Article by rihey
Download cell Phone camera software and method of installation (1)First, the necessary software:1.MotoVision Download: http://www.cpcw.com/xz/MotoVision.rarThis compressed package contains two files MotoVision.exe and MotoVision.mpkg. The former for the pc side of the installation, including the pc side of the virtual camera driver and phone connection program, which is the cell phones(Cell phones wholesale) side of the installation files.2.MVDS Download: http://www.cpcw.com/xz/MVDS.rarThis is for the pc side of the cell phones connection procedures, roles and MotoVision in the cell phones connection procedures, is not required, but it increases the preview feature, and can be reduced to the task bar, it is easy to use them.3.USBLAN Download: http://www.cpcw.com/xz/USBLAN.rar for a series and E Series Motorola Linux smartphone USB NIC drivers.4.FullScrVideo.jar Download: http://www.cpcw.com/xz/FullScrVideo.jar This software is not required, it is a used cell phone with the full-Java program, with it, you are using a cell phone camera can be annoying when the menu to the hidden, and it also has the functions of suspended the camera.( Cell phone accessories wholesale)Second, the cell phone-side software installation:after decompressing MotoVision.rar file, use the “USB mass storage” mode to connect cell phones and PC, will change them MotoVision.mpkg Named MotoVision.pkg and copy to the cell phones, but can also be copied to FullScrVideo.jar. (Note: The cell phones side need security Mpkg installation process) on the point of living in the cell phones MotoVision.pkg file, pop-up menu and select Open With command, in the dialog box, select the Open as “mpkg install”, then you can hear the cell phones issue “mpkg files installed successfully,” the voice prompts. Also do not forget to install FullScrVideo.jar, the procedures and general Java program installation is the same, just click on the line. Then the cell phones again Start, you can find MotoVision program icon in phone “office” component.( camera cell phone)
Makers of Fake versions of known software packages buys advertisment at the search giant.
Google Adwords lets anyone buy themselves a good placement when people search for topic where it is offered any services. If you search for a particular search word at your place, a local company is bound to have bought themselves a sponsored link at google.
But not everyone has honest intentions when they buy a placement like this. Developers with malicious intents have bought themselves advertisment spots at Google.
Creators of the software package winrar warns people on a fake link to a fake version of their software on the sponsored link on google.
Zdnet informes that the users that search for winrar will get up a sponsored link that will lead them to a fake Donwload.com page. IF you download this version of the winrar software, you will get some messages that you will need to searh for threats on your machine. You will then be directed to several fake web pages with fake security software.
Zango buys advertisment spots that makes people to download winzip and winrar software, but what the users get is adware full of viruses.
These examples are only the tip of the iceberg, and we are bound to find more examples of these types of methodologies to spread viruses and worms to your computers, and servers around the world.
Google Sponsored Links Spreading Rogue Anti-Virus Software
McAfee warns that lots of fake Google Code projects have been created by cyber-criminals in order to push malware to unsuspecting users. The projects promote adult videos that prompt users to download malware in the form of fake video codecs.
Google Code is a popular service used by numerous software developers to promote and host their projects. A similar service, called MSN Spaces, is being offered by Microsoft, and has been abused by hackers in the past. Chris Barton, research scientist for McAfee, points out that, in addition, Google automatically indexes the projects in it’s search engine.
The McAfee researcher explains that, when attempting to watch the videos, which are actually just linked images, the users are redirected to a fake codec download website that actually serves them a malicious application. “Repeated clicks will take you to an adult site,” he also notes. The server hosting the malware is located in Latvia, and is also being used in other malicious campaigns.