Search:
Type: Posts; User: dynamoo; Keyword(s):
Search:
Search took 0.02 seconds.
-
December 17th, 2016, 11:57 AM
I haven't seen this mentioned on the board, nor do I appear to have received an email from QuinStreet (owners of AntiOnline). However, I can confirm that there has been a data breach on QuinStreet...
-
October 28th, 2008, 01:43 PM
Well, not really off-topic. It goes to prove that you *think* your safe from a worm attack because it's quite old, but the little buggers are persistent.
Luckily, there doesn't seem to be a...
-
October 27th, 2008, 05:54 PM
We've applied this patch to a lot of systems (3000+) with no ill-effects so far that can be attributed to it.
The odd thing about these worms is that they can flare up again from time-to-time. We...
-
October 27th, 2008, 12:20 PM
There's a fairly low-key but worrying bit of malware exploiting this at the moment: http://voices.washingtonpost.com/securityfix/2008/10/data-stealing_trojan_exploitin.html
Don't been fooled into...
-
June 14th, 2006, 04:10 PM
To be honest, only a small minority of patches need to be applied to most servers.
For example - there's no real need to patch IE on a file server because you're not going to be surfing for p0rn...
-
January 13th, 2006, 10:38 AM
I've had some further thoughts on possible attack vectors for the TNEF flaw on Exchange servers.
Looking back to the Witty Worm again, there was a definite feeling that very many of the vulnerable...
-
January 13th, 2006, 10:38 AM
I've had some further thoughts on possible attack vectors for the TNEF flaw on Exchange servers.
Looking back to the Witty Worm again, there was a definite feeling that very many of the vulnerable...
-
January 12th, 2006, 04:54 PM
Mmm... the legal situation has been mentioned in a couple of threads.
The law varies widely according to the country you are in, and state-by-state in the US. However, one thing that you need to...
-
January 12th, 2006, 04:54 PM
Mmm... the legal situation has been mentioned in a couple of threads.
The law varies widely according to the country you are in, and state-by-state in the US. However, one thing that you need to...
-
January 12th, 2006, 03:49 PM
Errr this is a bit long.
Patch report
I applied the TNEF patch to two legacy Exchange 5.5 SP4 servers OK, although one did require a reboot. Definitely time to move from *that* platform though as...
-
January 12th, 2006, 03:49 PM
Errr this is a bit long.
Patch report
I applied the TNEF patch to two legacy Exchange 5.5 SP4 servers OK, although one did require a reboot. Definitely time to move from *that* platform though as...
-
January 11th, 2006, 04:57 PM
Yes, it's worth looking at the workarounds for each problem too. Sometimes the workarounds are very easy to implement and are often more effective.
-
January 11th, 2006, 04:41 PM
Some of it depends on the seriousness of the flaw and the likelihood of it being exploited, versus the inherent risks of applying the patch.
For example, with the WMF patch I manually tried out a...
-
January 11th, 2006, 02:10 PM
I hate to think what that might break though. Isn't the .dat file an integral part of an RTF formatted message?
Not one to put off patching though - although you don't need to reboot servers, the...
-
January 11th, 2006, 12:48 PM
Urrrggghhh... I've done some poking around and it appears that the SERVER can be infected with the TNEF attack hence the patch - so an update would be required for both. The fact that it appears that...
-
January 11th, 2006, 12:21 PM
For the Exchange / RTF / TNEF thing, there's a set of patches for client PCs (Outlook 2000, 2002 and 2003) and a set of patches for Exchange (5.0, 5.5 and 2000).
I've read the bulletin and I'm...
-
January 7th, 2006, 05:27 PM
It depends. It's definitely worth taking additional steps if you have a wireless network, but as
HTRegz said it kinda depends on your circumstances. For my home network I take several additonal...
-
January 7th, 2006, 05:14 PM
I think we've dodged the bullet on this one.. but I bet you that the WMF handling subsystem is full of holes like this, so I guess the bad guys will keep looking around all the legacy crap with...
-
January 6th, 2006, 12:03 PM
I'm in the camp that says that's it not a great product - but it's certainly a LOT better than no firewall at all. It does have an elegant simplicity.. and as has been said, if you go onto the...
-
January 6th, 2006, 02:22 AM
Now.. here's something strange. Remember the blocklist that the ISC was recommending..
Well, check out Alexa's movers and shakers (do NOT visit the sites) and look at the sites going down.
...
-
January 5th, 2006, 11:21 PM
Windows XP Pro and Windows 2000 Pro applied the patch just fine for me.
-
January 5th, 2006, 10:39 PM
Just going to apply the patch now. If I don't get the BSOD then I'll authorise it via our SUS server. If you don't hear from me..,
-
January 5th, 2006, 01:23 PM
I've now seen this in action on an infected web page.
Now, I'll post real domains here because I trust you boys and girls to be CAREFUL with this stuff. Use Samspade for Windows or some other...
-
January 3rd, 2006, 12:37 PM
I ran the checker on a Windows 2000 SP4 PC and it came out as vulnerable. Also, a legacy NT4 box was also flagged as being vulnerable.
-
January 3rd, 2006, 11:00 AM
On the Windows 2000 issue..
My desktop PC here is Windows 2000 running Outlook 2000. Outlook can render WMF files embedded in an email message just fine - i.e. not as an attachment, as part of the...
|
|