Re: [H] Fwd: No definition updates possible

2006-01-04 Thread jeff.lane



Same hereservers are probably down temporarily. 
It happens with them on occasion.

  - Original Message - 
  From: 
  David L. Gabler 
  
  To: [EMAIL PROTECTED] 
  Sent: Wednesday, January 04, 2006 4:00 
  PM
  Subject: [H] Fwd: No definition updates 
  possible
  Anyone else having a problem updating their 
  Ad-Aware SE program today?I sent the inquiry below to LavaSoft but have 
  not received a reply.
  X-Sender: [EMAIL PROTECTED] 
(Unverified)X-Mailer: QUALCOMM Windows Eudora Version 6.1.2.0Date: 
Wed, 04 Jan 2006 17:06:13 -0600To: [EMAIL PROTECTED]From: "David L. 
Gabler" <[EMAIL PROTECTED]>Subject: No 
definition updates possibleCc: 
[EMAIL PROTECTED]X-NAS-Bayes: #0: 0; #1: 
1X-NAS-Classification: 0X-NAS-MessageID: 23137X-NAS-Validation: 
{A3ADC7E0-AC60-11D4-89EF-CC9E3BF43234}Your update site :http://updates.ls-servers.com/public/defs.ziphas 
not been working all day today (01/04/06)Nor does updating the 
definitions through the program itself work!When will the server be up 
and functional again?Thanks,
  David L. Gabler 1719 Lindy Lane Conroe, Texas 77301-4019 
  Home: 936-756-4614  Mobil: 936-537-5574 ICQ # 
  123822  E-Mail   
  [EMAIL PROTECTED]
  
  

  No virus found in this incoming message.Checked by AVG Free 
  Edition.Version: 7.1.371 / Virus Database: 267.14.13/221 - Release Date: 
  1/4/2006


[H] Fwd: No definition updates possible

2006-01-04 Thread David L. Gabler


Anyone else having a problem updating their Ad-Aware SE
program today?
I sent the inquiry below to LavaSoft but have not received a
reply.
X-Sender:
[EMAIL PROTECTED] (Unverified)
X-Mailer: QUALCOMM Windows Eudora Version 6.1.2.0
Date: Wed, 04 Jan 2006 17:06:13 -0600
To: [EMAIL PROTECTED]
From: "David L. Gabler" <[EMAIL PROTECTED]>
Subject: No definition updates possible
Cc: [EMAIL PROTECTED]
X-NAS-Bayes: #0: 0; #1: 1
X-NAS-Classification: 0
X-NAS-MessageID: 23137
X-NAS-Validation: {A3ADC7E0-AC60-11D4-89EF-CC9E3BF43234}
Your update site :
http://updates.ls-servers.com/public/defs.zip
has not been working all day today (01/04/06)
Nor does updating the definitions through the program itself work!
When will the server be up and functional again?
Thanks,


David L. Gabler 
1719 Lindy Lane 
Conroe, Texas 77301-4019 
Home: 936-756-4614  Mobil: 936-537-5574 
ICQ # 123822  E-Mail  
[EMAIL PROTECTED]




Re: [H] GooglePC in the future?

2006-01-04 Thread Ben Ruset

Vindicated! :)

http://www.theregister.co.uk/2006/01/04/google_denies_pc/

Hayes Elkins wrote:



There are but a few components separating a tivo from a full blown PC. 
In the future it will be indistinguishable.







RE: [H] Web authoring question - protecting email addresses

2006-01-04 Thread Bobby Heid
I just came across this today:
http://www.dotnet2themax.com/ShowContent.aspx?ID=35efbee1-d8cd-4720-9eb2-83f
c9a4033bb

An excerpt:

"SafeMailLink is a HttpModule for ASP.NET that prevents the action of
SPAM-bot software that search and extract e-mail addresses from Internet
pages. Once it is set-up with a line in the site's web.config file, it
dynamically encodes the "mailto:"; links found on your pages at runtime, just
before the HTML code generated by the page is sent to the target browser. 

Links with parameters that pre-fill the mail's subject and body fields
(among others) are also supported and encoded correctly. E-mail addresses
used as text for the e-mail hyperlink are protected as well. Full C# source
code is included."

Bobby

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Al
Sent: Saturday, December 17, 2005 10:58 AM
To: The Hardware List
Subject: Re: [H] Web authoring question - protecting email addresses



PS

I've used the javascript method many times.
http://www.joemaller.com/js-mailer.shtml
Al

Al <[EMAIL PROTECTED]> wrote:

> 
> Brian Weeden <[EMAIL PROTECTED]> wrote:
> 
> > This weekend I am building a website to help with planning my wedding.
> >  How careful do I have to be about putting phone numbers, addresses,
> > and email addresses on it?  I am assuming that nefarious people with
> > spiders can crawl it or add them to spam lists.  Any ways of
> > preventing this?
> > 
> > --
> > Brian
> 
> Brian,
> http://www.google.com/search?hl=en&lr=&q=html+hide+email
> 
> The first one looks good:
> Design Tip: 
> Hide From Email Spiders 
> 
> Second look cool too:
> Protect email addresses in web pages (Version 2.0)
> 
> HTH,
> al
> 


"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)




Re: [H] OT: Great TV show - Dr Who

2006-01-04 Thread Christopher Fisk

On Fri, 30 Dec 2005, Brian Weeden wrote:


Speaking of newsgroups, what are you guys using for your new server?
Paying for a service I am assuming?


Road Runner runs good servers for thier customers.  That is what I use. 
Only 2-3 day retention on binaries though.



Christopher Fisk
--
Homer:	I'm sorry, Marge, but sometimes I think we're the worst family in 
town.

Marge:  Maybe we should move to a larger community.
There's No Disgrace Like Home


[H] unofficial patch for WMF bug plus fix for desktop hijaker

2006-01-04 Thread Hayes Elkins
Link to the patch. It is a third-party unofficial patch for MS systems but 
it has the stamp of approval from SANS' ISC

http://www.hexblog.com/2005/12/wmf_vuln.html
http://isc.sans.org/diary.php?storyid=1010


The desktop hijacker removal utility is called “smitrem.exe” and you can 
download it here: http://noahdfear.geekstogo.com/


It’s really just a bunch of batch scripts where somebody did all the dirty 
work for you. You need to run it in safe mode.





Re: [H] WMF fix out

2006-01-04 Thread Thane Sherrington (S)

At 12:07 PM 04/01/2006, Hayes Elkins wrote:
Right now it's in the form of a repair tool for already infected systems. 
The *patch* (not a repair tool fix) is set to release via microsoftupdate 
on Tuesday the 10th.


In other words, we can't fix the vulnerability, but if you just trust this 
other product we have, you can repair the damage.


T 



RE: [H] Windows vulnerability?

2006-01-04 Thread Thane Sherrington (S)

At 11:47 AM 04/01/2006, FORC5 wrote:
tried this windowsonecare on one of my test boxes, looks good but not 
ready for prime time. Would lock up and not run. ( the program, not the puter )
wish it was a download so I could try it again after uninstall or on 
another test box without the mother may I routine, but I will anyway for 
grins. <:-|
I uninstalled Norton Corp b4 but I wonder if that had some affect on this. 
MS should concentrate on keeping windows stable and cheap and stay out of 
the rest of it IMO


From what I've read, NOD32 and Kaspersky are keeping up with the exploits, 
so MS' attempt to "solve" their vulnerabilities by adding a new product 
seems a waste of time.


T 



Re: [H] WMF fix out

2006-01-04 Thread Hayes Elkins
Right now it's in the form of a repair tool for already infected systems. 
The *patch* (not a repair tool fix) is set to release via microsoftupdate on 
Tuesday the 10th.




From: warpmedia <[EMAIL PROTECTED]>
Reply-To: The Hardware List 
To: The Hardware List 
Subject: Re: [H] WMF fix out
Date: Wed, 04 Jan 2006 10:57:12 -0500

Where in this is WMF fix?

Hayes Elkins wrote:

From: Gary Hicks [mailto:[EMAIL PROTECTED]
Sent: Wednesday, January 04, 2006 8:31 AM
To: Premier Contacts
Subject: Announcement - Microsoft Security Advisory (912920) Released



This Alert is to advise you that Microsoft Security Advisory (912920), 
Systems that are infected with Win32/[EMAIL PROTECTED] may download and run 
malicious files from certain Web domains beginning on January 6, 2006 has 
been released.








Re: [H] WMF fix out

2006-01-04 Thread warpmedia

Where in this is WMF fix?

Hayes Elkins wrote:

From: Gary Hicks [mailto:[EMAIL PROTECTED]
Sent: Wednesday, January 04, 2006 8:31 AM
To: Premier Contacts
Subject: Announcement - Microsoft Security Advisory (912920) Released



This Alert is to advise you that Microsoft Security Advisory (912920), 
Systems that are infected with Win32/[EMAIL PROTECTED] may download and run 
malicious files from certain Web domains beginning on January 6, 2006 
has been released.





RE: [H] Windows vulnerability?

2006-01-04 Thread FORC5
tried this windowsonecare on one of my test boxes, looks good but not ready for 
prime time. Would lock up and not run. ( the program, not the puter )
wish it was a download so I could try it again after uninstall or on another 
test box without the mother may I routine, but I will anyway for grins. <:-|
I uninstalled Norton Corp b4 but I wonder if that had some affect on this. MS 
should concentrate on keeping windows stable and cheap and stay out of the rest 
of it IMO

Would be nice for customer boxes if it works out.
fp

At 08:15 PM 1/3/2006, Chris Reeves Poked the stick with:

>Microsoft's opinion on this to beta testers and onecare users:
>
>January 3, 2006 Advisory: How to know if you are protected from the WMF
>vulnerability
>A security vulnerability in Windows could allow malicious software to infect
>your computer when opening an infected graphic or a malicious Web site.
>Microsoft is working on a patch, but Windows OneCare is protecting you now
>from known viruses using this flaw. As long as your Windows OneCare status
>remains "green" or "yellow" while you're connected to the Internet, Windows
>OneCare is protecting you. If your status is "red" (at risk), please either
>take the requested action or go to the Help Center.
>
>To find out more about this vulnerability, please see
>http://www.windowsonecare.com/secinfo/wmf1228.aspx.
>

-- 
Tallyho ! ]:8)
Taglines below !
--
Nothing succeeds like failure.



[H] WMF fix out

2006-01-04 Thread Hayes Elkins

From: Gary Hicks [mailto:[EMAIL PROTECTED]
Sent: Wednesday, January 04, 2006 8:31 AM
To: Premier Contacts
Subject: Announcement - Microsoft Security Advisory (912920) Released



This Alert is to advise you that Microsoft Security Advisory (912920), 
Systems that are infected with Win32/[EMAIL PROTECTED] may download and run 
malicious files from certain Web domains beginning on January 6, 2006 has 
been released.




Microsoft is aware of the Sober mass mailer worm variant named 
Win32/[EMAIL PROTECTED] The worm tries to entice users through social engineering 
efforts into opening an attached file or executable in e-mail. If the 
recipient opens the file or executable, the worm sends itself to all the 
contacts that are contained in the system’s address book. Customers who are 
using the most recent and updated antivirus software are at a reduced risk 
from infection by the Win32/[EMAIL PROTECTED] worm.




On systems that are infected by Win32/[EMAIL PROTECTED], the malware is programmed 
to download and run malicious files from certain Web domains beginning on 
January 6, 2006. Beginning approximately every two weeks thereafter, the 
worm is set to begin downloading and running malicious files from additional 
sites on the same Web domains.




As with all currently known variants of the Sober worm, the worm does not 
appear to target a security vulnerability, but rather relies on the user 
opening an infected attachment.




Microsoft added detection for the latest Sober variants in its December 2005 
update to the Malicious Software Removal Tool and in the Windows Live Safety 
Center.




Customers who believe that they are infected with Sober or are not sure 
whether they are infected should visit Safety.live.com and choose 
"Protection Scan" or run the latest version of the Malicious Software 
Removal Tool from either Microsoft Update or Windows Update to ensure that 
their systems are free of infection. Additionally, Windows OneCare from 
Microsoft provides detection for and protection against Sober and its known 
variants.




Microsoft will release an updated version of the Malicious Software Removal 
Tool on January 10, 2006, that will further assist in the detection and 
removal of known malware threats including Sober and its known variants. See 
Microsoft Knowledge Base Article 891716 for additional details on how to 
deploy the Malicious Software Removal Tool with the latest definitions to 
help protect against malware.




For more information about Sober, to help determine whether you have been 
infected by the worm, and for instructions on how to repair your system if 
you have been infected, see the Microsoft Virus Encyclopedia. For Microsoft 
Virus Encyclopedia references, see the “Overview” section. We continue to 
encourage customers to use caution with unknown file attachments and to 
follow our Protect Your PC guidance of enabling a firewall, getting software 
updates, and installing antivirus software. Customers can learn more about 
these steps by visiting the Protect Your PC Web site.




Mitigating Factors:

• Customers must open a malicious e-mail attachment in order to be infected 
by the worm.




More information can be found at:

http://www.microsoft.com/technet/security/advisory/912920.mspx





If you have any questions regarding this alert please contact your Technical 
Account Manager or Application Development Consultant.




Thank you,

Microsoft PSS Security Team




RE: [H] Windows vulnerability?

2006-01-04 Thread Bobby Heid
Update.  It appears the date is Jan 10, not Jan 19.

I just found this:
http://www.tgdaily.com/2006/01/03/microsoft_windows_fix/ 
which links to the original here:
http://www.cbc.ca/cp/business/060103/b010372.html

Bobby

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bobby Heid
Sent: Wednesday, January 04, 2006 7:08 AM
To: 'The Hardware List'
Subject: RE: [H] Windows vulnerability?


I saw something yesterday, that, IIRC, MS has a patch that they expect to
release on the 19th.

Bobby



Re: [H] GooglePC in the future?

2006-01-04 Thread chuck


- Original Message - 
From: "Thane Sherrington (S)" <[EMAIL PROTECTED]>

To: "The Hardware List" 
Sent: Wednesday, January 04, 2006 6:34 AM
Subject: Re: [H] GooglePC in the future?




And people are forgetting that MS already has a cheap PC that's already in 
a lot of homes.  The X-Box just needs a keyboard and a web browser (there 
actually is a browser on some of the hacked dashboards) to compete quite


I could sell lots more real computers if the quality of computers had 
required minimums as vehicles do. Due to safety issues, vehicle 
manufacturers can not keep cutting the quality etc. like computer 
manufacturers have done for a decade and still do. Is less than $200.00 per 
year too much to ask a person to spend on a quality computer and 17" flat 
panel monitor?


I know the jury is still out on the life of flat panel monitors. If cheap 
ones are already failing, I don't want to hear it! Cheap anything fails 
miserably, prematurely! What I want to know is if quality flat panel 
monitors easily last for over 10 years. I have 5 in my shop/home (Viewsonic) 
that I paid an average of over $700.00 each (wholesale from my supplier) for 
back when they were higher. I fully expect them to last well over 10 years. 
This means that if a person invests $700.00 with me for a real computer and 
$300.00 for a 17" quality flat panel monitor their annual investment is less 
than $200.00. If they replace the computer 5 years later (it will most 
likely still be running and appraise at $200.00) they most likely will not 
have to replace their monitor.


No, you do not have to spend a grand for a real computer and large 17" 
(bundled monitors are mostly 15") flat panel monitor. You can buy an 
abbreviated computer. Many are being discussed here. Speaking out about 
imitations gives me the opportunity to infrequently counter offer my idea of 
sticking with real computers, not name brand junk and imitations or online 
access boxes.


Yall let me know if you see a sudden drying up of the availability of 
components to build real computers. I want the opportunity to build me one 
more real one while I can. That will give me at least another 5 happy years 
of troublefree computer performance. I am not a disbeliever when some say my 
heyday is almost over! I just want to go down swinging!


Chuck 



RE: [H] Windows vulnerability?

2006-01-04 Thread Bobby Heid
I saw something yesterday, that, IIRC, MS has a patch that they expect to
release on the 19th.

Bobby



Re: [H] GooglePC in the future?

2006-01-04 Thread Thane Sherrington (S)

At 01:39 PM 03/01/2006, Chris Reeves wrote:

http://www.latimes.com/business/la-fi-predict1jan01,0,3503327.story

Google intent on distributing it's own, super-low cost internet browsing 
PC running on it's OS.


If they really decide to release, say, a $300 email and web browsing system 
(WebTV, anyone?) and sell it through Wal-mart, the cost of support will 
kill them, or the lack of support will kill the idea.  Most people simply 
can't use their computers - so unless they can turn a computer into a 
simpler VCR (most people can't use their VCRs either) that cannot be 
attacked by spam, pop-ups or mal-ware, then they'll have to support the 
thing.  Wal-mart can't support the product, so it'll all be on Google's 
back.  And given the level of support available from Bangalore, it won't be 
pretty.


And people are forgetting that MS already has a cheap PC that's already in 
a lot of homes.  The X-Box just needs a keyboard and a web browser (there 
actually is a browser on some of the hacked dashboards) to compete quite 
handily with anything Google can bring out.


I submit that if Google goes up against MS in the PC/OS arena, especially 
with Wal-mart as it's only ally, that MS will chew Google up and spit it out.


T