Status
Not open for further replies.

Nico@FMA

Level 27
Hello Everyone,

2014 was a wonderful year where our company did have brilliant moments and where we did develop some great software. We have seen the PR-Guard 2014 which was a smashing success, and we did have CBAD Anti-malware which was pretty awesome in its own right. Not to mention the massive amount of positive feedback from all of you (Thanks for that).
Yet we have also seen the tragedy my company did endure, being hacked, software being stolen and people who did not accept that someone might have come up with a idea they did not think off.
Its just reality and FMA Intel-Secure has moved on to 2015 ready to show everyone that their trust in our products is 100% justified and that we keep innovating and improving our-self to bring you the right software and tools you need for the job. Everyone remembers the CCSU PR-Guard 2014 edition right? (If not here is the link to its old development topic) It was a pretty amazing piece of software that while it did look like **** TBH it did work exactly as advertised, and thanks to the many community testing rounds it has a proven record of being that good. Well let me tell you a little secret, it has been made better, stronger and even more reliable. And this time? It does not look like crap lmao.
So allow me to present the new: (CCSU PR-Guard) 2015 Edition take a look and enjoy.
* I wanna give special thanks to our friends and partners for helping FMA during our difficult times, you guys have been GREAT. Thanks.

*Note in the animation you see in the top right that there is a little error where the text does not fit, it has already been corrected i just did not bother to generate a new animation.

Wait did you forgot what CCSU PR-Guard is? Well here is its impressive feature list:

FMA Intel-Secure™ forensics & intrusion analysis software (FMAIS) is a highly advanced digital forensic investigation and analysis tool.
Which allows system administrators and network specialists to collect, preserve and reveal digital evidence on windows based systems and networks.
FMAIS has the ability to perform memory and file analysis of a specific host and collects information about running processes and drivers from memory using basic and advanced techniques.
It gathers advanced file system meta data, registry data, event logs, network information, services, tasks, and Internet history.
Among many others, FMAIS’s features include other advanced options to read, scan, cross-reference and extract any data from multiple known and unknown sources within the Windows based operating systems and networks.
Our downloadable version of FMAIS is a very comprehensive tool that allows you to ultimately reveal any malicious data and traces to the source which allows you to reverse engineer and stop potential & actual cyber threats.

Note: This program is written for Windows 7 (32 & 64bit)
Full Feature List:
Low memory usage (Less then 50mb)
Low CPU usage (less then 10%)
Real time process monitoring
Real time data stream monitoring and logging
Advanced automated analyses capabilities (point to point analyses (PPA)
Next Generation system software analysis and logging
Next Generation active & hidden processes analysis and logging
Advanced process handler analysis and logging
Extended services status analysis and logging
PPA Kernel validation and corruption analysis
Next Generation system driver and signature analysis
PPA Kernel Transaction analysis and backtracking
Next Generation PPA HASH analysis and validation + extended logging
Windows services and malicious services analysis and logging
Limited log based Spyware detection (Manual detection)
Limited log based Exploit detection (Manual detection)
Limited log based Browser Trojan detection (Manual detection)
Limited log based Rootkit detection (Manual detection)
Limited log based Worm detection (Manual detection)
Limited log based Hooking detection (manual detection)
Firewall state inspection and logging
Full firewall extended logging
Advanced MCB scan, logging and repair
Start-up hash validation and backtrack changes
Driver validation and backtrack capacity
Group policy corruption and intrusion analysis
Data resources monitoring and logging
Hard disk volume analysis and serial logging
Advanced start-up scan and logging
Windows boot manager analysis and logging
System Policy analysis and logging
Group Policy analysis and logging
Advanced Internet connection repair and logging
DNS analysis, logging,repair, cleaning
ARP tables analysis, logging, repair, cleaning
Full IP INT analysis and reset capability
Advanced firewall analysis and repair
Firewall helpers analysis, logging and repair
Logging of all allowed programs
Logging of current profiles and repair
Deep level firewall configuration analysis and repair
Deep level ICMP configuration analysis, logging and repair
Full Inspection firewall services and dependencies (Logging and repair)
Firewall state inspection and logging
Full firewall extended logging
Advanced MCB scan, logging and repair
Advanced open ports scanning, logging and repair
Advanced firewall rule inspection, repair and logging
History logging for historical firewall notifications
Extended firewall OP mode scan and repair
Advanced winsock readout, logging and repair
Past and present full route information readout & logging
Hard drive health status and possible corruption analysis
Shadow copy health & validation capacity
Valid and rogue connections scan and logging
IP routing table analysis and logging
All active listening TCP and UDP connections scan and logging
Active TCP connections and (PID) logging
Logging statistics TCP, UDP, ICMP, and IP protocols
Bytes and packets sent and received statistic logging
Analyze and log components for all executables
Advanced internet connection repair and logging
DNS scan, logging,repair, cleaning
ARP tables scan, logging, repair, cleaning
Full IP INT scan and reset capability
Advanced firewall audit and repair
Firewall helpers analysis, logging and repair
Logging of all allowed programs
Logging of current profiles and repair
Deep level firewall configuration analysis and repair
Deep level ICMP configuration scan, logging and repair
Full Inspection firewall services and dependencies (Logging and repair)
Advanced open ports scanning, logging and repair
Advanced firewall rule inspection, repair and logging
History logging for historical firewall notifications
Advanced full reset and repair of Windows firewall, profiles, policies, rules, ports and dependencies
Full registry audits, deep level checks and cross call function referencing

As you can see the list is HUGE, and its written for Windows 7.
However as you all know i am also working on a windows (ALL) version, and this version is pretty much ready. But for now i will just make the Windows 7 version available so everyone can have a go at it. All other Windows versions will soon be supported as i personally do want to run a few more tests on Windows 8 and the technical version of the new Windows (it still gives minor errors and stability issues which i want to fix first)

So as you can see i did keep my word and thanks to our friends who did help me greatly everything that we lost in 2014 has almost being undone, again many thanks.

Go to our website and download CCSU PR-Guard 2015 now.

O and before i forget, my software is 100% clean see VT report.
That all being said, if you want to support us then share us on facebook, twitter or any other page/forum/blog you can find. The more the better.

Thats all.
Cheers guys.

Please Note: CCSU Guard is NOT an Antivirus/Antimalware program and it should not be considered as a replacement for these programs.
 
Last edited by a moderator:

Av Gurus

Level 29
Trusted
Malware Hunter
Verified
That's very nice to hear (read) :)
Wish you all the best with this and future stuff.
Keep up with good work ;).
 

Av Gurus

Level 29
Trusted
Malware Hunter
Verified
I did't try it beacause I switch (temporarily) on Windows 10TP and all my virtual masine are on other HDD (I wanted to put on Windows 10 but did not want to install, I know it's only for Windows 7 :rolleyes:).

I'll be waiting All Win version...when it will be ready?
 

Nico@FMA

Level 27
I did't try it beacause I switch (temporarily) on Windows 10TP and all my virtual masine are on other HDD (I wanted to put on Windows 10 but did not want to install, I know it's only for Windows 7 :rolleyes:).

I'll be waiting All Win version...when it will be ready?
Lol thats not what i asked...i made a animated gif in my post to show how it looks like.. so how does it look?
 

Av Gurus

Level 29
Trusted
Malware Hunter
Verified
I need serial???
WHy?
Free version...?
Send mail at contact...(I think this is an unnecessary hassle :confused:)
 

Attachments

H

hjlbx

Thanks Nico...I can only imagine what you went through to get to this point.

I'm sure to have a "look-see" once the W8/8.1 supported version is ready and form a general impression.

Is it a utility that simply provides infos ... or ... is it one that used improperly (without knowing what one is doing) can smash the system?
 

Nico@FMA

Level 27
I need serial???
WHy?
Free version...?
Send mail at contact...(I think this is an unnecessary hassle :confused:)
No its not a hassle, if you do a quick search on the internet then you will see there are some websites that actually do offer the 2014 version bundled within adware and other crap, and due to the fact that i introduced a licence system i can avoid some of that, as we can have some sort of control over who gets it in the future we will add additional non invasive options to shield the installation and actual files from tampering with. (i encourage anyone to come up with some idea's to help us with that)

Also if you search on the internet, and you come across our software then please let me know as our software is NOT available outside our own website.
Obviously there are some very known websites like Cnet and others that will eventually distribute our software, but use your common sense when searching as the websites i am asking you about are by default questionable and most do offer a downloader or some sort of bundle.
And take note of the fact that i will NEVER bundle my software and i will never create a downloader or something similar. We have sended 14 take down notices at different websites already so go figure.

Anyway the people who sended us a email have been supplied with a licence (be sure to check your spam folder)

Cheers
Nico
 
Last edited:
D

Deleted member 21043

No its not a hassle, if you do a quick search on the internet then you will see there are some websites that actually do offer the 2014 version bundled within adware and other crap, and due to the fact that i introduced a licence system i can avoid some of that, as we can have some sort of control over who gets it in the future we will add additional non invasive options to shield the installation and actual files from tampering with. (i encourage anyone to come up with some idea's to help us with that)

Anyway the people who sended us a email have been supplied with a licence (be sure to check your spam folder)

Cheers
Nico
I see why you implemented the license system, and I agree that it should work and stop the adware bundling, mostly. However what could now happen, is the adware bundling continuous, however they just bundle the installer meaning the user who got the adware package then has to contact you afterwards for the key, despite having installed the adware.

I am not sure if this is off-topic or not in related to your question in there about the files shielding... However, if you're up to it, you could write a driver which prevents the installed files from being tampered with. Considering the driver would be running in kernel-mode, you have the power to prevent modifications and the deletion of your installed files. Just note, that a digital signature would be required to load drivers on x64 systems due to Patch Guard. In fact, as well as file protection, you could use a driver to protect the registry keys. Just an idea :).
 
Last edited by a moderator:
  • Like
Reactions: Dani Santos

Nico@FMA

Level 27
I see why you implemented the license system, and I agree that it should work and stop the adware bundling, mostly. However what could now happen, is the adware bundling continuous, however they just bundle the installer meaning the user who got the adware package then has to contact you afterwards for the key, despite having installed the adware.

I am not sure if this is off-topic or not in related to your question in there about the files shielding... However, if you're up to it, you could write a driver which prevents the installed files from being tampered with. Considering the driver would be running in kernel-mode, you have the power to prevent modifications and the deletion of your installed files. Just note, that a digital signature would be required to load drivers on x64 systems due to Patch Guard. In fact, as well as file protection, you could use a driver to protect the registry keys. Just an idea :).
Yeah the program itself is already signed... but you are right thats something to be investigated..
 

Nico@FMA

Level 27
No its not mike his design.
It looks very nice and modern ... MikeV design?
Rectification: The UI is not MikeV his design, the image however is for 99% MikeV his design (As i added some text lol)
Either way i am sorry for the confusion it might have created and i am sorry if i did discredit MikeV his awesome designer skills which was never my intention. @MikeV So dude you ROCK man thanks again for your awesome graphic's.

Cheers
 

Av Gurus

Level 29
Trusted
Malware Hunter
Verified
No its not a hassle, if you do a quick search on the internet then you will see there are some websites that actually do offer the 2014 version bundled within adware and other crap, and due to the fact that i introduced a licence system i can avoid some of that, as we can have some sort of control over who gets it in the future we will add additional non invasive options to shield the installation and actual files from tampering with. (i encourage anyone to come up with some idea's to help us with that)

Also if you search on the internet, and you come across our software then please let me know as our software is NOT available outside our own website.
Obviously there are some very known websites like Cnet and others that will eventually distribute our software, but use your common sense when searching as the websites i am asking you about are by default questionable and most do offer a downloader or some sort of bundle.
And take note of the fact that i will NEVER bundle my software and i will never create a downloader or something similar. We have sended 14 take down notices at different websites already so go figure.

Anyway the people who sended us a email have been supplied with a licence (be sure to check your spam folder)

Cheers
Nico
I undertend what you saying and what is for but licence is getting a little slow...
I send mail yesterday at 15h and got mail at evening 23h...:cool:

Clipboard00.jpg
Clipboard01.jpg
 

Nico@FMA

Level 27
I undertend what you saying and what is for but licence is getting a little slow...
I send mail yesterday at 15h and got mail at evening 23h...:cool:

View attachment 45897 View attachment 45898
Well sorry about that i did have a funeral to attend to.
But if you sended us a email as requested in the program then you should have a key by now as everyone else before you did have it within hours.
If you did not send us a email then you do not have a key as we will only do it by mail, so read the instructions next time before saying that i am slow LOL. But specially for you i will make a one time exception and send it by pm so check your pm.
Cheers
 
Last edited:

Av Gurus

Level 29
Trusted
Malware Hunter
Verified
I did not know that you have personally carried out.
I thought you have an automatic system.
If any user will have to wait several hours to get the key I think that it may reject them from your product.
Apologies if I offended is not what I intended.
:)

BTW: i got the key by email (as i wrote in message above).
 
Status
Not open for further replies.