sultan_emerr

Members
  • Content Count

    1514
  • Joined

  • Last visited

Posts posted by sultan_emerr

  1. I already sent this in a PM but figured I'll show y'all to see what you think....(ok, maybe I am just showing off but I think it looks pretty cool :P )

    I work better from scratch and would probably have just made his sig look like crap.

    xcannon2.png

    I also think it looks pretty cool.

  2. Well StealthG, that's certainly a step in the right direction. Unfortunatly, I saw your reply just as something has come up that causes me to have to leave immediatly. However, I wanted to put you mind at ease by letting you know that those are all very common error messages, and if no one else has delt with you on the next steps by the time I get back, I will go into them then.

  3. Go to control panel/ system / advanced Tab/ startup and recovery box/ settings button/ sytem failure and uncheck "restart on system failure" ( take the check out of automatically restart box ) , and check the Write a system event, and the Admin alert boxes (check "send admin alert") and then check "create log file" (record of what when wrong and where). This will force a BSOD on the next crash (freezes/restarts = crashing) that posts the Stop Error Code. On the next crash write down the Stop Error Code and post that here back on this thread.

    Also check in your event viewer for error messages. Go to Control Pannel/Admin tools/Computer Managment/Event Viewer/ and click on System, and see the list of Info, Warnings and errors/ click on the "error" message and post here what it says and any links it gives.

  4. Recently within the past week, my computer has been freezing during startup. It sometimes occurs on window's welcome screen, it just freezes and i have to restart manually. Other times it happens when my computer loads to the desktop, but the taskbar stays blue (as if it was still trying to load) and then of course it freezes. But other times it loads successfully without any freezing.

    I have checked my startup items and disabled the ones that arent neccessary. Could this be a problem with an audio driver? Long story short, ive been trying to reinstall an audio driver, but i havent been able to download one that is WHQL certified by microsoft.

    NOTE: I had these speakers working along with windows correctly like last week.

    Any help will be appreciated.

    Go to control panel/ system / advanced Tab/ startup and recovery box/ settings button/ sytem failure and uncheck "restart on system failure" ( take the check out of automatically restart box ) , and check the Write a system event, and the Admin alert boxes (check "send admin alert") and then check "create log file" (record of what when wrong and where). This will force a BSOD on the next crash (freezes/restarts = crashing) that posts the Stop Error Code. On the next crash write down the Stop Error Code and post that here back on this thread.

    Also check in your event viewer for error messages. Go to Control Pannel/Admin tools/Computer Managment/Event Viewer/ and click on System, and see the list of Info, Warnings and errors/ click on the "error" message and post here what it says and any links it gives.

  5. Hi Sultan......um.....I have to register to read about the security alert?

    Flaws in Mozilla browsers soar: study

    By Sam Varghese

    March 22, 2005 - 11:44AM

    Page Tools

    Email to a friend Printer format

    The number of vulnerabilities in Mozilla-based browsers has risen sharply in the six months from July to December 2004 in comparison to the number found in the January to June 2004 period, the network security and anti-virus company Symantec says in its latest bi-annual security survey.

    Symantec Australia and New Zealand managing director John Donovan said the Symantec Internet Security Threat Report, the seventh such survey, reported that 21 vulnerabilities were found to affect the Mozilla browsers in this period.

    In sharp contrast, just one Mozilla vulnerability was documented between January and June 2004; seven were noted in the same reporting period a year ago.

    It was also more than the number found in Internet Explorer - 13 - during the July-December period. However, IE had a much higher number of critical vulnerabilities.

    Donovan said that as use of the browsers based on Mozilla increased, malicious attackers were bound to look more closely at finding flaws in these browsers.

    Advertisement

    Advertisement"The report also notes that there is a marked rise in planned financial attacks like phishing; these use flaws in browsers, so this increase we've noted is only natural," he said.

    He admitted that the report had not taken into account the interval between the finding of a flaw in Mozilla-based browsers and the issue of a patch. At times, this has been as little as a day, while Microsoft has often taken well in excess of six months to patch flaws.

    Donovan said no flaws were reported in the Apple browser, Safari, during this period. However, there was a marked increase in the number of flaws found in OS X with the company documenting 37 high-severity vulnerabilities in the operating system.

    "These vulnerabilities have been confirmed by the vendor, which, in the Apple's case, almost always means that the company has released a patch. The appearance of a rootkit109 called Opener in October serves to illustrate the growth in vulnerability research on the OS X platform. Additionally, multiple remote and local vulnerabilities have been disclosed that affect both the server and desktop versions of OS X," the report said.

    With regard to phishing, Donovan said there was a big rise in activity during the six months under study. During the first week of July, 193 new phishing attacks were detected. This rose rapidly, reaching a peak of 584 new attacks during week October 7 to 13. Then things slowed, before climbing again in the final weeks of December, when 558 new phishing attacks were detected.

    The report also predicted that a major backdoor would be discovered in a popular application or software respository.

    Citing the backdoors that were found in Sendmail and Fragrouter in 2002, and also the attempt to place a backdoor in the Linux kernel in 2003, the report said that it was unlikely that all software distribution points had become completely secure and untainted since that time, or that attackers, both internal or external, had collectively decided not to backdoor software.

    "Rather, Symantec feels it is likely that backdoors inserted into software at certain (perhaps stale) distribution sites persist and remain undiscovered. The possibility of backdoor code being slipped into downloadable software bundles continues to remain a very real threat for users of all platforms," the report said.

    "The large number of mirror websites and FTP servers hosting copies of applications and packages is especially worrisome. Compounding the problem is that most operating systems rely on regular downloads of updated packages from websites or mirror sites. The authenticity of most downloadable software, such as popular shareware applications, often cannot be verified, particularly as very few closed source vendors or authors provide digital signatures of their packages."

    Donovan said another aspect which was worth noting was the rise in the amount of malicious code targeting mobile devices. Some had targeted bluetooth devices, others had targeted devices running the Symbian OS.

    On the enterprise front, he said that given the trends, companies should now focus on planning for recovery. "It is more or less inevitable that some kind of attack will happen sooner or later," he said.

    Asked if this was not a fatalistic aproach, Donovan said he was merely being practical, adding "it is better to plan for the worst."

    He referred to the problem posed by some kinds of spyware and adware, where the companies which put out these products objected to them being categorised as such. "We can block them, but we can't name them," he said.

    Donovan said there was insufficient data to draw any kind of separate picture for Australia. "We cannot read anything into the fact that the country has dropped down the list from fourth to 14th as far as being a source of attacks goes," he said.

    The US was the top country of origin for attacks, accounting for 30 percent of those counted by Symantec during the six months. China and Germany were second, with eight percent each.

    The report also found that as far as bot networks went, the UK was the host of the largest number. In the Asia-Pacific region, China accounted for nearly eight percent with South Korea (3), Taiwan (3.1) and Japan (2.6) figuring in the top 10.

    A recent report said that as many as a million PCs running mostly Windows XP and Windows 2000 had been compromised.

    Donovan said there had been a drop in the number of bot networks, which was primarily put down to the release of service pack 2 for Windows XP.

    "Over the first six months of 2004, Symantec analysts observed a persistent increase in the number of computers identified as belonging to bot networks. During this period, the average number of computers identified in daily bot network scanning increased to over 30,000 systems a day," the report said.

    "This trend was expected to continue as additional systems were added to these bot networks; however, as shown in figure 7, this increasing trend did not continue through the second half of the year.

    "Between July 1 and December 31, 2004, observed bot network computers actively scanning declined from a peak of over 30,000 per day in late July to below 5000 per day by the end of the year. The bulk of this decrease occurred in mid-August with a significant drop on August 19. The timing of this drop corresponds closely with the availability of Windows XP Service Pack 2."

    Subscribe to The Age for a chance to win a luxury cruise*