Home » Archives for October 2011
Free Comodo Internet Security Pro 2012 one year license key
Comodo Internet Security Pro 2012 which is priced at $49.99. This promo will allow users to use the latest pro version completely free for a year.
Free Comodo Internet Security Pro 2012
Comodo Internet Security Pro comes with powerful cloud based Antivirus, Antispyware, and an excellent award winning firewall with defense plus technology that provides high-level of protection. The 2012 consumer products from Comodo is yet to be officially released, but users can start using the new version as the new installers has been already uploaded on the official Comodo servers.Key Features of Comodo Internet Security Pro 2012:
- Antivirus, Anti-Spyware, Anti-Rootkit & Bot protection
- Defends your PC from Internet attacks
- Detects and eliminates viruses
- Prevents malware from being installed
- Auto Sandbox Technology™
- Easy to install, configure and use
- Remote Security & System Support
Follow below steps to get Free Comodo Internet Security Pro 2012 one year license key
- Download Comodo Internet Security Pro 2011 Here -> one-year special installer
- Install and start Comodo 2011. Navigate to “More” -> “About” -> Serial Number -> “Copy”.
- Save the serial number on your PC, you will need this serial to activate the 2012 version.
- Download and Install Free Comodo Internet Security Pro 2012. During installation, enter the serial number that you received from the 2011 version.

Official GNOME Shell Extensions
Official GNOME Shell Extensions Available In The WebUpd8 GNOME 3 PPA For Ubuntu 11.10
The latest official GNOME Shell Extensions (version 3.2.0) are now available in the WebUpd8 GNOME 3 PPA for Ubuntu 11.10 Oneiric Ocelot. This PPA is an attempt to have all the stable GNOME 3.2 packages that aren't available in the official Ubuntu 11.10 repositories in a single place. Please note that I did not package this. I'm only uploading these packages to a single PPA.
Install GNOME Shell Extensions pack in Ubuntu 11.10 Oneiric Ocelot
Important: an user has reported that using the Alternative Status Menu extension without having a profile picture crashes GNOME Shell. So set a picture (under User Accounts) before installing this extension.
Firstly, add the WebUpd8 GNOME 3 PPA:
sudo add-apt-repository ppa:webupd8team/gnome3
sudo apt-get update
Below you'll find a description on what each extension does and how to install it:
- Alternative tab extension: use the classic ALT + Tab. Install:
sudo apt-get install gnome-shell-extensions-alternate-tab
- Alternative Status Menu extension : adds "Power off" and "Hibernate" to the status menu, visible at all time (and not just when pressing the ALT key). Install:
es/THEME_NAME/gnome-shell or /usr/share/THEME_NAME/gnome-shell. This extension is especially useful when used with GNOME Tweak Tool. This way, you can install and switch between GNOME Shell extensions with a click. Install both User Theme extension and GNOME Tweak Tool:
sudo apt-get install gnome-shell-extensions-user-theme gnome-tweak-tool
- Workspace Indicator extension: displays the current workspace and lets you switch between workspaces (wither using its menu or by scrolling). Install:
sudo apt-get install gnome-shell-extensions-workspace-indicator
- Applications Menu extension: adds an regular (old-style) menu to the top GNOME Shell bar. Install:
sudo apt-get install gnome-shell-extensions-apps-menu
- Removable Drive Menu extension: adds a removable drive menu to the top GNOME Shell bar (on the right). Install:
sudo apt-get install gnome-shell-extensions-drive-menu
- SystemMonitor extension: adds two graphs to the GNOME Shell message tray, displaying the RAM and CPU usage. Install:
sudo apt-get install gnome-shell-extensions-system-monitor
- Places Status Indicator: adds a menu to the top bar in the old Places Menu style. Install:
sudo apt-get install gnome-shell-extensions-places-menu
- Dock extension: shows a dock-style task switcher
To customize the dock extension, install dconf-tools (sudo apt-get install dconf-tools), then launch "dconf-editor", navigate to org > gnome > shell > extensions > dock and here you can specify the dock position (left or right), enable or disable autohide, specify the hide effect or set the hide duration.
Install:
sudo apt-get install gnome-shell-extensions-dock
sudo apt-get install gnome-shell-extensions-native-window-placement
sudo apt-get install gnome-shell-extensions-xrandr-indicator
sudo apt-get install gnome-shell-extensions-auto-move-windows
- Gajim extension: Gajim integration for GNOME Shell. Install:
sudo apt-get install gnome-shell-extensions-gajim
sudo apt-get install gnome-shell-extensions-windows-navigator
Or, install them all using the following command (will also install GNOME Tweak Tool) - yeah, there's no meta package yet:
sudo apt-get install gnome-shell-extensions-alternate-tab
gnome-shell-extensions-alternative-status-menu
gnome-shell-extensions-user-theme
gnome-tweak-tool
gnome-shell-extensions-workspace-indicator
gnome-shell-extensions-apps-menu
gnome-shell-extensions-drive-menu
gnome-shell-extensions-system-monitor
gnome-shell-extensions-places-menu
gnome-shell-extensions-dock
gnome-shell-extensions-native-window-placement
gnome-shell-extensions-gajim
gnome-shell-extensions-xrandr-indicator
gnome-shell-extensions-windows-navigator
gnome-shell-extensions-auto-move-windows
Regards
Adnan Anjum

Bypassing Windows 7 Kernel ASLR
Windows 7 has a nice security about kernel space
Many
checks of size, integrity controls and access restrictions are
available.For example the “security check” protect our stack if a string
is used, many functions like “strcpy()” are deprecated (and some are
disallowed) to force developers to have a secure coding.This is why,
some attacks were presented as heap overflows in local exploitations
(recently Tarjei Mandt)but we don’t see any remote exploitation like we
saw in SRV.SYS or other drivers.This lack of remote exploits occurs
partially because an ASLR (randomization of memory spaces) is enabled in
kernel land. If a hacker doesn’t have any possibilities to jump and
execute a payload (ROP, Jmp Eax …) exploitation of the bug isn’t
possible. Only a magnificent BSOD could appear in most of the cases.This
paper will try to explain how to bypass this protection and improve
remote kernel vulnerabilities research!For the use of this document we
will consider a remote stack overflow as the main vulnerability
Download PDF

A Code Execution Vulnerability in Google App Engine SDK for Python
Google App Engine is a great technology
allowing web developers to develop their own web applications,test them
in their internal framework, and deploy them to Google’s appspot.com
domain.The Google App Engine framework allows developers to write their
web site logic in Python, and offers several frameworks specially
created for this. In addition, Google App Engine provides an SDK Console
via web that acts as an administration console for the newly written
application.This advisory lists 4 different vulnerabilities, one in
admin console and three others in the Google python API, which allow a
remote attacker to gain full code execution on the developer’s machine.
These severe issues have been communicated to Google, and a fix was
released last month on Sep 12, 2012 (in version 1.5.4).
Download PDF

WebBackdoors , Attack, Evasion and Detection
Download PDF
