--- Begin Message ---
SecurityFocus Microsoft Newsletter #213
----------------------------------------

This Issue is Sponsored By: SecurityFocus

Stay up to date.  All the latest news, columns, jobs and more in a
convenient html newsletter - Even a glimpse of upcoming columns and feature
articles!  Sign up today!

http://www.securityfocus.com/htmlnewsletter/subscribe

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Trends in Web Application Security
     2. Phishing For Savvy Users
II. MICROSOFT VULNERABILITY SUMMARY
     1. Microsoft Internet Explorer Malformed HTML Null Pointer Dere...
     2. Mozilla Bugzilla Multiple Authentication Bypass and Informat...
     3. OpenWFE Remote Cross-Site Scripting And Connection Proxy Vul...
     4. Microsoft Internet Explorer Malformed IFRAME Remote Buffer O...
     5. NetCaptor Cross-Domain Dialog Box Spoofing Vulnerability
     6. NetCaptor Cross-Domain Tab Window Form Field Focus Vulnerabi...
     7. Microsoft Internet Explorer HHCtrl ActiveX Control Cross-Dom...
     8. Mozilla Temporary File Insecure Permissions Information Disc...
     9. GD Graphics Library Remote Integer Overflow Vulnerability
     10. PostNuke Trojan Horse Vulnerability
     11. Slim Browser Cross-Domain Tab Window Form Field Focus Vulner...
     12. Slim Browser Cross-Domain Dialog Box Spoofing Vulnerability
     13. Tabs Laboratories MailCarrier Remote SMTP EHLO/HELO Buffer O...
     14. Microsoft Internet Explorer Font Tag Denial Of Service Vulne...
     15. Novell ZENworks System Tray Local Privilege Escalation Vulne...
     16. Hummingbird Connectivity INETD32 Privilege Escalation Vulner...
     17. Google Desktop Search Remote Cross-Site Scripting Vulnerabil...
     18. Hummingbird Connectivity FTP Server Denial Of Service Vulner...
     19. PHPList Multiple unspecified Vulnerabilities
     20. PuTTY Remote SSH2_MSG_DEBUG Buffer Overflow Vulnerability
     21. Quicksilver Master of Orion III Multiple Remote Denial of Se...
     22. Apple QuickTime Remote Integer Overflow Vulnerability
     23. RealNetworks RealOne Player/RealPlayer Skin File Remote Stac...
     24. Multiple Vendor Content Filtering Bypass Vulnerabilities
     25. Microsoft Internet Explorer TABLE Status Bar URI Obfuscation...
     26. Global Spy Software Cyber Web Filter IP Filter Bypass Vulner...
III. MICROSOFT FOCUS LIST SUMMARY
     1. 802.1x Authentication (Thread)
     2. GPO that forces users to use a proxy server. (Thread)
     3. Remove "Shutdown" command from w2k PCs but enable re... (Thread)
     4. Notifying users of password expiration via e-mail` (Thread)
     5. RE: Can we really block users from installing applic... (Thread)
     6. SecurityFocus Microsoft Newsletter #212 (Thread)
IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
     1. CAT Cellular Authentication Token and eAuthentication Servic...
     2. KeyCaptor Keylogger
     3. SpyBuster
     4. FreezeX
     5. NeoExec for Active Directory
     6. Secrets Protector v2.03
V. NEW TOOLS FOR MICROSOFT PLATFORMS
     1. WapgGuihttp://workspaces.gotdotnet.com/wapggui 1.0
     2. antinat v0.81
     3. PopMessenger 1.60
     4. ByteShelter I 1.0
     5. DiskInternals Uneraser 2.01
     6. DiskInternals NTFS Reader 1.01
VI. UNSUBSCRIBE INSTRUCTIONS
VII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Trends in Web Application Security
By Kapil Raina

This article discusses current trends in penetration testing for web
application security, and in particular discusses a framework for selecting
the best tool or tools to use for these increasingly common type of
application.

http://www.securityfocus.com/infocus/1809


2. Phishing For Savvy Users
By Scott Granneman

Recent "phishing" episodes are still often overlooked by tech-savvy users,
but a lesson in history shows how entire nations have been fooled.

http://www.securityfocus.com/columnists/274

II. MICROSOFT VULNERABILITY SUMMARY
-----------------------------------
1. Microsoft Internet Explorer Malformed HTML Null Pointer Dere...
BugTraq ID: 11510
Remote: Yes
Date Published: Oct 23 2004
Relevant URL: http://www.securityfocus.com/bid/11510
Summary:
Microsoft Internet Explorer is prone to a vulnerability that may permit 
malformed HTML to crash the browser.  The source of the crash is reportedly a 
null pointer dereference.

2. Mozilla Bugzilla Multiple Authentication Bypass and Informat...
BugTraq ID: 11511
Remote: Yes
Date Published: Oct 25 2004
Relevant URL: http://www.securityfocus.com/bid/11511
Summary:
Mozilla Bugzilla is affected by multiple authentication bypass and information 
disclosure vulnerabilities.  These issues are due to a failure of the 
application to properly validate access permissions of a user prior to 
revealing or altering information.

An attacker can leverage these issues to disclose bug details that are marked 
private as well as edit bug reports without requiring authorization.

3. OpenWFE Remote Cross-Site Scripting And Connection Proxy Vul...
BugTraq ID: 11514
Remote: Yes
Date Published: Oct 25 2004
Relevant URL: http://www.securityfocus.com/bid/11514
Summary:
OpenWFE is affected by a cross-site scripting and connection proxy 
vulnerability.  These issues are due to a failure of the application to 
properly sanitize user-supplied input.

An attacker may leverage the cross-site scripting issue to steal cookie-based 
authentication credentials as well as carry out other attacks by executing 
client-based script code in an unsuspecting user's browser.  An attacker may 
leverage the connection proxy issue to scan arbitrary network computers 
anonymously, facilitating further attacks.

4. Microsoft Internet Explorer Malformed IFRAME Remote Buffer O...
BugTraq ID: 11515
Remote: Yes
Date Published: Oct 24 2004
Relevant URL: http://www.securityfocus.com/bid/11515
Summary:
Microsoft Internet Explorer is reported prone to a remote buffer overflow 
vulnerability.  This issue presents itself due to insufficient boundary checks 
performed by the application and results in a denial of service condition.  
Arbitrary code execution may be possible as well.

This issue is reported to affect Microsoft Internet Explorer 6 running on a 
Windows 2000 SP4 platform.

5. NetCaptor Cross-Domain Dialog Box Spoofing Vulnerability
BugTraq ID: 11519
Remote: Yes
Date Published: Oct 25 2004
Relevant URL: http://www.securityfocus.com/bid/11519
Summary:
NetCaptor is reported prone to a cross-domain dialog box spoofing 
vulnerability.  This issue may allow a remote attacker to carry out phishing 
style attacks as an attacker may exploit this vulnerability to spoof an 
interface of a trusted web site.

6. NetCaptor Cross-Domain Tab Window Form Field Focus Vulnerabi...
BugTraq ID: 11520
Remote: Yes
Date Published: Oct 25 2004
Relevant URL: http://www.securityfocus.com/bid/11520
Summary:
A cross-domain tab window form field focus vulnerability reportedly affects 
NetCaptor.  This issue is due to an access validation error that allows a web 
page to gain access to form fields in other web pages rendered in different 
tabs of the same browser window.

This issue may be leveraged to facilitate convincing phishing style attacks 
designed to reveal sensitive information such as passwords and financial 
details.

7. Microsoft Internet Explorer HHCtrl ActiveX Control Cross-Dom...
BugTraq ID: 11521
Remote: Yes
Date Published: Oct 25 2004
Relevant URL: http://www.securityfocus.com/bid/11521
Summary:
Microsoft Internet Explorer is reported prone to a cross-domain scripting 
vulnerability.

The vulnerability is reported in the 'hhctrl' Internet Explorer ActiveX control 
and could allow an attacker to influence Internet Explorer into running script 
in the context of a foreign domain.

8. Mozilla Temporary File Insecure Permissions Information Disc...
BugTraq ID: 11522
Remote: No
Date Published: Oct 25 2004
Relevant URL: http://www.securityfocus.com/bid/11522
Summary:
Mozilla, Mozilla Firefox, and Mozilla Thunderbird are all reported susceptible 
to an information disclosure vulnerability. This issue is due to a failure of 
the applications to properly ensure secure file permissions on temporary files 
located in world-accessible locations.

This vulnerability allows local attackers to gain access to the contents of 
potentially sensitive files. This may aid them in further attacks.

9. GD Graphics Library Remote Integer Overflow Vulnerability
BugTraq ID: 11523
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11523
Summary:
The GD Graphics Library (gdlib) is affected by an integer overflow that 
facilitates a heap overflow.  This issue is due to a failure of the library to 
do proper sanity checking on size values contained within image format files.

An attacker may leverage this issue to manipulate process heap memory, 
potentially leading to code execution and compromise of the computer running 
the affected library.

10. PostNuke Trojan Horse Vulnerability
BugTraq ID: 11529
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11529
Summary:
It is reported that the server hosting PostNuke, www.postnuke.com, was 
compromised recently. Additionally, it is reported that the attacker modified 
the download address of the archive 'PostNuke-0.750.zip'. The new download 
location contained a trojaned version of the PostNuke archive.

It is reported that users that downloaded the PostNuke archive between Sunday 
the 24th of Oct 2004 at 23:50 GMT and Tuesday the 26th of Oct 2004 at 8:30 GMT 
are likely to be affected by this vulnerability.

11. Slim Browser Cross-Domain Tab Window Form Field Focus Vulner...
BugTraq ID: 11530
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11530
Summary:
A cross-domain tab window form field focus vulnerability reportedly affects 
Slim Browser.  This issue is due to an access validation error that allows a 
web page to gain access to form fields in other web pages rendered in different 
tabs of the same browser window.

This issue may be leveraged to facilitate convincing phishing style attacks 
designed to reveal sensitive information such as passwords and financial 
details.

12. Slim Browser Cross-Domain Dialog Box Spoofing Vulnerability
BugTraq ID: 11532
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11532
Summary:
Slim Browser is reported prone to a cross-domain dialog box spoofing 
vulnerability.  This issue may allow a remote attacker to carry out phishing 
style attacks as an attacker may exploit this vulnerability to spoof an 
interface of a trusted web site.

13. Tabs Laboratories MailCarrier Remote SMTP EHLO/HELO Buffer O...
BugTraq ID: 11535
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11535
Summary:
Tabs Laboratories MailCarrier is affected by a remote SMTP EHLO/HELO buffer 
overflow vulnerability.  This issue is due to a failure of the application to 
perform adequate bounds checking on network messages prior to copying them into 
process buffers.

A remote attacker may leverage this issue to execute arbitrary code on a 
computer running the affected software.  This will facilitate unauthorized 
access and privilege escalation.

14. Microsoft Internet Explorer Font Tag Denial Of Service Vulne...
BugTraq ID: 11536
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11536
Summary:
Microsoft Internet Explorer is reported prone to a remote denial of service 
vulnerability.

The issue presents itself due to a malfunction that occurs when certain font 
tags are encountered and rendered.

When a page that contains the malicious HTML code is viewed, Internet Explorer 
and all instances of Internet Explorer that are spawned from the instance used 
to view the malicious page, will crash.

15. Novell ZENworks System Tray Local Privilege Escalation Vulne...
BugTraq ID: 11537
Remote: No
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11537
Summary:
It is reported that ZENworks for Desktops contains a local privilege escalation 
vulnerability.

This vulnerability allows users with local interactive access to execute 
arbitrary application with administrative privileges.

Version 4.0.1 of the application is reported to be vulnerable to this issue.

16. Hummingbird Connectivity INETD32 Privilege Escalation Vulner...
BugTraq ID: 11539
Remote: No
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11539
Summary:
Hummingbird Connectivity is reported prone to a privilege escalation 
vulnerability in its inetd32 application.

This vulnerability allows users with local interactive access to execute 
arbitrary applications with administrative privileges.

Version 7.1 and 9.0 are reported vulnerable to this issue. Other versions are 
also likely affected.

17. Google Desktop Search Remote Cross-Site Scripting Vulnerabil...
BugTraq ID: 11541
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11541
Summary:
Google Desktop Search is reportedly affected by a cross-site scripting 
vulnerability.  This issue is due to a failure of the application to properly 
sanitize HTML tag content.

An attacker may leverage this issue to execute arbitrary client-side script 
code in an unsuspecting user's browser, facilitating theft of cookie-based 
authentication credentials and other attacks.

18. Hummingbird Connectivity FTP Server Denial Of Service Vulner...
BugTraq ID: 11542
Remote: Yes
Date Published: Oct 26 2004
Relevant URL: http://www.securityfocus.com/bid/11542
Summary:
Hummingbird Connectivity is reported prone to a denial of service vulnerability 
in its FTP server application.

This vulnerability allows remote attackers to crash the affected application, 
denying service to legitimate users.

Version 7.1 and 9.0 are reported vulnerable to this issue. Other versions are 
also likely affected.

19. PHPList Multiple unspecified Vulnerabilities
BugTraq ID: 11545
Remote: Yes
Date Published: Oct 27 2004
Relevant URL: http://www.securityfocus.com/bid/11545
Summary:
PHPList is affected by multiple unspecified vulnerabilities.  The underlying 
cause for these issues is currently unknown, however due to the nature of the 
application it is likely that they are due to input validation issues.

The impact of these issues is currently unknown, although due to the nature of 
the application they may facilitate unauthorized administrator access to the 
affected application.  This is not confirmed.

20. PuTTY Remote SSH2_MSG_DEBUG Buffer Overflow Vulnerability
BugTraq ID: 11549
Remote: Yes
Date Published: Oct 27 2004
Relevant URL: http://www.securityfocus.com/bid/11549
Summary:
A remote SSH2_MSG_DEBUG buffer overflow vulnerability affects PuTTY.  This 
issue is due to insufficient bounds checking on network data prior to copying 
the data into process buffers.

An attacker may leverage this issue to execute arbitrary code on a computer 
running the affected software with the privileges of the user that activated 
it, facilitating unauthorized access.

21. Quicksilver Master of Orion III Multiple Remote Denial of Se...
BugTraq ID: 11550
Remote: Yes
Date Published: Oct 27 2004
Relevant URL: http://www.securityfocus.com/bid/11550
Summary:
Master of Orion III is reported prone to multiple remote denial of service 
vulnerabilities.  These issues occur because the application does not handle 
exceptional conditions in a proper manner.

Master of Orion III 1.2.5 and prior versions are reportedly affected by these 
issues.

22. Apple QuickTime Remote Integer Overflow Vulnerability
BugTraq ID: 11553
Remote: Yes
Date Published: Oct 27 2004
Relevant URL: http://www.securityfocus.com/bid/11553
Summary:
A remote integer overflow vulnerability affects Apple QuickTime for the 
Microsoft Windows platform.  This issue is due to a failure of the application 
to properly validate integer signed-ness prior to using it to carry out 
critical operations.

An attacker may leverage this issue to cause the affected QuickTime client to 
crash, denying service to legitimate users.  It has been speculated that this 
issue may also facilitate code execution; any code execution would occur with 
the privileges of the user that activated the affected software.

23. RealNetworks RealOne Player/RealPlayer Skin File Remote Stac...
BugTraq ID: 11555
Remote: Yes
Date Published: Oct 27 2004
Relevant URL: http://www.securityfocus.com/bid/11555
Summary:
RealNetworks RealPlayer and RealOne Player are reported prone to a remote stack 
based buffer overflow vulnerability.

It is reported that the buffer overflow exists due to a lack of boundary checks 
performed on filenames contained in skin file archives.

A remote attacker may exploit this vulnerability to execute arbitrary 
instructions in the context of a user that visits a malicious website, or that 
applies a malicious skin file manually.

24. Multiple Vendor Content Filtering Bypass Vulnerabilities
BugTraq ID: 11558
Remote: Yes
Date Published: Oct 28 2004
Relevant URL: http://www.securityfocus.com/bid/11558
Summary:
It has been reported that several products are vulnerable to content filtering 
bypass issues.

These issues could allow a web client to access disallowed content from behind 
an affected product.  Bypassing the content filter could potentially allow 
malicious code to be executed on a client system thought to be protected.

Checkpoint VPN-1 and Firewall-1 and Agnitum Outpost Pro have been confirmed 
vulnerable to some or all of these issues.  Other products are likely 
vulnerable.

25. Microsoft Internet Explorer TABLE Status Bar URI Obfuscation...
BugTraq ID: 11561
Remote: Yes
Date Published: Oct 28 2004
Relevant URL: http://www.securityfocus.com/bid/11561
Summary:
Microsoft Internet Explorer is reported prone to a URI obfuscation weakness.

This issue may be leveraged by an attacker to display false information in the 
status bar of an unsuspecting user, allowing an attacker to present web pages 
to users that seem to originate from a trusted location.

This vulnerability is reported to affect Internet Explorer 6, other versions 
might also be affected.

Update: A report regarding this issue has been disclosed specifying that 
Internet Explorer version 6.0.2900.2180 may not be affected, or may be affected 
in a different manner. Symantec has confirmed that version 6.0.2800.1106 of 
Internet Explorer is vulnerable to this weakness.

NOTE: It has been reported that this issue does not affect Internet Explorer 
for Apple Mac OS X.

Update: Internet Explorer version 6.0.2900.2180 running on Windows XP SP2 is 
reportedly not vulnerable to this issue.

26. Global Spy Software Cyber Web Filter IP Filter Bypass Vulner...
BugTraq ID: 11562
Remote: Yes
Date Published: Oct 29 2004
Relevant URL: http://www.securityfocus.com/bid/11562
Summary:
Global Spy Software Cyber Web Filter is affected by an IP filter bypass 
vulnerability.  This issue is due to a failure of the application to properly 
handle exceptional HTTP requests.

An attacker may leverage this issue to bypass filters based on IP addresses, 
allowing an attacker to visit restricted Web sites.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. 802.1x Authentication (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/380143

2. GPO that forces users to use a proxy server. (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/380142

3. Remove "Shutdown" command from w2k PCs but enable re... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/380140

4. Notifying users of password expiration via e-mail` (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/379796

5. RE: Can we really block users from installing applic... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/379731

6. SecurityFocus Microsoft Newsletter #212 (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/379696

IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
----------------------------------------
1. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, UNIX, 
Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:

Low cost, easy to use Two Factor Authentication One Time Password token using 
the Cellular. Does not use SMS or communication, manages multiple OTP accounts 
- new technology. For any business that want a safer access to its Internet 
Services. More information at our site.

We also provide eAuthentication service for businesses that will not buy an 
Authentication product but would prefer to pay a monthly charge for 
authentication services from our our CAT Server.

2. KeyCaptor Keylogger
By: Keylogger Software
Platforms: MacOS, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keylogger-software.com/keylogger/keylogger.htm
Summary:

KeyCaptor is your solution for recording ALL keystrokes of ALL users on your 
computer!  Now you have the power to record emails, websites, documents, chats, 
instant messages, usernames, passwords, and MUCH MORE!

With our advanced stealth technology, KeyCaptor will not show in your processes 
list and cannot be stopped from running unless you say so!

3. SpyBuster
By: Remove Spyware
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.remove-spyware.com/spybuster.htm
Summary:

Our award winning spyware / adware scanner and removal software, SpyBuster will 
scan your computer for over 4,000 known spyware and adware applications. 
SpyBuster protects your computer from data stealing programs that can expose 
your personal information.

SpyBuster scanning technology allows for a quick and easy sweep, so you can 
resume your work in minutes.

4. FreezeX
By: Faronics Technologies USA Inc
Platforms: Windows 2000, Windows 95/98, Windows XP
Relevant URL: http://www.faronics.com/html/Freezex.asp
Summary:

FreezeX prevents all unauthorized programs, including viruses, keyloggers and 
spy ware from executing. Powerful and secure, FreezeX ensures that any new 
executable, program, or application that is downloaded, introduced via 
removable media or the network will never install

5. NeoExec for Active Directory
By: NeoValens
Platforms: Windows 2000, Windows XP
Relevant URL: http://www.neovalens.com
Summary:

NeoExec® is an operating system extension for Windows 2000/XP that allows the 
setting of privileges at the application level rather than at the user level.

NeoExec® is the ideal solution for applications that require elevated 
privileges to run as the privileges are granted to the application, not the 
user.

NeoExec® is the only solution on the market capable of modifying at runtime the 
processes' security context -- without requiring a second account as with RunAs 
and RunAs-derived products.

6. Secrets Protector v2.03
By: E-CRONIS
Platforms: Windows 2000, Windows XP
Relevant URL: http://www.e-cronis.com/download/sp.exe
Summary:

It's the end of your worries about top-secret data of your company, your 
confidential files or the pictures from the last party. All these will be 
hidden beyond the reach of ANY intruder and you will be the only one able to 
handle them. And what you want to delete will be DELETED. It is the ultimate 
security tool to protect your sensitive information on PC, meeting the three 
most important security issues: Integrity, Confidentiality and Availability. 
This product gives you the features of a "folder locker" and a "secure eraser".

Your secret information is available only trough this software and there is no 
other mean to access it. The information is protected at file system level and 
it cannot be accidentally deleted or overwritten neither in Safe mode nor in 
other operating system. This program doesn't make your operating system 
unstable as other related product do and protects your information from being 
seen, altered or deleted by an unauthorized user with or without his wish. The 
program allows you to permanently erase your sensitive data using secure wiping 
methods leaving no trace of your information. Depending on the selected wiping 
method your data is unrecoverable using software or even hardware recovery 
techniques.

V. NEW TOOLS FOR MICROSOFT PLATFORMS
------------------------------------
1. WapgGuihttp://workspaces.gotdotnet.com/wapggui 1.0
By: William D. Bartholomew
Relevant URL: http://workspaces.gotdotnet.com/wapggui
Platforms: Windows 2000, Windows XP
Summary:

A free, open-source, user-friendly interface to run the WAPG password 
generator. Supports generation of random and pronounceable passwords, 
specifying minimum and maximum length, specifying what character classes should 
or must be used, and much more.

2. antinat v0.81
By: Malcolm Smith
Relevant URL: http://yallara.cs.rmit.edu.au/~malsmith/products/antinat/
Platforms: MacOS, POSIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

The Antinat SOCKS Server is a multi-threaded, scalable SOCKS server with a 
client library for writing proxy-based applications. It supports SOCKS 4, SOCKS 
5, authentication, firewalling, UDP, and name resolution.

3. PopMessenger 1.60
By: LeadMind Development
Relevant URL: http://www.leadmind.com
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

Chat and send text messages and files to anyone on your LAN easily and securely!

4. ByteShelter I 1.0
By: MazZoft NDA
Relevant URL: http://www.mazzoft.com/bs1.zip
Platforms: Windows 2000, Windows 95/98
Summary:

This steganography tools lets you conceal data in Outlook e-mail messages and 
.doc files.

5. DiskInternals Uneraser 2.01
By: Alexey Babenko
Relevant URL: http://diskinternals.com/download/Uneraser_Setup.zip
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

DiskInternals Uneraser can recover any deleted file, including documents, 
photos, mp3 and zip files, or even folders and damaged disks. In addition to 
HDD, the program supports any type of storage media (music sticks, cameras, 
flash drives, USB drives, etc)! It works with encrypted files and helps you 
undelete file lost because of a virus attack or an employee's malicious 
behavior. No special skills needed; 100% free to try.

6. DiskInternals NTFS Reader 1.01
By: Alexey Babenko
Relevant URL: http://diskinternals.com/download/NTFS_Reader_Setup.zip
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

Provides read access to NTFS disks from Windows 95, 98 and Me. Allows you to 
save any files to any disk visible on the system or on the network. Supports 
saving compressed or encrypted files.

While saving, it ignores file security policies. It means that it is possible 
to access absolutely any file on a NTFS disk from Windows 9x.

VI. UNSUBSCRIBE INSTRUCTIONS
----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed 
address. The contents of the subject or message body do not matter. You will 
receive a confirmation request message to which you will have to answer. 
Alternatively you can also visit http://www.securityfocus.com/newsletters and 
unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be 
manually removed.

VII. SPONSOR INFORMATION
-----------------------

This Issue is Sponsored By: SecurityFocus

Stay up to date.  All the latest news, columns, jobs and more in a
convenient html newsletter - Even a glimpse of upcoming columns and feature
articles!  Sign up today!

http://www.securityfocus.com/htmlnewsletter/subscribe

------------------------------------------------------------------------

---------------------------------------------------------------------------
---------------------------------------------------------------------------



--- End Message ---

Responder a