Peaches

Update Experts
  • Content Count

    2130
  • Joined

  • Last visited

Everything posted by Peaches

  1. Office 2003's Days are Numbered Gregg Keizer, Computerworld Saturday, April 04, 2009 9:00 AM PDT Microsoft Corp. has announced that it will drop mainstream support for Office 2003 on April 14, the same day it starts to retire Windows XP. Office 2003, which was last updated in September 2007 with Service Pack 3 (SP3), will leave mainstream support in less than two weeks, and enter extended support. Typically, Microsoft keeps a product in the former for five years, then shifts it into the latter for another five. Microsoft launched Office 2003 in November of that year. It stopped shippping the
  2. SUSE update for Sun Java SUSE has issued an update for Sun Java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a user's system. For more information: Secunia advisories - http://secunia.com/advisories/34451/
  3. iPhone VOIP tussle heats up Skype vs Deutsche Telekom, AT&T By Rik Myslewski in San Francisco 3rd April 2009 20:46 GMT Skype and its allies are fighting back against telcos that disallow or cripple its voice-over-internet-protocol (VoIP) service. At issue is Deutsche Telekom's edict that customers who use Skype's free VoIP service on their iPhone will have their internet access summarily severed and AT&T's refusal to allow Skype to work on its Edge and 3G networks. On Wednesday, Deutsche Telekom's mobile arm, T-Mobile Germany, decreed that subscribers who used its service to make VoIP
  4. AMD ATI Radeon HD 4890 Get ready for gigahertz graphics By Leo Waldock 3rd April 2009 14:33 GMT Review The new AMD ATI Radeon HD 4890 is heavily based on the HD 4870 but it has some changes in its architecture that allow it to run substantially higher clock speeds. How much higher? Glad you asked. The 4870 has reference clock speeds of 750MHz for the core and GDDR 5 memory that runs at 900MHz. GDDR 5 is a completely different animal to GDDR 3 so the 900MHz speed equates to an effective speed of 3600MHz. This business of true speed/effective speed could get wearisome so we’re going to stick to
  5. Solid Potato Salad - the Ross Sisters Amazing!!! All I can say is, "GOOD GRIEF"!!!!! Many of uou moy may not remember the song & dance act of the Ross Sisters, who were popular in 1944 but this is worth watching. Their act gets better as it progresses and you will be amazed at how the sisters exit the stage at the end of their performance. The whole act is absolutely amazing to watch. YouTube - Solid Potato Salad - The Ross Sisters (1944)
  6. I did the test and am not infected .... for what it's worth. Conficker Eye Chart Thanks to Joe Stewart from SecureWorks for his awesome work. Go to site to determine if you are infected with Conficker http://www.confickerworkinggroup.org http://www.confickerworkinggroup.org/wiki/ Note: site my get real busy..so check back later if you can not access the test.
  7. Conficker D-Day Arrives; Worm Phones Home (Quietly) Ian Paul timestamp(1238599920000,'longDateTime') <li> The Conficker worm today has begun to phone home for instructions but has done little else. Conficker was programmed to today begin actively visiting 500 out of 50,000 randomly generated web addresses to receive new instructions on how to behave. Conficker has begun to do this, according to security company F-Secure, but so far no doomsday scenarios have emerged. Among security experts, the consensus seems to be that very little will happen today. This may be in pa
  8. 1 April 2009, 13:11 Security update for Bugzilla The developers of the Bugzilla open source bug tracking system have released versions 3.2.3 and 3.3.4 to close a cross-site request forgery hole. Bugzilla 3.2.3 is an update to the stable version of Bugzilla, while 3.3.4 is an update for the development branch. The cause of the problem was a vulnerability in the handling of attachment editing. It was found that the attachment.cgi script did not validate HTTP requests to ensure they actually came from Bugzilla. An attacker would have to have access to a Bugzilla installation and be a
  9. <h2 class="headline">Trend Micro Issues Instructions On Restoring Web Site Access Should Conficker Worm Bite </h2>How infected Internet users can regain access to security companies' Web sites in order to work with tech support to clean their computers, get information and tools on security updates Apr 01, 2009 | 02:43 PM Cupertino, Calif. -- March 31, 2009 -- While the ultimate goal of the DOWNAD/Conficker worm still remains unknown, Trend Micro has discovered that those infected with the worm are blocked from entering the Web sites of security companies and prevented fro
  10. >>>>>>>>>>>>> Freakishly fast' Ruby coming to the Mac Blowing up the bridge 2nd April 2009 00:50 GMT Mac developers intrigued by Ruby's ease of use and simple maintainability but deterred by its turgid performance will be happy to hear MacRuby 0.5 - aka its "experimental branch" - is remarkably snappy. Exactly how snappy is remarkably snappy? A suite of low-level benchmark tests recently performed by Antonio Cangiano of Zen and the Art of Programming shows MacRuby 0.5 to be on average just under three times as fast as Ruby 1.9.1, with some oper
  11. 31 March 2009, 18:05 Freeloaders are taking advantage of Conficker scare [/] According to reports by several anti-virus vendors, the fear of Conficker has brought the first freeloaders to the scene. The cyber criminals try to sell alleged removal tools for the Conficker worm. According to F-Secure, a Google or other search engine query for Conficker removal tools will quickly produce dubious offers that promise a lot and deliver nothing – or even infect the PC with malware themselves. The freeloaders generally belong to the scareware developer crowd. They create programs which try to scare use
  12. March 31, 2009 7:00 AM PDT Postini: Spam up again following McColo takedown by Elinor Mills It has taken spammers only four months to get their botnets back up after hosting company McColo Corp. was shut down, according to statistics due to be released on Tuesday from Google's Postini e-mail security provider. Spam volumes dropped as much as 70 percent or 80 percent overnight when San Jose, Calif.-based McColo was shut down on November 11, 2008. McColo was hosting command and control servers that were being used to send instructions--like send spam or Trojans--to bot software planted on PCs,
  13. 31 March 2009, 11:54 Conficker demystified Today, Felix Leder and Tillmann Werner of Bonn University are presenting the results of their analysis of the Conficker worm. In a paper in the Honeynet Project "Know Your Enemy" series, they not only describe the worm's modus operandi, but also provide a number of tools to immunise against the worm, detect its presence, and remove it cleanly. They have also discovered a problem in Conficker that apparently allows it to be directly attacked. If proof were still required that Conficker is not the work of beginners, Leder and Werner's analysis now prov
  14. Never lie to your mother Brian invited his mother over for dinner. During the course of the meal, Brian's mother couldn't help but notice how beautiful Brian's roommate, Jennifer, was. Brian's Mom had long been suspicious of a relationship between Brian and Jennifer, and this had only made her more curious. Over the course of the evening, while watching the two interact, she started to wonder if there was more between Brian and Jennifer than met the eye. Reading his mom's thoughts, Brian volunteered, 'I know what you must be thinking, but I assure you Jennifer and I are just roommates.' About
  15. No problem logging etc. but I do have an editing problem. When I edit and repost I have a lot of html coding within the contents of the post. Any reason as to why this is happening?
  16. Search for 'Conficker' Could Lure Virus Symantec is warning Web users that searching for information on computer viruses such as Conficker could put them at risk of unintentionally downloading the virus on to their PC. Conficker targets a flaw in Windows Server and despite Microsoft releasing an emergency patch and urging all Web users to download it, many machines remain unprotected. According to the security vendor, searching for 'conficker' in a number of the Web's most popular search engines brings up a number of hoax Websites that actually host the virus and infect any users that navigate
  17. Problems removing conficker relate to dat files being unable to cope with the way conficker morphs (signature-based AV is on the way out for this very reason - the need to retain immense libraries of signatures against every variant of every threat known), the account used to run cleanup/removal tools having escalated privileges (and thus enabling the worm to propagate further through the network), removal needing to be run in safe mode to properly disinfect the machine and general laziness regarding patching of systems - the patch that prevent conficker infection in the first place is four mo
  18. Companies Trash Security Policies Along With Sensitive Data Careless disposal could turn dumpsters into gold mines for data thieves, experts say Mar 27, 2009 | 03:13 PM By Tim Wilson DarkReading Before you declare your organization's sensitive data to be safe, you'd better check your trash. Several companies didn't during the past week, and they're paying the price: • In Alabama, employees at Hancock Fabric are livid after personnel records dating back to 2005 were found in a dumpster. The company apologized to current and former employees, and said the documents were disposed of improperly.
  19. Phishing with images containing hidden code 27 March 2009, 12:36 "Arbor Networks, which specialises in combating distributed denial of service (DDoS) attacks, reports on it's blog that a named web site is actively exploiting Internet Explorer's MIME-sniffing problem to create phishing attacks. The perpetrators send email containing a supposedly harmless link that seemingly leads to a JPEG image, but the photo contains hidden HTML and JavaScript code that displays a fake eBay login page. While Firefox and Safari return an error message when loading the image, Internet Explorer execute
  20. 27 March 2009, 17:06 Malicious spam poses as DHL delivery notification A large scale malicious spam campaign is sending emails claiming to contain an invoice for a missed delivery from courier DHL. According to Graham Cluley of Sophos, the messages claim that an attempted delivery was made on the 14th of March. To claim their package recipients are asked to print out the attached invoice, supposedly contained inside of an attached zip file named "dhl_n756512.zip", and take it to a DHL office. The zip file attachment contains the Troj/Agent-JJP Trojan horse, which can allow an attacke
  21. <h2 class="headline">New Rootkit Attack Hard To Kill </h2> BIOS-based hack demonstrated by Core Security Technologies evades antivirus software Mar 27, 2009 | 04:23 PM By Kelly Jackson Higgins DarkReading Researchers have come up with a way to create an even stealthier rootkit that survives reboots and evades antivirus software. Anibal Sacco and Alfredo Ortega, both exploit writers for Core Security Technologies, were able to inject a rootkit into commercial BIOS firmware using their own Python-based tool that installed the rootkit via an update, or flash, process.
  22. <h2 class="headline">Mozilla Pounces On New Firefox Zero-Day Exploit </h2> Vulnerability discovered in Firefox 3.0.x browsers considered critical Mar 26, 2009 | 02:48 PM By Kelly Jackson Higgins DarkReading A zero-day exploit for Firefox was unleashed online yesterday, but Mozilla didn't waste any time before patching for the critical vulnerability it abuses: The open-source group now has a patch ready for the flaw that will ship with the next Firefox update on April 1. The researcher who discovered the vulnerability yesterday released with it proof-of-concept code.
  23. Mar27 Spoofed Delta Airlines Contains Malware by Jake Soriano (Technical Communications) The Trend Micro Content Security team discovered spoofed email messages that pretend to be from Delta Airlines. The fake email message contains a confirmation numbers of supposed ticket purchase and a ZIP file. Recipients are told that this said file contains details on the travel itinerary. Here’s a screenshot of a spammed message: http://blog.trendmicro.com/spoofed-delta-a...ntains-malware/ The ZIP file is, of course, a malicious file detected by Trend Micro as TROJ_DELF.PSZ. The T
  24. Ubuntu update for openjdk-6 Highly critical Ubuntu has issued an update for openjdk-6. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a user's system. Secunia - http://secunia.com/advisories/34489/