LJM Master

Members
  • Content Count

    230
  • Joined

  • Last visited

Everything posted by LJM Master

  1. very much like the guide Chachazz! understood..
  2. lol.. I kno the response is abit late, just like to say that i liked this one! good one rv likewise Barb
  3. lol, good one jimras, kinda makes ya feel sorry for the old fella.. hehe!! L.J.M
  4. glad your safe an sound handplane, L.J.M
  5. good one tg liked this one alot tg, sent it around... keep 'em comin for sure... L.J.M
  6. very funny one tg.. one to definately sent around..
  7. hehe.. like that one barb L.J.M
  8. lol hehe.. hant heard this one before good one Sultan L.J.M
  9. http://www.spywarebeaters.com
  10. hehe... that one's hilarious!! Thanks bozodog, I am also gonna be sending this 1 to ppl all over cheers L.J.M
  11. FYI... - http://isc.sans.org/diary.php?date=2005-04-20 Updated April 20th 2005 21:56 UTC "Secunia Advisory: SA15023 Release Date: 2005-04-20 - http://secunia.com/advisories/15023/ Affected Software - most of it; Security Patch Update For Realplayer Enterprise - http://www.service.real.com/help/faq/secur...rity041905.html Stand alone versions; - http://service.real.com/help/faq/security/050419_player/EN/ Stand alone patches for RealOne and RealPlayer for Windows and Macintosh are available if you use the players "Check for Update"..."
  12. FYI... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0964 "...Vulnerability in Kerio Personal Firewall 4.1.2 and earlier allows local users to bypass firewall rules via a malicious process that impersonates a legitimate process that has fewer restrictions." >>> Update to version 4.1.3: http://www.kerio.com/kpf_download.html Release history: http://www.kerio.com/kpf_releasehistory.html
  13. http://www.computerworld.com/securitytopic...,100874,00.html
  14. http://news.com.com/E-mail+worm+graduates+...697.html?tag=nl and you might wanna take a read here > http://www.betanews.com/article/IM_Securit...ally/1112722975
  15. hi everyonce, you guys are all welcome for the head-up echobay: If you feel it necessary to do so, feel free to start you own thread on that, I supposed it's kool with me, so go ahead and start the thread, that link was to an article Firefox's preparation for an new extension, so i have no objection to it. have a good day ppl L.J.M
  16. Hi Secunia has found a vulnerability in Firefox in 1.0.1 & 1.0.2 They advise you to Disable JavaScript There is also a test to see if your vulnerable. http://secunia.com/advisories/14820/ L.J.M
  17. WORM_KRYNOS.B is a destructive, memory-resident worm that propagates via peer-to-peer applications by dropping a .ZIP copy of itself in a certain folder. It may also spread via email by sending itself as an attachment. This worm has backdoor capabilities, allowing remote users to access and perform malicious tasks on affected machines. It can also prevent affected users from accessing certain antivirus and security Web sites by modifying the HOSTS file. WORM_KRYNOS.B is currently spreading in-the-wild, and infecting computers running Windows NT, 2000, and XP. Upon execution, this memory-reside
  18. After you install Windows XP Service Pack 2, some 1394 devices (such as digital cameras that use S400 speed) may not perform as expected. Install this update to help prevent this issue. After you install this update, you will have to restart your computer. Quick Info File Name: WindowsXP-KB885222-x86-ENU.exe Download Size: 367 KB Date Published: 3/25/2005 Version: 885222 Download from: http://www.microsoft.com/downloads/details...&displaylang=en View the Knowledge Base: http://support.microsoft.com/kb/885222
  19. Hi Liz, glad to hear things turned out great, so how's your new toy? I haven't got IESpyad yet, some say it's a necessity, i'm still thinking about gettin' it, but i'm not in a rush to download it just yet (especially as Internet Exploror isn't my default web browser, I use K-Meleon browser, it's awesome IMHO, a link to it here > http://kmeleon.sourceforge.net/ kind regards L.J.M
  20. WORM_JEANS.A is a memory-resident worm that attempts to propagate via email with itself as an attachment, using its own Simple Mail Transfer Protocol (SMTP) engine. It may use a polymorphic engine to drop a file containing the source code of the worm, and then recompile it to produce a different appearance. While the inclusion of source code in the worm is not new behavior (BAGLE variants included this), the recompilation of the dropped source code is. This "courier virus" behavior is described as the worm being able to carry within itself, its whole source code and eventually dropping and rec