Search:

Type: Posts; User: Tiger Shark; Keyword(s):

Search: Search took 0.40 seconds.

  1. But you aren't forcing the user to visit the site...

    But you aren't forcing the user to visit the site that initiates the popup thus you can't _force_ the user to visit the infected site. If you have that much control over the initial site that you can...
  2. I think this is where a major problem will come...

    I think this is where a major problem will come from. Since they haven't patched office automatically in the past there are a million vulnerable systems out there from the office standpoint even...
  3. Snort Sigs Update

    Three rules have been placed on the Snort Sigs, (rather than Bleeding Edge).

    They should prove to be more accurate.

    alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"WEB-CLIENT JPEG...
  4. From here...

    From here

    As is my want in situations where new exploit code becomes available my first instinct is to determine the attack vector in order to determine a method of mitigation within my network....
Results 1 to 4 of 4