Jump to content

大†Shinegumi†大

Members
  • Joined

  • Last visited

Posts posted by 大†Shinegumi†大

  1. Posted ·

    Edited by 大†Shinegumi†大

    bd32904016.png


    Brave Browser is a free, fast, secure and open source web browsing application based on the Chromium and available for your all devices. Complete with a built-in ad blocker that prevents tracking and provides security protection with optimized data and battery performance.

    The Brave is much more than a web browser, it is a new way of thinking about how the web works. Brave is on a mission to fix the web by giving users a safer, faster and better browsing experience while growing support for content creators through a new attention-based ecosystem of rewards.

    Brave is built by a team of privacy focused, performance oriented pioneers of the web, including the inventor of JavaScript and co-founder of Mozilla. It begins with giving you back power. Get unmatched speed, security and privacy by blocking trackers. Earn rewards by opting into our privacy-respecting ads and help give publishers back their fair share of Internet revenue.

    Browse Faster – Load pages 3x to 6x faster
    Watch Brave in action, head-to-head-to-head against Chrome and Firefox. Brave loads pages three times as fast out of the box with nothing to install, learn or manage.

    Switching is easy – Import and continue where you left off
    It’s easy to import your settings from your old browser. You can do it during the welcome tour or later through the menus. All of your old browser profiles will appear in a list. You can import other browser data through the main menu item called “Import Bookmarks and Settings.”

    Support your favorite sites with Brave Rewards
    Turn on Brave Rewards and give a little back to the sites you frequent most. Earn frequent flyer-like tokens (BAT) for viewing privacy-respecting ads through Brave and help fund the content you love.

    Browsing the web with Brave is free: with Brave Rewards activated, you can support the content creators you love at the amount that works for you.

    The browser can automatically distribute your contributions based on how much time you spend on sites. Or, you can choose to tip sites directly, and even offer a fixed monthly tip amount.

    All of this works while keeping your browsing history private. Your funds are made available to site owners through an anonymous ledger system, so you can’t be identified based on the sites you visit and support. Over 10,000 publishers and content creators have registered to receive Brave Rewards.

    Remember: these contributions are optional – browsing the web with Brave Browser is free.

     

    TqR2YhjA_o.png

     

    cDSckV8C_o.png

     

    AA7sbsV1_o.png

     

    oPeZvPQI_o.png

    Brave Browser Feature List:
    Shields
    Ad blocking
    Fingerprinting prevention
    Cookie control
    HTTPS upgrading
    Block scripts
    Per-site shield settings
    Configurable global shield defaults
    Brave Rewards
    Earn by viewing private ads
    Tip your favorite creators
    Contribute monthly to sites
    Auto-contribute to sites
    Verify with Uphold and move funds in and out of your wallet
    Become a verified creator and start earning BAT from tips, contributions and referrals
    Tabs and Windows
    Private Windows
    Pinned Tabs
    Auto-unload
    Drag and drop
    Duplicate
    Close Options
    Find on page
    Print page
    Security
    Clear browsing data
    Built-in password manager
    Form autofill
    Control content access to full-screen presentation
    Control site access to autoplay media
    Send “Do not track” with browsing requests
    Search
    Choose default search engine
    Use keyboard shortcuts for alternate search engines
    Option to use DuckDuckGo for private window search
    Address Bar
    Add Bookmark
    Autosuggest URLs
    Search from address bar
    Autosuggest search terms
    Show/hide bookmarks toolbar
    Show secure or insecure site
    Extensions and Plugins
    Brave Desktop now supports most of the Chrome extensions in the chrome web store

    Windows 7/8/10

    VhX3MiHy_o.png

     

     

  2. Posted ·

    Edited by 大†Shinegumi†大

     

    253.jpg

    Notes:
    1- youtube-dl.exe included to run video URLs
    2- Disabled check for updates
    3- Enabled Dark Theme
    4- Enabled playback ability in the preview pane of Explorer
    5- Command line switches: Auto install with Progress Only "/SILENT" Or Completely Silent "/VERYSILENT"
    6- Enjoy!

    222.jpg

     

    Screen-Shot-20240116102328.png

     

    Screen-Shot-20240116102321.png

    2Gcl91J.png

    K-Lite Codec Pack Full 18.8.0 Silent Install 

  3. Posted

    VirtualBox_3.2.12_r68302_Final.jpg

    VirtualBox is an application installed on an existing host OS; Within this application,
    Additional operating systems can be loaded and run, each with its own virtual environment. For example,
    Multiple Linux distributions can be hosted on a single Windows XP machine; Likewise, XP and Vista
    It can run on a Linux machine etc. There is free for personal
    Or the review uses a proprietary version and the GNU General Public version
     VirtualBox 6.1.14 Build 140239 Silent

     

    Quote

     

     

  4. Correcciones de seguridad

    Chrome 85 implementa 20 correcciones de seguridad. Investigadores externos encontraron lo siguiente:

    • [$ N / A] [ 1109120 ] Alto CVE-2020-6558: Cumplimiento de políticas insuficiente en iOS. Reportado por Alison Huffman, Microsoft Browser Vulnerability Research el 2020-07-24
    • [$ TBD] [ 1116706 ] Alto CVE-2020-6559: usar después de la API gratuita en la presentación. Reportado por Liu Wei y Wu Zekai de Tencent Security Xuanwu Lab el 2020-08-15
    • [$ 5000] [ 1108181 ] Medio CVE-2020-6560: Cumplimiento de políticas insuficiente en la función de autocompletar. Reportado por Nadja Ungethuem de www.unnex.de el 2020-07-22
    • [$ 1000] [ 932892 ] Medio CVE-2020-6561: Implementación inapropiada en la Política de seguridad de contenido. Reportado por Rob Wu el 2019-02-16
    • [$ 1000] [ 1086845 ] Medio CVE-2020-6562: Cumplimiento de políticas insuficiente en Blink. Reportado por Masato Kinugawa el 2020-05-27
    • [$ 1000] [ 1104628 ] Medio CVE-2020-6563: Cumplimiento de políticas insuficiente en el manejo de intenciones. Reportado por Pedro Oliveira el 2020-07-12
    • [$ 500] [ 841622 ] Medio CVE-2020-6564: IU de seguridad incorrecta en los permisos. Reportado por Khalil Zhani el 2018-05-10
    • [$ 500] [ 1029907 ] Medio CVE-2020-6565: IU de seguridad incorrecta en Omnibox. Reportado por Khalil Zhani el 2019-12-02
    • [$ N / A] [ 1065264 ] Medio CVE-2020-6566: Cumplimiento de políticas insuficiente en los medios. Reportado por Jun Kokatsu, Microsoft Browser Vulnerability Research el 2020-03-27
    • [$ 500] [ 937179 ] Bajo CVE-2020-6567: validación insuficiente de la entrada no confiable en el manejo de la línea de comandos. Reportado por Joshua Graham de TSS el 2019-03-01
    • [$ 500] [ 1092451 ] CVE-2020-6568 bajo: Cumplimiento de políticas insuficiente en el manejo de intenciones. Informado por Yongke Wang (@Rudykewang) y Aryb1n (@ aryb1n) de Tencent Security Xuanwu Lab (Tencent Security Xuanwu Lab) el 2020-06 -08
    • [$ N / A] [ 995732 ] Bajo CVE-2020-6569: Desbordamiento de enteros en WebUSB. Reportado por guaixiaomei el 2019-08-20
    • [$ N / A] [ 1084699 ] Bajo CVE-2020-6570: Fuga de información de canal lateral en WebRTC. Reportado por Signal / Tenable el 2020-05-19
    • [$ N / A] [ 1085315 ] CVE-2020-6571 bajo: IU de seguridad incorrecta en el cuadro multifunción. Reportado por Rayyan Bijoora el 2020-05-21
    • [ 1121299 ] Varias correcciones de auditorías internas, fuzzing y otras iniciativas

    Por lo tanto, Google gastó al menos $ 10,000 en recompensas por errores para esta versión, una pequeña cantidad en comparación con su gasto habitual. Como siempre, las correcciones de seguridad por sí solas deberían ser un incentivo suficiente para que actualice.

  5. Posted ·

    Edited by 大†Shinegumi†大

    20051302442826293.jpg


     

    .: Installation Notes:.
    # Old Versions Are Cleaned Before Installation.
    # Initial Auto Starts and Services Removed.
    Storage of Setup Files has been removed. Agreements Come Accepted.
    # Product Improvement, Digital Edition Help, Acrobat.Com Access Closed.
    # All Updates Closed. Update Service is Disabled.
    # Wait Until Information About the Installation Is Given…

    Download: 

    Password: damas

     

  6. This update includes 38 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information. 

    • [$TBD][1103195] Critical CVE-2020-6510: Heap buffer overflow in background fetch. Reported by Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud on 2020-07-08
    • [$5000][1074317] High CVE-2020-6511: Side-channel information leakage in content security policy. Reported by Mikhail Oblozhikhin on 2020-04-24
    • [$5000][1084820] High CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu of WeChat Open Platform Security Team on 2020-05-20
    • [$2000][1091404] High CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar Nikolic of Cisco Talos on 2020-06-04
    • [$TBD][1076703] High CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2020-04-30 
    • [$TBD][1082755] High CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA on 2020-05-14
    • [$TBD][1092449] High CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang of Tencent's Xuanwu Lab (xlab.tencent.com) on 2020-06-08
    • [$TBD][1095560] High CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu (@hellowuzekai) of Tencent Security Xuanwu Lab on 2020-06-16
    • [$3000][986051] Medium CVE-2020-6518: Use after free in developer tools. Reported by David Erceg on 2019-07-20
    • [$3000][1064676] Medium CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman (@WeizmanGal) of PerimeterX on 2020-03-25
    • [$1000][1092274] Medium CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-08
    • [$500][1075734] Medium CVE-2020-6521: Side-channel information leakage in autofill. Reported by Xu Lin (University of Illinois at Chicago), Panagiotis Ilia (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago) on 2020-04-27
    • [$TBD][1052093] Medium CVE-2020-6522: Inappropriate implementation in external protocol handlers. Reported by Eric Lawrence of Microsoft on 2020-02-13
    • [$N/A][1080481] Medium CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu Zekai of Tencent Security Xuanwu Lab on 2020-05-08
    • [$N/A][1081722] Medium CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta (@Mipu94) of SEFCOM Lab, Arizona State University on 2020-05-12
    • [$N/A][1091670] Medium CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-05
    • [$1000][1074340] Low CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported by Jonathan Kingston on 2020-04-24
    • [$500][992698] Low CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong Zhaochen of andsecurity.cn on 2019-08-10
    • [$500][1063690] Low CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan Bijoora on 2020-03-22
    • [$N/A][978779] Low CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by kaustubhvats7 on 2019-06-26
    • [$N/A][1016278] Low CVE-2020-6530: Out of bounds memory access in developer tools. Reported by myvyang on 2019-10-21
    • [$TBD][1042986] Low CVE-2020-6531: Side-channel information leakage in scroll to text. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-01-17
    • [$N/A][1069964] Low CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen @ SeraphicAlgorithms on 2020-04-11
    • [$N/A][1072412] Low CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous on 2020-04-20
    • [$TBD][1073409] Low CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-04-22
    • [$TBD][1080934] Low CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng of Tencent security platform department on 2020-05-09
    We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.

    As usual, our ongoing internal security work was responsible for a wide range of fixes: 
    • [1105224] Various fixes from internal audits, fuzzing and other initiatives