RE: Foxit PDF Reader Flaws

2009-03-11 Thread Webster
From: Webster [mailto:carlwebs...@gmail.com] 
Subject: RE: Foxit PDF Reader Flaws

 

I just hope they fix the issue with redirecting the APPDATA folder they
broke in 9.0 that worked in 8.x.

 

Nope, not fixed and now documented as not supported.  From
http://kb.adobe.com/selfservice/viewContent.do?externalId=kb408814
<http://kb.adobe.com/selfservice/viewContent.do?externalId=kb408814&sliceId=
2> &sliceId=2 :

 

*   Roaming Profiles on Windows and Networked Home Directory on
Macintosh are not supported configurations for 9.0 or 9.1, however we have
made several fixes in 9.1. We are looking at the possibility of supporting
this for the next major release. 

Webster


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Simon Butler
I always get it from the Adobe FTP site. 
There is a 9.1 build there:
ftp://ftp.adobe.com/pub/adobe/reader/win/9.x/9.1/enu/

Go up a level for other languages. 

Simon. 


--
Simon Butler
MVP: Exchange, MCSE
Amset IT Solutions Ltd.

e: si...@amset.co.uk
w: www.amset.co.uk
w: www.amset.info

Need cheap certificates for Exchange, compatible with Windows Mobile 5.0?
http://CertificatesForExchange.com/ for certificates from just $23.99. 
Need a domain for your certificate? http://DomainsForExchange.net/ 




-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: 11 March 2009 22:19
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

And in turn by me posting that link I probably just broke their license 
agreement.  Oops.



-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 5:17 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

Not familiar with what's on their FTP site,

But the link they are giving out in the "Adobe Reader Distribution Request" 
email is to this 9.0 file:
http://ardownload.adobe.com/pub/adobe/reader/win/9.x/9.0/enu/AdbeRdr90_en_US_Std.exe

-Sam





-Original Message-
From: Andy Ognenoff [mailto:andyognen...@gmail.com]
Sent: Wednesday, March 11, 2009 5:08 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's the same file that they put on the FTP site.

 - Andy O. 

From: Sam Cayze [mailto:sam.ca...@rollouts.com]
Sent: Wednesday, March 11, 2009 3:56 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

That's the method I am talking about that is still distributing 9.0, and not 
9.1.   So it's worthless to us right now :( -Sam


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Webster
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Subject: RE: Foxit PDF Reader Flaws

 

That's the method I am talking about that is still distributing 9.0, and not
9.1.   So it's worthless to us right now :(

-Sam

 

Not really.  Other than the filename they send you, the same process can be
used for Reader 8.x, 9.x, Acrobat Pro 8.x, 9.x and I am sure other Adobe
software packages.  When they release 9.1, the only thing that will change
will be the filename.  I just hope they fix the issue with redirecting the
APPDATA folder they broke in 9.0 that worked in 8.x.

 

 

Webster

  _  

From: Webster [mailto:carlwebs...@gmail.com] 
Subject: RE: Foxit PDF Reader Flaws

And I had just written an article on how to do all this! J

 

http://www.dabcc.com/article.aspx?id=10082

 

 

Webster

 

From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Subject: RE: Foxit PDF Reader Flaws

 

Thank you for clarifying the process. I had it in my notes _SOMEWHERE_ but
couldn't quickly locate it.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
And in turn by me posting that link I probably just broke their license 
agreement.  Oops.



-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 5:17 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

Not familiar with what's on their FTP site,

But the link they are giving out in the "Adobe Reader Distribution Request" 
email is to this 9.0 file:
http://ardownload.adobe.com/pub/adobe/reader/win/9.x/9.0/enu/AdbeRdr90_en_US_Std.exe

-Sam





-Original Message-
From: Andy Ognenoff [mailto:andyognen...@gmail.com]
Sent: Wednesday, March 11, 2009 5:08 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's the same file that they put on the FTP site.

 - Andy O. 

From: Sam Cayze [mailto:sam.ca...@rollouts.com]
Sent: Wednesday, March 11, 2009 3:56 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

That's the method I am talking about that is still distributing 9.0, and not 
9.1.   So it's worthless to us right now :( -Sam


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
Not familiar with what's on their FTP site,

But the link they are giving out in the "Adobe Reader Distribution Request" 
email is to this 9.0 file:
http://ardownload.adobe.com/pub/adobe/reader/win/9.x/9.0/enu/AdbeRdr90_en_US_Std.exe

-Sam





-Original Message-
From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Sent: Wednesday, March 11, 2009 5:08 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's the same file that they put on the FTP site.

 - Andy O. 

From: Sam Cayze [mailto:sam.ca...@rollouts.com]
Sent: Wednesday, March 11, 2009 3:56 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

That's the method I am talking about that is still distributing 9.0, and not 
9.1.   So it's worthless to us right now :( -Sam


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Andy Ognenoff
It’s the same file that they put on the FTP site.

 - Andy O. 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 3:56 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

That's the method I am talking about that is still distributing 9.0, and not
9.1.   So it's worthless to us right now :(
-Sam


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
That's the method I am talking about that is still distributing 9.0, and
not 9.1.   So it's worthless to us right now :(
-Sam



From: Webster [mailto:carlwebs...@gmail.com] 
Sent: Wednesday, March 11, 2009 4:21 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws



And I had just written an article on how to do all this! J

 

http://www.dabcc.com/article.aspx?id=10082

 

 

Webster

 

From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Subject: RE: Foxit PDF Reader Flaws

 

Thank you for clarifying the process. I had it in my notes _SOMEWHERE_
but couldn't quickly locate it.

 

From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Subject: RE: Foxit PDF Reader Flaws

 

>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1. Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
Agreement at www.adobe.com/products/acrobat/distribute.html.

2. Download the AdbeRdr90_en_US.exe from the link in the confirmation
email you recieve after filling out the distribution agreement and save
the file to your desktop.

3. Choose Start > Run.

4. In the Open text box, type:
"%UserProfile%\Desktop\AdbeRdr90_en_US.exe" -nos_ne.

5. Click OK to start decompressing the file.

6. When the Adobe Reader 9 Setup screen clears, browse to the following
location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup
Files

7. Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O. 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Michael B. Smith
Well, I knew that you had written it - I didn't know it was posted yet!

 

From: Webster [mailto:carlwebs...@gmail.com] 
Sent: Wednesday, March 11, 2009 5:21 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

 

And I had just written an article on how to do all this! J

 

http://www.dabcc.com/article.aspx?id=10082

 

 

Webster

 

From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Subject: RE: Foxit PDF Reader Flaws

 

Thank you for clarifying the process. I had it in my notes _SOMEWHERE_ but
couldn't quickly locate it.

 

From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Subject: RE: Foxit PDF Reader Flaws

 

>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1. Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
Agreement at www.adobe.com/products/acrobat/distribute.html.

2. Download the AdbeRdr90_en_US.exe from the link in the confirmation email
you recieve after filling out the distribution agreement and save the file
to your desktop.

3. Choose Start > Run.

4. In the Open text box, type: "%UserProfile%\Desktop\AdbeRdr90_en_US.exe"
-nos_ne.

5. Click OK to start decompressing the file.

6. When the Adobe Reader 9 Setup screen clears, browse to the following
location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup Files

7. Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O. 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Re: Foxit PDF Reader Flaws

2009-03-11 Thread Kurt Buff
That's OK Sammy - I'm sure he's a fogiving sort of guy.



On Wed, Mar 11, 2009 at 14:24, Sam Cayze  wrote:
> Sorry Michael, bad assumption.  My apologies.
> -Sam
> 
> From: Michael B. Smith [mailto:mich...@theessentialexchange.com]
> Sent: Wednesday, March 11, 2009 4:22 PM
> To: NT System Admin Issues
> Subject: RE: Foxit PDF Reader Flaws
>
> Mike? Who is Mike? I don’t know anyone named Mike around here…
>
>
>
> From: Sam Cayze [mailto:sam.ca...@rollouts.com]
> Sent: Wednesday, March 11, 2009 5:16 PM
> To: NT System Admin Issues
> Subject: RE: Foxit PDF Reader Flaws
>
>
>
> Total different process and files that Mike and I are talking about.
>
>
>
> I think Mike is spot on.
>
>
>
> The method you mention is the correct way, but they are still pushing 9.0
> via that method, and not 9.1
>
>
>
> -Sam
>
>
>
> 
>
> From: Andy Ognenoff [mailto:andyognen...@gmail.com]
> Sent: Wednesday, March 11, 2009 4:12 PM
> To: NT System Admin Issues
> Subject: RE: Foxit PDF Reader Flaws
>
>>Careful!
>
>>
>
>>I recently learned that using that is a license violation.
>
>
>
> Not if you follow the instructions from the link I posted earlier.
>
>
>
> If the link didn't work for you, here's what it says:
>
>
>
> Extract the Adobe Reader 9 installation files from the compressed
> executable:
>
> 1.    Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
> Agreement at www.adobe.com/products/acrobat/distribute.html.
>
> 2.    Download the AdbeRdr90_en_US.exe from the link in the confirmation
> email you recieve after filling out the distribution agreement and save the
> file to your desktop.
>
> 3.    Choose Start > Run.
>
> 4.    In the Open text box, type:
> "%UserProfile%\Desktop\AdbeRdr90_en_US.exe" -nos_ne.
>
> 5.    Click OK to start decompressing the file.
>
> 6.    When the Adobe Reader 9 Setup screen clears, browse to the following
> location
> %UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup Files
>
> 7.    Drag the READER9 folder to your desktop. This folder contains
> AcroRead.msi and Data1.cab files needed for installation.
>
>
>
>  - Andy O.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
Sorry Michael, bad assumption.  My apologies.
-Sam



From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, March 11, 2009 4:22 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws



Mike? Who is Mike? I don't know anyone named Mike around here...

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 5:16 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

 

Total different process and files that Mike and I are talking about.

 

I think Mike is spot on.  

 

The method you mention is the correct way, but they are still pushing
9.0 via that method, and not 9.1

 

-Sam

 



From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Sent: Wednesday, March 11, 2009 4:12 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1.Obtain Adobe Reader 9 by filling out an Adobe Reader
Redistribution Agreement at
www.adobe.com/products/acrobat/distribute.html.

2.Download the AdbeRdr90_en_US.exe from the link in the confirmation
email you recieve after filling out the distribution agreement and save
the file to your desktop.

3.Choose Start > Run.

4.In the Open text box, type:
"%UserProfile%\Desktop\AdbeRdr90_en_US.exe" -nos_ne.

5.Click OK to start decompressing the file.

6.When the Adobe Reader 9 Setup screen clears, browse to the
following location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup
Files

7.Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O.

 

 

 

 

 

 

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Andy Ognenoff
What method are you referring to? The integrated Adobe Updater method? What
link still has 9.0 posted?

Yesterday, I downloaded 9.1 from the public FTP site and used the method I
mentioned. Customized it with the Adobe Customization Wizard and all is
well.

 - Andy O. 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 3:16 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

Total different process and files that Mike and I are talking about.
 
I think Mike is spot on.  
 
The method you mention is the correct way, but they are still pushing 9.0
via that method, and not 9.1
 
-Sam

 
 

 
 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Michael B. Smith
Mike? Who is Mike? I don't know anyone named Mike around here.

 

From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 5:16 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

 

Total different process and files that Mike and I are talking about.

 

I think Mike is spot on.  

 

The method you mention is the correct way, but they are still pushing 9.0
via that method, and not 9.1

 

-Sam

 

  _  

From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Sent: Wednesday, March 11, 2009 4:12 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1.Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
Agreement at www.adobe.com/products/acrobat/distribute.html.

2.Download the AdbeRdr90_en_US.exe from the link in the confirmation
email you recieve after filling out the distribution agreement and save the
file to your desktop.

3.Choose Start > Run.

4.In the Open text box, type:
"%UserProfile%\Desktop\AdbeRdr90_en_US.exe" -nos_ne.

5.Click OK to start decompressing the file.

6.When the Adobe Reader 9 Setup screen clears, browse to the following
location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup Files

7.Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O.

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Webster
And I had just written an article on how to do all this! J

 

http://www.dabcc.com/article.aspx?id=10082

 

 

Webster

 

From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Subject: RE: Foxit PDF Reader Flaws

 

Thank you for clarifying the process. I had it in my notes _SOMEWHERE_ but
couldn't quickly locate it.

 

From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Subject: RE: Foxit PDF Reader Flaws

 

>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1. Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
Agreement at www.adobe.com/products/acrobat/distribute.html.

2. Download the AdbeRdr90_en_US.exe from the link in the confirmation email
you recieve after filling out the distribution agreement and save the file
to your desktop.

3. Choose Start > Run.

4. In the Open text box, type: "%UserProfile%\Desktop\AdbeRdr90_en_US.exe"
-nos_ne.

5. Click OK to start decompressing the file.

6. When the Adobe Reader 9 Setup screen clears, browse to the following
location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup Files

7. Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O. 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Michael B. Smith
Thank you for clarifying the process. I had it in my notes _SOMEWHERE_ but
couldn't quickly locate it.

 

From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Sent: Wednesday, March 11, 2009 5:12 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

 

>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1.  Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
Agreement at www.adobe.com/products/acrobat/distribute.html.

2.  Download the AdbeRdr90_en_US.exe from the link in the confirmation email
you recieve after filling out the distribution agreement and save the file
to your desktop.

3.  Choose Start > Run.

4.  In the Open text box, type: "%UserProfile%\Desktop\AdbeRdr90_en_US.exe"
-nos_ne.

5.  Click OK to start decompressing the file.

6.  When the Adobe Reader 9 Setup screen clears, browse to the following
location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup Files

7.  Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O.

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
Total different process and files that Mike and I are talking about.
 
I think Mike is spot on.  
 
The method you mention is the correct way, but they are still pushing
9.0 via that method, and not 9.1
 
-Sam



From: Andy Ognenoff [mailto:andyognen...@gmail.com] 
Sent: Wednesday, March 11, 2009 4:12 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws



>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1.Obtain Adobe Reader 9 by filling out an Adobe Reader
Redistribution Agreement at
www.adobe.com/products/acrobat/distribute.html.

2.Download the AdbeRdr90_en_US.exe from the link in the confirmation
email you recieve after filling out the distribution agreement and save
the file to your desktop.

3.Choose Start > Run.

4.In the Open text box, type:
"%UserProfile%\Desktop\AdbeRdr90_en_US.exe" -nos_ne.

5.Click OK to start decompressing the file.

6.When the Adobe Reader 9 Setup screen clears, browse to the
following location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup
Files

7.Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O.

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Andy Ognenoff
>Careful!

> 

>I recently learned that using that is a license violation.

 

Not if you follow the instructions from the link I posted earlier.

 

If the link didn't work for you, here's what it says:

 

Extract the Adobe Reader 9 installation files from the compressed
executable:

1.Obtain Adobe Reader 9 by filling out an Adobe Reader Redistribution
Agreement at www.adobe.com/products/acrobat/distribute.html.

2.Download the AdbeRdr90_en_US.exe from the link in the confirmation
email you recieve after filling out the distribution agreement and save the
file to your desktop.

3.Choose Start > Run.

4.In the Open text box, type:
"%UserProfile%\Desktop\AdbeRdr90_en_US.exe" -nos_ne.

5.Click OK to start decompressing the file.

6.When the Adobe Reader 9 Setup screen clears, browse to the following
location
%UserProfile%\Local Settings\Application Data\Adobe\Reader 9.0\Setup Files

7.Drag the READER9 folder to your desktop. This folder contains
AcroRead.msi and Data1.cab files needed for installation.

 

 - Andy O.

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
Good call.  

It's bullocks they are still pushing out 9.0 and not 9.1 via means that
they give you to legally distribute Reader.  (Just checked, they
download link still is 9.0 as of an hour ago).




-Original Message-
From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Wednesday, March 11, 2009 3:56 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

Careful!

I recently learned that using that is a license violation.

-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com]
Sent: Wednesday, March 11, 2009 4:19 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

To get the MSIs you can also run the Adobe Updater from one instance of
9.0, and find the downloaded 9.1 updates in 

...\Local Settings\Application Data\Adobe\Updater6\Install\ 

-Sam

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov]
Sent: Wednesday, March 11, 2009 10:39 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

The patch is out.  It's an update from 9.0 to 9.1.  My question is
whether or not they're going to provide another download to give us
separate files for Adobe Air and Reader.  Right now, the full download
of the update only provides one install, which includes both.  You can
get just the reader install from the FTP site, but it is an .exe, not
.msi...

Joe Heaton
Employment Training Panel


-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Wednesday, March 11, 2009 8:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Michael B. Smith
Careful!

I recently learned that using that is a license violation.

-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 4:19 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

To get the MSIs you can also run the Adobe Updater from one instance of
9.0, and find the downloaded 9.1 updates in 

...\Local Settings\Application Data\Adobe\Updater6\Install\ 

-Sam

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Wednesday, March 11, 2009 10:39 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

The patch is out.  It's an update from 9.0 to 9.1.  My question is
whether or not they're going to provide another download to give us
separate files for Adobe Air and Reader.  Right now, the full download
of the update only provides one install, which includes both.  You can
get just the reader install from the FTP site, but it is an .exe, not
.msi...

Joe Heaton
Employment Training Panel


-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Wednesday, March 11, 2009 8:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
To get the MSIs you can also run the Adobe Updater from one instance of
9.0, and find the downloaded 9.1 updates in 

...\Local Settings\Application Data\Adobe\Updater6\Install\ 

-Sam

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Wednesday, March 11, 2009 10:39 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

The patch is out.  It's an update from 9.0 to 9.1.  My question is
whether or not they're going to provide another download to give us
separate files for Adobe Air and Reader.  Right now, the full download
of the update only provides one install, which includes both.  You can
get just the reader install from the FTP site, but it is an .exe, not
.msi...

Joe Heaton
Employment Training Panel


-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Wednesday, March 11, 2009 8:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Carl Houseman
I checked earlier this morning, and an hour ago with the reader's "check for
updates" and no update was forthcoming.

Just now I checked again and an update was found.

Carl

-Original Message-
From: Peter van Houten [mailto:peter...@gmail.com] 
Sent: Wednesday, March 11, 2009 11:50 AM
To: NT System Admin Issues
Subject: Re: Foxit PDF Reader Flaws

It was out yesterday already:

http://www.adobe.com/support/security/bulletins/apsb09-03.html

--
Peter van Houten


> -Original Message-
> From: Carl Houseman [mailto:c.house...@gmail.com] 
> Sent: Wednesday, March 11, 2009 8:22 AM
> To: NT System Admin Issues
> Subject: RE: Foxit PDF Reader Flaws
> 
> It's March 11 already in most of the world and no Adobe patch yet.  (I
> know,
> they're hardly awake in CA yet and why should I be surprised that Adobe
> can't automate something as simple putting a new version online.)
> 
> Carl
> 
> -Original Message-
> From: Mike French [mailto:mike.fre...@theequitybank.com] 
> Sent: Wednesday, March 11, 2009 11:14 AM
> To: NT System Admin Issues
> Subject: Foxit PDF Reader Flaws
> 
> Just an FYI:
> 
> March 9, Computerworld - (International) Foxit PDF viewer open to
> attack, say researchers. Security researchers on March 9 warned of
> several vulnerabilities in Foxit, a free PDF document viewer that has
> been recommended as an alternative to Adobe Reader, which currently
> contains an unpatched critical bug of its own. Foxit Software Co.
> patched its namesake on March 9 to plug three holes. One of the three
> vulnerabilities is in the same JBIG2 image compression format fingered
> by researchers last month as the root of the bug in Adobe System Inc.'s
> popular Reader and Acrobat applications. The flaw in Adobe's software,
> which has been exploited by hackers since at least early January, will
> not be patched until March 11, according to Adobe's schedule. The Foxit
> and Adobe bugs are unrelated, however, except for the fact that they are
> both in the code that parses JBIG2 images, said the chief technology
> officer at Secunia, the Danish company that reported the flaw to Foxit.
> "It is a completely different vulnerability related to JBIG2," he said
> in an e-mail on March 9. It was Adobe's confirmation of its bug that
> prompted Secunia researchers to dig into other PDF viewers. "We did,
> however, start the research in Foxit out of curiosity based on the Adobe
> vulnerability, and discovered this new vulnerability," the chief
> technology officer said. Secunia reported the bug to Foxit on February
> 27. The remaining two bugs in Foxit were reported February 18 by Core
> Security Technologies, a developer of penetration testing software. One
> of the vulnerabilities can trigger a buffer overflow, while the other
> could be used by attackers to circumvent security warnings.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


Re: Foxit PDF Reader Flaws

2009-03-11 Thread Ben Scott
On Wed, Mar 11, 2009 at 11:14 AM, Mike French
 wrote:
> One of the three vulnerabilities is in the same JBIG2 image
> compression format fingered by researchers last month
> as the root of the bug in Adobe System Inc.'s

  It seems like FoxIt often ends up issuing vulnerability notices for
their Reader software when Adobe does for theirs.  Is FoxIt licensing
come code from Adobe or something?

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: Foxit PDF Reader Flaws

2009-03-11 Thread Michael Tellson
According to Foxit software's website, all 3 vulnerabilities were fixed
by an updated version released on 3/9
http://www.foxitsoftware.com/pdf/reader/security.htm


-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com] 
Sent: Wednesday, March 11, 2009 10:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws


Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~



Re: Foxit PDF Reader Flaws

2009-03-11 Thread Micheal Espinola Jr
*cough*

The XML page cannot be displayed
Cannot view XML input using style sheet. Please correct the error and
then click the Refresh button, or try again later.




The server did not understand the request, or the request was invalid.
Error processing resource 'http://www.w3.org/TR/xhtm...


--
ME2



On Wed, Mar 11, 2009 at 12:03 PM, Andy Ognenoff  wrote:
> You can get the .msi from the .exe file:
>
> http://kb.adobe.com/selfservice/viewContent.do?externalId=kb404146
>
>  - Andy O.
>
>>-Original Message-
>>From: Joe Heaton [mailto:jhea...@etp.ca.gov]
>>Sent: Wednesday, March 11, 2009 9:39 AM
>>To: NT System Admin Issues
>>Subject: RE: Foxit PDF Reader Flaws
>>
>>The patch is out.  It's an update from 9.0 to 9.1.  My question is
>>whether or not they're going to provide another download to give us
>>separate files for Adobe Air and Reader.  Right now, the full download
>>of the update only provides one install, which includes both.  You can
>>get just the reader install from the FTP site, but it is an .exe, not
>>.msi...
>>
>>Joe Heaton
>>Employment Training Panel
>>
>>
>>-Original Message-----
>>From: Carl Houseman [mailto:c.house...@gmail.com]
>>Sent: Wednesday, March 11, 2009 8:22 AM
>>To: NT System Admin Issues
>>Subject: RE: Foxit PDF Reader Flaws
>>
>>It's March 11 already in most of the world and no Adobe patch yet.  (I
>>know,
>>they're hardly awake in CA yet and why should I be surprised that Adobe
>>can't automate something as simple putting a new version online.)
>>
>>Carl
>>
>>-Original Message-
>>From: Mike French [mailto:mike.fre...@theequitybank.com]
>>Sent: Wednesday, March 11, 2009 11:14 AM
>>To: NT System Admin Issues
>>Subject: Foxit PDF Reader Flaws
>>
>>Just an FYI:
>>
>>March 9, Computerworld - (International) Foxit PDF viewer open to
>>attack, say researchers. Security researchers on March 9 warned of
>>several vulnerabilities in Foxit, a free PDF document viewer that has
>>been recommended as an alternative to Adobe Reader, which currently
>>contains an unpatched critical bug of its own. Foxit Software Co.
>>patched its namesake on March 9 to plug three holes. One of the three
>>vulnerabilities is in the same JBIG2 image compression format fingered
>>by researchers last month as the root of the bug in Adobe System Inc.'s
>>popular Reader and Acrobat applications. The flaw in Adobe's software,
>>which has been exploited by hackers since at least early January, will
>>not be patched until March 11, according to Adobe's schedule. The Foxit
>>and Adobe bugs are unrelated, however, except for the fact that they are
>>both in the code that parses JBIG2 images, said the chief technology
>>officer at Secunia, the Danish company that reported the flaw to Foxit.
>>"It is a completely different vulnerability related to JBIG2," he said
>>in an e-mail on March 9. It was Adobe's confirmation of its bug that
>>prompted Secunia researchers to dig into other PDF viewers. "We did,
>>however, start the research in Foxit out of curiosity based on the Adobe
>>vulnerability, and discovered this new vulnerability," the chief
>>technology officer said. Secunia reported the bug to Foxit on February
>>27. The remaining two bugs in Foxit were reported February 18 by Core
>>Security Technologies, a developer of penetration testing software. One
>>of the vulnerabilities can trigger a buffer overflow, while the other
>>could be used by attackers to circumvent security warnings.
>>
>>
>>
>>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>>
>>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Andy Ognenoff
You can get the .msi from the .exe file:

http://kb.adobe.com/selfservice/viewContent.do?externalId=kb404146

 - Andy O.

>-Original Message-
>From: Joe Heaton [mailto:jhea...@etp.ca.gov]
>Sent: Wednesday, March 11, 2009 9:39 AM
>To: NT System Admin Issues
>Subject: RE: Foxit PDF Reader Flaws
>
>The patch is out.  It's an update from 9.0 to 9.1.  My question is
>whether or not they're going to provide another download to give us
>separate files for Adobe Air and Reader.  Right now, the full download
>of the update only provides one install, which includes both.  You can
>get just the reader install from the FTP site, but it is an .exe, not
>.msi...
>
>Joe Heaton
>Employment Training Panel
>
>
>-Original Message-
>From: Carl Houseman [mailto:c.house...@gmail.com]
>Sent: Wednesday, March 11, 2009 8:22 AM
>To: NT System Admin Issues
>Subject: RE: Foxit PDF Reader Flaws
>
>It's March 11 already in most of the world and no Adobe patch yet.  (I
>know,
>they're hardly awake in CA yet and why should I be surprised that Adobe
>can't automate something as simple putting a new version online.)
>
>Carl
>
>-Original Message-
>From: Mike French [mailto:mike.fre...@theequitybank.com]
>Sent: Wednesday, March 11, 2009 11:14 AM
>To: NT System Admin Issues
>Subject: Foxit PDF Reader Flaws
>
>Just an FYI:
>
>March 9, Computerworld - (International) Foxit PDF viewer open to
>attack, say researchers. Security researchers on March 9 warned of
>several vulnerabilities in Foxit, a free PDF document viewer that has
>been recommended as an alternative to Adobe Reader, which currently
>contains an unpatched critical bug of its own. Foxit Software Co.
>patched its namesake on March 9 to plug three holes. One of the three
>vulnerabilities is in the same JBIG2 image compression format fingered
>by researchers last month as the root of the bug in Adobe System Inc.'s
>popular Reader and Acrobat applications. The flaw in Adobe's software,
>which has been exploited by hackers since at least early January, will
>not be patched until March 11, according to Adobe's schedule. The Foxit
>and Adobe bugs are unrelated, however, except for the fact that they are
>both in the code that parses JBIG2 images, said the chief technology
>officer at Secunia, the Danish company that reported the flaw to Foxit.
>"It is a completely different vulnerability related to JBIG2," he said
>in an e-mail on March 9. It was Adobe's confirmation of its bug that
>prompted Secunia researchers to dig into other PDF viewers. "We did,
>however, start the research in Foxit out of curiosity based on the Adobe
>vulnerability, and discovered this new vulnerability," the chief
>technology officer said. Secunia reported the bug to Foxit on February
>27. The remaining two bugs in Foxit were reported February 18 by Core
>Security Technologies, a developer of penetration testing software. One
>of the vulnerabilities can trigger a buffer overflow, while the other
>could be used by attackers to circumvent security warnings.
>
>
>
>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
>
>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
Ah, I assumed the 3/11 patch was to address the Javascript.  I'm now up to 
speed, thanks.

-Original Message-
From: Bill Songstad (WCUL) [mailto:administra...@waleague.org] 
Sent: Wednesday, March 11, 2009 10:45 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

That article is in reference to the earlier workaround of disabling JavaScript 
in Adobe Reader, not the 3/11/09 patch.

Bill 
 

-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com]
Sent: Wednesday, March 11, 2009 8:28 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

On topic, The patch might not matter:


A New Twist to the Adobe Vulnerability
http://www.readwriteweb.com/archives/a_new_twist_to_the_adobe_vulnerability.php 



-Sam













-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, March 11, 2009 10:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Bill Songstad (WCUL)
That article is in reference to the earlier workaround of disabling JavaScript 
in Adobe Reader, not the 3/11/09 patch.

Bill 
 

-Original Message-
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 8:28 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

On topic, The patch might not matter:


A New Twist to the Adobe Vulnerability 
http://www.readwriteweb.com/archives/a_new_twist_to_the_adobe_vulnerability.php 



-Sam













-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, March 11, 2009 10:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
Iirc, the Cust Wizard will extract the MSI from the EXE...
http://www.adobe.com/support/downloads/detail.jsp?ftpID=3993

 

-Original Message-
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Wednesday, March 11, 2009 10:39 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

The patch is out.  It's an update from 9.0 to 9.1.  My question is
whether or not they're going to provide another download to give us
separate files for Adobe Air and Reader.  Right now, the full download
of the update only provides one install, which includes both.  You can
get just the reader install from the FTP site, but it is an .exe, not
.msi...

Joe Heaton
Employment Training Panel


-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Wednesday, March 11, 2009 8:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



Re: Foxit PDF Reader Flaws

2009-03-11 Thread Peter van Houten

It was out yesterday already:

http://www.adobe.com/support/security/bulletins/apsb09-03.html

--
Peter van Houten



-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, March 11, 2009 8:22 AM

To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know,
they're hardly awake in CA yet and why should I be surprised that Adobe
can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com] 
Sent: Wednesday, March 11, 2009 11:14 AM

To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


RE: Foxit PDF Reader Flaws

2009-03-11 Thread Joe Heaton
The patch is out.  It's an update from 9.0 to 9.1.  My question is
whether or not they're going to provide another download to give us
separate files for Adobe Air and Reader.  Right now, the full download
of the update only provides one install, which includes both.  You can
get just the reader install from the FTP site, but it is an .exe, not
.msi...

Joe Heaton
Employment Training Panel


-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, March 11, 2009 8:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know,
they're hardly awake in CA yet and why should I be surprised that Adobe
can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com] 
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Sam Cayze
On topic, The patch might not matter:


A New Twist to the Adobe Vulnerability 
http://www.readwriteweb.com/archives/a_new_twist_to_the_adobe_vulnerabil
ity.php 



-Sam













-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, March 11, 2009 10:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



RE: Foxit PDF Reader Flaws

2009-03-11 Thread Carl Houseman
It's March 11 already in most of the world and no Adobe patch yet.  (I know,
they're hardly awake in CA yet and why should I be surprised that Adobe
can't automate something as simple putting a new version online.)

Carl

-Original Message-
From: Mike French [mailto:mike.fre...@theequitybank.com] 
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~