Peaches

Update Experts
  • Content Count

    2130
  • Joined

  • Last visited

Everything posted by Peaches

  1. http://www.threatexpert.com/files/reader_s.exe.html The Reader_s.exe attaches itself to other .exe files on your computer, thus making other programs a “breeder” for the virus. If you do a backup, which I recommend, I would forget about those types of files. The virus can be triggered again if you are trying to access a backed-up .exe file on your new install. The virus doesn’t look good, can be downloaded many different ways, but since it attaches itself to .exe type files, it could be transferred through file sharing networks the fastest. http://www.sukosaki.info/general/reader_se...ilable
  2. 9 April 2009, 10:48 Linux Kernel Vulnerability A vulnerability in the CIFS client in the Linux Kernel code makes it possible for a manipulated SMB server to cause users systems to crash or be compromised. The problem is caused by a buffer in the CIFSTCon function in fs/cifs/connect.c file being too small. This function is used when the server responds to a connection request for a resource, known as a Tree Connect. Overflowing the undersized buffer could allow code to be injected and executed. The bug only comes into play if the users system attempts to mount a resource on a manipulated serve
  3. The following is not true - just a figament of the imagination. Ice escapades This time of year is always a delight as long-buried items begin to emerge from the melting snow. Clothing, a hockey stick, some garden tools, the frostbitten toe I’ve been looking for, all are arising into the joyous warmth that is spring. The large rectangle in the back yard grass is something new this year. It is where the ice rink was. Lovely brown isn’t it? It contrasts nicely with the lush green of the surrounding growth. I devised a clever technique for removing the rink called “Sit Around and Let It Melt.”
  4. U got that right - it's a real bummer!! the cast has brought up weird and wonderful things I never knew existed in my puter. I sported a real shiner as well as I torpedoed head first and fractured my right cheek as well. I looked like a huge Mac truck had run over me & that is not to say that I didn't feel one ran over me. But u know, one must keep seeing the funny side ... when the doc at the hospital was pulling my fingers to get the bones back into place .. I cried like a baby but also told him I was not going to take him home with me cuz he was abusive to which he said "honey we ai
  5. April 8, 2009 12:01 AM PDT Microsoft: Scareware, PDF exploits rise by Elinor Mills The use of scareware and exploits that take advantage of common file formats like PDF, Excel and Word rose in the second half of last year as online scammers realized people are getting smarter about recognizing spam and phishing e-mails, according to a Microsoft security report to be released on Wednesday. There was a significant increase in rogue security software, which falsely informs people they need to buy security software and instead either does nothing or steals personal information, the Microsoft Sec
  6. Sun Solaris / SEAM Kerberos Multiple Vulnerabilities Highly critical Sun has acknowledged some vulnerabilities in Solaris and Sun Enterprise Authentication Mechanism (SEAM), which can be exploited by malicious people to potentially disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. For more information: SA34347 The vulnerabilities are reported in Solaris 9 and 10 for both the SPARC and x86 platforms, and Sun Enterprise Authentication Mechanism 1.0.1 (please see the vendor's advisory for details). Secunia Advisories - http://secunia.
  7. Apr8 New MS08-067 Exploit Creeps in During DOWNAD Frenzy by JM Hipolito (Technical Communications) "A new MS08-067 exploit silently made its entrance as the rest of the world was keeping watch on DOWNAD’s next step last week. In what seems to be a case of “old worm with new tricks,” the worm Neeris which has been active for a few years now was found updated with the now infamous MS08-067 exploit. Detected by Trend Micro as WORM_NEERIS.A, the number of PCs infected by this variant reportedly spiked almost at the same time that DOWNAD was supposed to do its thing. However, despite similarities
  8. Tax Season is Phishing Season by Mary Ermitano (Anti-spam Research Engineer) As usual, the approaching tax season (April 15th is Tax Day in the US) also comes with tax-related online threats. With unemployment rates reaching record highs this year, cybercriminals have yet another opportunity to polish their social engineering techniques. Last year, spammed messages supposedly from the Internal Revenue Service (IRS) delivered malware into systems. The email messages were sternly-worded. The intention was to alarm recipients of what these same messages claimed were incomplete tax forms, which c
  9. 7 April 2009, 17:13 Critical vulnerability in plug-in for IrfanView image viewer A critical vulnerability has been found in the Formats plug-in (format.dll) for the popular image viewer IrfanView. According to the security service provider Secunia, the problem is caused by an integer overflow when processing XPM files with specific dimensions. The vulnerability can be used by an attacker to compromise a user's system and infect it with malware. For an attack to be successful, a user must first be tricked into opening a specially crafted XPM file that causes the heap-based buffer overflow. The
  10. I would think of answers along that nature but would hesitate to actually put them down in writing.
  11. WAL-MART Job Application: This is an actual job application that a 17yearold boy submitted to Wal-Mart in Florida ... and they hired him because he was so honest and funny! NAME: Greg Bulmash. SEX: Not yet. Still waiting for the right person (or one who'll cooperate). DESIRED POSITION: Company's President or Vice President. But seriously,whatever's available. If I was in a position to be picky, I wouldn't be applying here in the first place. DESIRED SALARY: $185,000 a year plus stock options and a Michael Ovitzstyle severance package. If that's not possible, make an offer and we can hag
  12. Trojans accounted for 73 percent of all new malware created during this period, according to quarterly report Apr 06, 2009 | 07:59 PM GLENDALE, Calif., April 6 /PRNewswire/ -- PandaLabs, Panda Security's malware analysis and detection laboratory, today announced the general availability of its malware report for the first quarter of 2009. According to the report, Trojans have accounted for 73 percent of all new malware created during this period. Nevertheless, one of the main trends identified in the report is the growth of spyware, which rose from 2.5 percent in the previous quarter
  13. <h1 class="storyHeadlineFull" style="padding-left: 1px; margin-left: -2px; letter-spacing: 0px; text-align: left;">Facebook, Microsoft Partner To Fight Koobface Worm </h1> The Koobface virus, which spreads through social networking sites, has been added to Microsoft's Malicious Software Removal Tool. By Thomas Claburn InformationWeek April 6, 2009 04:55 PM In a partnership that reflects the growing need for cooperative responses to online security threats, Facebook last week said that it was working with Microsoft to protect people from the Koobface virus. Koobface app
  14. Peaches

    I'm Upset

    My thoughts & prayers that all goes well & your dad has a speedy recovery. Take care,
  15. very sharp picking up my typo error but it did get ur attention. LOL My right hand is in a splint type cast so 2 finger typing is a real pain!! Ever try using a right hand mouse with your left hand? Now that is a barrel of laughs. Cast will probably remain until the end of the month but I do my best. I have been on sites that take forever to load so now I know ^ anyone else that reads my post. Cheers & have a great week.
  16. For those of you that didn't see the show, Celine Dion appeared to walk out and stand next to Elvis as the two sang a duet of the classic "If I can Dream." It was like he was raised from the dead Everyone has been asking how it was done. ET said tonight it was a hologram. Totally amazing what they can do now. Estimated cost of this was said to have been between $50,000 to $100,000 and it is said to have taken months and months to create. Prior to the performance, Celine practiced with an Elvis impersonator. However it was done, it is totally amazing to me. She sounded great singing with Elv
  17. THE LAW & FISHING A couple went on vacation to a fishing resort up north. The husband liked to fish at the crack of dawn. The wife liked to read. One morning the husband returned after several hours of fishing and decided to take a short nap. Although she wasn't familiar with the lake, the wife decided to take the boat. She rowed out a short distance, anchored, and returned to reading her book. Along came the sheriff in his boat. He pulled up alongside her and said, "Good morning, Ma'am. What are you doing?" "Reading my book," she replied...as she thought to herself, "duh -- isn't
  18. Comcast e-mail outage sparks Twitter updates galore Millions of subscribers may have been affected By Marc Ferranti April 4, 2009 (IDG News Service) Comcast.net e-mail went down for potentially millions of subscribers on Saturday as users and observers got running commentary on the service provider's efforts to manage the situation via Twitter updates from Frank Eliason, the company's director of Digital Care. The outage started at 7:30 a.m. ET, with Eliason continuously issuing updates to his Comcastcares Twitter page throughout the day, several times forecasting fixes that failed
  19. Google makes Gmail search accessible to all comers About time too By Kelly Fiveash Google has released a new Gmail search tool that provides suggestions for messages, attachments and even file names in a move to degeekify its email service. Search Autocomplete is Mountain View’s latest Labs add-on, and also highlights Google’s sluggish response to improving search in its webmail app for all its users. RegAd('mpu1', 'reg.software.4159/applications', 'pos=top;sz=336x280', VCs); The new feature throws up automatic suggestions for users when searching for messages from a specific
  20. Conficker copycat prowls for victims, says Microsoft Four-year-old Neeris worm copies Conficker's attack strategies By Gregg Keizer April 5, 2009 (Computerworld) An old, but little-known worm has copied some of the infection strategies of Conficker, the worm that raised a ruckus last week, Microsoft security researchers said late Friday. Neeris, which harks to May 2005, is now exploiting the same Windows bug that Conficker put to good use, and is spreading through flash drives, another Conficker characteristic, said Ziv Mador and Aaron Putnam, researchers with the Microsoft Malw
  21. Google advises flushing your website Lessons in load time By Cade Metz in San Francisco 3rd April 2009 00:17 GMT Web 2.0 Expo Steve Souders is the sort of person who spends his Saturday afternoons measuring website load-times. "You might watch football games," he says. "I watch websites load." After founding the Exceptional Performance Group at Yahoo! - an effort to improve website speed from the websurfer's point of view - Souders now does similar work inside the Google Chocolate Factory. And on Thursday afternoon, he trumpeted his newest load-time tricks at Tim 2.0'Reilly's Web
  22. College Rules On the first day of college, the dean addressed the students, pointing out some of the rules: "The female dormitory will be out-of-bounds for all male students, and the male dormitory to the female students. Anybody caught breaking this rule will be fined $20 the first time. Anybody caught breaking this rule the second time will be fined $60. Being caught a third time will cost you $180. Are there any questions?" "How much for a season pass?"
  23. 3 April 2009, 11:12 Security vulnerability in PowerPoint Microsoft has warned of a vulnerability in their PowerPoint application that can be exploited with a specially crafted presentation file to allow remote execution of code. According to the report, the vulnerability is caused by an invalid object in memory and affects Microsoft Office PowerPoint 2000 Service Pack 3, 2002 Service Pack 3, 2003 Service Pack 3 and Microsoft Office 2004 for Mac. Other versions are reportedly not affected. For an attack to be successful, the victim must open a manipulated PowerPoint file, perhaps received in
  24. 3 April 2009, 17:38 The H Security Conficker information site On this page you will find all of the important information about the Conficker worm, including how to detect it and to guard against it. Note that some manufacturers call Conficker either Kido or Downadup. Test pages There are several test sites that can help you check for Conficker infection. These links open a page that performs the test and shows the result. Conficker test from The H and heise Security Conficker test from the University of Bonn Info pages and removal tools from AV vendors Many anti-virus manufacturers are offer
  25. 3 April 2009, 16:41 Vulnerabilities in several security products Several security products have been reported as having vulnerabilities which can circumvent the filtering or allow for denial of service attacks. ClamAV versions prior to 0.05, for example, can be fooled into not scanning groomed RAT archives and malformed TAR files can put it into an infinite loop when it attempts to process them. Also when scanning executable files with the -detect-broken option set, the ClamAV scanner can crash with a divide by zero error. These errors are eliminated in ClamAV 0.95. F-Prot has a problem with