Hello everyone.
With the rise of Petya attacks occurring recently, and due to most traditional AV products not incorporating any real dynamic protection to tackle a threat like Petya, I decided to write a guide on how you can maintain dynamic security against the threat without actually doing anything programming-wise yourself.
The Master Boot Record is essentially the boot loader for the Operating System; its primary task is to load the kernel in memory. The Master Boot Record must...
Page 6 of 15
-
Created by kram7750
- Jul 13, 2017
Comments: 10 Views: 575Continue reading» -
Created by Petrovic
- Jul 12, 2017
uBlock Protector Extension (CHROME ONLY)
- Install uBlock Origin by Raymond Hill (Chrome Web Store Link)
- Enable Adblock Warning Removal List from uBlock Origin settings panel.
- Enable the uBlock Protector List filter. - Thank you r/adeldk for the...
Views: 425Continue reading» -
Created by Petrovic
- Jan 20, 2017
Rufus is an easy to use portable software program for Microsoft Windows devices to create bootable USB drives using ISO images.
It appears that I have never reviewed Rufus before here on Ghacks, even though I mentioned it a couple of times in the past when it came to the creation of bootable USB media.
Bootable USB media is quite common these days, as more and more PCs and laptops seem to ship without optical drive....Comments: 4 Views: 524Continue reading» -
Created by Petrovic
- Jan 11, 2017
If your Windows PC is throwing an error message at you before it even begins to load Windows, it’s possible that the boot sector on your system partition is damaged, corrupted, or has missing files. Here’s how to troubleshoot those problems....Comments: 1 Views: 332Continue reading» -
Created by revC0de
- Jan 4, 2017
Hello
Some simple and perhaps obvious advice, but people often do not follow best practices in this context, for the happiness of cybercriminals! :)
1 - Be wary of any message, even if apparently authentic, that you received via e-mail, social networks, etc. that invites you to download documents or files. They could contain malware!
2 - Be wary of any request for data related to payment cards, access banking keys or other personal information received on any digital channel...Comments: 19 Views: 1105Continue reading» -
Hello Everyone,
I have just come across some information on how to easily fix corrupted system files for the Windows 8 and 8.1 Operating Systems, if I come across information regarding how to do this in Windows 10, I'll add that, too.
This information has been extracted from the web page: http://www.tomshardware.com/answers/id-2003226/fix-corrupt-windows-installer.html
I have made screenshots of the process, so that you could see what I am talking about. For that reason, there...Comments: 1 Views: 329Continue reading» -
Created by Trim
- Dec 7, 2016
Hello to all,
I would want to introduce this new MTAC Poison Box event, which consists of posting maximum 10 malicious links, and to have the highest sum of detection ratios.
The winner will be the member who have the highest sum of the detection ratios of the malicious links posted.
RULES:
- Each malicious URL must be in "hxxp://" form (for example: "hxxp://maliciouslink.com")...
Comments: 10 Views: 116Continue reading» -
Created by Petrovic
- Nov 13, 2016
Windows Defender can detect and remove malware and viruses, but it doesn’t detect Potentially Unwanted Programs by default. However, there is an opt-in feature which you can enable by editing the registry, to make Windows Defender scan and eliminate adware, PUAs or PUPs in real-time.
Full GuideViews: 331Continue reading» -
Created by Petrovic
- Nov 7, 2016
In the case of Nvidia, Telemetry gets installed alongside the driver package. While you may -- and should -- customize the installation of the Nvidia driver so that only the bits that you require are installed, there is no option to disable the Telemetry components from being...
Views: 366Continue reading» -
Created by Trim
- Oct 30, 2016
Hello to all,
today I will share with you this thread, which was created in collaboration with @revC0de to explain the best practices for security for everyone, and also a complete guide/tutorial/suggestions to have a strong and safe security configuration.
I would want to start by saying that the security on the web is the first and most important priority. When we surf the web we must feel protected against new threats that are released every day and can be very...Comments: 15 Views: 1982Continue reading»
Page 6 of 15