gHacks Technology News - Page 1051 of 1052

World of Warcraft hackers using Sony BMG rootkit

It has come to our attention that World of Warcraft Hackers already are using Sonys Rootkit Software to hide their hacking from Blizzards Warden Client.
We reported earlier this week that some Music Cds by Sony labeled "Content enhanced & protected" would bring up an installation program when the music cd was put into a personal computer.

GIMP Image Manipulation Program

If you ever had the problem that you needed a good graphics suite and always thought the Adobe Photoshop line of products was far to expensive then GIMP might be the right software for your. The biggest advantage, its completely free, you don´t pay a dime for it.

Universal Music Group Music Cds may also install rootkits

And another player joins the rangs of the companies that might install spyware with their Music Cds when you put them into your pc drives. "Fontana Distribution, part of Universal Music Group and distributors for Upstairs Records Inc., are encouraging the independent records labels they distribute to use content protection on their CDs. "Twelve Eighteen", featuring the hit song "Summer Nights", carries the same content protection currently being used by Sony BMG.

John Lopez of Upstairs Records commented: "we are very pleased with the seamless production of the album. The media player on the CD has a good user experience and we intend using the technology on more new releases."

Freeware MyPlanetSoft Anti-Keylogger

Most banks in Europe offer a new service on their internet pages. When a user has to enter his login data he has the option to enter the password using a keypad that is displayed on the screen using a java applet. The user then clicks on the numbers and they appear in the password field. This is done to prevent the keylogging of the password.

The Anti-Keylogger does the same thing, only difference is, that its a tool that is started like every other windows program. After the tool is started you simply use the displayed keys to enter your passwords or other data on websites or even local programs.

Highly configurable online proxy

Lets start with a quick link in the morning. The online proxy Poxy can be configured in many ways, you can chose to accept cookies, enable javascript, show images and have a small form above the website that you want to surf anonymously with poxys configuration available.

The great advantage of Poxy is that the site itself has no ads, no popups and all those other nasty stuff that most online proxies seem to have these days.

Sony music cds might install spyware on your system

A few minutes ago I read a news article written by Brian Krebs who described how some Sony Music Cds try to install a software on pcs that could be labeled as spyware.

It seems that we have reached a new level in the fight between the record companies and its consumers. If you put a music cd in question into your drive a installer will popup. If you agree to install the software you won´t find a uninstall feature anywhere on your pc.

Apparently all Music Cds labeled "Content enhanced & protected" have the installer on the CD, make sure you check this before you buy a cd you would want to hear using your pc.

Convert a Recovery CD to working Windows Install CD

The guys at neowin.net posted an article on how to find out if a recovery cd is in fact a normal windows xp version labeled recovery version.

The process involves a total of eleven steps, starting with the creation of the cd structure and the movement of the files needed to later burn them to a new cd.

can your computer run the game

Can your computer run the game?

I found a website that tests the ability of your pc to run a certain game. They have most newly released and soon to be released games in their list, e.g. Age of Empires III and Civilization IV.

NSA Operating System Guides

The National Security Agency offers Operating System Guides on their websites. These guides are currently being used throughout the government and by numerous entities as a security baseline their systems.

The IP: The housenumber of your Computer

Everything you do on the net transmitts your Ip Address. If you chat with someone he could easily find it out, if you write an email the information will be transmitted with the email.

The article describes what the IP reveals about the user behind.

youtube movies

Watch free movies online

I thought this would be of interest to some of you. Watchfilms.com are offering more than 300 movies on their website that you can watch for free.

The movies are divided into six categories: Movies, Cartoons, Documentaries, Newsreels, Commercials and Short Films. Most films are black and white movies from 1930-1950.

How Internet Search Engines work

This article describes how search engines work, how the data is processed, how search results are generated. It also describes most of the advanced search operators available today.

process partrol

Process Patrol

Process Patrol allows you to manage the Windows processes on your computer. You can set stop lists for spyware, adware, and virus programs that will be automatically killed. Program files are renamed to prevent restarts.

A New Gaming Feature - Spyware

Greg Hoglund with some time at his hands performed a long reversing session on a game most of us played or have at least heard of: World of Warcraft.

infoblox

Free online web proxy

Just a quick news this time. A new free online proxy site opened up its gate. You can use it to bypass restrictions at school or work for example. (e.g. filtered sites)

How do spammers spam?

Richi posted a nice introduction on how spammers actually send the millions of spam mails every day. He begins by describing two ways of sending spam mails: traditional and viral.

Unlocker: How to delete "cannot delete files"

Have you ever recieved on of the following ...

Openoffice 2.0 is here

OpenOffice 2.0 is finally available for eve...