Archive

Archive for January, 2010

Free Hide Folder

Free Hide Folder is a free computer security software to hide your private folders. It is very useful to keep your personal data away from others. Others will not know where your personal files exist and they will not be able to accidentally view them. You can hide folders simply with a few mouse clicks. Free Hide Folder is protected by a password that you can change or remove at any time.

S.O.:
Windows 9x/Me/NT/2000/XP/2003/Vista/7

License:  Freeware

Homepage:
http://www.cleanersoft.com/hidefolder/free_hide_folder.htm

Download page:
http://www.cleanersoft.com/download/FHFSetup.exe

Advertisements

A-SQUARED Free

A-SQUARED Free

Scans the computer for malicious software (Malware). The term Malware describes Trojan Horses, Dialer, Worms, Spyware and others. a-squared Free is specialized in finding and removing them securely.

The disk scan checks all files on your disks for Malware. The scanner also scans for Spyware Traces and Tracking Cookies. The included Memory Scan detects Malware immediately without the need to scan the whole harddisk to make a quick security check.
Currently more than 200,000 different types of Malware can be removed. After the scan has finished you can select which Malware files you want to remove automatically. Free daily online updates provides best protection against Malware. Secure your PC and stop hackers now!

O.S.:
Windows XP, Windows Vista, Windows 7 as well as on Windows Server 2003/2008 (in all 32 bit and 64 bit editions)

Homepage:

http://www.emsisoft.com/en/software/free

Download Page:

http://download4.emsisoft.com/a2FreeSetup.exe

UNIX – Lesson 018 – chown and chgrp commands

chown
The “chown” command is used to change the owner of a files and directories.

Permissions can only be changed by the owner (or root user, because he has full control over the attributes and access of files).

If you would like to give ownership of a file to another user on the system, you can ask to the system administrator to use the chown command.

Syntax :

chown [options] files/directories

Key argument :

  • -f    Force. Does not report errors.
  • -h   If the file is a symbolic link, this option changes the owner of the symbolic link. Without this option, only the owner of the file referenced by the symbolic link is changed.
  • -R   Recursive. chown descends through the directory, and any subdirectories, setting the specified ownership ID as it proceeds. When a symbolic link is encountered, the owner of the target file is changed, unless the -h option is specified.

Example

Starting from original permissions for “myfile” file equal to:

-rwxrwxrwx 1 xarabas users 22 Feb 20 14:53 myfile

If you run the following command:

$ chown hat myfile

the “hat” user became owner of “myfile” file instead of xarabas

Root can use chown to change, in the same time, the owner and the group of a file.

Running

chown hat:admins test test1

the “hat” user (with admins group) became owner of “test” and “test1” files files instead of xarabas (with users group)

================================================================================

chgrp
The “chgrp” command is used to change the group associated with files and directories.

Unlike the chown command, chgrp allows regular users to change groups, but only to one of which they are a member (otherwise root user, because he has full control over the attributes and access of files).

If you would like to give ownership of a file to another group on the system, you can ask to the system administrator to use the chgrp command.

chgrp newgroup files/directories

Syntax :

chgrp [options] files/directories

Key argument:

  • -f    Force. Does not report errors.
  • -h   If the file is a symbolic link, this option changes the group of the symbolic link. Without this option, only the group of the file referenced by the symbolic link is changed.
  • -R   Recursive. chgrp descends through the directory, and any subdirectories, setting the specified group ID as it proceeds. When a symbolic link is encountered, the group of the target file is changed, unless the -h option is specified.

Example

Starting from original permissions for “myfile” file equal to

-rwxrwxrwx 1 xarabas users 22 Feb 20 14:53 myfile

If you run the following command:

chgrp admins myfile

the group owner of “myfile” file became admins instead of users

If you run the following command:

chgrp users myfile

the group owner of “myfile” file became users instead of admins, we came back in the initial group settings.

Categories: Unix

UNIX – Lesson 017 – chmod command in symbolic-mode and in absolute-mode

chmod
The “chmod” command (abbreviated from change mode) is a shell command to change filesystem modes of files and directories
Permissions can only be changed by the owner (or root user).
There are two ways to use the chmod command:

  • symbolic-mode
  • absolute-mode

=================================================================================

chmod command in symbolic-mode

A symbolic mode specification has the following format:

Syntax :
chmod [options] symbolic-mode files/directories

Key argument :

  • -f    Force. chmod will  not  complain  if  it  fails  to  change the mode of a file.
  • -R    Recursively descends through  directory  arguments, setting  the mode for each file as described above. When symbolic links are encountered, the mode of the target file is changed, but no recursion takes place.

Where symbolic-mode is [who[operator]permission]

  • who         user, group, or other
  • operator         + (add), – (subtract), = (set equal to)
  • permission     read, write, execute

Examples

Starting from original permissions for “myfile” file equal to
-rw-r–r–   1 xarabas users         22 Feb 20 14:53 myfile

Running the following command:
chmod u+x,g+x,o+x myfile OR       chmod +x myfile
The final result is: rwxr-xr-x     myfile

Starting from the previous result and executing this command:
chmod g=x,o= myfile
The final result is: rw—x—     myfile

Starting from the previous result and executing this command:
chmod u+x,g=rx,o-r myfile
The final result is: rwxr-x—     myfile

=================================================================================

chmod command in absolute-mode

The chmod command also supports a numeric (octal) representation. This representation is
obsolete, but it’s a commonly used form. Convert each group of permissions into
appropriate numeric representation

Syntax :
chmod [options] absolute-mode files/directories

Key argument :

  • -f    Force. chmod will  not  complain  if  it  fails  to  change the mode of a file.
  • -R    Recursively descends through  directory  arguments, setting  the mode for each     file as described above. When symbolic links are encountered, the mode of the      target file is changed, but no recursion takes place.

Where absolute-mode is:

  • Read = 4
  • Write = 2
  • Execute = 1
  • 400     Allow read by owner.
  • 200     Allow write by owner.
  • 100     Allow execute (search in directory)  by owner.
  • 700     Allow read, write, and execute (search) by owner.
  • 040     Allow read by group.
  • 020     Allow write by group.
  • 010     Allow execute (search in directory)  by group.
  • 070     Allow read, write, and execute (search) by group.
  • 004     Allow read by others.
  • 002     Allow write by others.
  • 001     Allow execute  (search in directory)  by others.
  • 007     Allow read, write, and execute (search) by others.

Examples:

Starting from original permissions for “myfile” file equal to:
-rw-r–r–   1 xarabas users         22 Feb 20 14:53 myfile

Running the following command:
chmod 640 myfile
The final result is : -rw-r—–     myfile

Executing this command:
chmod 777 myfile
The final result is:-rwxrwxrwx     myfile

Executing this command:
chmod 000 myfile
The final result is: ———-     myfile

Executing this command:
chmod 755 myfile
The final result is: -rwxr-xr-x     myfile

Categories: Unix

Windows Vulnerability Scanner 1.42

Windows Vulnerability Scanner 1.42

Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system more secure.
This software is compatible with Windows XP (Home & Professional), Windows 2000 Server & Professional and Windows 2003. Once the Scan is completed, Protector Plus – Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch.
It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus – Windows Vulnerability Scanner was executed.

License:  Freeware

Download:  http://www.protectorplus.com/download/Winvulscan.exe

UNIX – Lesson 016 – Secure and share your information – Intro

There are three types of access for each file and directory :

Read files contents can be examined directories contents can be examined
Write files contents can be changed directories contents can be changed
eXecute files file can be used as a command directories can become current working directory

Some examples of file’s permissions are:

-rwxr–r– 1 xarabas admins 6 Aug 24 11:48 test.sh
This describes a file that is readable, writable, and executable by the user and readable by the group and others.

-rwxr-xr-x 1 xarabas admins 6 Aug 24 11:48 test.sh
This describes a file that is readable, writable, and executable by the user, readable and executable by the group and others.

-rwx—— 1 xarabas admins 6 Aug 24 11:48 test.sh
This describes a file that is readable, writable and executable only by the user.

Categories: Unix

Microsoft Office 2007 Add-in: Microsoft Save as PDF

Save as PDF

This tool allows you to export and save to the PDF format in eight 2007 Microsoft Office programs. It also allows you to send files as e-mail attachments in the PDF format in a subset of these programs. Specific features vary by program.

This Microsoft Save as PDF Add-in for 2007 Microsoft Office programs supplements and is subject to the license terms for the 2007 Microsoft Office system software. You may not use this supplement if you do not have a license for the software.

Download English page:

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=f1fc413c-6d89-4f15-991b-63b07ba5f2e5

Download Italian page:

http://www.microsoft.com/downloads/details.aspx?displaylang=it&FamilyID=f1fc413c-6d89-4f15-991b-63b07ba5f2e5

Categories: Microsoft Office 2007
%d bloggers like this: