Showing posts with label downloads. Show all posts
Showing posts with label downloads. Show all posts

Microsoft Security Essentials


Microsoft Security Essentials (MSE) (previously codenamed Morro) is an antivirus software created by Microsoft that provides protection against viruses, spyware, rootkits, and trojans for Windows XP (x86), Windows Vista (x86 and x64), and Windows 7 (both x86 and x64), free of charge. MSE replaces Windows Live OneCare, a commercial subscription-based antivirus service and the free Windows Defender, which only protected users from adware and spyware. It is geared for consumer use, unlike Microsoft's upcoming enterprise-oriented product Microsoft Forefront.

VTC – Using Security Tools Tutorials


Whether you are a new security professional or a seasoned security engineer, you’ll need experience in working with the most commonly used security tools available. Veteran VTC author Bobby Rogers will show you how to use basic security tools that every security professional should be familiar with, such as Netcat, Nikto, Nessus, Nmap, and many others. You will learn how to use tools covering a wide range of security disciplines, such as penetration testing, computer forensics, and network security. Demonstrations include both Windows and Linux tools, and show how these tools are actually used in the daily jobs of security professionals everywhere.

Introduction
Course Introduction (05:40)
General Utilities
Secure Shell (ssh) (05:03)
VNC (05:31)
NX Client (06:01)
VMware pt. 1 (07:55)
VMware pt. 2 (08:32)
Host Security
Anti-Virus pt. 1 (03:28)
Anti-Virus pt. 2 (06:15)
Anti-Malware (06:33)
Linux Host Lockdown Tools (07:01)
Windows Host Lockdown Tools (SCAT) pt. 1 (08:21)
Windows Host Lockdown Tools (SCAT) pt. 2 (07:35)
Windows Utilities
Windows Command-Line Tools pt. 1 (06:51)
Windows Command-Line Tools pt. 2 (04:07)
Windows Firewall pt. 1 (05:05)
Windows Firewall pt. 2 (04:06)
MBSA (07:00)
MSConfig (06:07)
Linux Tools
User Tools pt. 1 (05:15)
User Tools pt. 2 (03:28)
tcpdump (05:51)
Inetd/TCP Wrappers & Xinetd pt. 1 (03:59)
Inetd/TCP Wrappers & Xinetd pt. 2 (04:50)
md5sum (05:51)
File Security Tools (07:41)
su & sudo (08:13)
Scanning & Reconnaisance Tools
Nmap pt. 1 (02:06)
Nmap pt. 2 (07:10)
Nessus pt. 1 (05:46)
Nessus pt. 2 (06:22)
Hping3 (07:19)
Look-at-Lan (06:06)
nslookup & dig (05:21)
Ping & Traceroute pt. 1 (04:56)
Ping & Traceroute pt. 2 (04:03)
Superscan pt. 1 (04:04)
Superscan pt. 2 (06:27)
Fing (04:57)
Network Security Tools
SmoothWall Firewall pt. 1 (08:28)
SmoothWall Firewall pt. 2 (07:22)
SmoothWall Firewall pt. 3 (07:21)
SmoothWall Firewall pt. 4 (05:39)
Linux Firewalls pt. 1 (02:14)
Linux Firewalls pt. 2 (07:20)
3rd Party Windows Firewalls pt. 1 (06:18)
3rd Party Windows Firewalls pt. 2 (08:38)
Wireshark pt. 1 (02:20)
Wireshark pt. 2 (07:43)
Wireless Security
Net Stumbler (05:20)
inSSIDer (04:43)
Wireless Capture Tools pt. 1 (03:44)
Wireless Capture Tools pt. 2 (03:56)
Web Tools
Google Hacking Techniques pt. 1 (03:55)
Google Hacking Techniques pt. 2 (07:36)
Nikto/Wikto (07:10)
NetCraft (04:02)
whois (06:02)
Paros Proxy (06:41)
Encryption Tools
TrueCrypt (07:55)
Encrypting Files in Linux pt. 1 (04:56)
Encrypting Files in Linux pt. 2 (03:53)
Microsoft Windows EFS (06:15)
Using Encrypted Email – PGP pt. 1 (06:30)
Using Encrypted Email – PGP pt. 2 (05:24)
Penetration Testing tools
Metasploit Framework pt. 1 (08:05)
Metasploit Framework pt. 2 (07:21)
Netcat (05:24)
John the Ripper pt. 1 (06:48)
John the Ripper pt. 2 (05:33)
Cain & Abel pt. 1 (04:01)
Cain & Abel pt. 2 (05:05)
Colasoft Packet Builder (08:13)
Computer Forensics Tools
Adepto (02:50)
Adepto Demonstration (05:53)
Ghost (06:34)
Autopsy (09:32)
Forensics Tool Kit pt. 1 (06:09)
Forensics Tool Kit pt. 2 (06:01)
Live Linux Distros
Backtrack 4 (05:46)
Helix (05:30)
Damn Vulnerable Linux (04:46)
Building a Security Toolbox
Creating a Security Toolbox (04:30)
Dual-Booting a Security Laptop pt. 1 (06:17)
Dual-Booting a Security Laptop pt. 2 (03:59)
Creating a Security USB Stick pt. 1 (06:03)
Creating a Security USB Stick pt. 2 (04:20)
Creating Your Own Live Security CD pt. 1 (04:59)
Creating Your Own Live Security CD pt. 2 (05:24)
Conclusion
Using Security Tools – Conclusion (05:50)
Resources (04:54)
Credits
About this Author (01:02)


Download Links:



Cheers!!! 

Spybot : Search & Destroy.

Botnet is a jargon term for a collection of software robots, or bots, that run autonomously and automatically. The term is often associated with malicious software, but it can also refer to the network of computers using distributed computing software. While botnets are often named after their malicious software name, there are typically multiple botnets in operation using the same malicious software families, but operated by different criminal entities.Botnets have created enough havoc over the past decade. They can not compromise your systems but also make you an unknown participant in a crime.                                            Spybot is a cool and free software for removing Bots on your systems and may more functions.
Spybot-S&D is maintained by a team of people very dedicated to privacy issues, many of which are working fulltime on analyzing masses of new threats each week, and the response time from our support team is better than that of many a commercial vendor.

Download Link:
http://download.cnet.com/Spybot-Search-amp-Destroy/3000-8022_4-10122137.html

Link of the Day: Eset NOD 32 Smart Security Antivirus

I am posting a link of a very good antivirus. Do download and use it. Moreover keep a track of this section for more exciting downloads.

Here are some features of the product:-

Smarter Scanner – Threats don't always enter your network in ways you expect. ESET NOD32 Antivirus inspects ~ Phisher ~encrypted communication channels like HTTPS and POP3S and intelligently scans compressed files to find hidden threats other products miss. Proactive protection begins at the earliest point in system startup to ensure your computer is always secure.

Clean and Safe Email – Email scanning for Microsoft Outlook, Outlook Express, Mozilla Thunderbird, Windows Live Mail, Windows Mail, and other POP3/IMAP mail clients, ensuring your email is free of viruses and other threats.

Removable Media Security – Threats can enter your PC from removable media such as USB thumb drives. For self-running media, ESET NOD32 Antivirus scans autorun.inf and associated files when the medium is inserted, in addition to scanning any file on any removable device when it is accessed, or during a full-scan of the media. Power users can adjust ESET NOD32 Antivirus to perform additional levels of scanning on removable media.

System Tools – ESET SysInspector and ESET SysRescue simplify diagnosing and cleaning of infected systems by allowing deep scans of system processes to find hidden threats, and creating bootable rescue CD/DVD or USB drives to help you repair an infected computer.

Self Defense – ESET NOD32 Antivirus has built-in technology to prevent malicious software from corrupting or disabling it, so you can rest assured your system is always protected.



links:


http://hotfile.com/dl/17706417/cf13420/ESET_Smart_Security_4.0.437_Business_Edition-x86.rar.html