Apparently, there is an unpatched vulnerability in Windows 2000 that could open the door for a network worm. The details have not been released to give Microsoft time to deal with a patch. (Microsoft is drawing down support commitments to 2000, releasing a batch of updates just before their timeline to start phasing out support.)
(more…)
Author: Avery
-
Windows 2000 Worm vulnerability
-
Microsoft to release 6 updates Tuesday August 9th
According to this release, expect to see 6 updates coming out from Microsoft Tuesday. One will be tagged critical from what I read. It seems like this is a bit large number this time around, but still it could be worse, prepare for patching.
-
Windows Vista virus
I know I saw this yesterday somewhere (The Register?), but….. According to this article, proof of concept viruses have already been written for Monad, which is Microsoft’s next revision of the command shell. Now, there is some hesitance to call these viruses the first that would affect Windows Vista because it’s not known when Monad will ship (it may first ship as part of Exchange 12 server).
(more…) -
Yahoo ! has launched Audio Search
Yahoo! has released an Audio search. It not only allows a search of some of the freely available audio on the net, but according to this article, it searches the catalogs of online music services (such as Rhapsody, emusic, Garageband.com, iTunes.)
(more…) -
Collection of Open Source software for Windows
This is a quick link to a downloadable cd of open source software for windows. There is a sizable list of programs. It appears as though some are not open source, but are free. If you have a fast enough connection to download it, you might find it very useful. If not, you might (more…)
-
Google Hacks
Along the lines of information is power. Here’s a recent book on Google Hacks that you might find interesting. It goes from some of the trivial stuff to improving search positioning and using the Google API.
-
Google Hack honeypot
I’ve found The Google Hack honeypot thanks to an entry at sans.org in the handlers diary. I’ve looked at it and it’s an interesting idea. The honeypot installs on your website and is invisibly linked to from another page. This way it gets spidered as if it was a real site. Then, it logs hack attempts against itself by monitoring and logging search referrers and ip addresses of those trying to use it.
(more…) -
Bad week for Cisco, security headaches
For starters, there was this advisory last week in response to a planned talk at a hacker convention on the possibility of a cisco router ipv6 exploit. The advisory detailed a LOCAL exploit and not the remote exploit that the talk was centered around. There was legal action against the speaker and materials detailing it were destroyed (literally ripped out of notebooks) at the convention by Cisco. Apparently this is the kind of vulnerability that could “shut down the internet”. Of course, much of the internet’s backbone runs on Cisco equipment. Next….
-
Spam that I might actually respond to
This is going to be uncategorized because it’s out of nowhere.
You know, I’ve wondered many times “who actually bites” for the things advertised in junk mail. You know someone has to. About a year ago I read an article on someone that bit at a lot of the “great offers” he got in his junk mail. I usually don’t see as much junk mail in my inbox as I used to. (I run spamassassin and a virus filter on my linux server). Sometimes a bit slips in though. Tonight I saw one that I may have to follow through with for more details….
(more…) -
Free speech in contrast (or lack of it)
This article details the Chinese governments tightening of control over what foreign tv, books, newspapers and other media imports. To quote from the article “Import of cultural products contrary to regulations will be punished according to the circumstances, and in serious cases the import license will be revoked,”
(more…)