I’ve run into a few problems with a windows xp repair install in the last few days that I wanted to detail the problems and what the resolution was. First, it was someone elses laptop needing a hard drive replacement. The drive was imaged, but windows still would not boot, so I broke out the XP Pro disc for a repair installation *(after trying to chkdsk from the recovery console first and fixboot /fixmbr…) Anyway, I went through the repair install process and the system booted up just fine. My next task was windows update and here’s were I started running into problems. Typing an address in the address bar of internet explorer caused a new window to open, which seemed to hang. Opening the home page seemed fine (i.e. the page that loads when you first open explorer), but you couldn’t navigate to another address.
Tag: IE
-
Internet Explorer 7 on linux
Haven’t had the chance to try this one firsthand yet, although I’ve been watching for this. You may be familiar with ies4linux which is a script that uses wine to download/install multiple versions of Internet Explorer on a linux install. (But why oh why would you do this?) For many that do web design it’s a tremendously good idea to test what a website looks like in multiple browsers because they all have their own unique …. quirks. Of course, there are other reasons…. sites that refuse to work with anything but IE. (Blue Cross/Blue Shield for instance has some web apps that will not work with anything else.)
Well… now Internet Explorer 7 is supported by ies4linux….
-
IE 7 address bar spoofing issue
Another issue was reported with the new IE 7 and confirmed by Microsoft. It seems that it’s possible for a malicious link to spoof the information in the address bar (make it look like you’re at a site that you’re NOT at.) Incidents.org gives the following possible workaround…
As a quick workaround you may want to configure MSIE 7.0 to open new windows in a new tab. In order to do this, Tools -> Internet Options -> Tabs Settings -> When a pop-up is encountered: Always open pop-ups in a new tab.
-
Internet Explorer 7 final release – AND first vulnerability…
Looks as though IE 7 release is imminent and will be in automatic updates on November 1st. Here’s one persons take on the user interface “improvements”. Now, there are many improvements in core functionality, but I’m annoyed by the user interface changes. I have spent quite a while with people getting use to the way the interface for windows programs have been for the last 10 years, now I feel like many of them will take another 5-8 years to get used to a NEW way to expect programs to be laid out….
-
Google Docs and Spreadsheets
Bye bye Writely – hello Google Docs and Spreadsheets Inside Google has been reporting on the (happening right now) launch of docs.google.com which should be a shared login for both the writely successor and spreadsheets which is now known as Google Docs and Spreadsheets. It appears to support IE 6 and Firefox.
-
Preventing the automatic update to Internet Explorer 7
Internet Explorer 7 is set to be released this month (October 2006) and it will likely be an automatic update for Windows users either November or December of this year. (I’m thinking November.) Now, it’s been a long time in the making, at one point Microsoft said there wouldn’t be another version past 6 of IE, but… it’s finally coming and some people will not want it installed automatically until they’ve had more time to investigate it and test with their critical uses.
-
Update on the Internet Explorer VML vulnerability
Just catching up on the days VML vulnerability news from today…. It looks as though… the exploit is now MUCH more widespread this blog has some video of an infection, what’s notable is that the first take was VERY UNEVENTFUL, it was used to stealthily install a keylogger. (So that they can harvest paypal/bank/etc. passwords…) So, there might not be a big red “you’re owned” sign pop up. Sunbelt reported on a test page to visit to see if you’re vulnerable. The direct link is http://www.isotf.org/zert/testvml.htm (Will crash IE if it’s vulnerable.)
-
Public CWSandbox (es)…
Around the time of this latest IE exploit hitting the web, there was also mention of some publicly available CWSandbox sites for the submission of malware. It’s an analysis tool that can give you a report of how the malware behaves and what it would do if run in a “non-sandboxed” environment. There are a couple up now it seems. One incidents.org reported is https://luigi.informatik.uni-mannheim.de/submit.php, Sunbelt has one at http://research.sunbelt-software.com/submit.aspx and they have alternate URLS….
-
Internet Explorer 0-day (take 2 of the last few days…)
The last zero day (activeX) seems to be less interesting than this NEW zero-day that really made a news splash in the last day. It looks as though this NEW 0-day affects VML… Incidents.org has good coverage here. Microsoft has an advisory up and they expect to release a patch on the next scheduled patch day (earlier if needed…. ahem….) Sunbelt is blogging about the “epic loads of adware” being pushed into systems via this vulnerability. Now, some workarounds….
-
ICQ client and toolbar vulnerabilities
Sans brings this from AOL, advising of vulnerabilities in the ICQ client and the ICQ toolbar for IE. The latest version of ICQ client is 5.1 and is claimed to not be vulnerable. (Toolbar version 1.3 is said to be vulnerable as well. No more recent version of that is available – you might consider disabling the toolbar.)