Latest Trends
Get the latest in Tech,
once a week. Free.

VR/AR
Security
How Your PC Can Get Infected Even When Antivirus Software Works FineFebruary 20, 2025SecurityAntivirus software like we are told is certainly the most important software on our computers (these days in mobiles as well). But what we missed is, to understand how antivirus software works.
Because of this, there are instances your computer gets infected even though you have antivirus software installed and active.
In this article, we explore what exactly the capabilities of antivirus software are and help you understand how antivirus software works.
But first lets’ get around why our computers actually get affected. From the reports of several virus attacks here’s what we found out.
Than any other illegal means, earning money from a malware infected computer is more easy and safe. In addition, if the owner of that target computer isn’t so good on securing his stuff, the bad guys’ work gets more simplified. But how do these cyber criminals do it is the million dollar question and this is probably how:
Software Vulnerabilities: There are these backdoors around every other software, which invite bugs. The complex the software gets the more vulnerabilities it holds.
Sheer Intelligence: Though they are on the wrong side we do have to accept this strength of theirs. It isn’t so easy to create a virus that can surpass the best-secured systems.
So, lets’ accept they are good with their stuff but there are ways in which we can pave them off from our money and lives. One way is by relying on good updated antivirus software and here’s why you should.
How Antivirus Software Works – Techniques
You’ll understand why we always recommend an updated antivirus by actually getting into how these antivirus software work. And lets’ begin.
Antivirus software is a computer program which is capable of identifying and eliminating any malware present in our computers. Here are all the methods it employs to achieve its purpose:
Signature Based Detection –The Dictionary Approach
With this methodology, the antivirus program scans all the files looking for matches to its virus dictionary (or) database.
This database contains the virus signatures, which is the binary code (a unique arrangement of 1s and 0s) of all known viruses. Hence if there is a match in any of the files this software flags it malicious.
Though mostly this is the method followed there is one basic loop hole with this. If at all there is some new virus which isn’t present in the database of the software, it is let go. This is the reason why we recommend updated AV software.
Detection Based On Behavior
This approach of malware detection is far better and acceptable. Here the AV software continuously monitors the behavior of programs.
Once it finds any program for say, trying to write into an executable file or anything abnormal for that matter, it flags it suspicious and notifies the user about it. This technique is further divided into two types:
Analogy-Based Detection (Setting up what is normal behavior and anything abnormal is flagged suspicious)
Specification-Based Detection (All the computer actions are mediated by a predetermined policy and nothing other than this is done).
How To Detect Malware Infection On Your Computer
easy way to Detect Malware Infection On Your Computer. Let’s be honest, no one wants to own a computer that is infected with malicious programs. Therefore
Read More
Conclusion:
An antivirus software works by performing one or more of these mentioned techniques; hence providing those extra layers of security to your computer.
Well for all those who argue antivirus software is for crap, I suggest being safe than sorry for their computers could be on the brink of with over 100 viruses and 500 new malware being released into the internet each single day.
Now that you understood how antivirus software works hope you stay more secure than ever. Express your views about the same in the comments section below. [...]
Some Of The Best Tools To Sandbox Programs In Your ComputerFebruary 20, 2025Security / SoftwareEveryone likes to try new programs in Windows but not always do it with caution. To avoid shocks or conflicts between a test program and Windows, a good solution is to use a sandboxing tool.
Trying a new Windows program is something which we usually do, and everyday there are hundreds of emerging new utilities that improve our current state. However, most of the programs are safe and there’s nothing to worry about. But sometimes some wayward program may bring in some bugs into your Windows computer. To avoid such problems, there are several possible solutions like using virtual machines or by performing system restore or even by using a sandbox technology. Today we are going to introduce you to some of the best tools for sandboxing your programs. But before that, here’s something about sandboxing.
The sandbox technology is basically to create a virtual environment, where you can run programs or processes without directly relating them to the rest of the system. In this way, you can run a fully functional program and in case of any failure, there wont be any affect to the other programs or the operating system. This technology has been around much but has not become popular until it was used in OS X and Google Chrome. The advantages of using sandbox are many, mainly related to security and ease of adoption.
Sandbox Tools for Windows :
Sandboxie :
We start with the most popular tool for sandboxing in Windows. Sandboxie is an incredibly easy to use and very intuitive tool. It will not cost you anything to learn to take advantage of it. It will virtually serve any application , from programs to games, Internet and the rest. It also allows exporting files created within the sandbox for use in Windows, because by default all files created are deleted. You can test for a limited time and purchase a license for personal use for only $ 22.15 or 15 €.
iCore Virtual Accounts :
Another option to consider is iCore Virtual Accounts . As in the previous case, it creates a virtual sandbox to run specific programs, it is compatible with most programs, including web browsers or games, barely noticeable resource consumption and is very easy to use and manage, and can create two or more virtual spaces for different uses. Among its advantages, it also allows you to create a customized version of sandbox to fit your needs completely before installation.
Evalaze :
Available in three different versions, one free Evalaze provides a simple environment to virtualize applications without affecting Windows. On his website you will see a list of supported applications , although you can try on your own with specific programs or games. The process is very fast using a handy wizard that guides you step by step on what you must do.
BufferZone :
Something more complete is BufferZone , which lets you create virtual spaces for your programs and perform a host of activities, such as accessing web pages, opens mail messages and attachments within these virtual spaces, talking on IM safely and even share files over P2P networks. In this sense, BufferZone acts as a kind of filter between your programs and Internet threats. In addition, as with virtual machines, it even allows you to backup in order to restore the configuration of the virtual space in case damaged by the malfunction of a program.
Browser in the Box :
Browser in the Box specializes only the Internet safely. This sandbox tool creates a virtual space in which you can run the web browser, which is only a virtual machine with Debian, Linux and Firefox . Although resource consumption is high, it provides a safe navigation and will not download or install any malicious program. If in case, you want to then you can directly restore the virtual machine at any time. Anyway, if you think that downloaded files are safe, you can extract them from Browser in the Box for Windows.
Comodo Internet Security :
This comprehensive security suite offers all kinds of tools, such as antivirus, firewall, antispyware, protection in the torn and also a practical module for running applications under sandbox . Like the rest of Comodo Internet Security options, even creating a virtual space or sandbox is very simple. Just go to “Sandbox Tasks” and click on the “Virtual Run” button. After selecting the programs that you want to run in the sandbox, it will start in protected mode. On the other hand, you can do directly from Windows Explorer by right-clicking on the program and selecting “Run in COMODO Sandbox” option.
Cameyo :
Another option to consider is Cameyo , which converts all files of a program to a portable version that includes within it a single executable file to work. In this sense, Cameyo creates a sandbox that allows the usage of programs without affecting Windows, which is another very practical and easy to implement sandbox possible solution for Windows. [...]
Ever Tried Sandboxing Your Programs? Here’s Why You ShouldFebruary 19, 2025SecurityAre you sure your antivirus software is sufficient to protect your computer? Are you a regular target to viruses and other malware? Then wait not, it’s time to have an extra security layer in your computer. So this extra layer should be so good that hardly any of these malware can penetrate though it, isn’t it! So here’s the best solution for you and that’s ‘Sandboxing’.
What Is Meant By Sandboxing :
Sandbox is that virtual environment in your computer which can contain and run all the malicious applications without your system getting affected. A sandbox, in normal terms, is a wooden box of sand children play with and is specially designed to confine sand within the layout of the box. If not done so, there are umpteen chances the sand gets spread all over the place making a big mess.
This same concept is applied in computing to confine all the malware of your computer to a set location. Sandboxing enables you to run malicious software, websites and games once they are placed into your computer’s sandbox; and you wouldn’t notice a glitch. Now that you know what a sandbox can do, you can test or analyze suspicious software or code in a rather protected atmosphere.
Sandbox and Security:
By now you must have understood that a sandbox is a virtual controlled atmosphere. Let’s now talk about the how-it-does-so part. First of all, sandboxing a piece of code or an application means, providing it access to the minimum resources it requires thereby denying any other resource permissions it requests for, which it may abuse.
Hence the behavior of this sandboxed application can completely be monitored. During the entire process, the virus (if at all any) is confined to that box and can’t infect the host computer.
For instance, let’s consider the browser you are viewing this page from. If at all this browser is sandboxed, all the websites you visit run inside the sandbox. These websites are then confined to run only within your browser without any access to other resources, say your webcam. Simply, they can’t get to your webcam or your local computer files or your USB stick. They are totally confined.
Now consider you haven’t sandboxed this particular browser, if at all now you enter some malicious website it is the same as installing a virus knowingly. Surely your antivirus software will offer the first line of defense but had it not been updated to that virus signature, Boom! You are in trouble.
Recently many programs come with their own sandbox. For the above mentioned example it really isn’t that easy for malware to intrude into your system because it first has to cross the browser’s sandbox. Google Chrome and Internet Explorer have their own sandboxing techniques employed which alert you in times you are browsing through malicious content.
Not just browsers, even many other applications like the PDFs, Word Processing Documents, Mobile Apps, Browser plug-ins all have their own sandbox. But this sums up only to be one layer of security and to stay safe its better you have multiple layers of them. You can learn the art of sandboxing your programs in our coming articles.
The Bottom Line:
To stay safe online and to protect your personal data, it is must that you have an updated antivirus in your computer. Few antivirus programs like Comodo Internet Security include sandboxing. Like mentioned, it is just one layer of security and for sound protection you need many more of those layers.
‘Whatever happens in the sandbox stays within the sandbox’.
[...]
Web Guides
Join Our Tech Community For Free
How To
Set-Up The Incognito Mode As Your Default Browsing ModeFebruary 18, 2025PC Hacks / SecurityToday we are going to explain you the way to setup incognito mode as your default browsing mode without pressing ” Ctrl + Shift + N “. If you are unaware of what is an incognito mode then you can check out this article where it was previously explained on OnlineCmag .
Steps To Setup The Incognito Mode As Your Default Browsing Mode :
Step 1: Create a Shortcut :
You need to create a shortcut of ” chrome.exe ” file. You can find this in your program files Or program files (x86). Use this path as reference ” C:\Program Files (x86)\Google\Chrome\Application ” ( Change the ” C ” to the drive on which all your program are being installed ).
Step 2: Move On To Properties :
Right-Click on the shortcut and select the properties option.
Step 3 : Change The Path :
Now add the text command ” -incognito ” to the path specified in the target text box as shown in the below image.
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" -incognito
After this change, when ever you launch the application from this shortcut it will directly open the chrome’s incognito mode.
Share Your Views In Form Of Comments … [...]
FILEminimizer Pictures: The Best Freeware For Image CompressionFebruary 17, 2025PC HacksWith technology advancements, digital cameras and the cameras built in our phones carry photos of higher quality which obviously are larger in size . This creates problem while sharing these images between computers . As a result people have been opting for cloud storage services . Cloud Storage is is better but isn’t exactly the solution because it takes a lot of time uploading and downloading these images .
To help you with this task of image compression, ” Balesio ” developed an application known as ” FILEminimizer Pictures ” with which you can make a quick image compression of as many photos as you want. Later you can store them or send them directly via email.
The developers indicate that the compression rate reaches 98%, but based on the study we have made here in OnlineCmag.com, you can see for yourself that the usual image compression is around 80% , a figure that is not at all bad .
Unlike other applications that perform compression as Winrar or Winzip; FILEminimizer Pictures can access the file directly without requiring any decompression and hence can simply reduce the weight of the file.
To take advantage of this great freeware, just download it from the link available at the end of article.
Image Compression By FILEminimizer-pictures:
Installation is performed regularly and once you open the application the following main options will be displayed.
Open Files: Allows the application to load as many pictures you want.
Optimize Files: Performs compression for the uploaded files.
Optimize and Send: Make compressing files uploaded and then allows you to email them.
Search: Allows searching within your team to locate image files.
Settings: Allows you to modify different aspects of the application.
In addition to these basic options, this allows you to select different degrees of compression even lets you set compression to a particular screen resolution.
Balesio | FILEminimizer Picture [...]
Increase Your System Security By Using Facial RecognitionFebruary 15, 2025PC Hacks / SecurityHere comes the ultimate solution for those who often forget their Window’s password. By using this application you can simply access your computer just by sitting in front of it. Today we are going to show you how this fantastic program works. By using this application, no one can access the computer without your permission, unless you have a twin brother / sister.
Luxand Blink! is an application of biometric access that allows the user to access Windows by facial recognition. The user’s face is captured via Webcam, and compared with previously registered profile. Thus, the application can allow or deny access to Windows.
Luxand Blink! makes it extremely easy to access the system without entering any name and password in the window’s login.
System Requirements To Run This Application :
Operating System : Any version of Microsoft Windows .
Webcam compatible with DirectShow.
Needs 18 Mb of free disk space on the hard disk.
Steps To Setup The Facial Recognition :
The first thing is to install this application, during the installation process it will ask you to select the webcam that you want to use.
Once installation is complete, start the assistant for face recognition by clicking on Next.
Now it will show you how to stare for proper recognition. Click on Next to continue .
In the next window facial recognition will be started. You just stare ahead and turn your head to the right and left until the recognition process is finished, it just takes a few seconds.
After registering your faces successfully, you will be asked to enter the system password. After entering the password just click on Finish.
Test The Application :
To test its proper functioning, you can Logout and log back into your windows by using facial recognition . You can also enter windows by just typing the username and password as usual.
You can access the application settings by right-clicking on the Luxand Blink icon shown in the toolbar.
Application settings :
Face authentication login : Enable or disable the facial recognition.
Register my Face: Register a new face
Select camera: Choose a different camera.
Help file: Opens the web help.
The program runs at Windows startup: If this option is disabled the program does not start when Windows starts but will enable facial recognition.
View the login history: In this section we will have all the unsuccessful attempts to login by face recognition, for example if someone sits in front of the computer and tries to login , then this application will capture the image of the person and stores it a side. So you can also see who has tried to access your computer without your permission.
High security: By enabling this option,the application will learn something new whenever you log in with your face, like a haircut or a day without shaving etc.
High convenience: This is a training mode.
Our Team has tested this application and it works perfectlt fine, Eg: You can not use a photograph of the registered face to login into the system . So nobody except your twin brother/sister can login to the system. Also in case of failed login you can easy catch the intruder red-handedly . [...]