<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-16559108</id><updated>2024-06-15T11:18:24.617-07:00</updated><title type='text'>Arovax Software</title><subtitle type='html'>Who are we?&#xa;Arovax, LLC. (&quot;Arovax&quot;) is an innovative software and Internet-based systems development company focused on advanced, high-quality and user friendly Online Security &amp; Privacy Solutions that enhance your internet privacy. Arovax applications are designed to be highly effective, yet extremely easy to use.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>42</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-16559108.post-4130601528060575442</id><published>2007-08-29T02:39:00.000-07:00</published><updated>2007-08-29T02:45:59.837-07:00</updated><title type='text'>SmartHide Release!!!</title><content type='html'>&lt;!-- / icon and title --&gt;         &lt;!-- message --&gt;   &lt;div id=&quot;post_message_11018&quot;&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;/span&gt;Online Security and Privacy solutions company &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax LLC&lt;/span&gt; is glad to announce the final release of its innovative and future-oriented software – &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax SmartHide.&lt;/span&gt;&lt;br /&gt;It was designed to provide you with the most important defence on the web – anonymity. SmartHide will keep your IP address hidden, encrypt and compress your traffic, secure all the protocols on your PC (E-mail, Web-browsing, IM, P2P, etc) and even more.&lt;br /&gt;Great changes and upgrades have been made to its beta-version to adjust SmartHide to the needs of our main experts – our clients!&lt;br /&gt;The hole program has been renewed and a few features have appeared.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Unique proposition!&lt;/span&gt;&lt;br /&gt;Now each registered user can invite three friends to join SmartHide users’ community and try the program on their own. They can test and enjoy the program for free!&lt;br /&gt;In SmartHide Release 433 (SSL) port has been closed to prevent Internet criminals from using it to cheat banks and processing services. Paid version of SmartHide won’t have this limitation.&lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;/span&gt;Other modifications and add-ons are the following:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Accelerated &lt;span style=&quot;font-weight: bold;&quot;&gt;network session&lt;/span&gt; authorization and startup.&lt;/li&gt;&lt;li&gt;Available &lt;span style=&quot;font-weight: bold;&quot;&gt;individual authorization&lt;/span&gt; - now every user can get his/her personal copy of SmartHide.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;News section&lt;/span&gt; has been added - follow the latest news of Arovax SmartHide changes and road-maps without going to the website. SmartHide official website also has been updated.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FAQ page&lt;/span&gt; has been added to help the beginners who only start using SmartHide as a security protection tool.&lt;/li&gt;&lt;li&gt;Also our &lt;span style=&quot;font-weight: bold;&quot;&gt;support system&lt;/span&gt; has been modified. Now every registered user can contact our support team and ask any question he or she is interested with.&lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;span style=&quot;font-family:Tahoma;&quot;&gt;&lt;/span&gt;All beta-testers can enjoy free limited version of Arovax SmartHide by receiving an Invitation code upon request to the admin&#39;s PM on the forum.&lt;br /&gt;&lt;br /&gt;If you have any questions or inquiries, please contact Arovax Company:&lt;br /&gt;mailto:&lt;span style=&quot;font-weight: bold;&quot;&gt;info@arovaxcompany.com&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Product Page: &lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://www.smarthide.com/&quot;&gt;http://www.smarthide.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax Community:&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://forum.arovax.com/&quot;&gt;http://forum.arovax.com&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/4130601528060575442/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/4130601528060575442' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/4130601528060575442'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/4130601528060575442'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/smarthide-release.html' title='SmartHide Release!!!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-8679028698464520213</id><published>2007-08-22T23:33:00.000-07:00</published><updated>2007-08-22T23:35:00.392-07:00</updated><title type='text'>Arovax Antispyware Signature Database update from 08/22/2007:</title><content type='html'>We would like to inform you that Arovax Antispyware Signature Database has been updated.&lt;br /&gt;Full information about updates you can find &lt;a href=&quot;http://forum.arovax.com/showthread.php?p=10004#post10004&quot;&gt;at this forum thread&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/8679028698464520213/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/8679028698464520213' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8679028698464520213'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8679028698464520213'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/arovax-antispyware-signature-database_22.html' title='Arovax Antispyware Signature Database update from 08/22/2007:'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-1114101696691089931</id><published>2007-08-22T06:14:00.000-07:00</published><updated>2007-08-22T06:22:27.889-07:00</updated><title type='text'>How to Read Virus Names</title><content type='html'>Antivirus vendors generally assign virus names consisting of a prefix, the name, and a suffix. Not all vendors follow this convention, however, and even those who do may sometimes use different designators. When attempting to find information about a particular virus, it can be helpful to understand how the names are formed.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The prefix&lt;/span&gt;&lt;br /&gt;&lt;span&gt;The prefix&lt;/span&gt; (when used) identifies the type of virus or malware it is. &lt;span style=&quot;font-weight: bold;&quot;&gt;W32&lt;/span&gt; or &lt;span style=&quot;font-weight: bold;&quot;&gt;Win32,&lt;/span&gt; for example, denote that it is a Windows 32-bit infector and thus impacts Windows 95, 98, 2000, 2003, XP, Me, NT 4.0. Those that impact only Windows 95/98 often have prefixes of &lt;span style=&quot;font-weight: bold;&quot;&gt;W95&lt;/span&gt;. Other vendors apply prefixes that are more indicative of the type of threat, rather than the platform it infects. For example, a &lt;span style=&quot;font-weight: bold;&quot;&gt;TROJ&lt;/span&gt; prefix implies the file is a Trojan Horse, an &lt;span style=&quot;font-weight: bold;&quot;&gt;I-Worm&lt;/span&gt; prefix indicates it is an Internet/email worm, and &lt;span style=&quot;font-weight: bold;&quot;&gt;OM&lt;/span&gt; signifies that it is a Microsoft Office macro virus.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;W97M, WM, X2KM&lt;/span&gt; are other examples of macro virus prefixes that denote both the fact that it is a macro virus and provides clues as to what versions of Office (or products within Office) are impacted. The prefix is usually separated from the name by an underscore, a period, or a slash.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The name &lt;/span&gt;&lt;br /&gt;Following the prefix is the actual name of the malware. For example, W32/Bagle has a prefix of W32 and the worm itself is dubbed &lt;span style=&quot;font-weight: bold;&quot;&gt;Bagle&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The suffix &lt;/span&gt;&lt;br /&gt;Many viruses belong to the same family but are slightly different. To differentiate between these variants, antivirus vendors assign an alphabetical suffix. The original virus (or worm, Trojan, etc.) generally does not have a suffix assigned until after further variants of the same threat are discovered. For example, W32/Bagle became W32/Bagle.&lt;span style=&quot;font-weight: bold;&quot;&gt;A&lt;/span&gt; after the &#39;&lt;span style=&quot;font-weight: bold;&quot;&gt;B&lt;/span&gt;&#39; variant was discovered.   Subsequent variants are assigned descending letters of the alphabet, i.e. Bagle.&lt;span style=&quot;font-weight: bold;&quot;&gt;A&lt;/span&gt;, Bagle.&lt;span style=&quot;font-weight: bold;&quot;&gt;B&lt;/span&gt;, Bagle.&lt;span style=&quot;font-weight: bold;&quot;&gt;C&lt;/span&gt; through to Bagle.&lt;span style=&quot;font-weight: bold;&quot;&gt;Z&lt;/span&gt;. When the end of the alphabet has been reached, the count starts over. This will repeat as many times as necessary. As of October 2004, the prolific Gaobot variants had reached W32/Gaobot.&lt;span style=&quot;font-weight: bold;&quot;&gt;BOW&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The modifier &lt;/span&gt;&lt;br /&gt;Some vendors also add a modifier after the suffix that further describes what type of malware it is. For example, &lt;span style=&quot;font-weight: bold;&quot;&gt;@mm&lt;/span&gt; signifies a mass-mailing email worm and &lt;span style=&quot;font-weight: bold;&quot;&gt;@dl&lt;/span&gt; is used by some to designate a downloader.   Using the above information, we can quickly see that W32/Bagle.BB@mm is a Bagle variant that is a mass-mailing email worm impacting Windows 32-bit systems.&lt;span style=&quot;&quot; lang=&quot;EN-US&quot;&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/1114101696691089931/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/1114101696691089931' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1114101696691089931'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1114101696691089931'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/what-can-you-find-out-from-virus-names.html' title='How to Read Virus Names'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-6785828651019210803</id><published>2007-08-16T04:32:00.000-07:00</published><updated>2007-08-22T23:36:24.580-07:00</updated><title type='text'>Arovax Antispyware Signature Database update from 08/15/2007:</title><content type='html'>We would like to inform you that Arovax Antispyware Signature Database has been updated.&lt;br /&gt;Full information about this you can find &lt;a href=&quot;http://forum.arovax.com/showthread.php?p=10004#post10004&quot;&gt;at this forum thread&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/6785828651019210803/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/6785828651019210803' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/6785828651019210803'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/6785828651019210803'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/07/arovax-antispyware-signature-database_26.html' title='Arovax Antispyware Signature Database update from 08/15/2007:'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-1587546464362375098</id><published>2007-08-14T05:52:00.000-07:00</published><updated>2007-08-14T06:12:06.441-07:00</updated><title type='text'>One Virus - Different Names</title><content type='html'>&lt;span class=&quot;body&quot;&gt;&lt;span class=&quot;author&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;body&quot;&gt;A group of security experts known as the Computer AntiVirus Researcher Organization (CARO) first attempted to develop a standard virus naming scheme in the form of the&lt;/span&gt; 1991 New Virus Naming Convention&quot; (NVNC &#39;91). But &lt;span class=&quot;body&quot;&gt;a great amount of new types of Internet infections had appeared since then and different AV laboratories began to name them &lt;/span&gt;&lt;span class=&quot;body&quot;&gt;creating criterias and categories&lt;/span&gt;&lt;span class=&quot;body&quot;&gt; on their own. &lt;/span&gt;This results in that different vendors assign different names to the same virus.&lt;br /&gt;&lt;span style=&quot;font-size: 12pt; font-family: &amp;quot;Times New Roman&amp;quot;;&quot; lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;br /&gt;Costin Raiu illustrated this situation in a sipmle but popular way:&lt;br /&gt;&quot;If we were to name every new virus with some word derived from its payload, like &quot;March6&quot;, &quot;January Friday 13th&quot; or &quot;CrashWindows&quot; the fictional exchange illustrated below could become commonplace:   &lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;(A1 - Analyst1, works for the respectable AV company C1)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; (A2 - Analyst2, works for the most respectable AV company C2)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; (A3 - Analyst3, works for the (even more) respectable AV company C3)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;   A1: &quot;Hey A2, have you seen that new beast, the &#39;Newyork&#39; virus?&quot;&lt;br /&gt;A2: &quot;You mean the one which fills all the files on disk with &#39;New York&#39;?&quot;&lt;br /&gt;A1: &quot;No, that&#39;s the &#39;NYFiller&#39; virus, I mean the one which shows a message box      with the text &#39;New York New York&#39;&quot;&lt;br /&gt;A2: &quot;Could be, I remember having seen two of them, one was a macro virus and      the other one infecting Linux ELF files&quot;&lt;br /&gt;A1: &quot;Hm, the &#39;Newyork&#39; I was thinking of actually infects Windows PE files&quot;&lt;br /&gt;A2: &quot;Ah, but I think I know what you mean, however, the one I&#39;ve seen shows      a message box stating &#39;New Orleans New Orleans&#39;. We are calling it      &#39;NewOrleans&#39;, of course.&quot;&lt;br /&gt;A1: &quot;Hm, that must be a new version of our &#39;NewYork&#39; virus with a modified      message. I think you should rename your &#39;NewOrleans&#39; virus to something      like &#39;NewYork(version:Orleans)&#39;.&quot;&lt;br /&gt;A2: &quot;Hey, wait a minute, why not rename _your_ virus to &#39;NewOrleans(York)&#39;?&quot;&lt;br /&gt;A3: &quot;Hey guys, have you seen the new virus which fills all the files on disk     with &#39;New Delhi&#39;? We&#39;re calling it &#39;NewDelhi&#39;, of course.&quot;&lt;br /&gt;A1: &quot;Arghhh...&quot;&lt;br /&gt;A2: &quot;Who designed this stupid payload-based naming scheme anyway...?&quot;&lt;p class=&quot;text&quot;&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/1587546464362375098/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/1587546464362375098' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1587546464362375098'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1587546464362375098'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/one-virus-different-names.html' title='One Virus - Different Names'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-1413909841703267371</id><published>2007-08-07T05:13:00.000-07:00</published><updated>2007-08-07T05:24:42.893-07:00</updated><title type='text'>Keyloggers Know What You Have Written</title><content type='html'>&lt;span style=&quot;font-weight: bold;&quot;&gt;About keyloggers&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Keylogger&lt;/span&gt; is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.&lt;br /&gt;Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.&lt;br /&gt;&lt;br /&gt;Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.&lt;br /&gt;&lt;br /&gt;There are other approaches to capturing info about what you are doing.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Some keyloggers capture screens, rather than keystrokes.&lt;/li&gt;&lt;li&gt;Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Keyloggers types&lt;/span&gt;&lt;br /&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt; 1. Hardware Keyloggers. &lt;/span&gt;These are small inline devices placed between the keyboard and the computer. Because of their size they can often go undetected for long periods of time - however, they of course require physical access to the machine. These hardware devices have the power to capture hundreds of keystrokes including banking and email username and passwords.&lt;br /&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt; 2. Software using a hooking mechanism.&lt;/span&gt; This type logging is accomplished by using the Windows function SetWindowsHookExe that monitors all keystrokes. The spyware will typically come packaged as an executable file that initiates the hook function, plus a DLL file to handle the logging functions. An application that calls SetWindowsHookExe is capable of capturing even autocomplete passwords.&lt;br /&gt;  &lt;span style=&quot;font-weight: bold;&quot;&gt;3. Kernel/driver keyloggers. &lt;/span&gt;This type of keylogger is at the kernel level and receives data directly from the input device (typically, a keyboard). It replaces the core software for interpreting keystrokes. It can be programmed to be virtually undetectable by taking advantage of the fact that it is executed on boot, before any user-level applications start.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Preventing keystroke capture&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;On the web application side, one method to avoid keystroke capture is to use a virtual keyboard for entering the username and password. A virtual keyboard is analogous to a graphical keypad where a user clicks on the characters rather than types them on the keyboard. This approach may not be practical for every user, for obvious reasons. However, it can be still be useful for very sensitive applications. Note however that even this approach is not completely secure, as some keyloggers are designed to capture screenshots on every mouse-click.&lt;/li&gt;&lt;li&gt;Another method of avoiding keystroke capture is to ask the user to enter the characters of the password randomly. For example, an application can ask the user to enter the 1st, 3rd and 5th (odd placed) characters of the password and then the characters in the even places. However this sequence has to change every time or else anyone capturing the password can easily reconstruct the original password - and additionally, the application must support this approach.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/1413909841703267371/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/1413909841703267371' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1413909841703267371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1413909841703267371'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/keyloggers-know-what-you-have-written.html' title='Keyloggers Know What You Have Written'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-7181595605608138200</id><published>2007-08-02T05:17:00.000-07:00</published><updated>2007-08-02T05:26:07.038-07:00</updated><title type='text'>Arovax SmartHide Open Beta-Test and Wishlist</title><content type='html'>Dear Arovax Community!&lt;br /&gt;&lt;br /&gt;Before the upcoming release of new Beta-version of Arovax SmartHide we are starting an&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt; open beta-test&lt;/span&gt; of the previous version of &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax SmartHide Beta.&lt;br /&gt;&lt;br /&gt;Arovax SmartHide&lt;/span&gt; is a perfect solution for the biggest online problem - Complete Anonymity.&lt;br /&gt;This unique program will keep your IP address (and your identity) hidden; secure all the protocols on your PC (E-mail, Web-browsing, Instant Messaging); provide full encryption of your traffic while working in Internet, and a lot more.&lt;br /&gt;&lt;br /&gt;Being extremely user-friendly, &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax SmartHide&lt;/span&gt; secures the data you send over Internet. You also get compression of all your traffic, so you can pay less to your internet providers!&lt;br /&gt;&lt;br /&gt;Everyone who wants to test the previous version of Arovax SmartHide - please visit &lt;a href=&quot;http://forum.arovax.com/showthread.php?t=1406&quot;&gt;this thread of our forum&lt;/a&gt; for further instructions.</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/7181595605608138200/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/7181595605608138200' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7181595605608138200'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7181595605608138200'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/arovax-smarthide-open-beta-test-and.html' title='Arovax SmartHide Open Beta-Test and Wishlist'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-8614030656328251796</id><published>2007-08-02T05:16:00.001-07:00</published><updated>2007-08-02T05:16:37.518-07:00</updated><title type='text'>Arovax Antispyware Signature Database update from 08/01/2007:</title><content type='html'>We would like to inform you that Arovax Antispyware Signature Database has been updated.&lt;br /&gt;Full information about this you can find &lt;a href=&quot;http://forum.arovax.com/showthread.php?p=10004#post10004&quot;&gt;at this forum thread&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/8614030656328251796/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/8614030656328251796' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8614030656328251796'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8614030656328251796'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/arovax-antispyware-signature-database.html' title='Arovax Antispyware Signature Database update from 08/01/2007:'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-3153219351234654343</id><published>2007-08-01T05:43:00.000-07:00</published><updated>2007-08-01T06:50:13.686-07:00</updated><title type='text'>Botnets: What are They?</title><content type='html'>A &lt;span style=&quot;font-weight: bold;&quot;&gt;botnet&lt;/span&gt; (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.&lt;br /&gt;Any such computer is referred to as a zombie - in effect, a computer &quot;robot&quot; or &quot;bot&quot; that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based.&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;According to a report from antivirus labs, botnets - not spam, viruses, or worms - currently pose the biggest threat to the Internet. An average of 57,000 active bots was observed per day over the six months of 2006.&lt;/span&gt;&lt;br /&gt;An attacker usually gains control by infecting the computers with a virus or other malicious code that gives the attacker access. Your computer may be part of a botnet even though it appears to be operating normally. Botnets are often used to conduct a range of activities, from distributing spam and viruses to conducting denial-of-service attacks.&lt;br /&gt;The main problem with botnets is that they are hidden and may stay undetected unless you are specifically looking for certain activity.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What can you do to protect yourself?&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Use and maintain anti-virus software - Anti-virus software recognizes and protects your computer against most known viruses, so you may be able to detect and remove the virus before it can do any damage.&lt;/li&gt;&lt;li&gt;Install a firewall - Firewalls may be able to prevent some types of infection by blocking malicious traffic before it can enter your computer and limiting the traffic you send.&lt;/li&gt;&lt;li&gt;Use good passwords - Select passwords that will be difficult for attackers to guess, and use different passwords for different programs and devices.&lt;/li&gt;&lt;li&gt;Keep software up-to-date - Install software patches so that attackers can&#39;t take advantage of known problems or vulnerabilities.&lt;/li&gt;&lt;li&gt;Follow good security practices - Take appropriate precautions when using email and web browsers to reduce the risk that your actions will trigger an infection.&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/3153219351234654343/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/3153219351234654343' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/3153219351234654343'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/3153219351234654343'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/08/botnets-what-are-they.html' title='Botnets: What are They?'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-4400252140371004129</id><published>2007-07-30T04:20:00.000-07:00</published><updated>2007-08-01T04:23:25.780-07:00</updated><title type='text'>Arovax AntiSpyware Roadmap (Updated 30.07.2007)</title><content type='html'>This roadmap lists features that are planned for the future. It is not complete and it is not final and it will change with time. We just would like to give you an overview of where Arovax AntiSpyware development is standing and what can you expect in the coming releases.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Current Version: 2.1.143 release!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Features on the Wall&lt;/span&gt;&lt;br /&gt;These features get our attention right now and are planned for the nearest release.&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Last edited: July 30, 2007&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;    * Three scan modes: quick, full and optional&lt;br /&gt;    * Incremental database update&lt;br /&gt;    * Automatic software update&lt;br /&gt;    * Open format of the language file&lt;br /&gt;    * System scanning right after database update</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/4400252140371004129/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/4400252140371004129' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/4400252140371004129'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/4400252140371004129'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/07/arovax-antispyware-roadmap-updated.html' title='Arovax AntiSpyware Roadmap (Updated 30.07.2007)'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-5861300876422088368</id><published>2007-07-19T02:10:00.000-07:00</published><updated>2007-07-20T02:12:14.608-07:00</updated><title type='text'>Arovax Antispyware Signature Database update from 07/18/2007:</title><content type='html'>We would like to inform you that Arovax Antispyware Signature Database has been updated.&lt;br /&gt;Full information about this you can find &lt;a href=&quot;http://forum.arovax.com/showthread.php?p=10004#post10004&quot;&gt;at this forum thread&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/5861300876422088368/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/5861300876422088368' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/5861300876422088368'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/5861300876422088368'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/07/arovax-antispyware-signature-database.html' title='Arovax Antispyware Signature Database update from 07/18/2007:'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-1151909660802285427</id><published>2007-07-18T07:14:00.000-07:00</published><updated>2007-07-18T07:14:58.890-07:00</updated><title type='text'>How to Learn About the Penalties for Violating Computer Virus Laws</title><content type='html'>&lt;span id=&quot;intelliTXT&quot;&gt;Everyone involved in e-commerce and digital intellectual property should understand the penalties &lt;/span&gt;for violating Computer Virus Laws&lt;span id=&quot;intelliTXT&quot;&gt; in order to gain a full appreciation of this new problem.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.ehow.com/&quot;&gt;How To Do Just About Everything&lt;/a&gt; proposes a few steps to learn about the penalties &lt;span id=&quot;intelliTXT&quot;&gt;for these violations&lt;/span&gt;:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step One&lt;/span&gt;&lt;br /&gt;Look over the Computer Fraud and Abuse Act of 1984 on the Department of Justice website (see Resources below). This piece of legislation makes it illegal to sell passwords, utilize computer systems without proper authorization and steal information from a financial institution&#39;s computers.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step Two&lt;/span&gt;&lt;br /&gt;Contact your state&#39;s consumer protection department in order to help stop computer viruses. Most states have a consumer protection organization that has a series of ongoing campaigns, including technology and intellectual property issues. A good example of a consumer protection agency on the state level is the New York State Consumer Protection Board (see Resources below).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step Three&lt;/span&gt;&lt;br /&gt;Learn about computer virus laws from a qualified criminal attorney. Contact the American Bar Association to get in touch with pro bono attorneys who deal with criminal and intellectual property law (see Resources below).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step Four&lt;/span&gt;&lt;br /&gt;Inquire about computer viruses and ways of violating computer systems from an information technology (IT) expert. A better understanding of computer viruses violating your computer can help you develop a larger picture of your legal case. Your local university will typically have an IT department that can answer public questions.</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/1151909660802285427/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/1151909660802285427' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1151909660802285427'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1151909660802285427'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/07/arovax-antispyware-21143-is-released.html' title='How to Learn About the Penalties for Violating Computer Virus Laws'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-8698720968258762203</id><published>2007-07-10T04:51:00.000-07:00</published><updated>2007-07-10T04:55:26.103-07:00</updated><title type='text'>Warning: Somebody&#39;s Phishing You!</title><content type='html'>&lt;span style=&quot;font-weight: bold;&quot; class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;Phishing&lt;/span&gt; is the term coined by hackers who imitate legitimate companies in e-mails to entice people to share passwords or credit-card numbers. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;phishers&lt;/span&gt; include &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;PayPal&lt;/span&gt;, eBay, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;MSN&lt;/span&gt;, Yahoo, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;BestBuy&lt;/span&gt;, and America Online. A &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;phishing&lt;/span&gt; expedition, like the fishing expedition it&#39;s named for, is a speculative venture: the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;phisher&lt;/span&gt; puts the lure hoping to fool at least a few of the prey that encounter the bait.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;Phishers&lt;/span&gt; use a number of different social engineering and e-mail spoofing ploys to try to trick their victims. In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients&#39; AOL accounts. The perpetrator&#39;s e-mail used AOL logos and contained legitimate links. If recipients clicked on the &quot;AOL Billing Center&quot; link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;PINs&lt;/span&gt;), social security numbers, banking numbers, and passwords. This information was used for identity theft.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Potential uses of your information: &lt;/span&gt;Control of victim&#39;s financial accounts, open new bank accounts, transfer bank balances, apply for loans, credit cards and other goods/services, luxury purchases, hide criminal activities, receive government benefits or obtain a passport.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tips on how to avoid &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot; class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;phishing&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;:&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body. &lt;span style=&quot;font-style: italic;&quot;&gt;For example, &lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot; class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;PayPal&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; will never ask you in an email: Credit and debit card numbers, Bank account numbers, Driver&#39;s license numbers,  Email addresses, Passwords, Your full name.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;/span&gt;    Look for misspellings and bad grammar. While an occasional typo can slip by any organization, more than one is a tip-off to beware.&lt;/li&gt;&lt;li&gt;Beware of the @ symbol in a URL. &lt;span style=&quot;font-style: italic;&quot;&gt;Most browsers will ignore all characters preceding the @ symbol, so this Web address -- http://www.respectedcompany.com@thisisascam.com -- may look to the unsuspecting user like a page of Respected Company&#39;s site. But it actually takes visitors to &lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot; class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;thisisascam&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;.com.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Before submitting financial information through a Web site, look for the &quot;lock&quot; icon on the browser&#39;s status bar. It means your information is secure during transmission.&lt;/li&gt;&lt;li&gt;If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine. &lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/8698720968258762203/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/8698720968258762203' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8698720968258762203'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8698720968258762203'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/07/warning-somebodys-phishing-you.html' title='Warning: Somebody&#39;s Phishing You!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-9018795141044423223</id><published>2007-07-07T02:13:00.000-07:00</published><updated>2007-07-20T02:16:49.643-07:00</updated><title type='text'>Arovax AntiSpyware 2.1.143 is released!!!</title><content type='html'>New version of Arovax Antispyware became much better. Now database update and system scan can be scheduled. We also fixed some errors and improved user interface. These are the main changes in the version 2.1.143:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;New: &quot;Scheduler: scheduling database updates and scans&quot;&lt;/li&gt;&lt;li&gt;New: &quot;Arovax Company news panel&quot;&lt;/li&gt;&lt;li&gt;New: &quot;Full compatibility with Windows Vista&quot;&lt;/li&gt;&lt;li&gt;Fixed: &quot;Bug with sending reports with last scan log&quot;&lt;/li&gt;&lt;li&gt;Fixed: &quot;Bug with counter during files scan&quot;&lt;/li&gt;&lt;li&gt;Fixed: &quot;Bug with scanning files with restricted access&quot;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Please &lt;a href=&quot;http://arovaxantispyware.com/dl.php&quot;&gt;download the latest version of Arovax Antispyware here&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/9018795141044423223/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/9018795141044423223' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/9018795141044423223'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/9018795141044423223'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/07/arovax-antispyware-21143-is-released_07.html' title='Arovax AntiSpyware 2.1.143 is released!!!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-7191605593033503166</id><published>2007-07-06T05:37:00.000-07:00</published><updated>2007-07-05T05:39:12.719-07:00</updated><title type='text'>Arovax Antispyware Signature Database update from 07/04/2007:</title><content type='html'>We would like to inform you that Arovax Antispyware Signature Database has been updated.&lt;br /&gt;Full information about this you can find &lt;a href=&quot;http://forum.arovax.com/showthread.php?p=7668#post7668&quot;&gt;here&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/7191605593033503166/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/7191605593033503166' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7191605593033503166'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7191605593033503166'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/06/arovax-antispyware-signature-database.html' title='Arovax Antispyware Signature Database update from 07/04/2007:'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-8224801353248223525</id><published>2007-06-27T04:22:00.000-07:00</published><updated>2007-06-27T04:24:11.244-07:00</updated><title type='text'>Internet Worms</title><content type='html'>People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.&lt;br /&gt;Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;History&lt;/span&gt;&lt;br /&gt;The first incarnations of internet worms weren&#39;t the malevolent threat they are today. These early worms (developed in 1982 at Xerox&#39;s Palo Alto Research Center by John Shock and Jon Hepps) were in fact, designed to perform useful tasks within a network.&lt;br /&gt;Despite the evident usefulness of these programs it was also clear that, in the wrong hands they could quite easily be turned to malevolent uses.&lt;br /&gt;The first true Internet worm (and probably the most famous) was released on 2nd November 1988 by Robert T. Morris. It attacked Sun and DEC UNIX systems attached to the Internet and within 24 hours had invaded 4,000-6,000 machines.&lt;br /&gt;The Melissa Worm was first recognized on 26th March 1999, it was the first major mail worm - a form of worm which was to become hugely prevalent. Melissa was written by David L. Smith and named after a lap dancer he met in Florida.&lt;br /&gt;Melissa contained a Word macro virus but unlike previous viruses of this type it could spread in a semi-active manner. It attacked Microsoft&#39;s Outlook and Word programs (Any time an infected user attached a Word document to an email, this email sent to the first 50 addresses in the recipients&#39; address book if they use Outlook as the mail client).&lt;br /&gt;In 2001 active worms made a return to prominence. The first of these worms to be noticed was called Code Red. Code Red was a relatively simple worm which affected computers running Microsoft&#39;s Internet Information Server (IIS) web server. It infected over 350,000 servers in just over 12 hours. Once it infected a system Code Red waited for 20-27 days to launch denial of service attacks on several fixed IP addresses. (Including the IP address of the White House).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How do they spread?&lt;/span&gt;&lt;br /&gt;A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip.&lt;br /&gt;If you click on the attachment to open it, you&#39;ll activate the worm, but in some versions of Microsoft Outlook, you don&#39;t even have to click on the attachment to activate it if you have the program preview pane activated.&lt;br /&gt;The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver&#39;s address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.&lt;br /&gt;Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading. According to Computer Economics, the associated damage from Code Red and Nimda came to $3.72 billion.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How to protect your computer?&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Make sure you visit Windows Update site frequently.&lt;/li&gt;&lt;li&gt;Most antivirus programs also provide a feature that allows you to update their definitions automatically – make sure you enable that as well.&lt;/li&gt;&lt;li&gt;Remove Spyware and Adware.&lt;/li&gt;&lt;li&gt;Prevent Spam.&lt;/li&gt;&lt;li&gt;Basically there is no one absolute defense from anything – use a combination of software and hardware protection.&lt;/li&gt;&lt;li&gt;Don’t run files from unknown sources, and confirm with the sender the authenticity of any unexpected attachment, especially an executable file (*.exe, *.scr, *.bat, *.com, *.vbs, *.cmd, etc).&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/8224801353248223525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/8224801353248223525' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8224801353248223525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8224801353248223525'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/06/internet-worms.html' title='Internet Worms'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-6297184633376018515</id><published>2007-06-21T01:29:00.000-07:00</published><updated>2007-06-21T01:41:29.849-07:00</updated><title type='text'>Strong Passwords: Tips</title><content type='html'>One of the problems with passwords is that users forget them. Different networks, sites and applications have their own password requirements and more classified or personal information merits stronger, more unique authentication.&lt;br /&gt;It is difficult when your employer requires a password of at least 8 characters that must include at least one number and one special character, but your bank requires a password of at least 6 characters that must include at least one uppercase, one lowercase and oner numerical character. Then, one web site you visit only allows a 4-character password, all numbers, and an application you use requires an 8-character password, but doesn&#39;t allow numbers or special characters.&lt;br /&gt;In an effort to not forget them, users indicate simple things like their dog’s name, their son’s first name and birthdate, the name of the current month - anything that will give them a clue to remember what their password is.&lt;br /&gt;For the curious hacker who has somehow gained access to your computer system this is the equivalent of locking your door and leaving the key under the doormat. Without even resorting to any specialized tools a hacker can discover your basic personal information- name, children’s names, birthdates, pets names, etc. and try all of those out as potential passwords.&lt;br /&gt;To create a secure password that is easy for you to remember, follow these simple steps:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. Do not use personal information. &lt;/span&gt;&lt;br /&gt;You should never use personal information as a part of your password. It is very easy for someone to guess things like your last name, pet&#39;s name, child&#39;s birth date and other similar details.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Do not use real words.&lt;/span&gt; There are tools available to help attackers guess your password. With today&#39;s computing power, it doesn&#39;t take long to try every word in the dictionary and find your password, so it is best if you do not use real words for your password.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Mix different character types. &lt;/span&gt;You can make a password much more secure by mixing different types of characters. Use some uppercase letters along with lowercase letters, numbers and even special characters such as &#39;&amp;&#39; or &#39;%&#39;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;4. Use a passphrase. &lt;/span&gt;Rather than trying to remember a password created using various character types which is also not a word from the dictionary, you can use a passphrase. Think up a sentence or a line from a song or poem that you like and create a password using the first letter from each word.&lt;br /&gt;For example, rather than just having a password like &#39;yr$1Hes&#39;, you could take a sentence such as &quot;I like to read the About.com Internet / Network Security web site&quot; and convert it to a password like &#39;il2rtA!nsws&quot;. By substituting the number &#39;2&#39; for the word &#39;to&#39; and using an exclamation point in place of the &#39;i&#39; for &#39;Internet&#39;, you can use a variety of character types and create a secure password that is hard to crack, but much easier for you to remember.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5. Use a password management tool. &lt;/span&gt;Another way to store and remember passwords securely is to use some sort of password management tool. These tools maintain a list of usernames and passwords in encrypted form. Some will automatically fill in the username and password information on sites and applications.&lt;br /&gt;&lt;a href=&quot;http://www.traysafe.com/&quot;&gt;Arovax TraySafe password manager&lt;/a&gt; was created specially to relieve computer users of headaches about lost passwords, typing usernames, passwords and storing securely valuable information.&lt;br /&gt;&lt;br /&gt;Using the tips above will help you create passwords that are more secure, but you should still also follow the following tips:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Use different passwords. You should usea different username and password for each login or application you are trying to protect. That way if one gets compromised the others are still safe. Another approach which is less secure, but provides a fair tradeoff between security and convenience, is to use one username and password for sites and applications that don&#39;t need the extra security, but use unique usernames and more secure passwords on sites such as your bank or credit card companies.&lt;/li&gt;&lt;li&gt;Change your passwords. You should change your password at least every 30 to 60 days. You should also not re-use a password for at least a year.&lt;/li&gt;&lt;li&gt;Enforce stronger passwords: Rather than relying on every user of the computer to understand and follow the instructions above, you can configure Microsot Windows password policies so that Windows will not accept passwords that don&#39;t meet the minimum requirements.&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/6297184633376018515/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/6297184633376018515' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/6297184633376018515'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/6297184633376018515'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/06/strong-passwords-tips.html' title='Strong Passwords: Tips'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-8434486123078695839</id><published>2007-06-06T06:22:00.000-07:00</published><updated>2007-06-06T06:31:28.528-07:00</updated><title type='text'>Secure your Credit Card information</title><content type='html'>Internet Fraudsters keep on finding new methods of using the Internet to scam innocent consumers and online users, which is said to be the common targets. This fraud is very popular because of its anonymity and less risk involved. Added to the fact that not so many countries are already ready to face this disaster and have strong policies and law to pursue the case against the suspected fraudster.&lt;br /&gt;Fraud on the Internet includes, but is not limited to: fraudulent or fake web sites, untrustworthy websites, phishing (fishing) for personal information with fraudulent emails, Online auction frauds - buyers and sellers, increased Nigerian 419 Advance Fee Fraud, Lottery Advance Fee Scams, Business Opportunities &amp; Work from Home Scams, International Modem Dialing and Cramming, and credit card fraud.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Take the first 8 digits of a standard 16-digit credit card number. Search for them on Google. Since the 8-digit prefix of a given card number is often shared with many other cards, about 1/4 of credit card numbers in my random test, turned up pages that included other credit card numbers, and about 1 in 10 turned up a &quot;treasure trove&quot; of card numbers that were exposed through someone&#39;s sloppily written Web app.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Protect from what?&lt;/span&gt;&lt;br /&gt;The most common and most successful frauds are done through the use of stolen credit card information, which was obtained in many ways:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Worms that contains malicious code to extract information from the infected computers.&lt;/span&gt; In the past, worms were designed primarily to propagate. Now, many of the significant worms are designed to steal sensitive information such as credit card numbers, social security numbers, pin codes, and passwords and send the information to the attacker for nefarious purposes including identity theft. Unfortunately, attackers have become very adept at circumventing traditional defenses such as anti-virus software and firewalls. &lt;a href=&quot;http://www.arovaxshield.com/&quot;&gt;Arovax Shield&lt;/a&gt; detects and notifies you about all major online threats trying to penetrate your system, isolates &amp; blocks them.&lt;/li&gt;&lt;li&gt;Frauds can get access to information about your online credit card payments through your PC in case you ever used online services for &lt;span style=&quot;font-weight: bold;&quot;&gt;purchasing something from the sites that are not secured.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Installation of keyloggers and monitoring software of the users’ computers. &lt;/span&gt;Keyloggers are a form of spyware that tracks person&#39;s keystrokes and then sends the information to someone who can translate and exploit it. This can copy the keystrokes on e-mail, instant messenger, and any other Internet activity. The person collecting the information can get information such as credit card numbers, user names and passwords, and more. These handy little devices have been around for sometime but the increase of spyware has brought them out to the front and center. It is easy to infect a computer with this type of software and very common. A user can easily go to the wrong web site and get infected or someone can manually place this on the computer, as well.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Using privacy leaks in your system,&lt;/span&gt; frauds get such information about you as your name, your street address or your email, masquerade as a trustworthy person and send you an apparently official email trying to find out your credit card pin and number. Your IP address or &quot;Internet Address&quot; can be used to trace your location and personal information. With &lt;a href=&quot;http://smarthide.com/&quot;&gt;Arovax SmartHide&lt;/a&gt; whenever you visit websites, your real IP address is not provided to the other people involved in the transaction. Most hacking is based on using your real IP address, which the hacker won’t be able to get, without that they have no idea where to hack into.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Electronic mail (email) is also vulnerable. This is because, like the real post, it spends a lot of time being stored and awaiting delivery: for instance, if a telecommunications link fails, then email that would have used that link will stay, waiting, until the link is restored. It is in principle possible for someone to bribe a computer operator at one of the mail servers and thus somehow gain access to all undelivered mail. A sophisticated program might then be able to extract anything that looked like a credit card number.&lt;br /&gt;Remember, the amount of risk in giving out a credit card number is limited by two important factors:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Anyone taking card numbers from that Web site and trying to use them before they were cancelled, would have put him/herself in a very difficult position. To use a card number and expiration date, without a physical card, to purchase tangible goods by phone or over the Web, you need to give an address to which the merchandise will be delivered, which makes the transaction very traceable. Cash advances require PIN numbers which you never give to online retailers. So the thief would be limited to paying for on-line memberships or buying &quot;soft goods,&quot; such as software, content, and music, that can be dowloaded directly from a Web site; and companies in that business tend to take extra precautions to prevent credit card fraud because of their unique vulnerability.&lt;/li&gt;&lt;li&gt;The credit card company limits your liability. Federal law limits your liability to $50 if someone makes unauthorized charges to your account, and most credit card issuers will remove them completely if you report the problem promptly. There are new technologies, such as “substitute” credit card numbers and password programs, that can offer extra measures of protection from someone else using your credit card.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;Your level of comfort in using your credit card on the World Wide Web is a personal matter.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How to decrease risks?&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Know who you’re dealing with. If the seller or charity is unfamiliar, check with your state or local consumer protection agency and the Better Business Bureau. Some Web sites have feedback forums, which can provide useful information about other people’s experiences with particular sellers. Get the physical address and phone number in case there is a problem later.&lt;/li&gt;&lt;li&gt;Be aware that no complaints is no guarantee. Fraudulent operators open and close quickly, so the fact that no one has made a complaint yet doesn’t meant that the seller or charity is legitimate. You still need to look for other danger signs of fraud.&lt;/li&gt;&lt;li&gt;Don’t believe promises of easy money. If someone claims that you can earn money with little or no work, get a loan or credit card even if you have bad credit, or make money on an investment with little or no risk, it’s probably a scam.&lt;/li&gt;&lt;li&gt;Understand the offer. A legitimate seller will give you all the details about the products or services, the total price, the delivery time, the refund and cancellation policies, and the terms of any warranty.&lt;/li&gt;&lt;li&gt;Resist pressure. Legitimate companies and charities will be happy to give you time to make a decision. It’s probably a scam if they demand that you act immediately or won’t take “No” for an answer.&lt;/li&gt;&lt;li&gt;Be cautious about unsolicited emails.  They are often fraudulent. If you are familiar with the company or charity that sent you the email and you don’t want to receive further messages, send a reply asking to be removed from the email list. However, responding to unknown senders may simply verify that yours is a working email address and result in even more unwanted messages from strangers. The best approach may simply be to delete the email.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Beware of imposters. Someone might send you an email pretending to be connected with a business or charity, or create a Web site that looks just like that of a well-known company or charitable organization. If you’re not sure that you’re dealing with the real thing, find another way to contact the legitimate business or charity and ask.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Guard your personal information. Don’t provide your credit card or bank account number unless you are actually paying for something. Your social security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.&lt;/li&gt;&lt;li&gt;Beware of “dangerous downloads.” In downloading programs to see pictures, hear music, play games, etc., you could download a virus that wipes out your computer files or connects your modem to a foreign telephone number, resulting in expensive phone charges. Only download programs from Web sites you know and trust. Read all user agreements carefully.&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/8434486123078695839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/8434486123078695839' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8434486123078695839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8434486123078695839'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/06/secure-your-credit-card-information.html' title='Secure your Credit Card information'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-7733109199198781227</id><published>2007-05-18T13:47:00.000-07:00</published><updated>2007-06-05T06:30:30.685-07:00</updated><title type='text'>Arovax AntiSpyware roadmap is updated!</title><content type='html'>This roadmap lists features that are planned for the future. It is not complete and it is not final and it will change with time. We just would like to give you an overview of where Arovax AntiSpyware development is standing and what can you expect in the coming releases.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Current Version: 2.0.113 Release!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Features on the Wall&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;These features get our attention right now and are planned for the nearest release.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;News Tab like the one in Arovax Shield;&lt;/li&gt;&lt;li&gt;Database download Scheduler;&lt;/li&gt;&lt;li&gt;Scan Scheduler;&lt;/li&gt;&lt;li&gt;All the files which are written to HDD should be written to the Application Data folder;&lt;/li&gt;&lt;li&gt;Windows Vista compatibility.&lt;/li&gt;&lt;/ul&gt; You can always stay up on all the latest news  and updates visiting &lt;a href=&quot;http://forum.arovax.com/showthread.php?t=63%20&quot;&gt;Arovax Community Forum.&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/7733109199198781227/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/7733109199198781227' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7733109199198781227'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7733109199198781227'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/05/arovax-antispyware-roadmap-is-updated.html' title='Arovax AntiSpyware roadmap is updated!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-1333947687722504546</id><published>2007-05-18T13:44:00.000-07:00</published><updated>2007-06-05T00:47:22.173-07:00</updated><title type='text'>Arovax Shield roadmap is updated!</title><content type='html'>&lt;span style=&quot;font-style: italic;&quot;&gt;Current public version: 2.1.103&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This roadmap lists features that are planned for the future. It is not complete and it is not final and it will change with time. We just would like to give you an overview of where Arovax Shield development is standing and what can you expect in the coming releases.&lt;br /&gt;&lt;br /&gt;•    New, completely remade Graphical User Interface;&lt;br /&gt;•    More reliable System Registry Monitoring level;&lt;br /&gt;•    Protection from modification of Executing files;&lt;br /&gt;•    Rules creation for access to Registry and File system for each separate application;&lt;br /&gt;•    Two levels of control over system activity: Normal and High;&lt;br /&gt;•    More advanced Events Log.</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/1333947687722504546/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/1333947687722504546' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1333947687722504546'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/1333947687722504546'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/05/arovax-shield-roadmap-is-updated.html' title='Arovax Shield roadmap is updated!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-8281699918252741610</id><published>2007-05-06T15:02:00.000-07:00</published><updated>2007-06-05T01:07:37.755-07:00</updated><title type='text'>Arovax Antispyware Signature Database update from 05.05.2007:</title><content type='html'>We would like to inform you that Arovax Antispyware Signature Database has been updated.&lt;br /&gt;Full information about this you can find &lt;a href=&quot;http://forum.arovax.com/showthread.php?t=3699&quot;&gt;here&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/8281699918252741610/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/8281699918252741610' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8281699918252741610'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/8281699918252741610'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/05/arovax-antispyware-signature-database.html' title='Arovax Antispyware Signature Database update from 05.05.2007:'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-5225994225872946176</id><published>2007-04-27T11:16:00.000-07:00</published><updated>2007-06-05T03:45:40.545-07:00</updated><title type='text'>Long-awaited Arovax AntiSpyware 2.0.113 is released!</title><content type='html'>Dear friends!&lt;br /&gt;&lt;br /&gt;The time has come and we have released the first big update among planned by &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax Team&lt;/span&gt; on our softwares.&lt;br /&gt;&lt;br /&gt;New &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax Antispyware&lt;/span&gt; has become even more reliable and effective. Arovax Antispyware Spyware Database is completely updated, a lot of trusted applications and registry keys were added which allows to discover malicious software and to distinguish it from the legal software.&lt;br /&gt;All found malicious software are now automatically checked for removing, and those items which will be marked as unknown can be sent to the &lt;span style=&quot;font-weight: bold;&quot;&gt;Arovax lab&lt;/span&gt; for the further research and analysis.&lt;br /&gt;Latest release of Arovax Shield is completely compatible with Windows Vista. New version includes fixes to the bugs which lead to AS failure. One of the most important features of the new update is the implemented regular &lt;span style=&quot;font-weight: bold;&quot;&gt;Signature database update&lt;/span&gt;. Arovax AntiSpyware is now able to completely secure your system from the most latest viruses, trojans, spyware, etc.&lt;br /&gt;&lt;br /&gt;These features were implemented in this release:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;New: Full compatibility with Windows Vista.&lt;/li&gt;&lt;li&gt;New: Single package of installation for Windows 2000/XP/2003/Vista.&lt;/li&gt;&lt;li&gt;New: Database now contains records about “Good” programs (White list)&lt;/li&gt;&lt;li&gt;New: Automatical selection of malicious records&lt;/li&gt;&lt;li&gt;New: Much faster working with the registry and file system.&lt;/li&gt;&lt;li&gt;Fixed: Sometime Arovax Shield is crushed when user is installing ActiveX components or IE toolbars.&lt;/li&gt;&lt;li&gt;New: If Arovax Antispyware discovered unknown records during the scan – you can send them to the Arovax lab for the research&lt;/li&gt;&lt;li&gt;Fixed: Bug with counter during files scan&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Please &lt;a href=&quot;http://www.arovaxantispyware.com/dl.php&quot; target=&quot;_blank&quot;&gt;download the latest version of Arovax Antispyware here&gt;&gt;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/5225994225872946176/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/5225994225872946176' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/5225994225872946176'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/5225994225872946176'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/04/long-awaited-arovax-antispyware-20113.html' title='Long-awaited Arovax AntiSpyware 2.0.113 is released!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-4837191648882280091</id><published>2007-03-05T11:27:00.000-08:00</published><updated>2007-06-05T00:31:30.430-07:00</updated><title type='text'>Arovax Shield v2.1.95 is released</title><content type='html'>In this release startup folder monitoring problems and hosts file monitoring problems in automatic mode have been fixed. In addition much faster IE cookies scan has been implemented.</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/4837191648882280091/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/4837191648882280091' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/4837191648882280091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/4837191648882280091'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/03/arovax-shield-v2195-is-released.html' title='Arovax Shield v2.1.95 is released'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-2551442606992079318</id><published>2007-03-05T09:47:00.000-08:00</published><updated>2007-06-05T03:50:28.406-07:00</updated><title type='text'>Arovax SmartHide 1.0.256 beta version!</title><content type='html'>Dear Beta-testers!&lt;br /&gt;&lt;br /&gt;A new version of Arovax SmartHide 1.0.256 has been uploaded to the Download section of your Beta-Tester Members Area.&lt;br /&gt;&lt;a href=&quot;http://www.smarthide.com/beta/download.php&quot; target=&quot;_blank&quot;&gt;SmartHide 1.0.256&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Please download the latest version and test it thoroughly.&lt;br /&gt;&lt;br /&gt;The cnages include complete re-writing of the program kernel and code, implementation of the new approach where all the traffic goes through anonymous server both UDP and TCP.&lt;br /&gt;Right now you do not need to play with Ports, ALL your traffic is automatically encrypted, compressed and anonymous.&lt;br /&gt;&lt;br /&gt;For the rest members of Arovax Community I want to remind, that you can still apply for Beta-testing &lt;a href=&quot;http://smarthide.com/beta/registration.php&quot; target=&quot;_blank&quot;&gt;registering here&lt;/a&gt; and waiting for our approvement.</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/2551442606992079318/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/2551442606992079318' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/2551442606992079318'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/2551442606992079318'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/03/arovax-smarthide-10256-beta-version.html' title='Arovax SmartHide 1.0.256 beta version!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-16559108.post-7508484011616515708</id><published>2007-02-13T21:25:00.000-08:00</published><updated>2007-06-05T00:25:43.704-07:00</updated><title type='text'>Arovax Shield 2.1.90 beta version is released!</title><content type='html'>New version has a number of features:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;New: Much faster Firefox cookies scan.&lt;/li&gt;&lt;li&gt;New: Now Arovax Shield defines the process which tries to change the hosts file.&lt;/li&gt;&lt;li&gt; New system of monitoring files and folders. Now it works on kernel mode.&lt;/li&gt;&lt;li&gt; New: Now Arovax Shield is saving the settings after update.&lt;/li&gt;&lt;li&gt;New: New technology &quot;SDT-Antipatch&quot;.&lt;/li&gt;&lt;li&gt;New: Arovax Shield is now fully compatible with Windows Server 2003 on the x86 platform.&lt;/li&gt;&lt;li&gt;Fixed: Startup folder monitoring problems in Windows 2000.&lt;/li&gt;&lt;li&gt;Fixed: &quot;Problems with Terminal Service.&lt;/li&gt;&lt;li&gt;Fixed: &quot;Crash while exiting Arovax Shield in Windows 2000.&lt;/li&gt;&lt;li&gt;Fixed: &quot;Problems during moving the files to startup folder.&lt;/li&gt;&lt;/ul&gt;If your copy of Arovax Shield does load your CPU too much during work with Firefox - please try this version of AS.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;&quot; lang=&quot;UK&quot;&gt;&lt;a href=&quot;http://www.arovaxshield.com/download/ashield_2_setup_90.exe&quot; target=&quot;_blank&quot;&gt;Download Arovax Shield for Windows 2000/XP!&lt;/a&gt; &lt;!--[if gte vml 1]&gt;&lt;v:shapetype id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; spt=&quot;75&quot; preferrelative=&quot;t&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;  &lt;v:stroke joinstyle=&quot;miter&quot;&gt;  &lt;v:formulas&gt;   &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;   &lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;   &lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;   &lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;   &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;   &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;   &lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;   &lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;   &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;   &lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;   &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;   &lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;  &lt;/v:formulas&gt;  &lt;v:path extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; connecttype=&quot;rect&quot;&gt;  &lt;o:lock ext=&quot;edit&quot; aspectratio=&quot;t&quot;&gt; &lt;/v:shapetype&gt;&lt;v:shape id=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot; alt=&quot;&quot; style=&quot;&#39;width:18.75pt;&quot;&gt;  &lt;v:imagedata src=&quot;file:///C:\DOCUME~1\Notebook\LOCALS~1\Temp\msohtml1\01\clip_image001.gif&quot; href=&quot;http://forum.arovax.com/images/smilies/006.gif&quot;&gt; &lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;br /&gt;&lt;a href=&quot;http://www.arovaxshield.com/download/ashield_2_setup_90_w2k3.exe&quot; target=&quot;_blank&quot;&gt;Download Arovax Shield for Windows Server 2003!&lt;/a&gt; &lt;!--[if gte vml 1]&gt;&lt;v:shape id=&quot;_x0000_i1026&quot; type=&quot;#_x0000_t75&quot; alt=&quot;&quot; style=&quot;&#39;width:18.75pt;height:21.75pt&#39;&quot;&gt;  &lt;v:imagedata src=&quot;file:///C:\DOCUME~1\Notebook\LOCALS~1\Temp\msohtml1\01\clip_image001.gif&quot; href=&quot;http://forum.arovax.com/images/smilies/006.gif&quot;&gt; &lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://arovax.blogspot.com/feeds/7508484011616515708/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/16559108/7508484011616515708' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7508484011616515708'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/16559108/posts/default/7508484011616515708'/><link rel='alternate' type='text/html' href='http://arovax.blogspot.com/2007/01/arovax-shield-2190-beta-version-is.html' title='Arovax Shield 2.1.90 beta version is released!'/><author><name>Arovax</name><uri>http://www.blogger.com/profile/02158702416645733534</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>