Category Archives: Software News

Get Organized With the Powerful Information Manager

CSoftLab has announced the release of C-Organizer Professional 4.0, the new major version of the advanced information manager providing the tools to organize and conveniently store all the important info in one place. The new version supports the Standard, Mixed and Ribbon interfaces, various color schemes, ensuring that a user will get comfortable with the program in no time.

If you store the important information in several places, you most likely suffered the inconvenience of this method. Retrieving contact info, looking for a sketch or in a pile of assorted papers, remembering all the appointments and scheduling meetings can come as a quite complicated task. What you need in this case is an integrated solution for information management that will store all the necessary info, so that you would always know where it is and be able to find it with just a few clicks. To meet this need, CSoftLab has developed C-Organizer Professional.

Designed to make information management quick and easy, C-Organizer Professional enables a user to plan and organize business and personal life, thus helping to save time and improve productivity. The comprehensive software offers a planner, an address book, password and bookmark managers, a notebook and a calendar of events all rolled into one PIM that smoothly integrates with your default e-mail client and web browser.

C-Organizer Pro features built-in Calendar to schedule tasks, appointments and meetings. And you can be sure that you don’t miss anything: the smart program will remind you of an upcoming deadline, holiday, birthday and other important events. The PIM allows you to make To-Do lists for your employees and teammates, group them and share over the network.


The program also offers the Address Book that allows storing pictures along with the usual contact info and features easily configurable database structure. To prevent information leaks, your sensitive data can be password protected and encrypted. You, on the other hand, will be able to access your info anytime, even while on the go, thanks to the support for synchronization with Pocket PC and Palm devices.

Pricing and Availability

C-Organizer Professional runs under Microsoft Windows 98, ME, NT4, 2000, XP, Vista and Windows 7, and costs $49.95 for a license. Licensed users are entitled to unlimited technical support and free lifetime updates. Further information on the product as well as its free 30-day evaluation version is available at https://csoftlab.com/c-organizer.

About CSoftLab

Founded in 2000, CSoftLab is an independent software development company focused on providing information management solutions. C-Organizer Professional edition remains the company’s bestselling title since the product launch in 2001. Originally developed in 2001, the program has since gained wide recognition from media and enjoyed popularity among customers. For more information, please visit www.csoftlab.com.

Graphcat<

An Offline Stock Icon Catalog

SibCode announces the release of Sib Icon Catalog, a free Windows tool to help webmasters, Web and software developers find and purchase ready-made graphics. Indexing hundreds of royalty-free icon collections and thousands of tagged individual icons, Sib Icon Catalog makes it easy to locate, preview, and buy icons for almost any project.

About Sib Icon Catalog

Sib Icon Catalog makes it easier to find, preview, and order graphics without spending hours in Google. Indexing hundreds of ready-made icon collections and thousands of royalty-free icons, Sib Icon Catalog will help webmasters, designers, Web and application developers find graphics they need in just minutes. All icons indexed by Sib Icon Catalog are carefully tagged, allowing to find just the right images in no time. Instant icon previews are included with Sib Icon Catalog. Unlike online sources, Sib Icon Catalog previews icons in full size and with no watermarks.

All images indexed by Sib Icon Catalog are coming directly from the source, with royalty-free licenses that make it possible to use images as many times as needed without paying extra in licensing fees. Sib Icon Catalog greatly simplifies searching and buying icons.

Thousands of previews with no watermarks are included with Sib Icon Catalog download. The tool offers a choice of individual icons or discounted icon sets. All icons can be ordered immediately, and will be delivered in just a few minutes to help customers meet the tightest deadlines.

Stock icons indexed by Sib Icon Catalog are available in numerous formats, sizes and color depths. ICO, GIF, PNG, and BMP formats are indexed. Images of 16×16 to 256×256 pixels, in 256 colors or 32-bit True Color with alpha channel can be purchased.

About SibCode

Founded in 2005, SibCode specializes in delivering a variety of graphic-related products and services to businesses and end users. The company’s products range from lightweight font and graphic editors, image viewers, and watermarking software to a variety of ready-made icon collections. In addition, SibCode offers royalty-free icons as well as graphic design services.

McAfee Offers Guidance and Protection as China-Linked Google Cyberattack Continues to Unfold

McAfee Guidance Helps Organizations Determine If They Were Compromised, McAfee Products Shield Against Future Attacks Exploiting Internet Explorer Vulnerability

SANTA CLARA, Calif.–(BUSINESS WIRE)–McAfee, Inc. (NYSE:MFE) today released guidance to help organizations determine if they were targeted in the same sophisticated cyberattack that hit a growing list of companies, including Google. The high profile cyberattack, linked to China by Google, targeted valuable intellectual property.

“This is the largest and most sophisticated cyberattack we have seen in years targeted at specific corporations,” said McAfee Worldwide Chief Technology Officer George Kurtz. “It is a watershed moment in cybersecurity because of the targeted and coordinated nature of the attack. As a result, the world has changed; organizations globally will have to change their threat models to account for this new class of highly sophisticated attack that goes after high value intellectual property.”

As part of the fallout of the attack, Windows users currently face a real and present danger due to the public disclosure of a serious vulnerability in Internet Explorer. McAfee was the first to discover and announce that an Internet Explorer vulnerability was a key vector in the attack on Google and others. Unfortunately, the risk has been compounded because the attack code that exploits this Internet Explorer vulnerability has now been posted in the public domain, increasing the possibility of widespread attacks. McAfee technologies provide protection against current threats related to the attack on Google and others.

How to know if your organization was compromised

Over 30 organizations have reportedly been targeted by the same attack that hit Google and the list of victims continues to grow. McAfee calls the cyberheist “Operation Aurora” and today provided detailed guidance to help organizations determine if they were impacted by the attack, which occurred over the December holidays and into early January.

McAfee’s guidance involves two steps:

1) If you are a McAfee customer, verify that you are using the latest threat definition files and perform a full scan on all machines within your enterprise.

2) Inspect network traffic history for communication with external systems associated with the attack.

3) Examine computers for specific files or file attributes related to the attack.

Detailed guidance is available on the McAfee Web site at http://www.mcafee.com/operationaurora

How to protect against the Internet Explorer vulnerability

McAfee products protect against attacks that may use the now publicly available exploit to attempt to attack Internet Explorer users and the malware used in the attack on Google and others:

1. McAfee consumer and enterprise PC security products provide protection against the malicious computer programs used to target Google and others through the threat definition files released on January 11 and through the McAfee real-time, cloud-based Global Threat Intelligence. Current customers should ensure the latest definition files are installed and that cloud detection is enabled. McAfee consumer security products are available online.

2. McAfee® Network Security Platform detects attacks that use the Internet Explorer zero-day exploit through the threat definition files released on January 15. Users of the McAfee Network Security Platform should ensure the latest definition files are installed.

3. McAfee Web Gateway and McAfee Firewall Enterprise provide powerful Web security technology to filter malicious traffic on the network. Users of either of these McAfee products should ensure that outbound Web security capabilities are enabled and malware scanning within the firewall is based on the latest signatures and associated rules.

Use Advanced McAfee Technology To Detect Future Attacks

The attack on Google and others marks a new, high-risk era in the world of cybercrime where these advanced persistent threats are no longer targeted at just governments, but are also targeted at organizations in many different sectors. McAfee is making available free trials of its advanced protection technologies to help companies shield themselves against sophisticated attacks such as the recent attack on Google and others.

Organizations can evaluate the following McAfee technologies at no cost:

* McAfee Network Threat Response, a network security appliance that automatically analyzes threats attempting to spread on a network. McAfee Network Threat Response would have allowed victims to detect the attack that hit Google and others.
* McAfee Application Control, a whitelisting application that prevents zero-day attacks past and future and ensures only trusted applications run on servers and PCs. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Also, McAfee Foundstone® has consultants who are available for forensic investigations. Complete the “911 Contact Form” on the Foundstone Web site for help.

McAfee will continue to provide updates on the attack that hit Google and other cyberattacks on its Web site and blog.

About McAfee, Inc.

McAfee, Inc., headquartered in Santa Clara, California, is the world’s largest dedicated security technology company. McAfee is committed to relentlessly tackling the world’s toughest security challenges. The company delivers proactive and proven solutions and services that help secure systems and networks around the world, allowing users to safely connect to the Internet, browse and shop the web more securely. Backed by an award-winning research team, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. http://www.mcafee.com