β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Damn Small XSS Scanner
Damn Small XSS Scanner (DSXS) is a fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.
> As of optional settings it supports HTTP proxy together with HTTP header values User-Agent, Referer and Cookie.
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/stamparm/DSXS.git
2) cd DSXS
3) python3 dsxs.py -h
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
π¦Usage: dsxs.py options
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.htm?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
$ python3 dsxs.py -u "http://testphp.vulnweb.com/search.php?test=query" --data="s
earchFor=foobar"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
scanning GET parameter 'test'
scanning POST parameter 'searchFor'
(i) POST parameter 'searchFor' appears to be XSS vulnerable (">.xss.<", outside
of tags, no filtering)
scan results: possible vulnerabilities found
$ python3 dsxs.py -u "http://public-firing-range.appspot.com/address/location.has
h/replace"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
(i) page itself appears to be XSS vulnerable (DOM)
(o) ...<script>
var payload = window.location.hash.substr(1);location.replace(payload);
</script>...
(x) no usable GET/POST parameters found
scan results: possible vulnerabilities found
β Verified by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Damn Small XSS Scanner
Damn Small XSS Scanner (DSXS) is a fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.
> As of optional settings it supports HTTP proxy together with HTTP header values User-Agent, Referer and Cookie.
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/stamparm/DSXS.git
2) cd DSXS
3) python3 dsxs.py -h
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
π¦Usage: dsxs.py options
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.htm?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
$ python3 dsxs.py -u "http://testphp.vulnweb.com/search.php?test=query" --data="s
earchFor=foobar"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
scanning GET parameter 'test'
scanning POST parameter 'searchFor'
(i) POST parameter 'searchFor' appears to be XSS vulnerable (">.xss.<", outside
of tags, no filtering)
scan results: possible vulnerabilities found
$ python3 dsxs.py -u "http://public-firing-range.appspot.com/address/location.has
h/replace"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
(i) page itself appears to be XSS vulnerable (DOM)
(o) ...<script>
var payload = window.location.hash.substr(1);location.replace(payload);
</script>...
(x) no usable GET/POST parameters found
scan results: possible vulnerabilities found
β Verified by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
107 - Java Swing [-PUNISHER-].pdf
7 MB
Forwarded from Backup Legal Mega
109_Java_Programming_From_Problem_Analysis_To_Program_Design_4th.pdf
8.5 MB
Forwarded from Backup Legal Mega
121_Metasploit_The_Penetration_Testers_Guide_2011_PUNISHER_.pdf
6.9 MB
Forwarded from Backup Legal Mega
124 - Msaccessebook [-PUNISHER-].pdf
449.9 KB
Forwarded from Backup Legal Mega
125_Nessus,_Snort,_&_Ethereal_Power_Tools_Customizing_Open_Source.pdf
7.1 MB
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best list of firefox plugins :
>Speedup-Block adds...
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/
https://addons.mozilla.org/en-US/firefox/addon/lightshot/
https://addons.mozilla.org/en-US/firefox/addon/umatrix/
https://addons.mozilla.org/en-US/firefox/addon/darkreader/
https://addons.mozilla.org/en-US/firefox/addon/clippings/
https://addons.mozilla.org/en-US/firefox/addon/grammarly-1/
https://addons.mozilla.org/en-US/firefox/addon/videospeed/
https://addons.mozilla.org/en-US/firefox/addon/tabliss/
https://addons.mozilla.org/en-US/firefox/addon/gesturefy/
https://addons.mozilla.org/en-US/firefox/addon/image-search-options/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best list of firefox plugins :
>Speedup-Block adds...
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/
https://addons.mozilla.org/en-US/firefox/addon/lightshot/
https://addons.mozilla.org/en-US/firefox/addon/umatrix/
https://addons.mozilla.org/en-US/firefox/addon/darkreader/
https://addons.mozilla.org/en-US/firefox/addon/clippings/
https://addons.mozilla.org/en-US/firefox/addon/grammarly-1/
https://addons.mozilla.org/en-US/firefox/addon/videospeed/
https://addons.mozilla.org/en-US/firefox/addon/tabliss/
https://addons.mozilla.org/en-US/firefox/addon/gesturefy/
https://addons.mozilla.org/en-US/firefox/addon/image-search-options/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
addons.mozilla.org
Adblock Plus β Get this Extension for π¦ Firefox (en-US)
Download Adblock Plus for Firefox. One of the most popular free ad blockers for Firefox. Block annoying ads on sites like Facebook, YouTube and all other websites.
Adblock Plus blocks all annoying ads, and supports websites by not blocking unobtrusive adsβ¦
Adblock Plus blocks all annoying ads, and supports websites by not blocking unobtrusive adsβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best ad blocker apps for Android
https://f-droid.org/en/packages/org.adaway/
https://adblockplus.org/android-about
https://adguard.com/en/adguard-android/overview.html
http://andauth.co/chrome
https://block-this.com/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best ad blocker apps for Android
https://f-droid.org/en/packages/org.adaway/
https://adblockplus.org/android-about
https://adguard.com/en/adguard-android/overview.html
http://andauth.co/chrome
https://block-this.com/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
f-droid.org
AdAway | F-Droid - Free and Open Source Android App Repository
A free and Open Source ad blocker for Android.
π¦TypeScript for JavaScript Developers β522 MB
https://www.packtpub.com/web-development/typescript-for-javascript-developers-video
>Download<
https://www.packtpub.com/web-development/typescript-for-javascript-developers-video
>Download<
Packt
Search | Packt Subscription
Search over 7,500 Programming & Development eBooks and videos to advance your IT skills, including Web Development, Application Development and Networking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Interpretation of apache configuration file http.conf
1) interpretation apache configuration file http.conf
recently wanted to do with their own server machines, because I know enough about the contents of http.conf, as well as their own path detours. Now explain the meaning of several options that need to be modified frequently in this file, I hope it will be helpful to everyone.
2) Bindaddress 127.0.0.1, this option means to bind your own IP address. If you are a stand-alone, this is your IP address; if your machine is online, then Bindaddress is followed by your IP address (I wasted a lot of time because I did not change the IP address here to my own IP address ).
3) Servername localhost, this option is the domain name of your machine. If you are a stand-alone computer, the domain name is localhost; if you are connected to the Internet, you should connect the domain name behind Servername, and if you do not have a domain name, connect your own IP address.
Port 80, this option is to indicate the port the server is listening on, generally defaults to 80, and can be changed to 80 or 8080.
ScriptAlias ββ/ php4 / \ "C: / php4 / \"
AddType application / x-httpd-php4 .php
AddType application / x-httpd-php4 .php3
AddType application / x-httpd-php4 .php4
Action application / x-httpd- php4 \ "/ php4 / php.exe \" The
above options allow your APACHE to support PHP4.
About the default startup document: Apache's default startup document is index.html DirectoryIndex index.html Change it to the default startup document you want. Want to support more documents like this:
DirectoryIndex index.htm
DirectoryIndex index.php
DirectoryIndex index.php3
DirectoryIndex index.php4
Well, with these options APACHE should basically be able to run normally!
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Interpretation of apache configuration file http.conf
1) interpretation apache configuration file http.conf
recently wanted to do with their own server machines, because I know enough about the contents of http.conf, as well as their own path detours. Now explain the meaning of several options that need to be modified frequently in this file, I hope it will be helpful to everyone.
2) Bindaddress 127.0.0.1, this option means to bind your own IP address. If you are a stand-alone, this is your IP address; if your machine is online, then Bindaddress is followed by your IP address (I wasted a lot of time because I did not change the IP address here to my own IP address ).
3) Servername localhost, this option is the domain name of your machine. If you are a stand-alone computer, the domain name is localhost; if you are connected to the Internet, you should connect the domain name behind Servername, and if you do not have a domain name, connect your own IP address.
Port 80, this option is to indicate the port the server is listening on, generally defaults to 80, and can be changed to 80 or 8080.
ScriptAlias ββ/ php4 / \ "C: / php4 / \"
AddType application / x-httpd-php4 .php
AddType application / x-httpd-php4 .php3
AddType application / x-httpd-php4 .php4
Action application / x-httpd- php4 \ "/ php4 / php.exe \" The
above options allow your APACHE to support PHP4.
About the default startup document: Apache's default startup document is index.html DirectoryIndex index.html Change it to the default startup document you want. Want to support more documents like this:
DirectoryIndex index.htm
DirectoryIndex index.php
DirectoryIndex index.php3
DirectoryIndex index.php4
Well, with these options APACHE should basically be able to run normally!
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Advertising on Facebook β-385 MB
https://www.lynda.com/Facebook-tutorials/Advertising-Facebook/2809360-2.html
>Download<
https://www.lynda.com/Facebook-tutorials/Advertising-Facebook/2809360-2.html
>Download<
LinkedIn
Advertising on Facebook Online Class | LinkedIn Learning, formerly Lynda.com
Amplify your reach with Facebook advertising. Learn how to create and manage Facebook ads campaigns that grow your business and boost your brand.
πNew Theme & marking the old videos as patched,before uploading more, and input our new url to banner...
> youtube.com/Undercode
> youtube.com/Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOW BT PHONE CARDS WORKs ?
----------------------- ----------------------
1) Contrary to popular belief, BT phonecards do not work using a magnetic strip system. The reason for this being that a magnetic strip would be
read only.
2) So how do they work then?
Well, examine a phonecard - preferably a used one if you are going to scratch it or dissect it. If you look on the printed surface (the green
side - which is the front) you will find two lines which form a thick band. Underneath this area is a "track" which holds the information about the
number of units used up and how many are left. A used phonecard will have some tiny bars marked on the track near one end.
3) On the reverse side of the phonecard (the black side) you can see a shiny
4) black strip in contrast to the matt black which has text on it (on older phone cards the whole of this side is shiny black). Anyway, this shiny strip
is "opposite" the band on the front and acts as a "window" to the information on the track - for the simple reason that it is no ordinary shiny black
plastic. This special black plastic is not like all the others (which do
not let normal light or infra-red light pass through) but is transparent to infra-red light. When a phonecard is in the machine, an infra-red beam is shone through the back of the card and the reflected beam is checked to
detect the time units remaining.
5) Now to explain the track itself which is protected by a layer of paint that also serves as the base for printing text and figures visible to the user.
6) On a 20-unit card, the track has 20 tiny rectangular areas (called
diffraction gratings - you might have come across them if you took physics)
7) which affect the light reflected by the cards. As the time units are used up, the ares are destroyed by an eraser head. The design of the assembly enables
the progress of the erasing operation to be checked. in fact, the 20
rectangular areas touch each other and form a continuous strip on the card.
8) The area which is read is wider than the track. This makes it possible to detect a reduction in track width.
9) Each unit is separated from its neighbour by a distance of 0.6mm. the erase area is greater than the width of the track so that the unit is always completely erased. The dimensions of both the card and the time units
suggest 140 as the theoretical maximum number of units possible.
10) The read-and-erase mechanism consists of a moving carriage on which are
fixed the eraser head and the optical components for reading. the carriage
OK, for those that weant to know, here is an ascii graphical representation
of the read and erase geometry :
Time units
---------------------------------------------------------
Track | | | | | | | | | 1.2mm
---------------------------------------------------------
<0.6mm>
Area read Area erased
---------------------------------------------
| | | | | | || | | 1.6mm
---------------------------------------------
0.4mm 0.7mm
Well I hope you all understood that! Most of the information in this text
file was obtained from British Telecom <spit> sources so is quite likely to
be correct (after all, they should know their own cardphones!).
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOW BT PHONE CARDS WORKs ?
----------------------- ----------------------
1) Contrary to popular belief, BT phonecards do not work using a magnetic strip system. The reason for this being that a magnetic strip would be
read only.
2) So how do they work then?
Well, examine a phonecard - preferably a used one if you are going to scratch it or dissect it. If you look on the printed surface (the green
side - which is the front) you will find two lines which form a thick band. Underneath this area is a "track" which holds the information about the
number of units used up and how many are left. A used phonecard will have some tiny bars marked on the track near one end.
3) On the reverse side of the phonecard (the black side) you can see a shiny
4) black strip in contrast to the matt black which has text on it (on older phone cards the whole of this side is shiny black). Anyway, this shiny strip
is "opposite" the band on the front and acts as a "window" to the information on the track - for the simple reason that it is no ordinary shiny black
plastic. This special black plastic is not like all the others (which do
not let normal light or infra-red light pass through) but is transparent to infra-red light. When a phonecard is in the machine, an infra-red beam is shone through the back of the card and the reflected beam is checked to
detect the time units remaining.
5) Now to explain the track itself which is protected by a layer of paint that also serves as the base for printing text and figures visible to the user.
6) On a 20-unit card, the track has 20 tiny rectangular areas (called
diffraction gratings - you might have come across them if you took physics)
7) which affect the light reflected by the cards. As the time units are used up, the ares are destroyed by an eraser head. The design of the assembly enables
the progress of the erasing operation to be checked. in fact, the 20
rectangular areas touch each other and form a continuous strip on the card.
8) The area which is read is wider than the track. This makes it possible to detect a reduction in track width.
9) Each unit is separated from its neighbour by a distance of 0.6mm. the erase area is greater than the width of the track so that the unit is always completely erased. The dimensions of both the card and the time units
suggest 140 as the theoretical maximum number of units possible.
10) The read-and-erase mechanism consists of a moving carriage on which are
fixed the eraser head and the optical components for reading. the carriage
OK, for those that weant to know, here is an ascii graphical representation
of the read and erase geometry :
Time units
---------------------------------------------------------
Track | | | | | | | | | 1.2mm
---------------------------------------------------------
<0.6mm>
Area read Area erased
---------------------------------------------
| | | | | | || | | 1.6mm
---------------------------------------------
0.4mm 0.7mm
Well I hope you all understood that! Most of the information in this text
file was obtained from British Telecom <spit> sources so is quite likely to
be correct (after all, they should know their own cardphones!).
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦what is DSSS - Direct Sequence Spread Spectrum ?
1) Direct Sequence Spread Spectrum (DSSS) is a spread spectrum technique whereby the original data signal is multiplied with a pseudo random noise spreading code. This spreading code has a higher chip rate (this the bitrate of the code), which results in a wideband time continiuous scrambled signal.
2)DSSS significantly improves protection against interfering (or jamming) signals, especially narrowband and makes the signal less noticeable. It also provides security of transmission if the code is not known to the public. These reasons make DSSS very popular by the military. In fact, DSSS was first used in the 1940s by the military.
3) DSSS can also be used as a multiple access technique, whereby several different pseudo random spreading codes are being used simultaneously. This multiple access technique is better known as Direct Sequence CDMA.
source wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦what is DSSS - Direct Sequence Spread Spectrum ?
1) Direct Sequence Spread Spectrum (DSSS) is a spread spectrum technique whereby the original data signal is multiplied with a pseudo random noise spreading code. This spreading code has a higher chip rate (this the bitrate of the code), which results in a wideband time continiuous scrambled signal.
2)DSSS significantly improves protection against interfering (or jamming) signals, especially narrowband and makes the signal less noticeable. It also provides security of transmission if the code is not known to the public. These reasons make DSSS very popular by the military. In fact, DSSS was first used in the 1940s by the military.
3) DSSS can also be used as a multiple access technique, whereby several different pseudo random spreading codes are being used simultaneously. This multiple access technique is better known as Direct Sequence CDMA.
source wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Behavior analysis-How a antimalware works
> secure yourself !
π¦ππΌπ'π πππΈβπ:
Dr.Web Process Heuristic
The behavior analysis technology Dr.Web Process Heuristic is used to resist the latest and most dangerous malware. Such malware can avoid the traditional signature analysis and heuristic analysis mechanism.
Dr.Web Process Heuristic analyzes each startup process, compares it with the constantly updated Dr.Web cloud service, and judges whether the process is dangerous based on the latest understanding of malware behavior and whether it needs to take action to remove the threat.
π¦This data protection technology can minimize the loss caused by unknown viruses, while taking up very little resources of the protected system.
Dr.Web Process Heuristic monitors any attempts to change the system:
β’Identify malicious software processes that maliciously change user files (such as the activity of encryption Trojans);
β’Prevent malware from being implanted in other applications;
β’Prevent malware from changing important areas of the system;
β’Detect and block malicious scripts and processes and suspicious or unreliable scripts and processes;
β’Prevent malware from changing the disk boot sector so that it (such as Bootkit) cannot start on the computer;
β’Prevent modifications to the registry and prevent Windows Safe Mode from being disabled;
β’Prohibit malicious software from changing software startup permissions;
β’It is forbidden to secretly load new or unknown drivers;
β’Prevent malicious software and some applications from starting automatically, such as software that specifically destroys the operation of anti-virus software, and prohibit it from completing self-starting after registering in the registry;
β’It is forbidden to change the registry branch responsible for the virtual device driver to prevent Trojans from posing as virtual devices to the computer;
β’Prevent malware from disrupting the normal operation of system services.
Dr.Web Process Dumper
Dr.Web Process Dumper is a packaged threat comprehensive analyzer, greatly improving the detection level of so-called "new threats". These so-called "new threats" are actually known threats hidden in the new packager. Using this analysis technology can avoid adding unnecessary new records to the virus database, thus ensuring the compactness of the Dr.Web virus database, and thus eliminating the need to raise system requirements, while maintaining consistent small traffic updates, while detection and removal Always at a high level.
Dr.Web ShellGuard
Dr.Web ShellGuard prevents vulnerability attacks, that is, exploiting vulnerabilities in malware to control applications and operating systems.
Dr.Web ShellGuard protects the following common applications that can be installed on the Windows operating system:
β’Internet browsers (Internet Explorer, Mozilla Firefox, Yandex browser, Google Chrome, Vivaldi Browser, etc.);
β’MS Office applications, including MS Office 2016;
β’System application;
β’Application programs using java, flash and pdf technology;
β’media Player.
When analyzing risk operations, the protection system uses Dr.Web ShellGuard technology to analyze not only the sub-rules stored on the computer, but also the latest data collected in the Dr.Web cloud service, including:
β’Malware algorithm;
β’Clean file information;
β’Digital signatures of well-known software manufacturers that have been stolen;
β’Digital signatures used in advertising and risk programs;
β’Information about websites that are not recommended to visit;
β’Protection algorithms for different applications.
@uNDERCODEtESTING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Behavior analysis-How a antimalware works
> secure yourself !
π¦ππΌπ'π πππΈβπ:
Dr.Web Process Heuristic
The behavior analysis technology Dr.Web Process Heuristic is used to resist the latest and most dangerous malware. Such malware can avoid the traditional signature analysis and heuristic analysis mechanism.
Dr.Web Process Heuristic analyzes each startup process, compares it with the constantly updated Dr.Web cloud service, and judges whether the process is dangerous based on the latest understanding of malware behavior and whether it needs to take action to remove the threat.
π¦This data protection technology can minimize the loss caused by unknown viruses, while taking up very little resources of the protected system.
Dr.Web Process Heuristic monitors any attempts to change the system:
β’Identify malicious software processes that maliciously change user files (such as the activity of encryption Trojans);
β’Prevent malware from being implanted in other applications;
β’Prevent malware from changing important areas of the system;
β’Detect and block malicious scripts and processes and suspicious or unreliable scripts and processes;
β’Prevent malware from changing the disk boot sector so that it (such as Bootkit) cannot start on the computer;
β’Prevent modifications to the registry and prevent Windows Safe Mode from being disabled;
β’Prohibit malicious software from changing software startup permissions;
β’It is forbidden to secretly load new or unknown drivers;
β’Prevent malicious software and some applications from starting automatically, such as software that specifically destroys the operation of anti-virus software, and prohibit it from completing self-starting after registering in the registry;
β’It is forbidden to change the registry branch responsible for the virtual device driver to prevent Trojans from posing as virtual devices to the computer;
β’Prevent malware from disrupting the normal operation of system services.
Dr.Web Process Dumper
Dr.Web Process Dumper is a packaged threat comprehensive analyzer, greatly improving the detection level of so-called "new threats". These so-called "new threats" are actually known threats hidden in the new packager. Using this analysis technology can avoid adding unnecessary new records to the virus database, thus ensuring the compactness of the Dr.Web virus database, and thus eliminating the need to raise system requirements, while maintaining consistent small traffic updates, while detection and removal Always at a high level.
Dr.Web ShellGuard
Dr.Web ShellGuard prevents vulnerability attacks, that is, exploiting vulnerabilities in malware to control applications and operating systems.
Dr.Web ShellGuard protects the following common applications that can be installed on the Windows operating system:
β’Internet browsers (Internet Explorer, Mozilla Firefox, Yandex browser, Google Chrome, Vivaldi Browser, etc.);
β’MS Office applications, including MS Office 2016;
β’System application;
β’Application programs using java, flash and pdf technology;
β’media Player.
When analyzing risk operations, the protection system uses Dr.Web ShellGuard technology to analyze not only the sub-rules stored on the computer, but also the latest data collected in the Dr.Web cloud service, including:
β’Malware algorithm;
β’Clean file information;
β’Digital signatures of well-known software manufacturers that have been stolen;
β’Digital signatures used in advertising and risk programs;
β’Information about websites that are not recommended to visit;
β’Protection algorithms for different applications.
@uNDERCODEtESTING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β