You are welcome to discuss various security topics with our professional team and other users like you!
Read our Registration Agreement and create your FREE account here!

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - never

Pages: 1 2 [3] 4 5 ... 9
31
Petya ransomware is one of a kind. This is the first time it is observed for a ransomware type of cyber-threat to have Rootkit capabilities. What the malware does is illustrated in the following methodology:

1. Infection - once downloaded by malicious URLs or attachments sent out via email which links to a Dropbox file, the program appears to mimick a Windows Shield type of app. Once executed, it crashes the computer, resulting in a BSOD (Blue Screen Of Death).

2. Action - once the user PC is restarted, you see the following scary Skull type of screen with the ransom instructions:



Unlike any other ransomware, this one does not fool around. Instead of the typical given time for the victim to pay the ransom money which is several days the very most, Petya gives several hours. This is extremely effective for the cyber-criminals since it takes significantly more time than several hours to unlock the computer. What is worse, a traditional boot scan does not do the job, so the best protection against this ransomware is to run applications sandboxed and to combine this with a strong AntiVirus and Anti-Malware software.

How To Fix It?

Unfortunately at this point in time there is no direct decryption method for free. The only mehtod to decrypt drives encoded by Petya is to follow the instructions, pay the 0.9 BTC and hope for the best. In case you have Cloud Backup, do not worry however, you may be able to download your files on a non-infected computer and simply reformat your drive and reinstall Windows.

We will keep you posted in this thread if a new solution surfaces, regarding Petya Ransowmare. You may find more information and eventual removal instructions to be updated in the article about Petya Ransomware.

32
Hello, as familiar to us, this is what appears to be the latest version of TeslaCrypt, known as 4.0. You may find more information about how to remove this malware and restore your data in the following article:

TeslaCrypt 4.0 Removal and File Restoration


33
PC Tips & Tricks / How To Build a Desktop PC
« on: March 16, 2016, 05:26:00 pm »
Hello, since there is no tutorial on anything related to building a computer on this forum, i have decided to help out and make one. Bear in mind that this is the most basic build and it does not include extras such as Wi-Fi or CD/DVD Player.

BEFORE STARTING

Besides a screwdriver, you will need several components to have before beginning the build:

-Motherboard
-CPU
-Power Supply Unit
-RAM Card
-GPU Card
-HDD or SSD.
-A suitable Desktop box (case) that will fit the components.
-Connector cables (Sata, etc.)
-CPU Cooler
-Monitor, Keyboard and Mouse with connecting cables.

IMPORTANT:
MAKE SURE ALL OF THE COMPONENTS YOU HAVE CHOSEN ARE COMPATIBLE WITH THE MOTHERBOARD.
MAKE SURE THE COMPONENTS ARE COMPATIBLE BETWEEN ONE ANOTHER(FOR EXAMPLE IF YOUR POWER SUPPLY UNIT IS 200W AND YOUR GPU USES 150W THERE WILL BE NO POWER FOR OTHER COMPONENTS TO RUN. FOR SOLUTION CHECK THE RECCOMENDATIONS ON YOUR COMPONENTS' MANUALS)


Step 0 - Insert the motherboard onto the Desktop Box

Since the desktop box has to contain the motherboard first, you should unscrew it and place the motherboard onto the motherboard slot. You will recognize the slot by attaching the slot's plate in the rectangular hole at the back of the box. After fitting the plate fit in the motherboard. Make sure all your ports fit in the plate and then screw the motherboard onto the box where able.

Step 1 - Insert the CPU into the motherboard Socket.


Try to be very gentle while adding the CPU to the main motherboard, do not use force and make sure there is no dust and the socket is dry. Disable the socket locking mechanism, insert the CPU and then lock it again.

Step 2 - Insert the CPU cooler in its place.

Usually, coolers come together with processors and they usually come standard with thermal paste. If not, you should look forward to picking up such and insert very little amount on the top of the CPU.

Most coolers have either a lever that fits them into place or custom made mechanisms (See the instructions of your cooler for more info). In case you have a lever, fit the cooler and then slowly rotate the lever to fix it onto the motherboard.

Step 3 - Insert the RAM card onto the motherboard


The motherboard should either have 2 or more slots. You may recognize them from the side levers they have for fixing the RAM in place. To fix the RAM in place pull the levers down, insert the RAM card in the slot accordingly and then pull the levers up.

Step 4 - Isert the GPU (Video Card) into the motherboard

Find the PCI slot on your motherboard. it is an expansion slot which looks similar to the RAM slot. Then you need to unscrew the slot plate to reveal an opening on the back of the box of your PC to make room for the ports of the GPU. After this, it is important to line up the video card carefull onto the PCI slot and then it will automatically fit in the back opening of the box. It should also have a place to be screwed into place with your screwdriver.

Step 5 - Install the HDD or SSD onto the motherboard.

Most cases have drive slots in what is known as their front upper side. They also have screws on them and along with those instructions on how to put the hard drive onto the case in place and fix it via the screws. Insert the hard drive or solid state drive, screw it in and then use a SATA Cable(also comes with the drive itself)  to connect the drive with the motherboard. You should be able to find the SATA slot on your motherboard fairly easy.

Step 6 - Connect the power supply

In case your Desktop box does not come with its own power supply, you should mount one in. Its slot is usually located in the back of the box and on its top. There are also some power supplies located on the bottom. Fit the box so that its power slot and off and on button are exposed and screw it in the Desktop box.

Step 7 - Connect everything into place


Take the cables of your Power Supply unit and connect them as follows:

-The 24-pin power cord to the motherboard.
-Skinny power plugs with no visible pins to the hard drive or the solid drive.
-Molex cables (ones with cylindrical ends) to the CPU cooler plugs.
-Plug the USB cables (black, small with 4 pins) to the motherboard's audio header and so on.
-The smallest cables are for the led lights and other functions. For the header(slot) of those you should have a look at your motherboard's manual.

Now connect the keyboard, mouse and Monitor and the power supply cable to the electricity and you are ALL SET! And do not forget to RTFM OF THE COMPONENTS!

Best Regards,
Never

34
Hello, there is no update. It is advisable to keep attempting with different files and hopefully if one of the other files you scanned for the password is discovered, the other files will start recovering as well.

However, if you have tried that there is also an option to recover your files, if you haven't formatted your hard drive. There are many data recovery programs out there. Here are some that we have tested so far:

File Recover Plus
Stellar Phoenix Data Recovery Pro
Pareto Logic Data Recovery Pro

N.B. There are all licensed but you can also find free ones if you search online. Google is your friend :)

Regards and good luck,
Never

35
Software Reviews / File Recover Plus Software Review
« on: March 07, 2016, 04:25:26 pm »
A program created by eSupport, File Recover is one of the lightest file recovery programs out there that are able to successfully restore erased data. The program supports advanced settings and detailed view of the restored files. There were several features we noticed that were very well placed and also there was some space for improvement.

We liked primarily several features:

  • The quality of the restored data we deleted.
  • Advanced info on the recovered files.
  • Simply created settings to mess with.
  • Deep scanning and smart scan options.
  • Very light and its only around 5 MB in size.


There was some details we found that could have been improved or added:


  • Using different scanning methods which can result in improved effectiveness.
  • Free evaluation of the software by giving the ability to restore several files with no charge.
  • On demand scanning feature based on specific folders.
  • Faster scanning process.


You can find more information in our software review of File Recover Plus.

36
A new Cerber ransomware has been reported to roam around and encrypt user files left and right. It is reported by researchers to use .CERBER file extension after encrypting the files with a strong AES-256 encryption algorhithm. So far there is no known method to directly decrypt file encrypted by this ransomware, so we advise you not to bother sending any files for decryption. Instead we advise you to follow the file restoration manual in the removal article about Cerber ransomware where you can also find more information about the ransomware. We have suggested several file restoring alternatives and we hope this helps!

N.B. This is an open forum topic. Here you may subscribe and wait for updates (if a decryption has been found), suggest ideas on how to remove and restore files and also provide your experience with Cerber. We will try to help the best way we can.

37
Software Reviews / Nox App Player for Android (Software Review)
« on: February 29, 2016, 05:18:50 pm »
Nox is an awesome program and it is maybe the best Android virtualization software you will ever see out there. It has well placed settings and a user friendly interface and it has many many features. We have decided to conduct a software review of this software in order to establish whether or not it is worth downloading only to discover that this application was really satisfying to work with.

Here is what we believe are the main benefits of this program:

  • It's uses .vdmk files which means that the virtual OS's can be transported from one PC to another.
  • Modern User Interface.
  • They have a blog with decent customer support.
  • It is very customizable and PC accessible. Even features settings to stop tilting and play Touch games using the keyboard.

However, there is always room for improvement:

  • No multitouch.
  • You can choose only the one version of Android and not the older ones.
  • They should focus on other mobile OSs as well.

This are our conclusions while using Nox. In case you want to write what you think, ask questions or simply share your experience, you are free to proceed and do this here. We are happy to hear your opinion.

Best Regards,
never

   




38
Software Reviews / Sandboxie Software Review Topic
« on: February 29, 2016, 05:02:32 pm »
Sanboxie is a very cool application that uses an encrypted sanbox when it runs all of your Windows processes and programs. It is created mainly for protection purposes. We at Sensorstechforum enjoy the idea of using sandbox technologies in Windows and decided to make a software review of Sandboxie.

As a result of that several pros an cons came up:

Pros:

  • Advanced preferences.
  • Ligtness (takes up to none from the CPU and around 2MB of RAM)
  • Secure.
  • Simple and Incognito.
  • Transparent.
  • Makes no difference performance-wise.
  • Compatible with older Windows OS's.

Cons:

  • Should have had more user-friendly options. You should be able to modify a setting with a click, instead of editing a Notepad document.


This are our conclusions about the program, we would love to know yours. You may also ask questions about Sandboxie and input your experience as well.

Best Regards,
Never

39
Hello, James

Try scanning multiple times for your files and let us know how that goes for you and if the results are the same or no. We are currently monitoring most of the big security companies who are aware of the situation and will let you known as a reply in this forum topic if a relevant decryption method has come out.

PS: We are also researching on new recovery software that is cheeper or for free and will keep you posted.

Meanwhile, if you know how to disassemble your hard drive, take it to your local data recovery expert and try it this way. If he or she is not able to recover the files, they usually may not charge you money for that.

Good Luck and Best Regards,
Never

40
Software Reviews / Ultimate Windows Tweaker 4.0.2.0 - Good or Bad
« on: February 24, 2016, 05:01:27 pm »
Since The Windows Club has published a program a while ago designed to grant users quick access to complicated and sometimes difficult to discover Windows settings we have made a Software Review about it.

Here are some details about  Windows Tweaker:

Pros:


  • Its light on the computer.
  • The software does not require installation.
  • Well-made settings.(Security, User Interface, etc.)
  • Easy methods for accessing different settings.
  • The software makes a Restore Point backing your PC before the changes on it have been made.
  • Its compatible with older versions of Windows.


Cons:

  • Missing pop-up to prompt the user for approval of restart. Instead it just force resets the PC.
  • It does not have a display with live feed tracking changes on the user PC.

We would like to know what you guys think about Windows Tweaker and if you think its a well made program or a poorly made one. This is an open topic so you may ask questions as well.

Best Regards,
Never

41
Off-Topic Discussions / Re: Do you use public wifi?
« on: February 24, 2016, 04:50:41 pm »
Since it may take too long for me to explain how a buddy got infected with adware seeing commercials forced by a Pizza place's public Wi-Fi on her smartphone I will just leave this meme here ;)



42
Off-Topic Discussions / Re: What do you think about the freedoms nowadays?
« on: February 24, 2016, 11:33:50 am »
hahaha nice one.




43
Off-Topic Discussions / What do you think about the freedoms nowadays?
« on: February 24, 2016, 10:28:16 am »
Hello,

I was just wondering what is happening with the freedom and how the freedoms today (if at all) is different from the freedoms in the old days. Here is what i found on the matter:

http://www.motherjones.com/kevin-drum/2013/01/freedom-now-vs-freedom-past

What do you guys think, what should be changed and more specifically with the situation of private corporations giving access to agencies such as NSA and FBI.

44
Yes, there are many free programs out there but they lack certain fundamental features such as choosing what type of files you are looking for or selecting an exact folder to scan. If any users know such programs that recover files in the same rate as the ones above, I urge them to share them with us.

Regards,
Never

45
Hello again,

Yes, backing up the files is the best solution, but the latest information points out that if the files are backed up in Windows, most ransomware infections, such as .locky delete this backup or encrypt the image file if the backup is created on a system image. This is why I would suggest using other approaches:

-Use an external USB, SSD, HDD or Memory Card to copy the files. This is a hands on approach and is suitable in case you do not have a lot of files to backup.

-Use an automatic backup uploaded to another server in your local network. Such servers should not be accessed by anyone. In fact only one, maximum two people should have access to the server and configure it so that it goes online only during specific times (for example, when backup is being performed).

-Use cloud backup. This is the 21st century`s solution - outsource it. There are many programs out there that encrypt your data and back it up so that its online on their servers but in the same time accessible only if yo go there. One of those programs is called SOS Online Backup. I use it for my home network and it is very good, because it provides unlimited backup storage, which is good if you have A LOT of data.

Hope this helps some of you out there.
Regards,
Never

Pages: 1 2 [3] 4 5 ... 9