Brandon

Members
  • Content Count

    550
  • Joined

  • Last visited

Everything posted by Brandon

  1. Forgot about Goldeneye007...I was never good at that game..but it was a cool first person shooter once you started playing it.
  2. Five vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to view potentially sensitive information, to trick users into downloading and executing arbitrary programs, and to compromise a user's system. 1) A design error in the processing of keyboard shortcuts for certain security dialogs can e.g. be exploited to delay the "File Download" dialog box and trick users into executing a malicious ".bat" file after pressing the "r" key. 2) A design error in the processing of mouse clicks in new browser windows and the predictability of the posi
  3. Secunia Research has discovered a vulnerability in Opera, which can be exploited by malicious people to trick users into downloading and executing arbitrary programs on a user's system. A design error in the processing of mouse clicks in new browser windows and the predictability of the position of the "File Download" dialog box can be exploited to trick the user into clicking on the "Run" button of the dialog box. This is exploited by first causing a "File Download" dialog box to be displayed underneath a new browser window, and then tricking the user into double-clicking within a specific ar
  4. Happy Birthday Rjmiller Have a great day..
  5. Happy Birthday Chappy Have a great day..
  6. On Nintendo and N64 I liked the Zelda and Starfox(only for N64) games...
  7. Brandon

    Extreme Pong

    First game only 129.. Second game only 214.. Fun game thanks for sharing
  8. Looks like only Enterprise user will still get updates/support...
  9. The weakness is caused due to an error in the handling of large history information. This can be exploited to fill the history file "history.dat" with large history information by tricking a user into visiting a malicious web site with an overly large title (e.g. set via JavaScript). Successful exploitation causes the browser to consume a large amount of CPU and memory resources on a vulnerable system when the affected browser is started up again after an attack. Users may have to remove the "history.dat" file in order to be able to use the affected browser. The weakness has been confirmed in
  10. Happy Birthday Gimpi Have a great day..
  11. The Online Safety Study, conducted by America Online and the National Cyber Security Alliance, analyzed the security of 354 broadband and dial-up users' computers. The study found that the number compromised by spyware dropped to 61 percent, from 80 percent a year ago, and the fraction infected with an active virus dropped to 12 percent from 19 percent a year ago. AOL and the NCSA sent technicians to the homes of each survey participant to check their computer security. While improvements are evident, consumers still have a long way to go, said Tatiana Platt, chief trust officer for America On
  12. An exploit for the new Firefox 1.5 browser was released today that causes a denial of service condition using a simple web page as a trigger. The heart of the problem lies with the history.dat file that Firefox creates, according to a posting on Packet Storm. The exploit creates a very large entry which Firefox then saves into the history.dat file. This causes the browser to crash the next time it is opened, and each time after that until the history.dat file is deleted from the system. The author of the exploit points out that average users may have difficulty figuring out this fix, preventin
  13. Yeah, my eyes hurt from looking at most of them...
  14. A new bot is spreading in the wild, with attackers looking to compromise vulnerable installations of the popular Mambo open-source content management system. A recent analysis by SecurityFocus confirms that a vulnerability first published on November 16th has resulted in numerous websites being defaced. Now, a bot has been released that compromises the web server and provides additional functionality for an attacker. Reports claim that the bot allows for arbitary code execution, DoS attacks (via TCP, UDP and HTTP floods), port scanning capabilities, and the ability to discover other vulnerable
  15. The MSBlast, or Blaster, worm spread to more systems than any other piece of malicious software in history and led to significant changes in Microsoft's handling of security, a member of the company's anti-malware response team stated in a recently released paper. The worm, which started spreading on August 11, 2003, compromised systems using a vulnerability in Microsoft Windows 2000 and Windows XP. More than 5 months later, the software giant released the Windows Blaster Worm Removal Tool. Windows Update offered the tool to people whose computers exhibited signs of the MSBlast worm, a group n