- Original Message -
From: "Todd Towles" <[EMAIL PROTECTED]>
To: "Über GuidoZ" <[EMAIL PROTECTED]>
Cc: "Mailing List - Full-Disclosure" <[EMAIL PROTECTED]>
Sent: Sunday, August 22, 2004 11:04 AM
Subject: RE: [Full-Disclosure] Windows Update
I also turn off all updates. I had my Automatic
- Original Message -
From: "Security List" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, August 21, 2004 1:50 AM
Subject: [Full-Disclosure] Windows Update
Went to windows update last night w/ XP Pro.
Redirected to the v5 version. I was asked to install
the new Windows Upda
I also turn off all updates. I had my Automatic updates and BITS set to manual and
Windows Update wouldn't work. I never disable it but I do stop the service and leave
it on manual. When you disable Automatic updates in the control panel the service
keeps running. Stupid, yep..I think so too.
H
[EMAIL PROTECTED]
Please contact me using a service that is not
blacklisted, i.e., nothing from Outblaze. Try Yahoo, or Hotmail.
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF
"...justice is a duty towards those whom you love and those whom you do
not. And people's rights will no
Allan is right. I didn't notice people calling it a worm. It is suppose
to be a patch management product that will actually use the expolit hole
to patch the box. It is a controlled problem and should be used only on
computers control by the corporation that owns the software.
But is it still a go
Most people i talked to consider the drag and drop vulnerability found by
http-equiv not as a serious problem, because it requires some user
interaction and the press pushes this topic way to much as the "first
security problem in SP2". In an article on BetaNews even Microsoft claims
it's not a
Umm, hold on a sec here...
(snip from "James Tucker"):
> There really should be no reason why you would want to disable the
> Automatic Updates service anyway, unless you are rolling out updates
> using a centralised distribution system, in which case you would not
>need it anyway.
I believe you
Here I found that I can have BITS and Automatic Updates in "manual",
Windows Update works fine here. It may be a good idea to refresh the
MMC console page, as you will probably find that at time the service
had shut down if and when BITS was stopped prematurely (i.e. when it
was in use).
There rea
> >>Zone Alarm stores its config. files in %windir%\Internet Logs\* . But strangely,
> Isn't it supposed to store logs ? My english knowledge is probably too poor.
The folder name would suggest that. I raised an eyebrow when I saw that too.
> >>EVERYONE: Full
This means that anyone / anything wh
> Except that the scenario you describe isn't near complete. What will happen
> is either it will get attacked by a benign worm (possibly breaking something)
> or a malicious worm (definitely breaking something) only a short while later.
> Which would you prefer then ?
I'd prefer to not have t
On Saturday 21 August 2004 16:00, michael williamson wrote:
> This is a _lot_ more responsible than running exploit code of any sort,
> even for a good purpose. I admin one particular windows server that I
> must actually wait for vender approval before applying any hotfixes.
> I'd be extremely p
Hi!
Not 100% sure if this is a topic for fd so far.
So, please, put your flamethrower aside if it's not.
A couple of days ago I recognized, that Safari (and
other apps using WebCore on MacOS X) do something known
as "content sniffing". That means, if Safari gets a file
with Content-Type "plain/text
KERNEL32.DLL
LoadLibraryA
GetProcAddress
ExitProcess
advapi32.dll
RegCloseKey
oleaut32.dll
SysFreeString
shell32.dll
ShellExecuteA
user32.dll
SetTimer
all these exports show point in a direction that it creates a key in the registry for
There are much better alternatives to using exploit code to install
patches.The security folk at TAMU have come up with an in-line
network sniffer automagically blocks infected machines and notifies them
via an internal webserver of their infection. After a set time it
allows them back on. (c
thanks for the link that was what i *really* needed!
-aditya
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Maxime
Ducharme
Sent: Tuesday, August 17, 2004 08:25 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Netsys. Com
Subject: Re: [Full-Disclosure] cmd.exe b
John LaCour wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There is absolutely no security issue here.
ZoneAlarm does not rely on file permissions to protect
any configuration files. Configuration files are protected
by our TrueVector(r) driver in the kernel.
In addition to protecting co
Tested on: Versión 7.23, Compilación 3227, Plataforma Win32,
Sistema Windows XP
document.getElementsByTagName("script")[0].text =
"";
Sourvivor,
www.thesur.com
-BEGIN PGP PUBLIC KEY BLOCK-Version:
PGP 8.0.3 - not licensed for commercial use: www.pgp.com
mQGiBEAirpURBADsKduF+gl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I really don't KNOW what HP is doing, but I would assume that it's
just a 'product' and not a worm. Meaning, you can probably setup 1
system on your network that scans a specified range (for example only
your workstations if you're worried about your
18 matches
Mail list logo