Challenging javascript game

Friday, December 16th, 2005

Just found this fairly challenging javascript game escape. You control a square and try to avoid touching 4 moving blocks (and the walls). It’s fairly tricky – I made it to 32.something seconds after a couple tries though. Just what I needed for a few moments this afternoon.    Send article as PDF   

Microsoft December 2005 Security updates

Tuesday, December 13th, 2005

Sans has the tip that information on the critical Windows updates expected tomorrow from Microsoft has started to be released. MS 05-54: Cumulative Security Update for Internet Explorer This will hopefully patch the javascript issues… MS 05-55: Vulnerability in Windows Kernel Could Allow Elevation of Privilege.    Send article as PDF   

Two critical fixes from Microsoft on December patch Tuesday

Thursday, December 8th, 2005

December’s rendition of Microsoft’s monthly Patch Tuesday will feature two critical security fixes. The malicious software removal tool will also be updated… Additionally, Microsoft will issue two non-security high-priority updates through Windows Update and Software Update Services, and three non-security high-priority updates through Microsoft Update and Windows Server Update Services. It is standard Microsoft procedure […]

Risk using Google Maps shut down.

Sunday, December 4th, 2005

I’m afraid it was something I expected would happen, *(although you always hope a company will look on such imitation as a form of flattery and be cooperative/excited about the new application of an old game idea…), but the implementation of the strategy game Risk using Google Maps has been shut down by a cease […]

More neat javascript stuff.

Wednesday, November 30th, 2005

A lot of things javascript have made the “web 2.0” idea what it is (Ajax and all), well, the new Mozilla-Firefox supports a canvas tag. To my limited understanding of it (at this point), allows some javascript interactions with the web page. For example…. one demo is of a first person shooter game (well… first […]

MS IE Javascript exploit for zero-day (0-day) vulnerability

Wednesday, November 30th, 2005

An exploit for last weeks zero-day (0-day) javascript vulnerability in Microsoft’s Internet Explorer is in the wild. I saw this post from Sunbelt a couple nights ago go up and disappear, at the time I didn’t have long enough to read it… It’s back today and there are instructions for mitigating the risk. However, there […]

DoS Exploit for MS-053

Tuesday, November 29th, 2005

Incidents.org has the story on an “in the wild” exploit for MS-053 vulnerability. The patch is out, so if you haven’t already – go ahead with the patching. The vulnerability is entitled “Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution (896424)”. The exploit causes 100% cpu utilitzation on visiting a page with a specially […]

Serving up web ads to users with javascript disabled

Wednesday, November 23rd, 2005

Well, with all the news on the Explorer bug, I started wondering what affect this would have on people browsing sites with adsense. I mean, adsense relies on javascript, so if it’s disabled, no adsense right? Right… Of course, adsense is not the only advertising program that uses javascript. (Of course, there are a number […]

More on Explorer vulnerability

Tuesday, November 22nd, 2005

Among other things… Sans has lowered the infocon to green, NOT that the threat is diminished, but there have been no new developments with regards to the announcement yesterday of a major Internet Explorer security vulnerability. Sans recommends browsing the web with firefox (with the noscript extension, so you can enable/disable javascript where you wish). […]

Exploit for Unpatched Internet Explorer vulnerability

Monday, November 21st, 2005

Well…. buckle your seatbelts it’s going to be a bumpy start to the week. the securityfix as well as incidents.org are reporting on exploit code that has been released that takes advantage of an unpatched Internet Explorer vulnerability. According to the Sans institute diary entry… they have tested the exploit code and it remotely launched […]

Google
 
Web www.averyjparker.com