Tuesday, December 27, 2011

Camtica Screen recorder

http://jiteco.com/screen_recorder_software.html


Camtica enables you to create professional screen
recordings, presentations, tutorials and more. You can record any desktop
activity with voice, webcam and animated mouse clicks. The resulting video can
be saved in various formats including AVI and WMV.

Why do you need Camtica?
* To create professional screen recordings,
demonstrations, presentations, screencasts, tutorials and more
* To generate effective videos that help you train,
teach, sell and more
* To create demonstration videos for any software program
* To show customers how to use your product
* To create on-demand interactive training, tutorials for
school or college class
* To create a set of videos answering your most
frequently asked questions
* To share your recordings on YouTube, Screencast.com and
other videos sites

Features:
* Records entire desktop, selected rectangle region,
dynamic region around mouse cursor, webcam
* Records anything on the screen including windows,
objects, menus, full screen and rectangular regions
* Records desktop screen with audio and webcam together -
personalizing your videos by including a webcam movie of yourself over * your
desktop at any position
* Records video chats, Skype video calls, games, flash
movies played on sites
* Mouse highlighting spotlights the location of the
cursor
* Records video in many video file formats including AVI
and WMV
* Supports various video and audio codecs
* Free support and advice
* Free lifetime updates and upgrades
* System requirements: Windows XP/2000/2003/Vista/Windows
7

It’s easy to use as one, two, three.

You may get more information about Camtica 4.3.19848
here:
http://jiteco.com/screen_recorder_software.html

Here is a link to download Camtica 4.3.19848:
http://jiteco.com/download/camtica/camtica.exe

Here are links to screenshots of Camtica:
http://jiteco.com/images/camtica_select_area_dropdown_menu.png
http://jiteco.com/images/camtica_desktop_webcam.png
http://jiteco.com/images/camtica_custom_size_recording.png
http://jiteco.com/images/camtica_webcam_only_recording.png
http://jiteco.com/images/camtica_webcam_device.png
http://jiteco.com/images/camtica_countdown_recording.png

Friday, April 10, 2009

FYI--Conficker Awakens, Starts Scamming

posted from Network World
On Wednesday, April 8 security firms started seeing some variants of Conficker C, the latest Conficker flavor, receive updates through its encrypted peer-to-peer (P2P) file-sharing functionality. Security Firm Trend Micro reports that the new Conficker instructions came from a server in Korea and the new file was created on April 7, 2009 at 07:41:21. The new update strengthened Conficker's defenses and the new Conficker functions will shut down on May 3, 2009

See link for full story http://tinyurl.com/cr59aq

Thursday, February 26, 2009

Adobe Flash Susceptible to Booby-trapped Shockwave Files

Severity: High
26 February, 2009
Summary:
§ This vulnerability affects: Adobe Flash, 10.0.x and earlier, running on Windows and Linux computers
§ How an attacker exploits it: By enticing your users to visit a malicious web site
§ Impact: An attacker can execute code on your computer, potentially gaining control of it
§ What to do: Download and install the latest version of Adobe Flash Player
Exposure:
Adobe Flash Player displays interactive, animated web content called Flash, often formatted as a Shockwave (.SWF) file. Adobe's Flash Player ships by default with many web browsers, including Internet Explorer (IE). It also runs on many operating systems.
In a security bulletin released late Tuesday, Adobe warned of critical vulnerabilities that affect Adobe Flash 10.0.12.36 for Windows and 10.0.15.3 for Linux (as well as all earlier versions). Adobe's bulletin refers to five CVE numbers, which suggests that their update fixes five security vulnerabilities. However, the bulletin only highlights one flaw, which Adobe doesn't describe in much technical detail. They warn that if an attacker can entice one of your users to visit a malicious web site containing specially crafted Shockwave (SWF) content, he could exploit this unspecified vulnerability to execute code on that user's computer, with that user's privileges. If your Windows users have local administrator privileges, an attacker could exploit this flaw to gain full control of their PC.
While Adobe doesn't really describe this flaw in detail, iDefense -- the research team that originally discovered this flaw -- does. If you'd like to learn more technical details about this vulnerability, we recommend you read iDefense's advisory. Also, this is the same issue that we referred to in a recent WatchGuard Wire post. At the time of that post, iDefense's advisory referenced Adobe's Reader security bulletin rather than their new Adobe Flash bulletin.
Solution Path
Adobe has released a new version of Flash Player (10.0.22.87). If you use Adobe Flash in your network, we recommend you download and deploy this update as soon as possible.
If you still use Flash 9, and cannot upgrade to 10, Adobe also released Flash Player 9.0.159.0 to correct this issue. You can download that version here.
For All WatchGuard Users:
Some of WatchGuard's Firebox models allow you to prevent your users from accessing Shockwave Flash files (.SWF) via the web (HTTP) or emails (SMTP, POP3). If you like, you can temporarily mitigate the risk of this vulnerability by blocking .SWF files using your Firebox's proxy services.
Again, many web sites rely on Flash for interactive content, and blocking Flash prevents these sites from working properly. Note that many popular video streaming sites, such as YouTube and JibJab, deliver video using a Flash front end, so this technique may render many video web sites unusable.
If you choose to block Flash content, follow the links below for video instructions on using your Firebox proxy's content blocking features to block .SWF files by their file extensions:
§ Firebox X Edge running 10.x
§ How do I block files with the FTP proxy?
§ How do I block files with the HTTP proxy?
§ How do I block files with the POP3 proxy?
§ How do I block files with the SMTP proxy
§ Firebox X Core and X Peak running Fireware 10.x
§ How do I block files with the FTP proxy?
§ How do I block files with the HTTP proxy?
§ How do I block files with the POP3 proxy?
§ How do I block files with the SMTP proxy?
Status:
Adobe has released a Flash update to fix these vulnerabilities.
References:
§ Adobe Security Bulletin
§ iDefense advisory
This alert was researched and written by Corey Nachreiner, CISSP.
What did you think of this alert? Let us know at your.opinion.matters@watchguard.com.
More alerts and articles: log into the LiveSecurity Archive.

Tuesday, February 24, 2009

Zero Day Excel Vulnerability Spreading in the Wild

Summary:
§ This vulnerability affects: All current versions of Microsoft Excel for Windows and Mac computers (also affects Excel Viewer and Office Compatibility Packs)
§ How an attacker exploits it: By enticing your users into opening maliciously crafted Excel spreadsheets
§ Impact: An attacker can execute code on your computer, potentially gaining control of it
§ What to do: Implement the workarounds described in the Solutions section of this alert
Exposure:
Today, Microsoft released a security advisory warning of a very serious unpatched Excel vulnerability, which attackers have already begun exploiting on the Internet. The vulnerability affects all current versions of Excel for Windows and Mac, as well as the Microsoft Excel Viewer and the Office Compatibility Packs.
Since Microsoft just learned about this flaw, they don't describe it in much detail. They only describe how attackers exploit it. By enticing one of your users into downloading and opening a maliciously crafted Excel document (.xls), an attacker can exploit this vulnerability to execute code on a victim's computer, usually inheriting that user's level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the user's machine.
With attackers actively exploiting this vulnerability in the wild, it poses a critical risk to Microsoft Office and Excel users. Microsoft hasn't had time to patch the flaw yet, but they plan to do so in the future. Until then, we recommend you implement the workarounds described below to mitigate the risk of this dangerous zero day attack.
Solution Path
Microsoft has not had time to release a patch for this zero day vulnerability. However, the workarounds described below should mitigate the risk of attacks currently circulating in the wild.
§ Inform your users of this vulnerability. Advise them to remain wary of unsolicited Excel (.xls) documents arriving via email. If they don't absolutely need the document, and don't trust the entity it came from, they should avoid opening it until Microsoft releases a patch.
§ Use antivirus (AV) software and make sure it's up to date. Some AV companies already have signatures that detect these malicious Excel files. Other AV companies will surely follow.
§ Use the Microsoft Office Isolated Conversion Environment (MOICE) to open untrusted Excel document. MOICE is a Microsoft add on that provides a special environment which allows you to more securely open Word, Excel, and PowerPoint binary format files. For more details on using it, see the "Suggested Actions" section of Microsoft's security advisory.
§ Use a gateway device, like your Firebox, to block Excel files. If your users can't download Excel files, this exploit won't affect them. Unfortunately, doing this blocks legitimate Excel files as well. Nonetheless, depending on your business needs, you may still consider blocking Excel files until Microsoft releases a patch.
We will update this alert when Microsoft releases a patch.
For All WatchGuard Users:
Many of WatchGuard's Firebox models can block incoming Excel files. However, most administrators prefer to allow these file types for business purposes. Nonetheless, if Excel files are not absolutely necessary to your business, you may consider blocking them using the Firebox's HTTP and SMTP proxy until Microsoft releases a fix for this vulnerability.
If you decide you want to block Excel documents, follow the links below for video instructions on using your Firebox proxy's content blocking features to block .xls files by their file extension:
§ Firebox X Edge running 10.x
§ How do I block files with the FTP proxy?
§ How do I block files with the HTTP proxy?
§ How do I block files with the POP3 proxy?
§ How do I block files with the SMTP proxy
§ Firebox X Core and X Peak running Fireware 10.x
§ How do I block files with the FTP proxy?
§ How do I block files with the HTTP proxy?
§ How do I block files with the POP3 proxy?
§ How do I block files with the SMTP proxy?
Status:
Microsoft plans to release a patch for this vulnerability. Until then, implement the workarounds described above.
References:
§ Microsoft Security Advisory
This alert was researched and written by Corey Nachreiner, CISSP.

Monday, February 23, 2009

Zero Day Adobe Reader Vulnerability Makes PDF Files Dangerous

Severity: High
20 February, 2009
Summary:
§ This vulnerability affects: Adobe Reader and Acrobat 9 and earlier, on Windows, Mac, *nix computers
§ How an attacker exploits it: By enticing your users into viewing a maliciously crafted PDF document
§ Impact: An attacker can execute code on your computer, potentially gaining control of it
§ What to do: Implement the workarounds described in the Solutions section of this alert
Exposure:
Late yesterday, both the Shadowserver Foundation and Adobe warned of a critical, unpatched buffer overflow vulnerability that affects Adobe Reader and Acrobat 9 (and potentially all earlier versions) on any platform that can run them. The Shadowserver Foundation first discovered attackers actively exploiting this new vulnerability in the wild. Since Adobe just learned about this flaw, they don't describe it in much detail. They only describe how attackers exploit it. By enticing one of your users into downloading and opening a malicious PDF document, an attacker could exploit this unpatched buffer overflow vulnerability to execute code on your user's computer, with that user's privileges. If the user was a local administrator, then the attacker would gain complete control of that user's machine.
Since attackers are actively exploiting this vulnerability in the wild and Adobe hasn't had time to patch it yet, this flaw poses a serious risk to Adobe Reader users. According to their advisory, Adobe plans to release a patch for this vulnerability on Wednesday, March 11. Until then, we recommend you implement the workarounds described below to mitigate the risk of this dangerous zero day attack.
Solution Path
Adobe has not had time to release a patch for this zero day vulnerability. However, the workarounds described below should mitigate the risk of attacks currently circulating in the wild.
1. Inform your users of this vulnerability. Advise them to remain wary of unsolicited PDF documents arriving via email. If they don't absolutely need the document, and trust the entity it came from, they should avoid opening it until you patch Adobe Reader.
2. Use antivirus (AV) software and make sure it's up to date. Some AV companies already have signatures for these malicious PDF files. Other AV companies will surely follow.
3. Disable JavaScript in Adobe Reader. According to Shadowserver, disabling JavaScript in Adobe Reader prevents the current exploits from installing malware on your system. Reader may still crash, but the actual attack will not succeed. To disable JavaScript in Adobe Reader, click Edit => Preferences => JavaScript and then uncheck Enable Acrobat JavaScript. Keep in mind, this prevents JavaScript from running in legitimate PDF documents as well.
4. Use a gateway device, like your Firebox, to block PDF files. If your users can't download PDF files, these exploits won't affect them. Unfortunately, doing this blocks legitimate PDF files as well. Nonetheless, depending on your business needs, you may still want to block PDF files until March 11.
We will update this alert when Adobe releases a patch on March 11.
For All WatchGuard Users:
Many of WatchGuard's Firebox models can block incoming PDF files. However, most administrators prefer to allow these file types for business purposes. Nonetheless, if PDF files are not absolutely necessary to your business, you may consider blocking them using the Firebox's HTTP and SMTP proxy until M arch 11.
If you decide you want to block PDF documents, follow the links below for video instructions on using your Firebox proxy's content blocking features to block .pdf files by their file extension:
§ Firebox X Edge running 10.x
§ How do I block files with the FTP proxy?
§ How do I block files with the HTTP proxy?
§ How do I block files with the POP3 proxy?
§ How do I block files with the SMTP proxy
§ Firebox X Core and X Peak running Fireware 10.x
§ How do I block files with the FTP proxy?
§ How do I block files with the HTTP proxy?
§ How do I block files with the POP3 proxy?
§ How do I block files with the SMTP proxy?
Status:
Adobe will release a patch on March 11. Until then, implement the workarounds described above.
References:
§ Adobe Security Bulletin
§ Shadowserver Foundation advisory
This alert was researched and written by Corey Nachreiner, CISSP.

Friday, January 23, 2009

Internet Storage Sites

Here are a few sites to look at. They allow you to store data on the internet on secure virtual space.

Nice place to store files, photos, our outlook.pst file. I also have external drives to save data to, but some times I do not bring "all" my software with or certians; so now I can upload them to a virtual storage site for free...they do have size restrictions, but I have found some that give you 1, 2, 5, ...up to 50 gigs free of storage space

Here are some of the sites I have found:

http://www.adrive.com/ (50 gigs free); you can upload up to 2 gigs at a time

http://www.idrive.com/

www.Mozy.com

www.4shared.com/