thomas.broxrost.com
Why Amazon Web Services just became a competitive web hosting provider – Thomas Brox Røst
http://thomas.broxrost.com/2009/03/12/why-amazon-web-services-just-became-a-competitive-web-hosting-provider
Skip to main content. Thomas Brox Røst. Why Amazon Web Services just became a competitive web hosting provider. March 12, 2009. February 2, 2010. UPDATE 1: There is now an updated version of this posting. The new version incorporates the August 2009 AWS reserved instance pricing changes. UPDATE 2: Corrected the bandwidth calculation in the formulas for AWS. Just announced a new reserved instances pricing plan. To see if the new pricing scheme fares any better, I have compared the cost of an AWS EC2 reser...
evilfingers.blogspot.com
EvilFingers: Fusion. A concept adopted by the current crimeware II
http://evilfingers.blogspot.com/2009/12/fusion-concept-adopted-by-current.html
Thursday, December 10, 2009. Fusion. A concept adopted by the current crimeware II. It's increasingly common for research processes we find that on the same server are housed, "operating" actively, several crimeware Exploit Pack. Type from which control and manage the zombies that are part of his fraudulent business. A while ago we commented on ElFiesta. Coexisting in the same environment, and meet the same objectives. This time, the merger is between Fragus. An increasingly popular crimeware. Is a colle...
evilfingers.blogspot.com
EvilFingers: May 2009
http://evilfingers.blogspot.com/2009_05_01_archive.html
Friday, May 29, 2009. Spy DLL Remover v2. Rootkit Analytics is proud to announce the release of SpyDLLRemover v2. One of the unique feature of SpyDLLRemover is its capability to free the DLL from remote process using advanced DLL injection method which can defeat any existing Rootkit tricks. It also uses sophisticated low level anti-rootkit techniques to uncover hidden userland Rootkit processes as well as to terminate them. To know more or to download the tool, CLICK HERE. Thursday, May 28, 2009. In thi...
evilfingers.blogspot.com
EvilFingers: March 2009
http://evilfingers.blogspot.com/2009_03_01_archive.html
Tuesday, March 31, 2009. MALWARE INFECTION THROUGH FALSE WINDOWS SECURITY CENTER. MALWARE INFECTION THROUGH FALSE WINDOWS SECURITY CENTER. But here it used to show the false scan alerts& It is spreading. When the user first accesses a malicious page, It is generating fake virus alert. And it asking to install the rogue system security 2009. More on Install.exe http:/ www.virustotal.com/analisis/cb066f00f4dccdd3f24f5f888843aee5. Domain name: itsecurityscan.com. Address: 1892 C Street. Timedatestamp.: ...
evilfingers.blogspot.com
EvilFingers: December 2009
http://evilfingers.blogspot.com/2009_12_01_archive.html
Friday, December 25, 2009. Anti-Virus Live 2010. Talking with the enemy. Generally one has the false belief that malicious code is trivial that any technical problems solved by just formatting the system or acquire any of the known anti-malware market offers today. However, on the one hand, the reality is that behind the development of malware hides a very large business in which every day must be added more "associates". Moreover, what happens when we plan to buy this antivirus is just the opposite.
evilfingers.blogspot.com
EvilFingers: August 2009
http://evilfingers.blogspot.com/2009_08_01_archive.html
Friday, August 28, 2009. Development of Open Source crimeware to control and manage botnets. The development of web applications oriented botnets control and management through the http protocol, is at an advanced level by the underground community of Eastern Europe, particularly from Russia, where cyber criminals constantly flood the market crimeware clandestine marketing packages as Eleonore. That is, development of open source software designed to be used for criminal purposes via the Internet. The "H...
evilfingers.blogspot.com
EvilFingers: October 2009
http://evilfingers.blogspot.com/2009_10_01_archive.html
Saturday, October 31, 2009. Bucky's Python Programming Tutorial - 9 - Sequences and Lists. Now that we have come this far, Bucky is now training on Python Sequence and Lists. Bucky's Python Programming Tutorial - 8 - Raw Input. Video on Python Raw Input:. Prevx - PC and Internet Security. Prevx - PC and Internet Security for Home and Families, Businesses, Enterprises, Banks, Financial, eCommerce, and their customers. Products and Services they offer:. This could do one of the following:. B) Buying sample...
evilfingers.blogspot.com
EvilFingers: July 2009
http://evilfingers.blogspot.com/2009_07_01_archive.html
Friday, July 31, 2009. If you wish to contribute or if you have some ideas for us, feel free to contact us at any time: contact.fingers @ gmail.com. Sunday, July 26, 2009. Software as a Service on the malware industry. However, at present this concept responds to a name that is setting a trend under the name of Cloud Computing. Offers a wide range of services that use Internet as a central infrastructure (the cloud). Where services are offered programs, is known by the acronym SaaS. Software as a Service.
evilfingers.blogspot.com
EvilFingers: Anti-Virus Live 2010. Talking with the enemy
http://evilfingers.blogspot.com/2009/12/anti-virus-live-2010-talking-with-enemy.html
Friday, December 25, 2009. Anti-Virus Live 2010. Talking with the enemy. Generally one has the false belief that malicious code is trivial that any technical problems solved by just formatting the system or acquire any of the known anti-malware market offers today. However, on the one hand, the reality is that behind the development of malware hides a very large business in which every day must be added more "associates". Moreover, what happens when we plan to buy this antivirus is just the opposite.