Speak ASIA: BUSTED Here is proof ?


The company name is: SpeakAsia Online Pte Ltd.formerly known as : Haren Technology Pte. Ltd.formerly known as: PAN Automotives Pte. Ltd.(Compliance rating for this company is Non Compliant currently)Prior to this name they were operating under:
 HAREN VENTURES PTE. LTD.
f.k.a HAREN AUTO PARTS PTE. LTD.
f.k.a HAREN MULTICONSULT TRADE SERVICES PTE. LTD.


Source: www.psi.gov.sg

I asked one of my CA friend that how frequently a company change it names and he said its very less and not done so frequently. There are 2 more companies with the same name whose status is either Cancelled or Terminated and again they keep changing their company name:

HAREN AUTO & HEAVY EQUIPMENTS
f.k.a HAREN AUTOMOTIVES & COMPONENTS And
 HAREN MULTICONSULT TRADE SERVICES




And there is a defunct website too: http://www.hmtservices.com/ where we can find the products they were dealing before starting this business which is no where related to online surveys or dotcoms. Check out the page http://www.hmtservices.com/sparts.htm  (probably they didnt had an active webmaster or the designer left work half complete due to several reasons)

b) When doing little more research on the address of the company the same address is used for different companies. A simple Google can throw a few names which I am listing below. Some of the companies having the same address are:

Valves.Com Pte Ltd
http://imageshack.us/m/573/8770/valves.jpg

SBS Consulting Pte. Ltd.
http://imageshack.us/m/805/5417/sbsgroup.jpg
http://img19.imageshack.us/img19/3762/unledrh.jpg ---> thanks metiz for the image

c) The company has a franchisee model so at the face of it you are not paying anything directly to the company "Speak Asia" and it goes in the name of the franchise (bank account) and who further pass that money to someone in Mumbai and all get to keep a certain % out of it. If its such a big company they should provide an option to pay online through credit card directly to them instead of making so m
d) If you watch YouTube for their Torch Bearers 2011 meet they are talking about opening a TV Channel by August 2011. Very nice and ambitious plan but doesnt it require a lot of regulatory processes and time and huge "money". But the ground reality is that they dont have a single registered office in India. There are claims that it will be open in May 2011 in Mumbai.

e) I found it amusing that they were using a hosted software at SurveyMonkey as their survey tool and only recently purchased Novi Survey. If its an established proven business with multi million dollars in revenue they should have built the survey system completely inhouse on which their entire business model works.

f) They claim they are established in Singapore / Malaysia / Indonesia but after doing a lot of research I didnt find enough evidence that proves that they are getting enough traffic from any of these countries to prove their claim. They are mainly in India and Bangladesh only.

i) Well many do beleive its a great opportunity and many feel its like a Ponzi scheme. If its the latter then how the whole thing works and how long it will last:

Well if we assume that company is not making money much out of these surveys and just running a ponzi scheme where the going is good till the flow of incoming people is great and keeps paying the subscribers them their own money and the new people who joined this affair. How will that work out:

For the first three month it is actually just paying out your own money back. So for the company there is always a buffer time of 3 months for the people to even realize how they have been gamed / duped. To keep the ship sailing they need to double their signups every quarter which is luckily happening for them SmileSo that they can pay the earlier and current customers from that money and keep some money for advertisement to maintain their signup targets.
So what will happen once the company falls short of their target of adding more people to its subscribers list?

 The first thing will be that there will be a rate cut in the surveys. Secondly we see less frequent surveys and at the end there will be hardly any surveys. The company is liable to pay only when you participate and fill the survey and as an user you cant sue the company as they are not liable to pay anything to you in the event there are no surveys. The initial 11,000 (which is soon going to be 15000) is towards the E-Zine so you continue to get that E-Zine
What happens when the company stops Surveys or doesnt pay?

Well nothing can be done due to the following reasons:



  • The main company is registered in Singapore so to recover 11000 hardly anyone will travel to Singapore to file a case against them in Singapore Court.
  • The company is selling you E-Zine and you have paid 11000 towards that and not towards the Survey. Your payment of Rs.1000 / 2 surveys is toward the Surveys you fill. So on that ground too the company is safe.
  • Lets assume something goes wrong and the Indian authorities goes after this whole scheme and in that case the company can easily bail themselves out saying they have not recieved any money from them cause none of the payments is made in their name rather its in the name of the Franchisee who are paid a certain % to forward that to the main distributor and who further pass it to someone else. So the person you can only catch is the person to whom you made the payment. But sadly the problem is that even that person is the victim of this whole scheme.
  • Yes one do receive a online reciept for the money that one pays from Speak Asia and here is the screenshot. Earlier it was given from "Online Surveys Today" which I doubt that any such company even exists though the address was same as SpeakAsia Online Pte. Ltd. and later it is changed to Haren Ventures Pte. Ltd. but they changed the address to a new address.
So how can someone run such a huge thing without anyone noticing it:

This is India and anything is possible. We easily believe in such schemes and are really fond of such online money making schemes.
 I leave the discretion of whether its an opportunity or a scam or something else on the readers to decide.
 Well when we search the internet there are several bloggers who have voiced their opinion on whether it is some scam or an opportunity but they all have been bombarded by comments of people who have all the reasons to believe its a genuine scheme and do not want anyone to distrupt the ongoing party.Well till the point every one is getting paid who really cares what goes behind the scene.  But we feel its important for us to ask some questions if we have reasons to believe that it CAN be scam in the making. 


If you all feel that this story is worth sharing please share it with all your friends and on Social Networks and this might help us spread more awareness about this.

 Working on orkut security, I know that fraudulent sites sometimes try to take advantage of orkut users like you and me. To help make sure that everyone is able to have a fun and safe experience on the site, I thought I'd share a few quick tips that I've picked up during my time on the orkut team. A bunch of these might seem like no-brainers, but hopefully you'll learn something new here as well:
  • Create a tough password: While "yourname123" is always a tempting password to create, keep in mind that it's just as easy for a malicious user to figure out as it is for you to remember. Try creating a password that involves a combination of letters and numbers that no one could easily guess, even if they know basic details about who you are. The same goes for your security question (the question that pops up if you forget your password)– you should try your best to pick a question that only you can answer.
  • Keep your private details private: Never share your orkut username and password with friends or on a site not authenticated by Google. orkut does not allow any external sites to store orkut login information and will never request that you enter it anywhere outside of the orkut login page. To be on the safe side, always check that your address bar reads "https://www.google.com/accounts/ServiceLogin?....." and nothing else when sharing your orkut user name and password.
  • Leave the coding to the engineers: Never copy and paste code into your address bar, no matter what it claims to be able to do. Typically these scripts actually send messages (in your name!) to your friends trying to trick them into giving up their personal information.
  • Downloads and orkut don't mix: Never download any file off of orkut, especially those that end in '.vb' or '.exe'. These files are often viruses that can infect your computer and start sending thousands of spam messages on your behalf. Sites offering special orkut themes or skins are particularly risky.
  • Think twice about external links: Links to sites outside of orkut that appear in scraps or posts have not been verified by the orkut team, and could lead you to harmful sites. We'd recommend only clicking on links that go to trusted sites or those that are from other orkut users you know well.
  • Anti-Virus software is always a good call: Even the most conscientious orkuteer can fall victim to a phishing attack, so it's important to always be alert and prepared. Regularly scanning your computer with updated anti-virus software is a great way to keep your computer secure.
  • For new orkut features, check out apps!: Sometimes an unofficial site may claim to offer special orkut features, but these sites are known for taking over orkut accounts and directly violate our Terms of Service. If you're looking for fun new orkut functionality, check out the thousands of applications that we have available. All of these apps have been built by talented developers according to standards that we believe will help to keep you safe online. If you haven't visited the app directory recently, take a look– you might be surprised at how much cool stuff you find.

via orkut blog 

Orkut Virus(BOM SABADO)

 Now a days orkut became a soft target of hackers and virus(like BOM SABADO) this is because orkut has huge network where he(virus(BOM SABADO),hackers) can spread easily.One more thing why orkut,this is because orkut members belongs to each section of society like professionals and non-professionals,young guys and child(from 8 to15).business man and technical expert behined this lot of guys dont know how set security and privacy on profile,some guys yet dint know why  they will set security level,they came on orkut for enjoyment or nothing else what ever you will post his scarpbook they will click what they will get or lost on click this not matter for him,hackers and virus(BOM SABADO) make him target first after that they spreading his infected content on network.BOM SABADO is one of the virus.Here sintuhack try to expalin about---.
  1.What is Bom Sabado
   2.How Bom Sabado virus attacked or Hacked Orukt users?
   3.What to do if my Orkut account has been hacked by Bom Sabado Virus?                                                                        
What is Bom Sabado?
In Portuguese language Bom Sabado means ‘Good Saturday’. But it was really a very bad Saturday for most of the Orkut users as this Bom Sabado virus hacked the user accounts of many Orkut users, mostly of India and Brazil. Portuguese is the also the official language of Brazil. So the Virus was mostly targeted on Brazilian users.
How Bom Sabado virus attacked or Hacked Orukt users?
Orkut users affected by Bom Sabado virus are automatically posting virus scraps on the other orkut users’ scrapbook and also adding them to new Orkut groups. Within a short period of time this virus was spread to the accounts of many Orkut users. You don’t need to click any links to be infected by this Virus, but a near watching of an infected orkut profile or scrapbook with Bom Sabado virus is more than enough to get your account hacked.
What to do if my Orkut account has been hacked by Bom Sabado Virus?
If you found that your Orkut account has been hacked:---
Do not login Orkut from PC at this time.
Clear cache, cookies and history from web browser
Login Orkut by visiting http://m.orkut.com/ only from your mobile phone.
Revert your theme/style back to the old Orkut layout
Delete all the scraps with the message ‘Bom Sabado’
Un-join from Brazilian communities if you have any doubts on them.
Change your Orkut account password
Logout from Orkut
Have a coffee and relax
How to stay safe from Bom Sabado Orkut Virus?
The best thing to be stay safe from this new orkut virus Bom Sabado is not to login orkut, till Orkut team has fixed this security loophole.
Do not tell your friends to login orkut till Orkut team has fixed this.
Spread this article to all your Orkut friends through email, facebook, twitter etc and help them to be stay safe from this new Orkut vulnerability.

Orkut Auto Scrap Virus Security


Orkut is getting targeted by a new Brazilian scrap virus, the virus infects users on clicking of the scrap message claiming to show some kind of video but it contain some exe file wich will be install  in your system on click.So Please dont Click simply delete this scrap.If you have clicked by mistake please follow following steps and uninstall this exe
This virus that claimes to be a video is a .exe file which infects users computer and sends the same scrap to all your friends on Orkut, the virus installs "orkutkut exe" and "imglog exe" on the infected computer, the virus can easily be disabled by following the steps below:
1.Kill both("orkutkut exe" and "imglog exe") the process from the 2.task manager (CTRL+SHIFT+ESC).
3.Remove startup entries using msconfig exe
4.Delete the two above mentioned files from system32 folder.
To secure yourself from such threats never click on unknown links in your scrapbook.!!!!HAPPY ORKUTING

How to Get Rid of a Computer Virus

Computer viruses come in many forms and can cause various kinds of damage to your system. Fortunately, most viruses are easily dealt with and effective methods for eliminating them are often developed as soon as the viruses are discovered. If you think your computer may be infected, take any necessary steps to clear your system and avoid infecting other computers.
Instructions
1.Visit your virus-scan software manufacturer's Web site and install any virus updates that are available. Then run the software. The software may not be able to delete the virus, but it may be able to identify it.
2.Search the Web for information regarding your specific virus by typing the name of the virus or its associated file into a search engine followed by the word "virus." For example, "Melissa virus," "BubbleBoy virus," etc.
3.Download and install any patches or other programs that will help you eliminate the virus. Or follow any instructions you find on deleting the virus manually.
4.Run another virus scan to make sure the virus has been dealt with properly.
Tips & Warnings
If you think your computer was affected with an e-mail virus that mails itself to people in your e-mail address book, contact those people and tell them not to open the messages or attachments.


-Web based email usually has built in virus scanning so viruses never reach your machine.


-Generally, deleting the file that caused the virus isn't sufficient to eliminate the problem, since many viruses can create new files or corrupt existing files. Your best bet is to use anti-virus software or specific online instructions.


-Avoid sending out any e-mails until you have properly eliminated the virus. Many viruses can attach themselves to outgoing messages without your knowledge, causing you to unwittingly infect the computers of your friends and colleagues



Mobile Physical Security: How Anti-theft Software Works- part II


Here is the another list of mobile physical security providers.
  we had tried our best to provide the whole common list if any suggestion please post in comments 

OVI Suite.

The world's largest mobile phone maker company NOKIA Corporation also provide online data
backup through its OVI suite.
Through OVI synchronisation you can upload your contacts data in Nokia Server. To store your datain Nokia server you need to make a free OVI account and go to contacts. Here you can see your
contacts which is synchronised from your mobile. You can also manage your account like Delete
contact, Add contact, Details etc.
So if you are a Nokia user then use this free Nokia tool to avoid stolen of your personal contact/datawith your mobile.


NetQin Mobile Inc.

 NetQin was one of the first companies to recognize the growing security threats targeting 
smartphone users and is now a leading Software-as-a-Service (SaaS) provider, serving both greater 
China and global clients. The company focuses on serving clients in three key sectors: 1) mobile 
security,
It works on your Android, BlackBerry, Symbian, Windows Mobile, Java phone etc.This is a free software with some limited functionality, In free version M guard you can filter calls,manage your applications/File/ Web etc. You can also optimised your mobile performance.

RSEVEN:

Rseven is a lifecache service where it can preserve all your daily activities as recorded by your mobile phone.
It can record your incoming and outgoing voice calls made from your mobile, stores your recorded voice, SMS,Calender, Contacts online and when you need that data then you may restore it from rseven.This is a free tool from rseven with limited space, But if you need more space then you have to purchase it online.

WAVESECURE:

It ensures privacy in the event of theft and enhances the possibility of recovering yourAndroid, BlackBerry, Symbian, Windows Mobile, Java phone. WaveSecure comes pre-installedWaveSecure is the complete mobile security service, that protects data on your phone,With some phone but if you not have pre-installed then you may buy it online for your phone.

Denial Of Service (DoS) Attacks

A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-

1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).
example:- c:/>ping -l 65540 hostname
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.

2) Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another. Rather than sending the entire chunk in asingle packet, the data is broken down into smaller packets as given below:
* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.
In teardrop attack, however, the data packets sent to the target computer contais bytes that overlaps with each other.
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)
When the target system receives such a series of packets, it can not reassemble the data and therefore will crash, hang, or reboot.
Old Linux systems, Windows NT/95 are vulnerable.

3) SYN - Flood Attack :- In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems' memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.

4) Land Attack :- A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target sysetm itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.

5) Smurf Attack :- There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.
Smurf Attack Result:- Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable, i.e. clogging the network and preventing legitimate users from obtaining network services.

6) UDP - Flood Attack :- Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.

How Computer Viruses / Malware Attack?

Computer users are facing all sorts of security threats these days, computer viruses, computer worms, hackers, phishing, spyware.  Almost every computer is challenged by more than one type of malicious attack each day.  Knowing how these malicious programs spread and work can help you avoid potential damage to your computer.
How Malware Attack

Computer viruses, worms, and Trojan horses are collectively known as malware.  They spread on the internet via email, instant messages and file sharing.  Computer viruses need a host program to run whereas computer worms are self-contained.  Both can replicate and spread in enormous rate over the internet.

Computer viruses usually cause damage to boot sector, system BIOS, software or data files.  Your system may fail to start, legitimate programs cannot run and data files are lost or corrupted.

Computer worms are usually designed to spread automatically via email program, causing major disruption of internet traffic.  Some worms can create back door to allow authorized access to your computer.

Trojan horses usually do not replicate, they appear as some innocent programs, such as free games or free screensavers.  This tricks you into downloading and running the Trojan horse.  Trojan horses can open a back door, disable antivirus program and allow the download of other malware.
How Hackers Attack

Hackers are computer users who explore networks and computers, looking for vulnerabilities and infiltrate your system without your knowledge and permission. Some people argue that hackers may not have malicious intent, they are just curious about how computer network works.  Nevertheless, unauthorized access to someone’s computer or network is not a moral act.

Malicious hackers gain access to your computer via different ways.  For examples, hackers may use keystroke logger to record your every stroke, giving them enough information to infiltrate your system.  They may hack your password by generating different combinations of numbers, letters and symbols.  Hackers also search for unprotected network or enter your system via a back door installed previously by other malware.
How Spyware Attack

Spyware are usually downloaded from web sites, email messages, instant messages or file sharing network.  Some legitimate programs may install spyware in your computer when you accept the End User License Agreement.  Spyware does exactly what its name suggests: it spies on you by collecting personal or sensitive information or tracking your browsing and shopping habit.  Some spyware programs can change your web browser's home page or install additional components to your browser without your consent.

Spyware can result in identity theft, computer slowdown and slow internet access.  Spyware should not be confused with adware.  Adware is a program that displays advertisements, usually in the form of pop up ads.  Strictly speaking, adware is not spyware if no personal information and browsing habit is collected.  It is a way for some software developers to reimburse their development cost by providing freeware to their customers.
How Spam Attack

Email spam is the electronic form of junk mail.  Most spam messages are unsolicited advertising sent to a large number of recipients.  Spam messages are not only annoying, some of them are dangerous.  Some spam messages are used to deliver Trojan horses, viruses, spyware or links to offensive web sites with inappropriate content.

A new form of spam message is used to launch phishing attack.  Phishers, pretending to be legitimate companies such as banks, financial institutes, PayPal, send out spam messages to a large number of recipients.  They usually use scare tactic and ask you to update your personal information (login ID and password, account information, etc) immediately or your account will be suspended.  Once you click on the link provided in the spam messages, you would land on phish sites which look remarkably similar to the legitimate company web sites where the phishers will steal your personal information.

Now that you know how malware, spyware, hackers and spam attack your computer, you can be more proactive in your defense.  Be careful of free download, free scan, email attachment, file sharing and don’t click on the hyperlink of spam messages.  Read the End User agreement carefully when you install any software.  Keep track of unusual inbound and outbound internet activities.  If you do all of these and install an all-in-one internet security program (antivirus, antispyware, firewall, spam control), you should be pretty safe from these malicious attacks.

How to remove a computer virus and spyware.

Symptoms that may be the result of ordinary Windows functions
A computer virus infection may cause the following problems:

    * Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
    * Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
    * The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
    * The computer runs very slowly. Additionally, the computer takes longer than expected to start.
    * You receive out-of-memory error messages even though the computer has sufficient RAM.
    * New programs are installed incorrectly.
    * Windows spontaneously restarts unexpectedly.
    * Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
    * A disk utility such as Scandisk reports multiple serious disk errors.
    * A partition disappears.
    * The computer always stops responding when you try to use Microsoft Office products.
    * You cannot start Windows Task Manager.
    * Antivirus software indicates that a computer virus is present.

Symptoms of a computer virus

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:

    * The computer runs slower than usual.
    * The computer stops responding, or it locks up frequently.
    * The computer crashes, and then it restarts every few minutes.
    * The computer restarts on its own. Additionally, the computer does not run as usual.
    * Applications on the computer do not work correctly.
    * Disks or disk drives are inaccessible.
    * You cannot print items correctly.
    * You see unusual error messages.
    * You see distorted menus and dialog boxes.
    * There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
    * An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
    * An antivirus program cannot be installed on the computer, or the antivirus program will not run.
    * New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
    * Strange sounds or music plays from the speakers unexpectedly.
    * A program disappears from the computer even though you did not intentionally remove the program.

Note These are common signs of infection. However, these signs may also be caused by hardware or software problems that have nothing to do with a computer virus. Unless you run the Microsoft Malicious Software Removal Tool, and then you install industry-standard, up-to-date antivirus software on your computer, you cannot be certain whether a computer is infected with a computer virus or not.

Symptoms of worms and trojan horse viruses in e-mail messages
When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:

    * The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
    * A copy of the infected file may be sent to all the addresses in an e-mail address list.
    * The computer virus may reformat the hard disk. This behavior will delete files and programs.
    * The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
    * The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
    * You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
    * Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

What is Spyware?
Spyware can install on your computer without your knowledge. These programs can change your computer’s configuration or collect advertising data and personal information. Spyware can track internet searching habits and possibly redirect web site activity. 

Symptoms of Spyware
When a computer becomes affected by Spyware, the following may result:

    * Slow internet connection.
    * Changing your web browser’s home page.
    * Loss of internet connectivity.
    * Failure to open some programs, including security software.
    * Unable to visit specific websites, which may include redirecting you to another one.
How to remove a computer virus and spyware.
Even for an expert, removing a computer virus or spyware can be a difficult task without the help of computer malicious software removal tools. Some computer viruses and other unwanted softwarereinstall themselves after the viruses and spyware have been detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software.

To remove a computer virus and other malicious software, follow these steps:

Install the latest updates from Microsoft Update:

   1. For Windows Vista and Windows 7:
         1. Click the Pearl (Start) button, then type Windows Update in the search box.
         2. In the results area, click Windows Update.
         3. Click Check for Updates.
         4. Follow the instructions to download and install the latest Windows Updates.
   2. For Windows XP:
         1. Click Start, then click Run.
         2. Click the Automatic Updates tab and hoose the Automatic (recommended) option.
         3. Click OK.

Symptoms of a computer virus

A computer virus infection may cause the following problems:

    * Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
    * Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
    * The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
    * The computer runs very slowly. Additionally, the computer takes longer than expected to start.
    * You receive out-of-memory error messages even though the computer has sufficient RAM.
    * New programs are installed incorrectly.
    * Windows spontaneously restarts unexpectedly.
    * Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
    * A disk utility such as Scandisk reports multiple serious disk errors.
    * A partition disappears.
    * The computer always stops responding when you try to use Microsoft Office products.
    * You cannot start Windows Task Manager.
    * Antivirus software indicates that a computer virus is present.
 

Symptoms of a computer virus

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:

    * The computer runs slower than usual.
    * The computer stops responding, or it locks up frequently.
    * The computer crashes, and then it restarts every few minutes.
    * The computer restarts on its own. Additionally, the computer does not run as usual.
    * Applications on the computer do not work correctly.
    * Disks or disk drives are inaccessible.
    * You cannot print items correctly.
    * You see unusual error messages.
    * You see distorted menus and dialog boxes.
    * There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
    * An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
    * An antivirus program cannot be installed on the computer, or the antivirus program will not run.
    * New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
    * Strange sounds or music plays from the speakers unexpectedly.
    * A program disappears from the computer even though you did not intentionally remove the program.

Note These are common signs of infection. However, these signs may also be caused by hardware or software problems that have nothing to do with a computer virus. Unless you run the Microsoft Malicious Software Removal Tool, and then you install industry-standard, up-to-date antivirus software on your computer, you cannot be certain whether a computer is infected with a computer virus or not.

Symptoms of worms and trojan horse viruses in e-mail messages
When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:

    * The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
    * A copy of the infected file may be sent to all the addresses in an e-mail address list.
    * The computer virus may reformat the hard disk. This behavior will delete files and programs.
    * The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
    * The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
    * You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
    * Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

What is Spyware?
Spyware can install on your computer without your knowledge. These programs can change your computer’s configuration or collect advertising data and personal information. Spyware can track internet searching habits and possibly redirect web site activity.

Symptoms of Spyware
When a computer becomes affected by Spyware, the following may result:

    * Slow internet connection.
    * Changing your web browser’s home page.
    * Loss of internet connectivity.
    * Failure to open some programs, including security software.
    * Unable to visit specific websites, which may include redirecting you to another one.

How to remove a computer virus and spyware.
Even for an expert, removing a computer virus or spyware can be a difficult task without the help of computer malicious software removal tools. Some computer viruses and other unwanted softwarereinstall themselves after the viruses and spyware have been detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software.

To remove a computer virus and other malicious software, follow these steps:
Computer viruses: description, prevention, and recovery

Mobile Physical Security: How Anti-theft Software Works


Mobile Physical Security

In the presence of google and facebook , iphones and mobiles became more important component of life as these things are now widely accessed  by these gadgets. As its importance increased, mobile security concerns also increased and the people are more searching for better security products. They are using antiviruses and antispyware for the software security but the physical security is also importance because your data can also be lost due to lost of your mobile.
So todays sintuhack Is going to describe about physical security of mobile phone and will explain about some antitheft software and their working procedure so that you can able to secure your mobile . This is a part of mobile physical security or you can say physical mobile security.

mGuard   

This is a free java application which is available for Sony Ericsson mobiles
till may of this year. This only tracks for any kind of sim-card change in your mobile
and sends a sms to user predefined numbers. It can be downloaded via internet as well as can be transferred from computes via Bluetooth or data cables. This is a free antitheft software but you have to go its website (Vapssky.com)and register your mobile with its IMEI number to use it.

Find My iPhone
As per name it’s free software for recovering iPhones, but only available for iPhone 4 running iOS 4.2 directly. Other iPhone users can access it via Mobile ME subscription service. Its unique feature is that you can monitor it from web(Me.com) as well as from any other iPhone where this application is installed. This software also provides other facilities like locking phone or displaying text message or raising a finder alarm.  You can also backup your all data remotely by using this and make you phone to restore it as factory level settings.

RoboLock

This is also a product of Vapssky.com but this is made for blackberry mobiles and runs on BlackBerry OS 4.2 and above. But it only supports Tour, Storm, Bold and 8xx models. The main advantage fo this is that you can remotely acesss you phone via email web or even via sms and then you can track its location on goggle map , recover your contacts or delete your data.you can also  lock it remotely and raise a finding alarm which only be stopped when you unlock it

RecoveryCop
"
RecoveryCop" is made for Windows Mobile 6.x Devices and it’s a real time mobile physical security provider. This works like James bond and don’t leave any clue behind its working space so it’s completely untraceable by an unknown user of your mobile.it can record all the text messages send  by stolen mobile. You can also take a call from this mobile and via its microphone you can hear the sound of surroundings .all other features are also available for this.

Yet the technology is its child stage as it is still unable to deliver complete mobile physical security provider software which can work for all type of mobiles and iPhones. The main hurdle behind this is the presence of different mobile makers and the lack of collaboration between them. So wait for that day when this will available and till then use different software as per your vendor

Cross site scripting


Cross site script is most common web attack.it basically attacks on application layer of web.
.its basically hits html and javascipt.
  cross site scripting arises when web application take data from form of site and include in it
web page without properly validating the data.XSS vulnerabilities allow an attackers to execute arbitrary commands and display arbitrary content in a victim users browsers. when XSS attacks became a successful attack it take control of victim browser or victim web application.  the potency of an XSS attack lies in the fact that thr malicious code executes in the context of the victim's session,allowing the attackers to bypass normal security restriction

Types of Cross Site Scripting Attacks :-

Reflective Cross Site  Scripting :-
 
In this XSS attacks attacker send the victim a misleading mail with the link containing malicious
javascript,if the victim click the link ,the http request is intiated  from the victim browsers
 and sent to the vulnerable web application.Thw malicious javascript is then reflected back to the victim's browsers,where it is executed int the
context of  of victim users session
 

Persistent Xss

Consider a Web application that allows users to enter a user name which is displayed on each user’s profile page. The application stores each user name in a local database. A malicious user notices that the Web application fails to sanitize the user name field and inputs malicious JavaScript code as part of their user name. When other users view the attacker’s profile page, the malicious code automatically executes in the context of their session.