-
Content Count
2130 -
Joined
-
Last visited
Content Type
Profiles
Forums
Calendar
Everything posted by Peaches
-
A Chinese couple named Wong had a new baby.The nurse brings them over a lovely, healthy, bouncy, definitely Caucasian, white baby boy! "Congratulations," says the nurse to the new parents. "What will you name the baby?" The puzzled father looks at his new baby boy and says.........."Well, two Wong's don't make a white, so I think we will name him Sum Ting Wong."
-
Need Help! How Do I Clean Up Cat Pee To Remove Smell?
Peaches replied to Fliliffroyari's topic in Open Chat
Taken off the internet ........ 1. Get down on your hands and knees and sniff out exactly where the urine spot is. 2.Pull up your carpet and remove the pad underneath and trash it. Nothing can save it. 3.Get as much of the urine out as possible ising a carpet cleaner. Whatever you do don't dump water on it. You will just cause the smell to spread to the surrounding carpet. Don't dose it with cleaners or enzymes either. The urine will spread out and eventually get into the good pad. You will have to sacrifice more pad. 4.Go to Sams Club, and get the OdoBan. It is about $10 for a gallon. It shou -
Winguard Pro 2005 Free v5.8 Build 2 Feeling queasy that someone will snoop around your personal files and shamelessly broadcast the contents to the world? This utility lets you password protect your programs, Windows and Web pages. WinGuard Pro also lets you encrypt your personal files and folders. Finally, you can lock your desktop, boot keys and task keys; you can also block software installations and Internet access. For screenshot & download - http://www.pcadvisor.co.uk/downloads/index...mp;itemID=23406
-
Sophos Anti-Root Kit scanner - free "Sophos Anti-Rootkit is easy to use, but getting to it takes a minute. It installs in the root directory in a folder called SOPHTEMP. In that folder, you click a file called SARGUI to launch the simple interface. Like many security tools, Sophos Anti-Rootkit can return the occasional false positive. Should any security program find a potential problem, it's best to make sure it's a problem before you delete something that might be harmless--or even necessary. " http://www.pcadvisor.co.uk/downloads/index...mp;itemID=64174
-
29 May 2009, 10:28 Security updates for VMware "VMware has released security updates to fix a denial of service (DoS) vulnerability in its Descheduled Time Accounting driver. The vulnerability only affects Windows versions of the VMware software. The affected driver is an optional part of the VMware Tools installation and is an experimental service to improve guest operating system performance. VMware does not provide any further details. All VMware products are affected by the vulnerability. The driver will not be included in future VMware products, starting with Fusion 2.0.2 and ESX 4.0." D
-
May 28, 2009 5:29 PM PDT Experts: Gumblar attack is alive, worse than Conficker by Elinor Mills "The Web site compromise attack known as Gumblar has added new domain names that are downloading malware onto unsuspecting computers, stealing FTP credentials to compromise more sites, and tampering with Web traffic, a security firm said on Thursday. The Gumblar attack started in March with Web sites being compromised and attack code hidden on them. Originally, the malware downloaded onto computers accessing those sites came from the gumblar.cn domain, a Chinese domain associated with Russian and
-
Hackers exploit unpatched Windows bug Attacks in progress, warns Microsoft; Vista and Windows 7 called safe Computerworld - "For the third time in the last 90 days, Microsoft Corp. has warned that hackers are exploiting an unpatched critical vulnerability in its software. Late Thursday, Microsoft issued a security advisory that said malicious hackers were already using attack code that leveraged a bug in DirectX, a Windows subsystem crucial to games and used when streaming video from Web sites. Hackers are using malicious QuickTime files -- QuickTime is rival Apple Inc.'s default video format
-
29 May 2009, 10:55 DSL router remotely controlled by URL "Michal Sajdak revealed at CONFidence 2009 in Krakow in mid-May that it's relatively easy to make the Linksys WAG54G2 WLAN DSL router execute arbitrary shell commands. He has now published further details. Sajdak discovered that it's easy to add a shell command to a POST request and have the router execute it. To test this, all you need is a proxy that can modify the POST request before it's sent. Sajdak says he told the manufacturer, Cisco, about the error in March and his message was acknowledged, but he has received no report of a fi
-
Cloud Security Alliance, Jericho Forum sign pact Cloud Security Alert By Tim Greene , Network World , 05/27/2009 "The Jericho Forum and the Cloud Security Alliance have made a formal commitment to jointly develop and promote best security practices in cloud computing. Their first step together will be working on version two of CSA’s major document “Security Guidance for Critical Areas of Focus in Cloud Computing.” The paper sets down 15 areas of concern that should be addressed by best practices in order to secure data in the cloud. Oracle Advanced Security: Download now CSA and Jericho f
-
Snort To Go Virtual Open source IDS/IPS celebrates its tenth year with an all-new platform in the works, a new release candidate, and plans for a commercial virtual appliance May 28, 2009 | 05:33 PM By Kelly Jackson Higgins DarkReading "The ten-year-old Snort IDS/IPS technology on which many of today's intrusion prevention products are based is poised for a facelift. Sourcefire, which develops the open source Snort tool, today officially announced that later this year it will deliver a commercial, Snort-based virtual appliance, and that it is working with Intel on the next-generation open-
-
Windows 7 Looks Good, but XP Migration Is Key John Fontana, Network World Thursday, May 28, 2009 2:26 PM PDT "Corporate migration to Windows 7 may be less about evaluating the new Microsoft operating system and more about how to properly gauge the correct time to get XP off client desktops. The equation corporate IT pros will have to figure out is how long it will take to get all their XP desktops to Windows 7 before XP support runs out or before application vendors quit producing XP versions of upgrades or new software, which some predict could come as early as 2012. Windows 7 is the shiny n
-
May28 Fake Anti-Spam Filter Leads to Keylogger by Nino Penoliar (Anti-spam Research Engineer) "Spam mails are very annoying, so we turn to spam filters to avoid ending up with an inbox flooded with them. Unfortunately one “anti-spam filter” we’ve encountered isn’t driving junk out, but letting them in. We have received an email message claiming that it is from Webmail Support. It is posing as a security announcement and states that the recipient’s mail server is sending out spam because it is infected by a virus that could contaminate their contacts and other users of the network. To correct
-
The flaw could allow a remote attacker to execute malicious code by convincing or duping a user to open a specially crafted QuickTime media file. By Thomas Claburn InformationWeek May 28, 2009 06:00 PM "Microsoft on Thursday issued a security advisory stating that it's investigating reports of a vulnerability in Microsoft DirectX, the company's APIs for games and multimedia. The company said that Windows 2000 Service Pack 4, Windows XP, and Windows Server 2003 are vulnerable and that Windows Vista and Windows Server 2008 are not vulnerable. The flaw could allow a remote attacker to execu
-
Comodo Adds Server Protection To Endpoint Security Manager
Peaches posted a topic in Security Alerts
Comodo Adds Server Protection To Endpoint Security Manager Offering also includes remote and centralized management of Comodo Internet Security software on all networked PCs and servers May 28, 2009 | 10:23 AM Jersey City, NJ, May 21, 2009 - "Comodo's new server protection software will defend nodes in enterprise networks from malicious attacks. This new safeguard joins the other Comodo branded products protecting enterprises, including security software, encryption and vulnerability scanning. PC users who adopted Comodo's award-winning security software at home have brought it to work with -
28 May 2009, 15:34 L0phtCrack is back "While "Duke Nukem Forever" will now never appear, the legendary L0phtcrack password cracker is returning and in the form of a new version 6 too. L0phtCrack disappeared from the market after @stake, a company which was formed by L0pht Heavy Industries and others, was taken over by Symantec. At the beginning of this year the original L0phtCrack team, consisting of Christien Rioux, Chris Wysopal and Peiter Zatkhat (Mudge), bought back the software rights from Symantec and have now upgraded the tool." Heise security for details & screenshot - http://www.h
-
Brian - I am very happy for you ... enjoy your new toy. I like the color ... reminds me of my son's first car ... Datsun 240. Anyway, I hope it improves life for you and I can also detect you are ecstatically happy at the moment. Enjoy!!
-
Windows 7 Beta Shuts Down July 1 Users who run the trial version of Microsoft's new OS beyond its expiration date will suffer endless reboots. By Paul McDougall InformationWeek May 26, 2009 09:19 AM A Microsoft official on Tuesday confirmed that the software maker plans to cripple the beta version of Windows 7 on July 1. The official said that an e-mail sent to users over the Memorial Day weekend indicating that the shutdown would begin on June 1 was in error. IWeek for more detail - http://www.informationweek.com/news/window...perating+system
-
27 May 2009, 11:00 RIM closes another BlackBerry PDF vulnerability "According to Research In Motion (RIM), a specially crafted PDF file can be used by an attacker to gain control of a BlackBerry Enterprise server. As with several previous vulnerabilities, the problem is in the PDF distiller of the BlackBerry Attachment service which pre-processes documents on the server so they can be easily read on a BlackBerry device. Opening the crafted PDF document on a BlackBerry smartphone client triggers the server error, causing memory corruption which leads to the execution of arbitrary code. Accord
-
ImageMagick "XMakeImage()" Integer Overflow Vulnerability Moderately critical - ImageMagick 6.x "Tielei Wang has discovered a vulnerability in ImageMagick, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an integer overflow error within the "XMakeImage()" function in magick/xwindow.c. This can be exploited to cause a buffer overflow via e.g. a specially crafted TIFF file. Successful exploitation may allow execution of arbitrary code." secunia advisories - http://secunia.com/advisories/35216/
-
Zeeways PhotoVideoTube Multiple Vulnerabilities Highly critical "Hakxer has reported some vulnerabilities in Zeeways PhotoVideoTube, which can be exploited by malicious people to bypass certain security restrictions or conduct script insertion attacks and by malicious users to potentially to compromise a vulnerable system. 1) A vulnerability is caused due to the application allowing access to the admin interface by checking if a certain cookie exists. This can be exploited to gain administrative access to the application by creating the cookie "username" and assigning it the value "admin". 2)
-
27 May 2009, 12:34 Twitter API facilitates worm propagation "Security specialist Aviv Raff reports that the Twitter API can be exploited to spread worms. Among other things, the Twitter API allows users to configure, manage and query the status of their accounts using HTTP requests. Responses are delivered in the form of an XML or JSON document. The twitpic.com photo sharing service is among the application sites that use the API, for example, to retrieve or import a user's Twitter profile. According to Raff, until recently Twitpic didn't filter HTML tags from the original Twitter profiles, s
-
The Importance of Walking Walking can add minutes to your life. This enables you at 85 years old To spend an additional 5 months in a nursing Home at $7000 per month. My grandpa started walking Five miles a day when he was 60. Now he's 97 years old And we don't know where he is. I like long walks, Especially when they are taken By people who annoy me. The only reason I would take up walking Is so that I could hear heavy breathing again. I have to walk early in the morning, Before my brain figures out what I'm doing. I joined a health club last year, Spent about 400 bucks. Haven't lost a pound.
-
Warning: don’t use any ESET NOD32 V4.x Antivirus product together with Windows Vista SP2 or Windows Server 2008 SP2 "The story: numerous ESET NOD32 V4.x Antivirus product customers reported severe problems after install of Service Pack 2 Windows Vista and Windows Server 2008. First reports showed up begin of May 2009, and at the moment I write this post these reports still continue. Embarrassing: the total lack of feedback from ESET regarding the issue. Like I today already wrote on DSLReports, looking at all the threads and posts in their own support forums regarding the severe Service Pack 2
-
Vista Service Pack 2 Now Ready for Download Tom Spring, PC World "Windows Vista Service Pack 2 is now available for download. The Vista SP2 update includes new support for recording Blu-ray discs straight from the Vista OS, updated support for Bluetooth v2.1, and bug fixes that address slow shutdowns and mysterious crashes. You can download Vista SP2 directly from Microsoft at its Web site (348MB) or it will be automatically delivered to your Vista system via Windows Update within a few weeks, according to Microsoft. You must have Vista SP1 installed on your system to install the SP2 Vista." M
-
May 26, 2009 9:24 AM PDT Report: Spam now 90 percent of all e-mail by Lance Whitney "Spam now accounts for 90.4 percent of all e-mail, according to a report released Monday from security vendor Symantec. This means that 1 out of every 1.1 e-mails is junk. The report also notes that spam shot up 5.1 percent just from April to May. Spam on the rise. (Credit: MessageLabs) Symantec's May 2009 MessageLabs Intelligence report reveals other disturbing trends, as well. Rather than just hijack disreputable Web sites, cybercriminals now favor older and well-established domains to host their malware. T