• Best Hacking Forum
  • Best Blog Online


  • Sponsored Links

    For their broadband customers, that is. While not quite the "Free internet for everyone!" initiative that we'd like to see, it is certainly a boon to anyone with a Pro, Elite, or FastAccess account. But wait, there's more! AT andT phone customers without broadband access will be able to sign up for a low monthly fee of $1.99. The rest of the world is free to jump on as well, though they'll have to pony up $7.99/day for the privileged. Looks like it pays to be affiliated. Those that do sign on will be granted unlimited access to over 10,000 hotspots. While nowhere near as exhaustive as T-Mobile Hotspot coverage, AT andT has a decent footprint, and you can't beat free, can we?

    Labels: ,


    Read more!





    I had no option but to talk about the “hottest gadget” – The Apple iphone. Everyone is eagerly waiting to see how the iphone will leave its historical mark after Friday’s launch as there is a lot of hype about this gadget.

    The iphone has already shown the market that not just the body or the outward beauty of the handset counts, but what is inside is what is most important.

    The all-touch-screen device, which lacks a button keyboard, will force users to get accustomed to typing messages on a virtual keyboard instead of regular buttons. The gadget triples as a cell-phone, iPod media player and a wireless web device.

    There is nobody who doesn’t know about this product which hasn’t been launched yet. While some of them want to be the first to own the Apple iPhone and others fell that apple is packing too much into a phone and do not want to be an early adopter of this untested product!!

    The ultimate question is whether the gadget will be as revolutionary as Apple claims it to be? Well, we will have to wait and watch as to what happens.

    Labels: ,


    Read more!

    1. TROJ_GENERIC

    Malware Type: Trojan
    This is the Trend Micro generic detection for low-threat Trojans. It also installs itself as a browser helper object (BHO) by creating certain registry keys.

    2. ADW_CNSMIN.G

    Malware Type: Adware
    This adware arrives on a system via the Internet, or bundled with other applications. It does not have a valid End-User License Agreement (EULA).

    It is a plugin that can monitor or manipulate a user's Internet activity by adding itself in the Layered Service Provider (LSP). Like most adware, it generates pop-up avertisements.

    3. WORM_NYXEM.E

    Malware Type: Worm
    This worm propagates by attaching copies of itself to email messages that it sends to target addresses, using its own SMTP engine. Through this SMTP engine, it is able to easily send the email message without using other mailing applications, such as Microsoft Outlook.

    4. TROJ_GENERIC.Z

    Malware Type: Trojan
    This is the Trend Micro generic detection for low-threat Trojans.

    5. WORM_ANIG.A

    Malware Type: Worm
    This memory-resident worm propagates by dropping copies of itself in shared network drives. It steals login information and saves the obtained data in a file, which can be retrieved by a remote user. Its keylogger component substitutes the standard Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL) to carry out its information-stealing routine.

    6. POSSIBLE_INFOSTL

    Malware Type: Susupicious files
    This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known variants of the following spyware:

    TSPY_LEGMIR
    TSPY_LINEAGE
    TSPY_QQPASS

    7. HTML_NETSKY.P

    Malware Type: HTML
    This HTML malware arrives as an email with an executable file attachment that is detected by Trend Micro as WORM_NETSKY.P. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5 known as the Automatic Execution of Embedded MIME Type. This vulnerability causes Internet Explorer to automatically run executable file attachments in email messages.

    8. WORM_NETSKY.DAM

    Malware Type: Worm
    This is Trend Micro's detection for the damaged samples of WORM_NETSKY variants. It runs on Windows 95, 98, ME, NT, 2000 and XP.

    9. POSSIBLE_STRAT-2

    Malware Type: Susupicious files
    This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known STRATION variants.

    10. TROJ_HORST.HF

    Malware Type: Trojan
    This Trojan usually arrives as a file dropped by other malware or as a file downloaded unknowingly by a user when visiting malicious Web sites.
    Source: Trend Micro

    Labels: , ,


    Read more!

    Intel Game Demo Contest 2007

    • Mobile Game Competition
      Enter your game demo to the Intel® Game Demo Contest 2007. Win Prizes!
    Play the Intel's Game Contest @ Win

    Whts the prize to be Won...

    Between July 1 and Aug 1, 2007 every vote, combined with judges input, will help determine the 10 finalists in each category. Finalists will upload their demos and compete for $10,000 USD first prizes plus a Gateway computer, Garage Games Torque Game Engine, a full suite of Intel® Software Development Products

    Labels: , ,


    Read more!


    Contact Me

    Name: prethi
    Home: Banglore, Karnataka, India
    About Me: i wanna b a techie girly
    See my complete profile sivashankar2@thandora.com Page copy protected against web site content infringement by Copyscape
    sivashankar2@thandora.com

    Must Have Software






    Sponsored Links





    © 2006 Tech Noise--All About Technology