How to Prevent Mobile Devices to Connect Internet
Date: Sep 28th, 2014 4:00:34 am - Subscribe
Mood: secure


1. Preface

Today, the popularity of mobile devices be quickly applied, many employees have a none corporate mobile device (IPAD, iPHONE, etc.) , it challenges the network security of corporate to connect a mobile device to wireless corporate network as one pleases, to prevent that employees connect their mobile device to wireless corporate network to use the corporate internet to surf, it is an important task for us, how to do this? The following example will demonstrate the point.
2. Network deployment

We need tow network devices, a switch with mirror port and a wireless router and application can send data via mirror port of switch, see the following figure:



Step1: To connect a PC to wireless router and change LAN port IP address of the wireless router, it will avoid conflicts with other devices within the network.

Step2: Disenable DHCP function of the wireless router.

Step3: Connect the wireless router to switch via LAN port of the wireless router.

Step4: Set mobile devices and connect them to wireless router.

Step5: Connect the monitor PC with Sax2 to mirror port of the switch.
3. Build a policy for Sax2 to prevent mobile devices access to app store

Step1: Launch Sax2 and open the "security policy" window, then derive a new policy set from the "default" policy set, see the following figure:

Step2: Select the new policy set and click the "edit" button on left to open setting window, see the following figure:

Step3: Switch to "Custom" page and select the "HTTP" item in right pane, click the "New" button to create a new policy, then enter the name of policy, select "Blocking and Log" response scheme, enter domains to be prohibited access, for example: www.ids-sax2.com, to here, the settings has been finished, see the following figure:

Step4: Save settings of policy and apply the new policy set, now we can prevent mobile devices to connect internet, about policy settings, please visit http://sax2help.ids-sax2.com/ to learn more information.
Comments: (0)


How to detect and remove the Trojan.IRCBot
Date: Oct 3rd, 2010 10:40:11 pm - Subscribe
Mood: mature


1. What is the Trojan.IRCBot

Trojan.IRCBot is a malicious back door Trojan which makes use of the popular IRC(Internet Related Chat)program, to cause you many unwanted computer problems.

Trojan.IRCBot.Gen can open a backdoor on your computer that allow a remote attacker to use Internet Relay Chat (IRC) to remotely control your system, send the worm to other IRC channels, update the Trojan, download and execute additional malware to your PC, perform Denial of Service (DoS) attacks against a specific target and send spam email messages, using the Internet connection of your computer.

This network-aware worm uses known exploits in order to replicate across vulnerable networks. In order to replicate itself through the network, Trojan.IRCBot.Gen can use common TCP ports used by some other worms: 135,139,445 or 593. This capability makes him a real threat for the company networks and servers. Using it like a backdoor, a remote attacker can compromise sensitive company data.

The most common ways to get infected with this worm are of three types:

*

by visiting Warez sites,
*

downloading pirated software from P2P networks,
*

or by opening an infected email attachment.


2. How to detect the Trojan.IRCBot with Sax2

Please update the policy basic knowledge of sax2 in time, we have add some polices for sax2 to detect the Trojan.IRCBot, once sax2 detects that the Trojan IRCBot attempt to establish a connection with the remote hosts, it will break the connection immediately to ensure your network & business security.

(Sax2 detected that the Trojan IRCBot attempt to establish a connection with the remote hosts)

(Sax2 breaked the connection successfully)
3. How to manually remove Trojan.IRCBot

*

Files associated with Trojan.IRCBot infection:
svchost.exe
1clickpcfix.exe
takod.exe
WindowsLive.exe
system32.exe
egun.exe
* Trojan.IRCBot processes to kill:
svchost.exe
1clickpcfix.exe
takod.exe
WindowsLive.exe
system32.exe
egun.exe
*

Remove Trojan.IRCBot registry entries:
HKEY_LOCAL_MACHINESOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN svchost
HKEY_LOCAL_MACHINESOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN 1 Click PC Fix - 3.5
HKEY_LOCAL_MACHINESystemCurrentControlSetServices akod
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ svchost
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ 1 Click PC Fix - 3.5
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\takod
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Windows Live
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Windows System32 Monitor
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Windows System Guard

4. How to Remove these trojans Instantly?

Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htm and download Malwarebytes' Anti-Malware to help you.

Comments: (0)


How to Detect and Remove the Trojan.FakeAV
Date: Oct 3rd, 2010 10:39:37 pm - Subscribe
Mood: fancy


1. What is the Trojan.FakeAV


Trojan.FakeAV is a malicious trojan horse that may represent a high security risk for the compromised system or its network environment. Trojan.FakeAV, also known as Trojan.Win32.Small.ccz, creates a startup registry entry and may display annoying fake alerts of malware payloads in order to persuade users to buy rogue antispyware products. Trojan.FakeAV contains characteristics of an identified security risk and should be removed once detected.


a. File System Modifications

%CommonFavorites%\_favdata.dat

%Temp%\eapp32hst.dll

%Temp%\PRAGMAb224.tmp

%Temp%\PRAGMAb253.tmp

%Temp%\PRAGMAc84c.tmp

%Temp%\TMP43307.tmp

%Temp%\topwesitjh

%Temp%\wscsvc32.exe

%Windir%\PRAGMAsesmccxtir\PRAGMAc.dll

%Windir%\PRAGMAsesmccxtir\PRAGMAcfg.ini

%Windir%\PRAGMAsesmccxtir\PRAGMAd.sys

%Windir%\PRAGMAsesmccxtir\PRAGMAsrcr.dat



* Notes:
o %CommonFavorites% is a variable that refers to the file system directory that serves as a common repository for all users' favorite items. A typical path is C:\Documents and Settings\All Users\Favorites (Windows NT/2000/XP).
o %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
o %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.

* The following directory was created:
o %Windir%\PRAGMAsesmccxtir

.
b. Memory Modifications

There were new processes created in the system:
Process Name Process Filename Main Module Size
wscsvc32.exe %Temp%\wscsvc32.exe 314,368 bytes
c. Registry Modifications

* The following Registry Key was created:

o HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups
o HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR
o HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000
o HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control
o HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR
o HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000
o HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control
o HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol
o HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\feature_enable_ie_compression
o HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
o HKEY_LOCAL_MACHINE\SOFTWARE\PRAGMA
o HKEY_LOCAL_MACHINE\SOFTWARE\PRAGMA\versions
o HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir
o HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir\modules
* The newly created Registry Values are:

o [HKEY_LOCAL_MACHINE\SOFTWARE]
+ f7c5da73-b4a5-4947-8f40-08f2871eb36b = ""
o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
+ DisableTaskMgr = 0x00000001
o [HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups]
+ ConvertedToLinks = 0x00000001
o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control]
+ *NewlyCreated* = 0x00000000
+ ActiveService = "PRAGMAsesmccxtir"
o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000]
+ Service = "PRAGMAsesmccxtir"
+ Legacy = 0x00000001
+ ConfigFlags = 0x00000000
+ Class = "LegacyDriver"
+ ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
+ DeviceDesc = "PRAGMAsesmccxtir"
o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_PRAGMASESMCCXTIR]
+ NextInstance = 0x00000001
o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000\Control]
+ *NewlyCreated* = 0x00000000
+ ActiveService = "PRAGMAsesmccxtir"
o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR\0000]
+ Service = "PRAGMAsesmccxtir"
+ Legacy = 0x00000001
+ ConfigFlags = 0x00000000
+ Class = "LegacyDriver"
+ ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
+ DeviceDesc = "PRAGMAsesmccxtir"
o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PRAGMASESMCCXTIR]
+ NextInstance = 0x00000001
o [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\feature_enable_ie_compression]
+ svchost.exe = 0x00000001
o [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
+ ProxyEnable = 0x00000000
o [HKEY_CURRENT_USER\Printers\Connections]
+ affid = "396"
+ subid = "landing"
o [HKEY_CURRENT_USER\Software]
+ 24d1ca9a-a864-4f7b-86fe-495eb56529d8 = ""
+ 7bde84a2-f58f-46ec-9eac-f1f90fead080 = ""
o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
+ DisableTaskMgr = 0x00000001

to prevent users from starting Task Manager (Taskmgr.exe)

o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
+ dfrgsnapnt.exe = "%Temp%\dfrgsnapnt.exe"
o [HKEY_LOCAL_MACHINE\SOFTWARE\PRAGMA]
+ affid = "5"
+ type = "no"
+ build = "no"
+ subid = "direct"
o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir\modules]
+ PRAGMAd = "\systemroot\PRAGMAsesmccxtir\PRAGMAd.sys"
+ PRAGMAc = "\systemroot\PRAGMAsesmccxtir\PRAGMAc.dll"
o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PRAGMAsesmccxtir]
+ start = 0x00000001
+ type = 0x00000001
+ imagepath = "\systemroot\PRAGMAsesmccxtir\PRAGMAd.sys"
* The following Registry Value was deleted:

o [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\ServiceCurrent]
+ (Default) =
o [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent]
+ (Default) =
o [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
+ Cache =

d. Other details

*

There was registered attempt to establish connection with the remote host. The connection details are:

Remote Host Port Number
91.212.127.86 80
91.212.127.96 80

*

The data identified by the following URL was then requested from the remote web server:
o http://mediafulluns.com/any3/5-direct.ex
o http://www.searchaverage.org/a/ad
o http://searchaverage.org/readdatagateway.php?type=stats&affid=396&subid=landing&version=4.0&adwareok


2. How-to's

a. Please update the policy basic knowledge of Sax2 in time, Once sax2 detects the communication of these trojans, it will break them and ensure your network & business security.
b. How to Remove the Trojan.FakeAV Manually?

Step 1 : The associated files of Trojan.FakeAV to be deleted are listed below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*]


Step 2 : The registry entries of Trojan.FakeAV that need to be removed are listed as follows:

File Name File Size MD5
CLADD 2560 e229a2fa3acd3f307ede63b89db833a4
WI3e94.exe 1943552 02fed38ea8975716f5f8f2595f905010
ddexpshare.exe 790528 8b4840953e5511d0a08ee67ff0034e2c
services.exe 47616 da9976cd71469bbcf0f87ec40e2ce798


c. How to Remove these trojans Instantly?

Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htmand download Malwarebytes' Anti-Malware to help you.


3. Appendix

For more information, please visit http://www.ids-sax2.com/ComputerSecurityNewsletter.htm
Comments: (0)


How to Detect and Remvoe the Trojan-Banker.Win32.Banbra
Date: Oct 3rd, 2010 10:38:51 pm - Subscribe
Mood: daring


1. What is the Trojan-Banker.Win32.Banbra

Trojan-Banker.Win32.Banbra is a malicious Trojan designed to steal banking details. Trojan-Banker.Win32.Banbra uses stealth tactics to enter the PC before downloading other harmful files from the Internet. Trojan-Banker.Win32.Banbra steals financial data like credit card numbers and online banking login details by taking screen snapshots of user activity. Trojan-Banker.Win32.Banbra also downloads additional components and poses a severe security risk to computer safety.


a. File System Modifications

%AppData%\36383.js

%AppData%\hotfix.exe [file and pathname of the sample #1]

%AppData%\srsf.bat

Notes:

%AppData% is a variable that refers to the file system directory that serves as a common repository for application-specific data. A typical path is C:\Documents and Settings\[UserName]\Application Data.

.
b. Memory Modifications

There were new processes created in the system:
Process Name Process Filename Main Module Size
[filename of the sample #1] [file and pathname of the sample #1] 3,796,992 bytes
hotfix.exe %AppData%\hotfix.exe 3,796,992 bytes
c. Registry Modifications

* The following Registry Key was created:
o HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run


* The newly created Registry Values are:
o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
+ WarnOnPost = 0x00000000
+ WarnOnZoneCrossing = 0x00000000
+ WarnOnPostRedirect = 0x00000000
+ WarnonBadCertRecving = 0x00000000
o [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
+ Shell = "%AppData%\hotfix.exe"

so that hotfix.exe runs every time Windows starts


* The following Registry Value was deleted:
o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
+ WarnOnPost = 01 00 00 00


d. Other details

*

The following port was open in the system:

Port Protocol Process
1053 UDP [file and pathname of the sample #1]

*

There was registered attempt to establish connection with the remote host. The connection details are:

Remote Host Port Number
85.234.191.174 80

*

The data identified by the following URL was then requested from the remote web server:
o http://85.234.191.174/zz.php?id=t_a_d_01


2. How-to's

a. Please update the policy basic knowledge of Sax2 in time, Once sax2 detects the communication of these trojans, it will break them and ensure your network & business security.
b. How to Remove the Trojan-Banker.Win32.Banbra Manually?

Step 1 : The associated files of Trojan-Banker.Win32.Banbra.ukb to be deleted are listed below:
%ProgramFiles%\Bulk Image Downloader\locale\zh_CHT\LC_MESSAGES
%ProgramFiles%\Bulk Image Downloader\locale\zh_CHT
%ProgramFiles%\Bulk Image Downloader\locale\zh_CHS\LC_MESSAGES
%ProgramFiles%\Bulk Image Downloader\locale\zh_CHS
%ProgramFiles%\Bulk Image Downloader\locale\uk\LC_MESSAGES
%ProgramFiles%\Bulk Image Downloader\locale\uk
%ProgramFiles%\Bulk Image Downloader\locale\tr\LC_MESSAGES
%ProgramFiles%\Bulk Image Downloader\locale\tr
%ProgramFiles%\Bulk Image Downloader\locale\sv\LC_MESSAGES
%ProgramFiles%\Bulk Image Downloader\locale\sv
%ProgramFiles%\Bulk Image Downloader\locale\sr\lc_messages
%ProgramFiles%\Bulk Image Downloader\locale\sr
%ProgramFiles%\Bulk Image Downloader\locale\sk\LC_MESSAGES
%ProgramFiles%\Bulk Image Downloader\locale\sk

Step 2 : The registry entries of Trojan-Banker.Win32.Banbra.ukb that need to be removed are listed as follows:
HKEY_CURRENT_USER\Software\Javasoft\Ex
HKEY_CURRENT_USER\Software\Javasoft
HKEY_CURRENT_USER\Software\Antibody Software\Bulk Image Downloader
HKEY_CURRENT_USER\Software\Antibody Software
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open current page with BID Link E&xplorer
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open current page with BI&D
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open &link target with BID
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Enqueue link tar&get with BID
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\En&queue current page with BID
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt
HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\Old_Current
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Bulk Image Downloader_is1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell\open\command
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell\open
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\DefaultIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader\shell\open\command
c. How to Remove these trojans Instantly?

Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htmand download Malwarebytes' Anti-Malware to help you.


3. Appendix

For more information, please visit http://www.ids-sax2.com/ComputerSecurityNewsletter.htm
Comments: (0)


How to Detect and Remove the Trojan.PSW.Agent.skv
Date: Oct 3rd, 2010 10:37:11 pm - Subscribe
Mood: naked


1. What is the Trojan.PSW.Agent.skv

Trojan.PSW.Agent monitors and records your keystrokes and scans your computer for stored passwords. This information is then sent to the parasite authors. Trojan.PSW.Agent is highly dangerous and is a serious threat to your financial and personal information.


a. File System Modifications

%ProgramFiles%\auclt.exe

%System%\engine32.dll

%System%\mlang32.dat

%System%\sound32.exe

5 %System%\winmn.dll

Notes:

%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.

%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
b. Memory Modifications

There were new processes created in the system:
Process Name Process Filename Main Module Size
[filename of the sample #1] [file and pathname of the sample #1] 561,152 bytes
sound32.exe %System%\sound32.exe 561,152 bytes
c. Other details

* There was registered attempt to establish connection with the remote host. The connection details are:


Remote Host Port Number
222.73.165.154 80

* The data identified by the following URL was then requested from the remote web server:
o http://m468.3322.org/m/t.php?m=&v=&is=0


2. How-to's

a. Please update the policy basic knowledge of Sax2 in time, Once sax2 detects the communication of these trojans, it will break them and ensure your network & business security.
b. How to Remove the Trojan.PSW.Agent.skv Manually?

Step 1 : Use Windows Task Manager to Remove Trojan.PSW.Agent Processes
Remove the "Trojan.PSW.Agent" processes files:
relpop.exe
svvosts.exe
nmhxy.exe
5Sy.exe
5[1].exe

Step 2 : Use Windows Command Prompt to Unregister Trojan.PSW.Agent DLL Files
Search and unregister "Trojan.PSW.Agent" DLL files:
nmhxy.dll
mywow.dll

Step 3 : Detect and Delete Other Trojan.PSW.Agent Files
Remove the "Trojan.PSW.Agent" processes files:
relpop.exe
svc
svvosts.exe
nmhxy.exe
5Sy.exe
5[1].exe
nmhxy.dll
mywow.dll

Step 4 : View the Trojan.PSW.Agent Components with its MD5s
Remove the "Trojan.PSW.Agent" components:

File Name File Size MD5
svchost.exe 35840 65cdc258d2ec47f25d2bec762d6550df


c. How to Remove these trojans Instantly?

Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start. visit http://www.ids-sax2.com/Malwarebytes-Anti-Malware.htmand download Malwarebytes' Anti-Malware to help you.


3. Appendix

For more information, please visit http://www.ids-sax2.com/ComputerSecurityNewsletter.htm
Comments: (0)


Labtop World Template
Free Blog Hosting Join Today
Content Copyrighted devidhuang at Aeonity Blog