2010年10月18日星期一

下載:強力系統清理器KCleaner 0.21.0

KCleaner是一款體積小巧的綠色免費軟件,它沒有多餘的功能及組件,其用途只有一個-清理系統中的各類臨時文件及緩存文件。

KCleaner開啟後會先彈出功能豐富的設置界面,我們可以選擇我們想要清理的文件類型,當然語言選項自然是簡體中文了。對於對數據安全有需求的用戶,可以選擇「數據安全」中的選項,已達到文件粉碎的效果。另外可以通過設置實現自動檢查和清理工作。

下载:强力系统清理器KCleaner 0.21.0
詳細的設置功能

軟件運行分為手動模式和自動模式,通過菜單中的選項可以方便的切換為專家模式和簡便模式,而且在清理完成後,可以通過詳細的日誌功能來查看對那些文件進行了清理。

下载:强力系统清理器KCleaner 0.21.0
簡單模式

下载:强力系统清理器KCleaner 0.21.0
專家模式

KCleaner的更新雖然不算很頻繁,但每次更新都是對清理數據庫進行完善,推薦對系統垃圾反感的用戶使用體驗。

本地下載:

http://www.myfiles.com.cn/soft/42/42902.htm

下载:强力系统清理器KCleaner 0.21.0
清理過程

下载:强力系统清理器KCleaner 0.21.0
清理完成後的效果

下载:强力系统清理器KCleaner 0.21.0
詳細的操作日誌

http://news.mydrivers.com/1/177/177131.htm

2010年10月15日星期五

微軟提供新版免費XP、Vista鏡像下載

為了彌補Windows平台只能安裝單一版本IE瀏覽器的缺陷、幫助開發者在不同系統平台測試各種版本的IE瀏覽器,自2006年IE7發佈以來,微軟開始向開發者提供Windows客戶端虛擬鏡像免費下載,也就是眾所周知的IE應用程序兼容性VPC鏡像(Internet Explorer Application Compatibility VPC Image),其中包括XP、Vista平台不同版本IE瀏覽器的虛擬鏡像文件。

早在今年6月,微軟就通過下載中心發佈了5個以上的免費XP和Vista虛擬機鏡像,不過作為的試用軟件,它們目前已經過期。為了繼續這項服務,微軟昨日發佈了最新版的IE應用程序兼容性VPC鏡像。

微軟IE產品主管Pete LePage解釋稱:「在2011財年之初,我們改變了VHD文件開發方式。首先,我們決定自己來完成這項工作,而不再讓廠商來開發;其次,我們認識到有 些舊系統已經退役(Windows XP SP2),因此花費了一些時間來尋找新的替代方案來繼續支持Windows XP VHD。」

最終答案就是,微軟發佈了新的XP、Vista免費副本。LePage指出:「這些鏡像的最大改變就是,Windows XP SP3不再是『全功能產品』,取而代之的是『試用版本』。這就意味著,這些免費Windows副本不再沿用以往複雜的期限機制,由於是試用版本,它們在 90天試用期結束後將自動失效。」

也就是說,此次發佈的多個版本XP、Vista鏡像都將在2011年1月11日到期

微软免费提供XP、Vista镜像下载

官方下載

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=21eabb90-958f-4b64-b5f1-73d0a413c8ef&displaylang=en

http://news.mydrivers.com/1/176/176956.htm

Building a site-to-site VPN tunnel between SonicWALL and IPCop

To perform this task, I used:
A SonicWALL TZ170 Running SonicOS Enhanced 3.2.0.3-54e
A PC running IPCop v1.4.11, with the built in VPN functionality

SonicWALL is becoming ever more popular as a good solution for the small to mid-sized business due to its lower TCO over products such as Cisco. In the same regard, IPCop has grown in popularity for its open source nature, and its large list of features. Therefore, I thought it would be interesting to see how difficult it might be to merge two companies using these very different products. In the end I can say, "not too difficult at all".

Some things to remember:
* You must have two different networks, with different network ID's. That is, if one company has a network ID of 192.168.0.0/24, than the other side cannot also be 192.168.0.0/24. This will be a routed network. You cannot route between two networks, that are actually the *same* network!

* SonicWALL is a commercial product and is backed by toll free phone support (which varies by product and status). Help is most certainly guaranteed. IPCop is open source. That means that your support comes in the form of forums, IRC, etc. Also note that the use of open source software comes with an agreement. Make sure that your company or organization is permitted to use open source software.

Step #1 – Set up the SonicWALL side of the tunnel.
Log into the SonicWALL Administration page. Click "VPN" on the left side, and ensure that you are now looking at "Settings". Now under the "VPN Policies" click the Add button.

Leave the authentication drop-down at its default. Name your policy whatever you wish. You can use spaces here, it doesn't matter.

For "Primary Gateway" you need to enter the IP address of the IPCop firewall. If this address was obtained via DHCP and will be changing, then you will need to set up Dynamic DNS for that box (Google for help on that). The SonicWALL *will* accept a hostname here instead of an IP address if DDNS is in use. For the "Secondary", you can enter 0.0.0.0, or if left blank, the SonicWALL will enter that for you. This would be used if you had a "backup VPN" in place to another box in case this VPN fails.

Enter a secret password into the "Pre-Shared Key" area. You will need to enter this same password on the IPCop firewall. The longer the password is, and the more obscure the characters are (!@#$%^, etc), the better your encryption will be. So be creative.

For your "peer ID's", I would typically recommend using the default which is "IP Address". And normally you would leave the fields blank. But, SonicWALL and IPCop did not handle that well at all. I suggest using something textual such as "E-Mail addresses". The idea here is you would use a contact at the SonicWALL site for the SonicWALL side, and the address of an employee at the IPCop side for the IPCop settings. It doesn't even have to be a real e-mail address, but whatever you enter in these boxes, must match the other side when we are done (local to remote, remote to local).

When done, it will look something like the illustration below. Click the Network Tab to continue.



Things may get tricky here depending on how complicated your network is. We will assume that you have one standard reserved network address on your local network. In our case, the SonicWALL's network is known as "192.168.199.0" with a subnet mask of 255.255.255.0. We could create a new "object" for that address, but instead used the default object, "LAN Primary Subnet". If you have a whole slew of networks, or you want the wireless network to be reachable through the VPN, etc – I would suggest going through this once for one network. When you have success with one network, go back and add the others. Each end of this tunnel must be aware of the other ends networks!

For the Destination Network, we will need to create an object. So click the drop-down under "Choose a network from the list", and then select "Create new address object". You can name this whatever you want, but for the sake of other administrators – or yourself at a later date – use a sensible name (like the network ID itself).

Zone Assignment MUST be set to "VPN"! Next, choose "Network" as the type, and enter in the network ID information for the IPCop side of things.



Click "OK" when done, and you should have something like this …



Now, click the Proposals tab. We will have to make a few changes here to find a middle ground between our two different ends of this tunnel.

For Exchange, choose Main Mode. For DH Group, choose "Group 2". Note that we also want Group 2 down below, but we can't change that (and don't need to) unless "Perfect Forward Secrecy" is enabled. For Encryption, go with "3DES" (aka Triple DES). Authentication, "MD5". Could we go with better encryption? Probably. But SonicWALL tends to have a harder time working with other devices when using stronger protocols. If you want this to work well, stick to this path. For lifetime, go with the default. We will match this on the other side. For those keeping track, 28800 seconds translates to 8 hours.

When you are all done here, it should look like this …



On the Advanced tab, there is not much that will need changed here. I like to enable a "keep alive" on one end of the VPN tunnel. This will keep the tunnel up, even when no traffic is being passed through it. In most cases, you want that kind of functionality. The alternative is a tunnel that is built "on the fly" when users start trying to send traffic through it.

You may also want to enable NetBIOS. I often do for my customers. But if this was my network, I wouldn't want Windows broadcasts going through my tunnel. This should be a routed network! Theres a good reason that broadcasts are not routable. Additionally, if you enable that here, you may be in trouble with how the IPCop handles it at the other end.

Leave this other options alone. You're done here. Click "OK".



The SonicWALL will go ahead and enable this policy for you. Since only one end is complete, you should disable it. Find the little checkbox under "Enable" and uncheck it.

Now, you are halfway there.

Step #2 Configure the IPCop side of the tunnel.
Connect to your IPCop's web administration. This can probably only be done from the LAN side, unless you have enabled remote administration. Remote administration for an IPCop box is tricky, as it entails setting up SSH – and configuring an SSH tunnel at the remote end. Again, use Google or the Ipcops.com forums for help on that.

From the admin interface, click "VPN's" and "VPN's" as the only choice. If you are an OpenVPN user as well, you should be happy that these two seem to work together without any problems.

On the "Global Settings" screen, enter the IP address or hostname of this IPCop firewall if it's not all read there. For the MTU, you will need to enter "1500", or you will have serious problems. The SonicWALL defaults to 1500. Do not enable the VPN yet. Click "Save" toward the lower right of these settings. Smile.

Now scroll down a bit to "Connection status and control" and click the "Add" button lingering around the lower center.

We will be building a "Net to Net", so choose that second option and then click "Add".

For name, choose anything you want. But it must be one big word without spaces or special characters. For the "IPCop side" leave the default setting of "left" (this is an obscure reference to Open SWAN settings).

In the Remote Host box, enter the IP address of the SonicWALL. This is the "public address" which should be reachable from the Internet.

For "Local Subnet" enter the ID of this IPCop's network. All ready in there? Good! Leave it alone. For the Remote Subnet, enter the SonicWALL's network ID in the same fashion. Network ID first, then a forward slash, then the subnet mask (for us it was 192.168.199.0/255.255.255.0).

Leave "Dead peer detection" at its default, "restart". If the VPN goes to hell in a hand-basket, it will drop and re-establish itself.

For "Options", we will need to enter Local and Remote ID's. As I mentioned earlier, these are textual. Normally, the IP address is used. But I had problems with that. My advice, use email addresses. You will need to put an "@" symbol in front of them.

So for Local ID, put in the address used as the remote "Peer ID" of the SonicWALL. Then for "Remote", use the local "Peer ID" that you used on the SonicWALL. Be sure to put them in with @ symbols leading the address, but of course still plant the @ symbol in the address where it belongs (such as "@steve.ballantyne@gmail.com").

The "Remark" is just a comment. Leave it blank.

For Authentication, we need to enter our Pre-Shared Key (the secret password). This should match what we used on our SonicWALL to a tee, or this won't get off the runway. Before clicking "Save" at the bottom, scroll up and uncheck the "Enable" at the top. We aren't ready to bring this up just yet! Now, click Save.

No errors? So far, so good. Scroll down to your new VPN under "Connection status and control" and find the edit button. It looks like a little pencil. Double check your settings for consistency.

Now scroll all the way to the bottom and click "Advanced".

NOTE: In some areas, there will be two options set (such as Grouptype). That will only confuse the SonicWALL and make life miserable for you. De-select all but what we specify (if it's darkened, or highlighted, it's selected).

IKE Encryption: 3DES
IKE Integrity: MD5
IKE Grouptype: MODP-1024 (this equates to "Group 2")
IKE Lifetime: 8 hours (you will need to change this)

ESP Encryption: 3DES
ESP Integrity: MD5
ESP Groutype: MODP-1024
ESP Keylife: 8 hours

Uncheck all other options at the bottom, including "PFS".

It looks like the picture below … Click Save.



Before bringing up your tunnel, you should probably be ready to debug it. So SSH into the IPCop firewall, and run "tail –f /var/log/messages". You will be watching your log running by. If it's moving too fast, that indicates a busy network … which means your timing probably isn't good for making network changes. ;-)

If possible, get the SonicWALL Administration web page open too and head into the Log area. Now we can be ready for any error messages that hit.

Enable the IPCop side first by checking "Enabled" and "VPN on Green" and clicking the Save button. You should see some stuff roll into your log. Let it settle down.

Now go to the SonicWALL, click VPN > Settings. Enable the VPN we created earlier. Watch the IPCop log now as it fills up with interesting stuff. This is not so easily read but should indicate a Phase 1, Phase 2 success followed by some confirmation messages.

Now, on the SonicWALL side, refresh your browser window. You are looking to see a "green light" on the VPN connection, as well as an active connection status displayed at the bottom. A green light does *not* indicate success. I have had many green lights that were actually crippled non-working tunnels.

On the SonicWALL, go into the Log and see what you have. You should see several messages, the last of which will be "SA Added" indicating success. No such luck? Start debugging.

The good news is that if it didn't work, it's probably just a mis-match in settings. The bad news is that there are a lot of things to look over and the error messages generally are not all that helpful. So check, double check, and re-check the settings at both ends. One small typo will blow the whole thing up.

To test your VPN you can (depending on your access rules) try pinging hosts. From the SonicWALL you can click System > Diagnostic and use the Ping utility. Do not try to ping the public addresses of the firewalls, and do not ping the private addresses of the firewalls themselves. The SonicWALL will not allow you to, and the IPCop will probably lie about where the reply is actually coming from. Rather, find a host on either end that will allow ICMP traffic and ping back and forth – and ping those.

Does it all work? Good. If you are have checked everything, and can't seem to get things to work, feel free to contact me. Just know that you understand your own networks far better than I do, so a resolution may be difficult coming from someone outside.

Enjoy,

-Steve Ballantyne

http://steveballantyne.blogspot.com/2006/12/building-site-to-site-vpn-tunnel.html

BitDefender發佈「超級工廠」Stuxnet病毒專殺工具

Stuxnet蠕蟲病毒也就是「超級工廠」病毒是世界上首個專門針對工業控制系統編寫的破壞性病毒, 能夠利用對Windows系統和西門子Simatic WinCC系統的7個漏洞進行攻擊。該病毒威力不小,之前曾造成伊朗核電站推遲發電,在今年9月份,該病毒流傳到了我國。

Stuxnet蠕蟲病毒對西門子Simatic WinCC系統危害更甚,會對其監控與數據採集(SCADA)系統進行攻擊,由於該系統在我國的多個重要行業應用廣泛,被用來進行鋼鐵、電力、能源、化工 等重要行業的人機交互與監控,所以如何查殺該病毒對於此類企業尤為重要。

近日BitDefender發佈了Stuxnet病毒的專殺工具,支持32位和64位系統,能完全清除目前所發現的所有Stuxnet變種,這其中也包括對Stuxnet蠕蟲殘留在系統中的Rootkit驅動程序的清除。

Stuxnet蠕蟲專殺工具官方下載
http://www.malwarecity.com/community/index.php?app=downloads&showfile=12

BitDefender中國在官方網站上描述道:「BitDefender最早於7月中旬發現超級工廠病毒Win32.Worm.Stuxnet, 超級工廠病毒Stuxnet的目的不像一般的病毒,干擾電腦正常運行或盜竊用戶財產和隱私,其最終目的是入侵Simatic WinCC SCADA系統,該系統主要被用做工業控制系統,能夠監控工業生產、基礎設施或基於設施的工業流程。類似的系統在全球範圍內被廣泛地應用於輸油管道、發電 廠、大型通信系統、機場、輪船甚至軍事設施。

『超級工廠』利用的是微軟的零日漏洞進行系統攻擊和進行傳播的,而且會通過可移動磁盤來傳播。它由一個惡意構造的Lnk文件和一個動態庫構成。通過 偽裝RealTek與JMicron兩大公司的數字簽名,從而順利繞過安全產品的檢測,當用戶打開U盤時,無需點擊任何程序,僅查看該病毒文件,該文件就 可以利用多個Windows漏洞加載起來,從而執行具有破壞行為的惡意代碼。」

BitDefender在線威脅病毒實驗室主管Catalin Cosoi表示:「BitDefender於7月19號將Stuxnet蠕蟲簽名正式加入到BitDefender病毒庫中,防止該蠕蟲通過零日漏洞感染 更多的電腦。當然我們考慮到為了幫助全球千萬用戶免受該蠕蟲的攻擊,我們特發佈了針對該蠕蟲的專殺工具。即使您的電腦沒有安裝BitDefender,也 可以免費下載該專殺工具來徹底查殺Stuxnet蠕蟲」

http://news.mydrivers.com/1/176/176940.htm

2010年10月14日星期四

Free Video Converter update CUDA

Faster video conversion with CUDA technology

Freemake Video Converter has recently integrated NVIDIA CUDA technology for faster and more efficient video conversion.

By outsourcing tasks normally handled by CPU to the graphics card, CUDA not only increases the program performance dramatically but also provides a significant acceleration of the entire conversion process. Now if your PC is equipped with NVIDIA-powered graphics card and the card driver is updated, you can feel all the benefits of CUDA-accelerated conversion.

Update your Freemake Video Converter here.

This is Free Video Converter

Freemake offers absolutely free programs developed as alternatives to paid ones. Make sure that our free video converter is freeware in the truest sense of the word: no adware, no spyware, no toolbars, no online registration!

2010年10月13日星期三

VB100十月殺毒軟件測試報告出爐 全年回顧

VB100 Award獎項(通稱VB100殺毒認證)是英國著名的獨立病毒測試中心Virus Bulletin以世界性組織Wild List病毒資料庫作為病毒來源,對世界各國的防病毒軟件進行測試後,診斷率100%、誤診率0%時賦予的獎項,VB100是非商業性組織,測試嚴格,在 業界內贏得了極好的口碑。近日,VB100出爐了10月份測試結果,此次的測試平台是Windows Server 2003。VB100會在每年的偶數月份發佈報告,由於Windows Server 2003並不是主要面向普通PC用戶推出的版本,所以VB100在4月份和8月份基於Windows XP和Vista的測試報告更具有參考性。

從10月份的VB100測試報告中可以看出,眾多知名國外殺毒軟件都通過了認證,比如Avast、AVG、小紅 傘、BitDefender、卡巴斯基等等。很多用戶比較關注的微軟免費殺毒軟件MSE並未參與此次測評,原因很簡單,它不支持Windows Server 2003平台。我國部分殺毒軟件廠商也參與了測試,其中可牛殺毒軟件等通過了認證,不過可牛殺毒軟件採用了卡巴斯基殺毒引擎,能通過此次測試也不足為奇。

VB100十月测试报告:两款国内杀软获认证

正如本文開頭所述,4月份和8月份的VB100殺毒軟件測試報告對於普通用戶來說更具參考性,所以下面我們再來回顧一下這兩個月份的測試結果。

4月份VB100測試基於Windows XP平台,8月份測試基於Windows Vista SP2企業版本,Avast、AVG、小紅傘、F-Secure、卡巴斯基、Sophos、賽門鐵克這些大家耳熟能詳的殺毒軟件都是全部通過,無論你是XP用戶還是Vista用戶,上述這些殺毒軟件絕對是不錯的選擇。

完整測試結果如下:

VB100十月测试报告:两款国内杀软获认证
 「×」表示未通過測試,「方塊」表示未參與測試,帶有VIRUS100 Logo表示通過測試

http://news.mydrivers.com/1/176/176757.htm

網管 7 武器

Seven Secret Weapons for Network Management on a Budget
http://www.cio.com/article/623863/Seven_Secret_Weapons_for_Network_Management_on_a_Budget?page=1#slideshow

http://www.networkworld.com/slideshows/2010/101110-seven-secret-foss-weapons-for-net-mgt-ciscosubnet.html