Welcome, Guest |
You have to register before you can post on our site.
|
|
|
How to Prevent ZIP Files from Executing Malicious JavaScript Behind Your Back |
Posted by: baziroll - 04-20-2016 , 11:08 PM - Forum: Security News
- Replies (1)
|
|
A problem exists today affecting countless of unsuspecting users, and that's the problem of ZIP files boobytrapped with malicious JavaScript code that can automatically and secretly download and launch malware into execution on their PCs.
For some years now, you could add JavaScript code to ZIP, RAR, or other types of archive files. When unzipping the file, the JavaScript file would execute, automating various operations.
On Windows, this code would run via the Windows Script Host (WSH), an automation technology for Microsoft Windows operating systems, similar to batch files, but one that can work with JavaScript and JScript (Microsoft's version of JavaScript) code.
With such powerful features, you sometimes wonder how come it took malware coders so much time to figure out they could abuse this ability to do bad. But they have now, and it's not rosy.
ZIP files boobytrapped with JavaScript abused to spread malware
We've seen ransomware, banking trojans, and all sorts of nasty malware distributed via this method. Attackers craft a malicious ZIP file, append it to an email, and spam hundreds and thousands of users in short-burst campaigns.
When users receive the email, they download the file and unzip it, thinking if there is malware, it's probably packed inside the ZIP as an EXE. Without realizing, the damage has already been done via the JavaScript file that silently executed, and the malware has already taken root.
But there's a way to prevent this, according to F-Secure, a Finish cyber-security vendor, who's how-to tutorial we're reproducing down below.
To prevent automatic execution of a malicious JavaScript file attached to a ZIP file, you'll have to edit the Windows Registry and disable the automatic connection between the JavaScript/JScript code and the Windows Script Host mentioned above.
Let's disable automatic JavaScript execution via Windows Script Host
Step 1: Open the Windows Search and type in "Regedit" to open the Windows Registry Editor.
Step 2: On the left you have some folders. Open the folders in the following order (path): "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Script Host\Settings"
Step 3: Once you've reached the last folder called "Settings," go to the panel on the right and right-click anywhere on the background.
Step 4: From the new popup menu, select the "New" and then the "DWORD (32 Bit) Value".
Step 5: This will create a new entry, which you'll have to name "Enabled". Once you've done this, double-click it to open a new popup.
Step 6: In this popup, make sure that you have "0" (zero) entered in the Value field, and that the Base setting is set to Hexadecimal.
Testing that everything works
That's it. Close all the Windows and go for a test. To verify that the Windows Script Host won't open any JavaScript files, first, you'll need some JavaScript files.
The easiest way is to download this file right here, which is the jQuery Javascript library. Press CTRL+S to save it from your browser to your computer, and then double-click the file.
If you've set up your Windows Registry correctly, the following popup will appear, telling you the Windows Script Host has been disabled.
source
|
|
|
More than Half of the World's Malicious Websites Are Hosted in the US |
Posted by: baziroll - 04-20-2016 , 11:04 PM - Forum: Security News
- No Replies
|
|
Yesterday, German security firm G DATA published its PC Malware Report that included an analysis of the threat landscape for the second half of 2015.
According to the company's report, in the second half of last year, its security products detected 2,098,062 new malware variants, bringing the 2015 total to 5,143,78, which is less compared to 2014's total of nearly 6 million malware variants.
Gambling sites are the most likely to host malicious content
The most popular malware variant during the second half of 2015 was an adware program called Script.Adware.DealPly.G, seen in 22.9 percent of all malware detections.
Most of this malware was distributed via spam email, but also via so-called "evil" websites. Based on the evil website's server location, 57 percent were hosted in the US. This should come as no surprise since the US also harbors more than half of the world's data centers.
Based on the evil website's domain of activity, G DATA experts saw a clear-cut trend of using gambling sites to spread malware. These types of sites were the source of 18.7 percent of all attacks, followed by blogs with a 12.9 percent ratio, and technology and telecommunications sites with 10.8 percent.
Dridex becomes a behemoth in H2 2015
Out of all the malware detected in 2015, even if not the predominant threat, banking trojans were among the most dangerous. In the second half of 2015, Dridex massively expanded its operations, taking up a huge piece of the market, with only Gozi and Vawtrack barely managing to keep their shares intact.
Analyzing banking trojans as a whole, G DATA looked at their targets, meaning the banks into whose websites banking trojans inject malicious code to steal the user's login credentials.
During the second half of 2015, the most targeted bank was the Santander Group (Spain), with an attack probability of 45 percent, followed by three UK banks, Lloyds, RBS, and Barclays, all with a probability of around 35 percent.
G DATA's 20-page report provides a more in-depth analysis of the whole threat landscape and is available for download from the company's website.
source
|
|
|
New PWOBot Python Malware Can Log Keystrokes, Mine for Bitcoin |
Posted by: baziroll - 04-20-2016 , 11:02 PM - Forum: Security News
- No Replies
|
|
Security experts from Palo Alto Networks have discovered PWOBot, a new malware family coded in Python that can execute a broad range of attacks via its modular architecture.
PWOBot infections started cropping up at multiple European organizations during mid-to-late 2015. The subsequent investigation carried out by Palo Alto researchers also brought to light attacks dating back as far as late 2013.
Until now, only the following organizations have faced a PWOBot infection: a Polish national research institution, a Polish shipping company, a large Polish retailer, a Polish information technology organization, a Danish building company, and a French optical equipment provider.
PWOBot distributed via a Polish file sharing service
All infections happened after employees of these companies downloaded files off a Polish file hosting service (chomikuj.pl).
The malicious files were generic executables compiled via the PyInstaller package that takes basic Python code and packages it as a binary.
Until now, Palo Alto says it has only seen PWOBot packed as Windows executables, but Python is a platform-agnostic language, and PyInstaller can also generate binaries for Linux, Mac OS X, FreeBSD, Solaris, and AIX.
PWOBot is modular, can carry out a broad range of attacks
Not all PWOBot infections were of the same kind, and researchers observed twelve different versions. PWOBot's modular architecture is the reason for this large number of different versions.
Researchers say they discovered PWOBot modules that can download and execute other binaries, launch an HTTP server, log keystrokes, execute custom Python code, query remote URLs and return results, and also mine for Bitcoin using the victim's CPU or GPU.
All outgoing traffic is tunneled via Tor and uses encryption to avoid detection by security products.
"While it has historically been seen affecting Microsoft Windows platforms, since the underlying code is cross-platform, it can easily be ported over to the Linux and OSX operating systems," Palo Alto's Josh Grunzweig explains. "That fact, coupled with a modular design, makes PWOBot a potentially significant threat."
source
|
|
|
Security Firm Discovers Secret Plan to Hack Numerous Websites and Forums |
Posted by: baziroll - 04-20-2016 , 10:59 PM - Forum: Security News
- No Replies
|
|
Security researchers from SurfWatch Labs have shut down a secret plan to hack and infect hundreds or possibly thousands of forums and websites hosted on the infrastructure of Invision Power Services, who are the makers of the IP.Board forum platform, now known as the IPS Community Suite.
The plan belonged to a malware coder known as AlphaLeon, who, at the start of March this year, started selling a new trojan called Thanatos.
Advertised as a MaaS (Malware-as-a-Service) rentable platform, to be attractive to its customers, Thanatos had to run on a very large number of infected hosts. In the infosec community, this structure is called a botnet, and the bigger it is, the easier it is to carry out all sorts of cyber-attacks.
AlphaLeon breached Invision Power Services servers
In order to increase the size of the Thanatos botnet, AlphaLeon needed to find a way to deliver the trojan to as many users as possible. For this, he devised a plan and later carried it out.
His idea consisted of finding and exploiting a vulnerability in the infrastructure of Invision Power Services (IPS), who offers its IPS Community Suite as a hosted platform, running on AWS (Amazon Web Services) servers.
After establishing a foothold on IPS' servers, AlphaLeon then intended to access the websites of IPS' customers and place an exploit kit on their pages. The exploit kit would automatically infect site visitors with the Thanatos trojan by leveraging vulnerabilities in the visitors (outdated) browsers and browser plugins.
IPS customers include large companies such as Evernote, the NHL, the Warner Music Group, Bethesda Softworks, and LiveNation. Besides classic IP.Board forums, IPS also allows customers to set up fully working sites, even e-commerce stores.
AlphaLeon: And I would have gotten away with it too if it weren't for those meddling kids
His plan was stopped short when SurfWatch Labs security experts got wind of his intentions while scanning the Dark Web. Researchers contacted IPS, who was unaware of the hacker's breach, discovered the entry point, and shut down his access. This incident happened at the start of April, and IPS is still in the process of investigating the breach.
According to the most recent Thanatos ads on the Dark Web, the trojan, which at the beginning of March was only a potent banking trojan, has now received new updates in the form of add-on modules.
These modules allow customers of the Thanatos botnet to launch DDoS attacks, deliver ransomware, access a victim's webcam, steal Bitcoin, send spam, or steal login credentials for various gaming platforms.
Our initial article on Thanatos also includes screenshots of the botnet's administration panel.
source
|
|
|
Four in Five Companies Don't Care About MouseJack Vulnerability |
Posted by: baziroll - 04-20-2016 , 10:58 PM - Forum: Security News
- No Replies
|
|
Companies are willing to take their chances with attackers rather than update or patch wireless mice that are vulnerable to the MouseJack vulnerability, a recent study has revealed.
Discovered this past February, MouseJack is a vulnerability in the protocol that sends data from wireless mice to their USB dongles.
According to Bastille, the company that discovered this issue, attackers can exploit a flaw in this protocol and send fake commands to a USB dongle, which fails to authenticate the data as coming from its paired device and sends the commands to the connected PC.
Attackers can use this flaw to install malware or take over devices from ranges up to 100 meters (330 feet).
Microsoft addressed this problem last week, when it issued an optional update that prevents MouseJack attacks on some Microsoft-manufactured wireless mice.
MouseJack attacks haven't scared companies in giving up wireless mice
Today, Bastille has released the results of a survey of 900 professionals. The study reveals that, despite the ominous message behind MouseJack, that attackers can hijack your mouse from 100 meters away, most companies just don't care.
Following MouseJack's being disclosed, 82 percent of the study's respondents admitted their companies did not take steps to outlaw the usage of wireless mice. In fact, 21 percent said they were not concerned that their wireless mouse could be hacked, and 16 percent claimed they’d continue to use their mouse even if it had the MouseJack vulnerability.
These responses show exactly why so many companies are getting hacked left and right these days. With a serious vulnerability exposing their corporate networks to any attacker within 100 meters, most respondents still thought of MouseJack as a rare type of hack that could never happen to them.
Nevertheless, 34 percent of the respondents said that, if they precisely knew that they were using a MouseJack-affected mouse, they would patch or fix it if a patch was available. Furthermore, 29 percent claimed they would replace it with a wired mouse, and 16 percent said they'd buy another wireless mouse that was not affected by this issue.
Taking into account that Bastille's CEO revealed to Kaspersky's ThreatPost that new proof-of-concept code and equipment allowed its researchers to raise the distance at which a MouseJack attack works from 100 to 225 meters (740 feet), the time to take MouseJack seriously has arrived.
source
|
|
|
Frustration with conventional password management leads to risky behavior |
Posted by: baziroll - 04-20-2016 , 10:51 PM - Forum: Security News
- No Replies
|
|
One in three Americans indulges in some form of risky password practice, such as writing them down, according to the results of a new survey.
The report from access control specialist SecureAuth finds that Americans are exasperated with conventional online password management. It reveals that 74 percent rely on means other than memory to manage their online passwords, 35 percent write passwords down and 25 percent use the same password across several accounts.
When asked what they found most frustrating about password management, 29 percent named keeping up with different password requirements across accounts, 18 percent meeting complex password requirements, 15 percent needing to change a password regularly, and 12 percent getting locked out for too many incorrect attempts.
"From email to social media to your online bank account, just about every online identity requires a password. In this high-tech age, passwords are a way of life. Many, however, are making some low-tech choices -- as evidenced by the 35 percent of individuals who write down passwords," says Craig Lund, SecureAuth CEO. "Cyberattacks cost millions of dollars a year, hurts individuals and leads to long, drawn-out lawsuits. Just ask the FBI, Target or IRS. It's in everyone's best interest to make it difficult for attackers to cause damage -- now we just need to reframe what defines safe when connected online".
In order to keep themselves safe the company recommends that people avoid password reuse across multiple sites, set up a password manager to help manage complex passwords, and where possible, enable two-factor authentication on any website or web based application.
You can find more information about safe authentication techniques on the SecureAuth blog.
source
|
|
|
EFF sues Justice Department to discover if secret orders are used to decrypt user da |
Posted by: baziroll - 04-20-2016 , 10:50 PM - Forum: Security News
- No Replies
|
|
EFF (the Electronic Frontier Foundation) has filed a Freedom of Information (FOIA) lawsuit against the Justice Department. The digital rights group wants to learn whether the government has made use of secret court orders to force tech companies to provide access to encrypted user data.
After the Apple vs the FBI battle, there has been renewed interest in how companies handle not only encryption, but government requests for access to such data. With services such as WhatsApp enabling end-to-end encryption, attention has now switched to what might be happening in the background without users' knowledge. While Apple very publicly refused to provide decryption keys, EFF -- and others -- are concerned that secret court orders may be used to hide what is really happening.
The Apple case in particular showed how the likes of the FBI make use of public courts to apply for access to data, but the EFF is concerned that "it is unclear to what extent the government has sought or obtained similar orders from the FISC". A particular worry is that "FISC operates mostly in secret and grants nearly every government surveillance request it receives".
The Electronic Frontier Foundation says:
The FBI’s controversial attempt to force Apple to build a special backdoor to an iPhone after the San Bernardino attacks underscored EFF’s concerns that the government is threatening the security of millions of people who use these devices daily. Many citizens, technologists and companies expressed similar outrage and concern over the FBI’s actions.
Given the public concern regarding government efforts to force private companies to make their customers less secure, EFF wants to know whether similar efforts are happening in secret before the FISC. There is good reason to think so. News outlets have reported that the government has sought FISC orders and opinions requiring companies to turn over source code so that federal agents can find and exploit security vulnerabilities for surveillance purposes.
The argument is that any orders -- public or secret -- that force companies to provide access to encrypted data reduce not only privacy, but also security. Those orders that are public allow for debate and discussion, but the very nature of secret orders prevents this. EFF Senior Staff Attorney Mark Rumold says:
Even setting aside the existence of technical assistance orders, there's no question that other, significant FISC opinions remain hidden from the public. The government’s narrow interpretation of its transparency obligations under USA FREEDOM is inconsistent with the language of the statute and Congress' intent. Congress wanted to bring an end to secret surveillance law, so it required that all significant FISC opinions be declassified and released. Our lawsuit seeks to hold DOJ accountable to the law.
You can read through the full complaint on the EFF website.
source
|
|
|
WinUtilities Professional Review and Giveaway (15 Licenses) |
Posted by: tarekma7 - 04-20-2016 , 05:31 PM - Forum: Expired Giveaways
- Replies (22)
|
|
WinUtilities Pro is an award winning collection of tools to optimize and speedup your system performance. This suite contains utilities to clean registry, temporary files on your disks, erase your application and internet browser history, cache and cookies. It also supports to defragment your disk drives and registry to improve computer performance and stability. Built-in Startup Cleaner allows you to control startup programs that load automatically with windows, find duplicate files, fix broken shortcuts and uninstall unneeded software. More features include secure file deletion, recycle bin shredding, maintenance tasks scheduling and file recovery.
Homepage:
http://hi.ylcomputing.com/products/winutilities-pro
File Version: 12.44
File Size: 6.09 MB
Features:
System Requirements:
Windows XP, Vista, Win7, Win8/8.1, Win10 and later versions (both 32-bit and 64-bit)
50 MB free disk space
128 MB RAM
READ THE FULL REVIEW HERE
I would Like to Thank YL Computing Team for sponsoring this giveaway for our members
Giveaway Details:
Number of Licenses: 15
Validity of Licenses: 1 Year/ 3PC
Value of each license: $29.99
Duration of giveaway: 10 days
Giveaway ends: April 30 , 2016
Rules:
1. Share this giveaway post to your Facebook, Twitter or Google+ and share the links along with your comment below.
2. Subscribe to our newsletter RSS FeedBurner and get all the latest giveaways and contests delivered to you by email.
3. Winners will be selected by using Randm.org.
4. If you don't want to take part in this giveaway please don't put your comment it creates problems when we randomize winners.
5. Winners must contact Me within 5 days after giveaway ends to claim their win. If a winner does not respond within that time-frame, their win will be void.
|
|
|
BioShock Triple Pack Steam key (Discount 79%) |
Posted by: Xavier Torres - 04-20-2016 , 04:15 PM - Forum: Game Deals
- Replies (2)
|
|
BioShock Triple Pack (Steam key) - 79% Off
Was: 69,99€
Now: 14,99€
Quote:
This pack includes:
- BioShock
- BioShock 2
- BioShock Infinite
BioShock - A first person shooter experience unlike any other, played out in Rapture, an immense underwater utopia torn apart by a genetic civil war. Explore a deadly but incredible art deco world filled with formidable technology and fascinating characters. You'll have a complete arsenal at your disposal, from simple revolvers to rocket launchers and flamethrowers. Challenge the constraints of nature by genetically modifying your DNA with injected PLASMIDS and embrace super human powers.
BioShock 2 - Set approximately 10 years after the events of the original BioShock, the halls of Rapture once again echo with sins of the past. Along the Atlantic coastline, a monster has been snatching little girls and bringing them back to the undersea city of Rapture. Players step into the boots of the most iconic denizen of Rapture, the Big Daddy, as they travel through the decrepit and beautiful fallen city, chasing an unseen foe in search of answers and their own survival.
BioShock Infinite - With the United States emerging as a world power, the floating City of Columbia is a mighty symbol of American ideals, launched with great fanfare to the cheers of a captivated public. But what begins as an endeavour of hope soon turns to disaster, as the city disappears into the clouds, its whereabouts unknown. The greatest accomplishment in American history has vanished without a trace.
OS: Windows
Languages: German, English, French , Italian, Spanish
Discount Page: https://fr.gamesplanet.com/game/bioshock...ey--1155-7
|
|
|
WinUtilities Professional |
Posted by: tarekma7 - 04-20-2016 , 03:11 PM - Forum: Written Reviews
- Replies (8)
|
|
Overview:
This is one of the best system maintenance programs. It includes a set of tools designed to optimize and speedup your system performance. There are utilities designed to clean registry, temporary files on your disks, erase your application and internet browser history, cache and cookies. It also helps in defragmentation of your disk drives and registry. This will improve computer performance and stability. In addition the startup cleaner lets you control startup programs which load automatically with windows, find duplicate files, fix broken shortcuts and uninstall unneeded software. More features include secure file deletion, recycle bin shredding, maintenance tasks scheduling and file recovery.
Homepage:
http://hi.ylcomputing.com/products/winutilities-pro
File Version: 12.44
File Size: 6.09 MB
System Requirements:
Windows XP, Vista, Win7, Win8/8.1, Win10 and later versions (both 32-bit and 64-bit)
1024x768 screen resolution with 16.7 million colors
50 MB free disk space
128 MB RAM
CD-ROM or DVD-ROM drive
Internet access
Download:
The program can be easily downloaded from the official website here:
http://hi.ylcomputing.com/products/winut...o/download
Installation is very simple ad after a few clicks you will have the program installed on your PC. It offers you fully functional trial for31 days. This will let you evaluate the program and taste all the features of the program before purchase.
Activation and purchase:
You can easily purchase an original license key at a reasonable price from the official website here:
http://hi.ylcomputing.com/products/winut...o/purchase
You have many options regarding the number of computers you will use the program on and the duration of use whether 1 year or lifetime
This offers you more flexibility to choose the license suitable for you. Of course the best choice is the lifetime license. After you have the license you will be able to easily activate the program.
User interface:
WinUtilities consists of a Four main buttons; modules, 1 click maintenance, scheduled tasks and status. The module button includes a number of useful modules that can be accessed through a common graphical Start Center. This center is divided into six categories to make it easier to find individual modules.
The modules of the selected category are shown on the right side of the window in the form of white buttons. You can start a module by clicking the corresponding button. When you have finished working with a module, simply click the red [X] in the upper right corner to close it and return to the Start Center.
Languages supported:
The program supports multiple languages, you can check this page to see which languages has included:
http://hi.ylcomputing.com/products/winut...ranslation
If you want to add your language, you can do this easily. Simply download the language file from the above site. You just need to add the downloaded *.txt" file to your installation directory, (C:\Program Files\WinUtilities\Language).
Features:
Modules:
The program includes many built in tools and utilities to clean registry, temporary files on your disks, erase your application and internet browser history, cache and cookies. it also supports to defragment your disk drives and improve computer performance and stability. built-in StartUp Cleaner allows you to control startup programs that load automatically with windows, find duplicate files, fix broken shortcuts and uninstall unneeded software. other features include secure file deletion, recycle bin shredding, system maintenance tasks scheduling and undelete deleted files
Clean Up and Repair:
Disk Cleaner : Cleans disks from information that clogs your system and reduces the performance of your computer.
Registry Cleaner : Scans the Windows registry and finds incorrect or obsolete information in the Windows Registry.
Shortcuts Fixer: Provides you with an easy way to address the invalid shortcuts and reports back to you so that you can remove it from your system.
Uninstall Manager: Manages the programs installed on your system and uninstall unneeded software.
Optimize and Improve:
Registry Defrag: defragments and optimizes windows registry.
Disk Defrag: Defragment your disks and improve computer performance and stability
Memory Optimizer: Optimizes the Memory Management of Windows. No special configuration is needed, Memory Optimizer will auto configure itself.
BHO Remover: Manages the BHOs that are currently installed.
Startup Cleaner: Helps you to easily manage program execution at windows startup.
Privacy and Security:
Process Manager : Allows you to check your system's performance and manage the running processes.
History Cleaner: Erases all traces of activity on your computer, save spaces and protect your privacy.
EXE Protector: Protects any Windows executable file with a secure password.
File Shredder: Erases files and make sure that no data thief can get his hands on your sensitive data.
File Undelete: Recovers deleted files on NTFS and FAT volumes.
Files and Folders:
Disk Analysis: shows the disc space usage of your files and folders
Document Protector: Protects your documents, pictures and video files with security password
Duplicate Files Finder: Helps you to free disk space by finding and removing duplicate files from your system.
File Splitter: Splits any type of file into smaller pieces and rejoin them to the original file.
Registry Tools:
Registry Backup & Restore: Back up and restore the Windows Registry.
Registry Search: Searchs the Windows Registry by a specific wildcard. then you can delete or export them.
Context Menu Manager: Remove and Restore the context menu items
System Tools:
System Control: Organizes and manage your Windows Settings
Task Scheduler: Configures the cleaning tasks that take place automatically.
System Information: Shows you the detailed information for your computer hardware and software.
Auto Shutdown: Schedules your computer for log off, stand by, hibernate, or shutdown at a specific time.
Windows Tools: Provides you an easy way to launch the utilities build in Windows.
Powerful System Cleaner:
It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner.
WinUtilities will clean the following:
Browsers:
Internet Explorer: Temporary files, history, cookies, super cookies, Autocomplete form history, index.dat files.
Firefox: Temporary files, history, cookies, super cookies, download history, form history.
Google Chrome: Temporary files, history, cookies, super cookies, download history, form history.
Opera: Temporary files, history, cookies, super cookies, download history.
Safari: Temporary files, history, cookies, super cookies, form history.
Other Supported Browsers: K-Meleon, Rockmelt, Flock, Google Chrome Canary, Chromium, SeaMonkey, Chrome Plus, SRWare Iron, Pale Moon, Phoenix, Netscape Navigator, Avant and Maxthon.
Windows: Recycle Bin, Recent Documents, Temporary files, Log files, Clipboard, DNS Cache, Error Reporting, Memory Dumps, Jump Lists.
Registry Cleaner: Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more...
Third-party applications: Removes temp files and recent file lists (MRUs) from many apps including Windows Media Player, eMule, Google Toolbar, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more...
1-Click Maintenance:
It is a function that allows you to quickly and easily clean up your registry and hard drive. To access this feature, simply click 1-Click Maintenance link on the main screen then run. that's all! The program will do everything for you. It scans registry and your hard drive automatically for unneeded entries and files. Scan status progress will appear and when finished, the program will automatically clean the computer. You can also have a 1-Click Maintenance icon placed on your desktop. In that way you can run a complete check on your system at any time quickly and easily.
What's new:
WinUtilities version 12.44
* Updates database
* Updates languages
* Minor tweaks
To revise the full list of changes, you can visit here:
http://hi.ylcomputing.com/products/winut...on-history
Settings:
These program settings include the language you prefer, start of the program with system start up, check for updates, and skin
Pros:
Improve system performance
Powerful Cleaner
Simple and Fast
Easy Friendly user interface
Defragmentation
And many more
Cons:
None
Conclusion:
WinUtilities Pro is the best all in one solution to improve your PC's performance. It includes is a collection of important registry, disk, and other system utilities for your PC. It is easy to use and effective program you will always need for your computer.
|
|
|
Apowersoft Phone Manager Pro |
Posted by: Xavier Torres - 04-20-2016 , 01:58 PM - Forum: External Giveaways/Freebies
- No Replies
|
|
Apowersoft Phone Manager Pro
Quote:
Apowersoft Phone Manager, one of the best mobile management software available on the market right now, is fully compatible with the two dominant smartphone operating systems – iOS and Android. It allows you to manage, transfer, view, restore, backup mobile or tablet files including messages, contacts, apps, bookmarks, call logs, wallpapers, songs, videos, etc easily on PC.
- Auto-recognize the device with all information
- Transfer all files from phone devices to PC and vice versa
- Work perfectly with devices based on iOS and Android systems
- Manage photos, music, videos, SMS, contacts and other files
- Backup all kinds of data from your devices to PC
- Restore mobile files from backups
- Take phone screenshots with just one click on PC
- Display the screens of phone in different modes
Giveaway Page: http://www.apowersoft.com/promotion/
Note: Less than 24 hours
|
|
|
|