1. kram7750
    Created by kram7750
    Jul 13, 2017
    Hello everyone.

    With the rise of Petya attacks occurring recently, and due to most traditional AV products not incorporating any real dynamic protection to tackle a threat like Petya, I decided to write a guide on how you can maintain dynamic security against the threat without actually doing anything programming-wise yourself.

    The Master Boot Record is essentially the boot loader for the Operating System; its primary task is to load the kernel in memory. The Master Boot Record must...
  2. Petrovic
    Created by Petrovic
    Jul 12, 2017
  3. Petrovic
    Created by Petrovic
    Jan 20, 2017
    Rufus is an easy to use portable software program for Microsoft Windows devices to create bootable USB drives using ISO images.

    It appears that I have never reviewed Rufus before here on Ghacks, even though I mentioned it a couple of times in the past when it came to the creation of bootable USB media.

    Bootable USB media is quite common these days, as more and more PCs and laptops seem to ship without optical drive....
  4. Petrovic
    Created by Petrovic
    Jan 11, 2017
    [​IMG]

    If your Windows PC is throwing an error message at you before it even begins to load Windows, it’s possible that the boot sector on your system partition is damaged, corrupted, or has missing files. Here’s how to troubleshoot those problems....
  5. revC0de
    Created by revC0de
    Jan 4, 2017
    Hello

    Some simple and perhaps obvious advice, but people often do not follow best practices in this context, for the happiness of cybercriminals! :)


    1 - Be wary of any message, even if apparently authentic, that you received via e-mail, social networks, etc. that invites you to download documents or files. They could contain malware!

    2 - Be wary of any request for data related to payment cards, access banking keys or other personal information received on any digital channel...
  6. BC2Tweak
    Created by BC2Tweak
    Dec 30, 2016
    Hello Everyone,

    I have just come across some information on how to easily fix corrupted system files for the Windows 8 and 8.1 Operating Systems, if I come across information regarding how to do this in Windows 10, I'll add that, too.

    This information has been extracted from the web page: http://www.tomshardware.com/answers/id-2003226/fix-corrupt-windows-installer.html
    I have made screenshots of the process, so that you could see what I am talking about. For that reason, there...
  7. Trim
    Created by Trim
    Dec 7, 2016
    Hello to all,

    I would want to introduce this new MTAC Poison Box event, which consists of posting maximum 10 malicious links, and to have the highest sum of detection ratios.
    The winner will be the member who have the highest sum of the detection ratios of the malicious links posted.

    RULES:
    • Each malicious URL must be in "hxxp://" form (for example: "hxxp://maliciouslink.com")...
  8. Petrovic
    Created by Petrovic
    Nov 13, 2016
    Windows Defender can detect and remove malware and viruses, but it doesn’t detect Potentially Unwanted Programs by default. However, there is an opt-in feature which you can enable by editing the registry, to make Windows Defender scan and eliminate adware, PUAs or PUPs in real-time.
    Full Guide
  9. Petrovic
    Created by Petrovic
    Nov 7, 2016
  10. Trim
    Created by Trim
    Oct 30, 2016
    Hello to all,

    today I will share with you this thread, which was created in collaboration with @revC0de to explain the best practices for security for everyone, and also a complete guide/tutorial/suggestions to have a strong and safe security configuration.
    I would want to start by saying that the security on the web is the first and most important priority. When we surf the web we must feel protected against new threats that are released every day and can be very...