Archive for September 26, 2011

Access control solution to floppy, CD-ROM, USB and other mobile devices.

DeviceLock will allow network administrators to control which users can access the system’s devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week.

DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device’s buffers. Remote control is also available.

Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside.

Here are some key features of “DeviceLock”:

· Control which users or groups can access USB and FireWire ports, WiFi and Bluetooth adapters, PDAs, CD-ROMs, floppy drives, other removable devices
· Control access to devices depending on the time of day and day of the week
· Authorize only specific USB devices that will not be locked regardless of any other settings
· Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)
· Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock has otherwise blocked the DVD/CD-ROM drive
· Protect against users with local administrator privileges so they can’t disable DeviceLock Service or remove it from their computers, if they are not in this list of DeviceLock administrators
· Set devices in read-only mode
· Protect disks from accidental or intentional formatting
· Detect and block hardware keyloggers (USB and PS/2)
· Deploy permissions and settings via Group Policy in an Active Directory domain
· Use the standard Windows RSoP snap-in to view the DeviceLock policy currently being applied, as well as to predict what policy would be applied in a given situation
· Control everything remotely using the centralized management console
· Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log that stores locally and/or in the special protected log that sends to DeviceLock Enterprise Server for centralized storage
· Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM) and transferred via COM and LPT ports
· Store shadow data and audit logs on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure
· Generate a report concerning the permissions and settings that have been set
· Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected
· Install and uninstall it automatically.

Requirements:

· 64 MB RAM
· 4 Mb disk space

Limitations:

· 30 days trial
· nag screen

What’s New in This Release: [ read full changelog ]

A Norman program utility that may be used to detect and remove specific malicious software

Norman Malware Cleaner is a Norman program designed to remove malware from your computer.

Note that it should not be used as a substitute for running normal proactive antivirus protection, but rather as a reactive tool to handle systems that are already infected.

By downloading and running Norman Malware Cleaner it will clean an infected system completely:

– kill running processes that are infcted
– remove infections from disk (including ActiveX components and browser helper objects)
– reveal and remove rootkits
– restore correct registry values
– remove references created by malware in hosts file
– remove windows firewall rules for malicious programs

NOTE:
This tool will not work in Windows Safe Mode. Please run Windows in Normal Mode.

Here are some key features of “Norman Malware Cleaner”:

· Easy to install and run
· Detect and Remove malware (viruses, Rootkit’s, FakeAV, worms and more)
· Utilize advanced Anti-Rootkit technology
· Quarantine module to process the detected files
· Deep scan and cleaning including Norman patented Norman SandBox technology
· Supports Quick- and Deep Scan mode
· New command line function for better tailor scanning across several machines (businesses)
· Daily signature updates available

Counter-Strike 1.6

Posted: September 26, 2011 in ╰» gαмєѕ
Tags:

Counter-Strike 1.6 is a MOD for Half-Life that is set in a teamplay mode

Play the world’s number 1 online action game. Engage in an incredibly realistic brand of terrorist warfare in this wildly popular team-based game. Ally with teammates to complete strategic missions.

Take out enemy sites. Rescue hostages. Your role affects your team’s success. Your team’s success affects your role.

There is only one outcome in each scenario and you will have to prove your allegiance every time you pull the trigger.

Note: This is a Steam installer, which means you need a valid copy of Half-Life/Counter-Strike. The Half-Life/Counter-Strike package can be bought via Steam for 9.99.

Requirements:

· OS: Windows 2000/XP/Vista
· CPU: 800 MHz
· RAM: 128 MB
· Video: 32 MB
· Mouse
· Keyboard
· Internet Connection

FOR STEAM

 

 

 

 

 

FULL GAME

First of all thanks goes to PNHT team who maid this possible.

Let’s go!

1. install UMU*Hack.sisx. After installing application will be launched.
2. Accept connection ask (you can use WiFi)
3. Accept trial key
4. Accept license
5. Select Yes
6. Select No, then OK
7. Select Ok ->Enter 123 -> Retype 123
8. Press Options -> Anti-Virus
9. Go to Quarantine
10. Options – Restore – Press Yes
11. Back -> Home -> Exit -> Uninstall UMU Mobile Security
12. Enter 123 password for uninstallation
13. Install RomPatcherPlus_3.1.sisx->Launch it -> Apply Open4all -> You get full access to all folders
14. Apply installserver . You can install any applications without signing.

HOPE YOU YOU UNDERSTOOD IF NO ASK ME IN COMMENTS I WILL HELP YOU…!!!

DOWNLOAD UMU HACK FOR SONY PHONES

DOWNLOAD UMU HACK FOR NOKIA MOBILES

DOWNLOAD ROMPATCHER 3.1 FOR BOTH NOKIA & SONY PHONES

both a VALID key and the XP SP3 update have been integrated into the cd..

make sure that in ur bios settings, the boot order is first cd and then hdd

-----DRIVERS-----

drivers not included... get them from the "drivers cd" that came w/ ur computer 
AND/OR go to the following links

i recommend downloading the drivers from the internet b/c the cd probably 
has outdated drivers and stuff

----COMPUTER MANUFACTURER (these USUALLY have very crappy/outdated drivers for graphics/video 
----cards and other pieces of important hardware, but the links are good for identification of your 
-----computer's hardware at least..)

dell           http://support.dell.com/support/downloads/

hp             http://welcome.hp.com/country/us/en/support.html

asus           http://support.asus.com/download/

ibm/lenovo     http://www-304.ibm.com/systems/support/pc/

----GRAPHICS/VIDEO CARD

nvidia         http://www.nvidia.com/Download/index.aspx

ati            http://ati.amd.com/support/driver.HTML

omega (3rd party nvid/ati drivers that work better for gaming)
               http://www.omegadrivers.net/omega_drivers.php

----INTEL
  http://downloadcenter.intel.com

YOU NEED DRIVERS SO THAT UR COMPUTER CAN EFFECTIVELY UTILIZE ITS HARDWARE

“Hey fella’s this is a torrent file so you need torrent clients to download the file. burn the downloaded file using power iso or other burning tools and boot it.”

DOWNLOAD THIS TORRENT