Chachazz

Members
  • Content Count

    1522
  • Joined

  • Last visited

Everything posted by Chachazz

  1. 180's Newest Installation Practices Read more»
  2. Moving topic to 'On the Web' forum. http://www.besttechie.net/forums/index.php?showforum=18
  3. Please also see: Microsoft Security Bulletin «MS06-001» Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919) Published: January 5, 2006 Version: 1.0 Manual Download available: •Microsoft Windows 2000 Service Pack 4 •Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 •Microsoft Windows XP Professional x64 Edition •Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 •Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems •Microsoft Windows Server 2003 x64 Edition
  4. Re: MS Patch for WMF Vulnerability Exploit Source:SANS Internet Storm Center«
  5. Title: Microsoft Security Response Center Bulletin Notification Issued: January 05, 2006 ******************************************************************** Summary ======= Important Information for Thursday 5 January 2006 Microsoft announced that it would release a security update to help protect customers from exploitations of a vulnerability in the Windows Meta File (WMF) area of code in the Windows operating system on Tuesday, January 2, 2006, in response to malicious and criminal attacks on computer users that were discovered last week. Microsoft will release the update today on Thursday, January 5, 2006, earlier than planned. Microsoft originally planned to release the update on Tuesday, January 10, 2006 as part of its regular monthly release of security bulletins, once testing for quality and application compatibility was complete. However, testing has been completed earlier than anticipated and the update is ready for release. In addition, Microsoft is releasing the update early in response to strong customer sentiment that the release should be made available as soon as possible. Microsoft's monitoring of attack data continues to indicate that the attacks are limited and are being mitigated both by Microsoft's efforts to shut down malicious Web sites and with up-to-date signatures form anti-virus companies. The security update will be available at 2:00 pm PT as MS06-001. Enterprise customers who are using Windows Server Update Services will receive the update automatically. In additional the update is supported Microsoft Baseline Security Analyzer 2.0, Systems Management Server, and Software Update Services. Enterprise customers can also manually download the update from the Download Center. Microsoft will hold a special Web cast on Friday, January 6, 2006, to provide technical details on the MS06-001 and to answer questions. Registration details will be available at http://www.microsoft.com/technet/security/default.mspx. Microsoft will also be releasing additional security updates on Tuesday, January 10, 2006 as part of its regularly scheduled release of security updates. More Info: MS Security Alert»
  6. Lovely words BD; - ditto - from me - Happy New Year to BestTechie, All Admins, All Staff, All Members - Best Wishes for a Great 2006!
  7. Moving to Spyware/Adware forum for further assistance;
  8. Sygate Firewall is still available ( downloaded it just the other day as a test) from the Symantic/Sygate page - redirecting to Simtel: http://smb.sygate.com/free/default.php If one can handle a firewall without customer support, go for it. As well, the forums should be help to users with questions.
  9. An added note: There is some confusion about the update posted on the S&D site yesterday that we have posted to the various Update forums; Am not sure there really is an update and awaiting confirmation from NI/Spybot.
  10. By Elizabeth Montalbano, IDG News Service October 13, 2005 Unauthorized Windows XP Service Pack 3 surfaces on Web site "A Microsoft Corp. employee has warned against downloading an unauthorized version of Windows XP Service Pack 3 (SP3) that has surfaced on a popular Web site that provides software patches. On a Microsoft user newsgroup posting last week, Mike Brannigan, an enterprise strategy and senior consultant at Microsoft, told users that downloading an unofficial version of Windows XP SP3 provided on The Hotfix.net would likely harm their computer and put them "out of support from Microsoft or an OEM (original equipment manufacturer)" because it is not an official Microsoft package" . "You would be well advised to stay clear of this fake SP3 package," Brannigan wrote in the post, which appeared on Google Groups.." "It is not suitable for testing as it is NOT SP3. ...Anyone who installs this thinking they are getting SP3 (even as a preview) is being grossly mislead and is posing a significant potentially non-recoverable risk to their PC and data." InfoWorld»
  11. Updated - Version 4.2.1 September 29, 2005 http://www.kerio.com/kpf_home.html
  12. Published Friday 7th October 2005 20:30 GMT "Dutch police have arrested three people for building a worldwide zombie network of more than 100,000 PCs used to launch internet attacks on companies and to hack into bank and Paypal accounts. The main suspect, a 19 year-old man, and his alleged accomplices, a 22 year-old and a 27 year-old, were collared in raids on their homes. Police seized "several computers, documents, a bank account, bare cash and a sports car". More arrests are expected. The compromised PCs were hacked using a trojan horse, called W 32.Toxbot, according to the police, who say that "some thousands" of the victims were based in the Netherlands. Investigators have identified at least one distributed denial of service (DDoS) attack, targeting an unnamed American company, emanating from the zombie botnet. DDoS attacks are often used by extortionists to unleash a barrage of computer-generated request to victim websites to cripple their operations. Online gambling firms and web retailers are typical victims. The suspects are also thought to have hacked into a "large number of PayPal and eBay accounts, enabling them to........" Story: The Register»
  13. Published: October 5, 2005, 5:00 PM PDT (If you are experiencing any slowdowns or unable to reach sites) » "Two major Internet backbone companies are feuding, potentially cutting off significant swaths of the Internet for some of each other's customers. On Wednesday, network company Level 3 Communications cut off its direct "peering" connections to another big network company called Cogent Communications. That technical action means that some customers on each company's network now will find it impossible, or slower, to get to Web sites on the other company's network. William Steele, a senior network engineer for Syncro Services, said his company noticed the problem Wednesday morning. "There are some people I can't send an e-mail to," Steele said. "At home, I have Road Runner as an ISP, and wasn't even able to remotely connect in order to manage our servers." "Peering" arrangements are maintained by network companies that agree to connect their networks directly together to exchange traffic more efficiently. When the companies are of roughly equal size, money rarely exchanges hands. Level 3 contends that its arrangement with Cogent is no longer financially viable, since it is larger than the other company. It has asked Cogent to seek other arrangements, possibly including paying for the traffic exchange, a Level 3 representative said." c/net News»
  14. The latest snapshot for the stable Linux kernel tree is: 2.6.14-rc2-git5 - 2005-09-25 09:01 UTC
  15. Happy Birthday Liz hope you had a lovely day
  16. Security Update 2005-008 (Mac OS X 10.3.9) 09/22/05 This update includes the following components: LibSystem LoginWindow Mail QuickDraw QuickTimeJava Safari SecurityAgent SecurityServer Security Update 2005-008 (Mac OS X 10.4.2) 09/22/05 This update includes the following components: ImageIO LibSystem Mail QuickDraw Ruby SecurityAgent securityd For detailed information on this Update, please visit this website: http://docs.info.apple.com/article.html?artnum=61798 SHA1 SecUpd2005-008Pan.dmg = 65f4dde09ee46fb9e1d58259f4085d90f420fae0 For detailed information on SHA 1 Digest, please visit this website: http://www.info.apple.com/kbnum/n75510 Downloads
  17. Free Standards Group Releases LSB 3.0 By Steven J. Vaughan-Nichols September 19, 2005 "On Monday, the Free Standards Group released the latest version of the Linux Standard Base, Version 3.0, and announced that Red Hat Inc., Novell Inc., the Debian Common Core Alliance and Asianux are all certifying their latest operating systems versions to it. The LSB 3.0 is a set of standards designed to ensure compatibility among Linux distributions and the applications that run on them. It is expressly designed to prevent the kind of application incompatibilities that have bedeviled the different distributions of the Unix operating system. With the widespread adoption of LSB 3.0, ISVs and end users should benefit as it becomes easier and less costly for software vendors to target Linux. Adopters include the nine members of the Debian Common Core Alliance, Novell, Red Hat, and Asianux, which is an alliance of China's Red Flag Linux, Japan's Miracle Linux and Korea's Haansoft distribution vendors." eWEEK - Linux & Open source
  18. The latest stable version of the Linux kernel is: 2.6.13.2- 2005-09-18 04:19 Changelog The latest prepatch for the stable Linux kernel tree is: 2.6.14-rc2 - 2005-09-20 03:32 UTC Changelog The latest snapshot for the stable Linux kernel tree is: 2.6.14-rc2-git2 2005-09-22 09:01 UTC http://www.kernel.org/
  19. KDE 3.5 Beta 1 ("Kanzler") September 21, 2005 KDE 3.5 Beta 1 can be downloaded over the Internet by visiting download.kde.org. Source code and vendor supplied binary packages are available. For additional information on package availability and to read further release notes, please visit the «KDE 3.5 Beta 1 Information Page» Please note: Qt 3.3.5 is unsupported by this release. http://www.kde.org/announcements/announce-3.5beta1.php