommend it), the Vidalia bundle installs the Torbutton plugin for you. Restart your Firefox, and you're all set:
Torbutton plugin for Firefox



(Learn more about Torbutton here. If you plan to run Firefox on a different computer than Tor, see the FAQ entry for running Tor on a different computer. If you need to use a browser other than Firefox, you'll have to configure its proxy settings yourself.)

Using Privoxy is necessary because browsers leak your DNS requests when they use a SOCKS proxy directly, which is bad for your anonymity. Privoxy also removes certain dangerous headers from your web requests, and blocks obnoxious ad sites like Doubleclick.

To Torify other applications that support HTTP proxies, just point them at Privoxy (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at SocksCap or FreeCap. (FreeCap is free software; SocksCap is proprietary.)

For information on how to Torify other applications, check out the Torify HOWTO.

Step Three: Make sure it's working


Check to see that Privoxy and Vidalia are running. Privoxy's icon is a blue or green circle with a "P" in it, and Vidalia uses a small green onion to indicate Tor is running or a dark onion with a red "X" when Tor is not running. You can start or stop Tor by right-clicking on Vidalia's icon in your system tray and selecting "Start" or "Stop" from the menu as shown below:
Vidalia Tray Icon


Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector and see whether it thinks you're using Tor or not. (If that site is down, see this FAQ entry for more suggestions on how to test your Tor.)

If you have a personal firewall that limits your computer's ability to connect to itself, be sure to allow connections from your local applications to local port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to at least TCP ports 80 and 443, and then see this FAQ entry.

If it's still not working, look at this FAQ entry for hints.

Step Four: Configure it as a relay

The Tor network relies on volunteers to donate bandwidth. The more people who run relays, the faster the Tor network will be. If you have at least 20 kilobytes/s each way, please help out Tor by configuring your Tor to be a relay too. We have many features that make Tor relays easy and convenient, including rate limiting for bandwidth, exit policies so you can limit your exposure to abuse complaints, and support for dynamic IP addresses.

Having relays in many different places on the Internet is what makes Tor users secure. You may also get stronger anonymity yourself, since remote sites can't know whether connections originated at your computer or were relayed from others.

Thursday, November 8, 2007

APPLE INSTALLATION ON INTEL



PRE INSTALLATION PROCESS:

• Place the image on your desktop. It should be named osx-leopard105.dmg
• Unzip the zip file on your desktop; PLACE ALL THE CONTENTS ON YOUR DESKTOP (2 PATCH FILES AND 3 FOLDERS)
• Now lets open the patch file. Double click the patch-it.sh file in your desktop. This should open it in text edit. If not, just right click it and select open with->textedit
• Now, look for the line where it says: DMG="/Users/XXX/Desktop/osx-leopard105.dmg". Make sure you change XXX with your username. This path points to the GM image located on your desktop! Save and close the file.
• Now, open up a terminal window; just type terminal in spotlight and load terminal from there;
• On your terminal window, do a sudo –s command and enter your password.
• Now Type “cd desktop" in the terminal window and hit enter.
• Now type ./9a581-patch.sh THE PATCH WILL NOW EXECUTE! Be patient, go grab some coffee or kiss your wife. It will take a bit of time.
• When the patch is done, you will see a Leo_Patched_DVD.iso image file inside the 9a581-patch folder. The size should be 4,698,669,056 bytes. If it is a bit more, dont worry. This is the image we will either burn to a DVD-RW or restore it to a partition. More ahead…
NOTE: PREBINDING ERRORS ARE ALRIGHT IF YOU GET THEM WITH THE SCRIPT
INSTALLATION METHOD 1 – Burn the Image
Now that we have our patched image, Leo_Patched_DVD.iso, lets burn it to a DVD-RW (I chose a DVD-RW since if you screw up, you can just erase it)
* If you are a Windows user, I recommend ImgBurn (http://www.imgburn.com/) to burn your .iso
• Open up disk utility;
• Make sure that your DVD-RW is on the drive; Click the drive on the left column in disk utility; now on your right side of the window, select erase. This will blank out the media (make sure you select the DVD drive, not another partition on your system!!)
• After that, Click Burn on the top left corner; browse to the 9a581-patch folder and select the Leo_Patched_DVD.iso. This will now burn it to the DVD. Wait a bit, kiss your wife again or get some more Brazilian coffee…
• After it is done (make sure you let disk utility verify your image), you will now have a fresh 9a581 patched DVD (it includes the new patched kernel as well,I didn’t tell you that huh?)
INSTALLATION METHOD 2 - RESTORE Leo_Patched_DVD.iso TO A PARTITION
Some people prefer using a spare partition to do the install instead of a DVD. That is quick install option if you want to test out the process without the long waits of burning a dvd, loading, etc… Just remember, the process below is to setup a partition for the installation files, not the actual leopard installation!! Well here it is:
• First, you need a partition somewhere. I recommend having a second hard disk since you can just reformat after you are done installing. Use Disk utility to partition the drive. It should be MAC OSX Journaled format. Also, it needs to be MBR. Partition and format (Make sure the Volume is named “Leopard”)
• Lets flag the partition and make it bootable.
Somehow, The Leopard Installation process does no make the partition bootable. You need to do this yourself (working on a fix). Before you run the steps below, make sure you copy the files located in files/i386 (from the pack) to /usr/standalone/i386/ on your tiger disk.
-----------------------A NOTE ABOUT THIS SECTION:---------------------------------------
Before you start this section: Kali (The Great!)has released a CD that will simplify the MAKE IT BOOTABLE process:

http://www.tiny.cc/TJSym
I would recommend using it for those that are new to this. I you use the CD, just jump to the next section
Many have reported a better "success rate"( If I can call it that way) when applying the commands below from the terminal window when booting from the DVD. What I mean is, Boot the DVD and when the welcome window shows up, run the terminal from the Utilities menu. also, the steps below will work either BEFORE or AFTER the Install.
• Open up terminal. This is what you do (red text is what terminal will show after the commands you enter):
sudo fdisk -e /dev/rdiskX ( replace X and x with the disk/partition you will restore the image to)
fdisk: 1> update
Machine code updated.
fdisk:*1> f 1
Partition 1 marked active.
fdisk:*1> w
Device could not be accessed exclusively.
A reboot will be needed for changes to take effect. OK? [n] y
Writing MBR at offset 0.
fdisk: 1> q
Your partition is now active!
MAKING IT BOOTABLE
*Note: If you are trying this with the USB disk method, place the startupfiletool, boot and boot1h files in your USB disk. When running the commands add a "./" to it
ie: ./startupfiletool -v /dev/rdisk1s1
• First, Lets Unmount the disk: In terminal type: diskutil umount diskXsx
• Ok, now lets put the file “boot1h” in the beginning of the partition: In terminal, browse to the i386 folder inside the 9a581-patch folder. Then type this:
sudo dd if=boot1h of=/dev/rdiskXsx bs=512 count=1
• Now, lets run the startup tool to embed the boot code: (Place startuptool in your usr/sbin folder, on your Tiger Disk if installing from tiger;otherwise, see above)
sudo startupfiletool -v /dev/rdiskXsx boot
• And last, lets give the pope’s blessing to the partition:
sudo bless -device /dev/diskXsx -setBoot –verbose
Now, mount and bless the mount:
• diskutil mount /diskXsx
• bless -mount /Volumes/YOUR_VOLUME_NAME -setBoot -verbose (Volume name is prob Leopard)
The partition is now bootable. The bless command wont give you any confirmation. It will just give you a "args:" line followed by your command.
-------------------------------------------------------------------------------------------------------
Now, to restore the Leo_Patched_DVD.iso to the partition:
• Open up Disk utility; Select Restore;
• Drag the Leo_Patched_DVD.dmg to the Source textbox and then Drag the Destination partition (the one you partitioned above) to the destination text box (this is on the right hand side in disk utility). Hit Restore. Wait a bit and the restore process is done!
Well done…now you have either a patched DVD or a “patched” partition containing the install. This is what we called “Pre-installation process. Let’s go now for the “Post-Installation” process…

POST INSTALLATION PROCESS:

In the first part, I showed you how to patch your DVD/prepare an installation partition. Lets now move to the install process.
You will need a partition to install Leopard. The partition we just did earlier was just to hold the installation files. Make sure you have a partition on one of your disks to receive the install. And the partition where you will be installing needs to be MBR not GUID!!!
After inserting the DVD/booting the install partition, just go and install leopard as usual. Make sure you un-select printer drivers/languages/xcode, etc… Our DVD is a single layer one without all the garbage. If you picked the restored partition method, the restored partition should show on the bootloader. If not:
• When the Darwin Bootloader loads, used advanced options and type rd=diskXsX (where X is the disk where you restored to, and X the partition number). This should boot into it (if not, there is something wrong with your setup!) Check the MAKING IT BOOTABLE SECTION from the post above or use Kalis CD. Link listed above.
After installing Leopard, reboot into Tiger again. DONT BOOT INTO LEOPARD YET!!!
NOTE: If you got the GreenD Patched DVD, The post patch method can be run from an External USB Pendrive. If no Tiger installation is present, Boot to the DVD, and once the Welcome Screen shows up, select Utilites->Terminal. Get a bit familiar with UNIX so you know how to browse to the PenDrive! The GreenD DVD has the instructions necessary.
Now we will run the Post Patch script to replace some kexts. This is due to the fact that When Leopard installs, it gets its kexts from their install package. We need to copy ours to the install partition so that it boots properly.
• After you boot into Tiger (or the DVD) Open up a terminal window and do a “sudo –s”; Enter your password (no need for sudo if booting from DVD, we are already root);
• Type “cd” and a hit space. Now, drag the folder 9a581-patch on your desktop to the terminal window and hit enter. This should give you the path to the folder (DVD boot, browse to your PenDrive file location)
• Now type ./9a581-PostPatch.sh THE POST PATCH WILL NOW EXECUTE! Wait a tit bit…
The Script will ask you to reboot, Hit Y/N and reboot.
We should be done now!!!! You now should boot to your Leopard installation disk. If you get stuck after this, boot with a –v option and watch for errors/panic.
From here on, we can post your problems here and we will try to
sort it.
AGAIN: The kexts here are the common ones used on everyday installations, but this was tailored for an ASUS P5W-DH Deluxe. If you get any panics with –v switch, we can try to pinpoint to what kernel is doing it. Some people have reported that the BootCache.kext gives panics. It is a bit more to do, but we can all get it sorted here.
Hope this helps a lot of you!


Patch installing
http://dailyapps.net/2007/10/hack-attack-install-leopard-on-your-pc-in-3-easy-steps/
http://forum.osx86scene.com/viewtopic.php?f=16&t=2008&st=0&sk=t&sd=a&sid=812ad7647071deb678a8e9725866ee3e
TOR download
http://www.torproject.org/docs/tor-doc-win32.html.en
DVD
http://www.demonoid.com/files/download/HTTP/1402044/7862916
patch
http://www.demonoid.com/files/download/HTTP/1403802/3931458