Got a few users with Windows CE clients connecting to Citrix XenApp 6
desktops who are experiencing keys sticking (mainly the Ctrl key, but
occasionally other ones) when in the Citrix session. I've replaced the
keyboards on multiple occasions and the error still occurs. I've seen some
Citrix forum
http://www.theregister.co.uk/2010/06/10/windows_help_bug/
http://seclists.org/fulldisclosure/2010/Jun/205
Looks like a combination of XSS, and invoking the hcp protocol for help and
support center to execute commands in the context of the logged on user.
PS: Mad Props to Susan Bradley on the
Saw this earlier on Patch Management...any word yet on workaround/mitigation
to keep us sane until the inevitable OOB patch comes around?
On 10 June 2010 12:00, Ziots, Edward ezi...@lifespan.org wrote:
http://www.theregister.co.uk/2010/06/10/windows_help_bug/
My intial thought would be HIPS to block the helpctr from even being
called, either that or stopping the help and support center service, and
ACLing the helpctr.exe. But still waiting to see what comes up on the
Security lists from Microsoft that Susan Bradley myself and others are
on, for
The article Susan linked had a mitigations section. The one I am most
interested in was the temporary disabling of the hcp protocol handler in
the registry.
http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/ADVISORY
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Thursday,
I can't find the protocol handler anywhere in HKCR?
On 10 June 2010 13:31, Joe Tinney jtin...@lastar.com wrote:
The article Susan linked had a mitigations section. The one I am most
interested in was the temporary disabling of the hcp protocol handler in the
registry.
ME2 has validated a Shook post. I feel pretty
Shook
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Wednesday, June 09, 2010 6:58 PM
To: NT System Admin Issues
Subject: Re: Ethernet First Mile
+1
--
ME2
On Wed, Jun 9, 2010 at 8:36 AM, Andy Shook
Oh wait...it only exists on Server 2003 and XP. Does that mean Windows 2008
is not affected by this? The POC link seems to work...
On 10 June 2010 13:37, James Rankin kz2...@googlemail.com wrote:
I can't find the protocol handler anywhere in HKCR?
On 10 June 2010 13:31, Joe Tinney
On Thu, Jun 10, 2010 at 5:13 AM, James Rankin kz2...@googlemail.com wrote:
Got a few users with Windows CE clients connecting to Citrix XenApp 6
desktops who are experiencing keys sticking (mainly the Ctrl key, but
occasionally other ones) when in the Citrix session.
Interesting. I have
If the issue disappears when you shadow them, then the issue has to do
with something in their session. This usually is something stored in
the roaming profile (hku hive in the registry). In these cases I will
generally try recreating the roaming profile.
Sent from my iPhone
On Jun 10,
I don't think that is the case, because when these users log on from home
everything works OK, and they are using the same roaming profile (and I've
already tried removing it, only to see the issue reoccur). It is only when
they are using the Windows CE client in a non-shadowed state that it
Can you disable the hot key mapping in the Citrix client? Does it
make a difference if the session is full screen vs in a seamless window?
Sent from my iPhone
On Jun 10, 2010, at 7:55 AM, James Rankin kz2...@googlemail.com
wrote:
I don't think that is the case, because when these users
Feeling and looking are two very different things Shooky Baby! J
Webster
From: Andy Shook [mailto:andy.sh...@peak10.com]
Subject: RE: Ethernet First Mile
ME2 has validated a Shook post. I feel pretty..
Shook
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Will give it a try with these pointers, cheers. Unfortunately due to the
intermittent and distributed nature of this problem, the testing trial/error
process is very slow :-)
On 10 June 2010 14:00, Mike Tellson micha...@colonialsavings.com wrote:
Can you disable the hot key mapping in the
I don't have it as well but I am win7pro and I didn't install the HP help
center software??
Maybe??
_
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: Thursday, June 10, 2010 8:38 AM
To: NT System Admin Issues
Subject: Re: More pain on the Windows front, possible 0 day
I think it is just for XP/2003, and it is the MS Help Center stuff
It actually doesn't work properly on 2008, as far as I can tell - I was
looking a bit too deep
On 10 June 2010 14:08, David W. McSpadden dav...@imcu.com wrote:
I don’t have it as well but I am win7pro and I didn’t install the
Here's the perfect protective case for iPhone/iPod:
http://www.unplggd.com/unplggd/personal-health/phoneballs-iphone-case-118980
Saw this on a private mailing list I'm on and thought I'd post it here. J
John-AldrichTile-Tools
~ Finally, powerful endpoint security that ISN'T a
Priceless!
Don Guyer
Systems Engineer - Information Services
Prudential, Fox Roach/Trident Group
431 W. Lancaster Avenue
Devon, PA 19333
Direct: (610) 993-3299
Fax: (610) 650-5306
don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com
From: John Aldrich
I have created a batch file and copied the output below it. I don't think
my ISP set the PTR records?
Should I see them using DIG site any???
echo on
c:
cd tmp\dig
del %1.txt /q
del dig.%1.txt /q
:root
dig %1 any%1.txt
copy %1.txt dig.%1.txt
:www
dig www.%1 any%1.txt
copy
What I am thinking if we don't have the spot in the registry, then maybe
configuring your web filtering, to block all URL's or sequences that
are calling HCP://
Per the seclist.org site the rogue html file had the following in it:
$ cat starthelp.html
iframe src=hcp://...
But this was
I have been asked by a customer if on their 2003 AD domain it is possible
for someone to have admin rights to the servers and not be a member of
domain admins.
and local admin groups on member servers.
Any one know if it can be done
Graeme
--
Good news everyone, you have just received and
Ok that's what I read but I wanted to be sure.
I don't even have the binaries directory so I am good.
_
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: Thursday, June 10, 2010 9:14 AM
To: NT System Admin Issues
Subject: Re: More pain on the Windows front, possible 0 day
Yes,
Restricted Groups... Scope the GPO to the Location in AD in which the
servers reside ( Usually a Servers OU accordingly). They will be local
administrators on those servers but not a Domain Admin.
Without knowing much else about the situation, Id even say that is way
too much
Easily, with restricted groups GPO. Just add another group to local
Administrators group on the target server(s). We do this for servers that
require some level of third-party support, although we keep their accounts
limited to certain date periods.
On 10 June 2010 14:47, Graeme Carstairs
Just don't wear the high heels and Drag outfit to the next PTA meeting
Shooky, you scared the children senseless last time
Dang someone spiked the KOOLAID again.. now I feel pretty J Fear Sleep
deprevation... Fear it well.
Z
Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
or do you mean have admin rights without belonging to the local
administrators group? You could easily give them all permissions and user
rights normally restricted to Administrators, but that would kind of defeat
the entire object of having the administrators group in the first place.
On 10 June
I can't find it on my Windows 7 boxes but I did on Windows XP SP3:
C:\WINDOWS\system32reg query HKCR /s | find /i hcp
HKEY_CLASSES_ROOT\HCP
HKEY_CLASSES_ROOT\HCP\shell
HKEY_CLASSES_ROOT\HCP\shell\open
HKEY_CLASSES_ROOT\HCP\shell\open\command
NO NAME REG_EXPAND_SZ
yeh thats what I thought.
I think they are wanting to make sure that if someone had the
admin account they couldn't set themselves up with full domain admin rights,
without having the account in the domain admin and local admin groups.
Its a security check thing, i think they are preparing to
As if it wasn't bad enough people were hanging things like this from
underneath their pickup truck...
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Thursday, June 10, 2010 8:49 AM
To: NT System Admin Issues
Subject: RE: For all you Apple Fan-Boys out there...
Indeed +1, LOL. I
I think for the iPad, something that benefits the Breast Cancer Society
would be fitting.
Don Guyer
Systems Engineer - Information Services
Prudential, Fox Roach/Trident Group
431 W. Lancaster Avenue
Devon, PA 19333
Direct: (610) 993-3299
Fax: (610) 650-5306
don.gu...@prufoxroach.com
So I'm not clear...if someone clicks on Help and Support in 2003 / XP it's
possible for them to get exploted because they might look for something and get
redirected to a compromised site? I'm not clear...what would my users have to
go to get exploited?
David Lum // SYSTEMS ENGINEER
NORTHWEST
This seems so simple, but I'm stuck.
I'm writing a new bat file in windows and I need to echo spaces to a
file.
For example:
echo bla bla bla spacespacespacespace results.txt
Anyone know how to echo a space?
I've tried $S, I've tried putting around spaces, I've tried echo
#032;
Any ideas?
I would assume the primary method of exploitation would be through a crafted
URL, delivered by whatever method your average virus writer chooses - email,
IM, FaceBook, etc
On 10 June 2010 15:09, David Lum david@nwea.org wrote:
So I’m not clear…if someone clicks on “Help and Support” in
echo.
On 10 June 2010 15:05, Derrenbacker, L. Jonathan jderrenbac...@kshgs.comwrote:
This seems so simple, but I’m stuck.
I'm writing a new bat file in windows and I need to echo spaces to a file.
For example:
echo bla bla bla spacespacespacespace results.txt
Anyone know how to echo
Other way around.
Your users have the opening on their pc.
The browse a site the the hcp:// embedded and the the embedded code can run
with their permissions on their pc. So they could in fact install something
or copy something to their machine with the hcp:// exploit.
That's how I read it
Sorry - i thought you meant an empty line, which is what echo. will give you
(I must learn to stop skimming)
On 10 June 2010 15:19, James Rankin kz2...@googlemail.com wrote:
echo.
On 10 June 2010 15:05, Derrenbacker, L. Jonathan
jderrenbac...@kshgs.comwrote:
This seems so simple, but
$S
On Thu, Jun 10, 2010 at 10:05 AM, Derrenbacker, L. Jonathan
jderrenbac...@kshgs.com wrote:
This seems so simple, but I’m stuck.
I'm writing a new bat file in windows and I need to echo spaces to a file.
For example:
echo bla bla bla spacespacespacespace results.txt
Anyone know
But, again, they'd have to browse a site with that exploit, which would mean
clicking a link within an e-mail, or just dumb luck...
David W. McSpadden dav...@imcu.com 6/10/2010 7:20 AM
Other way around.
Your users have the opening on their pc.
The browse a site the the hcp:// embedded and
Drive by dns poisioning. Think you are going to google.com and end up and
fu.google.com. get the bad code embedded on your machine redirect to
google.com. Nanoseconds and flicker to the user.
-Original Message-
From: Joseph Heaton [mailto:jhea...@dfg.ca.gov]
Sent: Thursday, June 10,
Any site could have the malicious code in it, and we all know that our
web filtering software isn't going to block everything on the big bad
internet :)
Z
Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.org
I just used spaces in a test batch file and that worked fine. I called the
batch file interactively, though...
On Thu, Jun 10, 2010 at 10:23 AM, Jonathan Link jonathan.l...@gmail.comwrote:
$S
On Thu, Jun 10, 2010 at 10:05 AM, Derrenbacker, L. Jonathan
jderrenbac...@kshgs.com wrote:
I concur. I just knocked up a quick batch file and successfully echoed some
spaces in
On 10 June 2010 15:33, Jonathan Link jonathan.l...@gmail.com wrote:
I just used spaces in a test batch file and that worked fine. I called the
batch file interactively, though...
On Thu, Jun 10, 2010 at
I would also see phishing attacks with this type of exploit as the
payload, along with others. Maybe they combine it with MPACK or Zues...
Z
Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.org
From: James
Just pad the spaces after your text and before your redirect (). The
spaces will echo just fine. An empty line as someone pointed out is (echo.)
--
ME2
On Thu, Jun 10, 2010 at 7:05 AM, Derrenbacker, L. Jonathan
jderrenbac...@kshgs.com wrote:
This seems so simple, but I’m stuck.
I'm
I've been asked to research this arena again.
What are you guys using for automating patch management for your servers?
Our environment:
A lot of VmWare
Mostly Server 2k8, some 2k8R2, some 2K3.
Not worried about 3rd party application patching within this project.
~ Finally, powerful endpoint
Here are some options:
1. Make the last space character ALT-255
2. Set a variable that is longer, and only output a specific number of
characters
The way you have written it should output the space to the file.
-ASB: http://XeeSM.com/AndrewBaker
On Thu, Jun 10, 2010 at 10:05 AM,
You're wanting this just for servers? What are you currently using for
desktops?
-Original Message-
From: Joseph Heaton [mailto:jhea...@dfg.ca.gov]
Sent: Thursday, June 10, 2010 11:17 AM
To: NT System Admin Issues
Subject: Patch Management - again
I've been asked to research this arena
On Thu, Jun 10, 2010 at 11:17 AM, Joseph Heaton jhea...@dfg.ca.gov wrote:
What are you guys using for automating patch management for your servers?
WSUS.
-- Ben
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
So what does Help and Support have to do with it? It tells the OS that hcp://
is a valid URL? Would that also mean disabling that service mitigates it?
Dave
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Thursday, June 10, 2010 7:29 AM
To: NT System Admin
Ohhh, thats right. It truncates. Dunno what I was thinking!!!
--
ME2
On Thu, Jun 10, 2010 at 8:11 AM, Micheal Espinola Jr
michealespin...@gmail.com wrote:
Just pad the spaces after your text and before your redirect (). The
spaces will echo just fine. An empty line as someone pointed
We use the Dell Kace KBOX here. It gets its patching stream from Patchlink
(not that it really matters). I have no issues with it, and it's very easy to
use. KBOX is a full management product, so that might be overkill if you
looking for patching exclusively.
Joseph Heaton
Have any of you checked out the examples of the exploit on the seclists.org
site? It is innocuous - only spawns calc.exe, but it is a good example of what
can be done with this exploit. Have already passed it on to my manager to see
if we can get a gpo implemented.
Thanks,
James Winzenz
Desktops is done by a different group. We currently are a Novell environment,
with a Windows application domain. I personally have both of my machines in
the Windows domain, and doing updates myself. I think the desktop group has
the clients automatically downloading and installing updates
+1
Sean Rector, MCSE
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Thursday, June 10, 2010 11:30 AM
To: NT System Admin Issues
Subject: Re: Patch Management - again
On Thu, Jun 10, 2010 at 11:17 AM, Joseph Heaton jhea...@dfg.ca.gov
wrote:
What are you guys
To all,
Ok, I have seen some rants about what Google has done on their main search
page. I don't like it either.
So, instead of ranting and complaining about to Google on getting it
changed, all I did was create a graphic with a white background, saved it as
a JPEG and then used their utility to
If this is just OS patching you just need WSUS, and I would talk to the other
group about switching the desktops to that also. Single point of download so
all those clients are not hitting your internet connectionyou decide what
(and when) updates to deploy...not some set of rules by MS.
Yeah I just use WSUS for our desktops and servers as well.
James
- Original Message -
From: Ben Scott mailvor...@gmail.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Thursday, June 10, 2010 11:29 AM
Subject: Re: Patch Management - again
On Thu, Jun 10,
What exactly is SCALE? A vendor?
Jay Dale
I.T. Manager, 3GiG
Mobile: 713.299.2541
Email: jay.d...@3-gig.commailto:jay.d...@3-gig.com
Confidentiality Notice: This e-mail, including any attached files, may contain
confidential and/or privileged information for the sole use of the intended
Hit change background and hit ‘editors pics’ and use their white background.
Tomorrow they release ‘remove background’ as an option and we can all remove it
and get back to a normal life.
From: Daniel Rodriguez [mailto:drod...@gmail.com]
Sent: Thursday, June 10, 2010 11:41 AM
To: NT System
Heh… I hadn’t had to “google” anything today (or if I did, I used the built-in
search tool in FireFox J) Interesting
John-AldrichTile-Tools
From: Daniel Rodriguez [mailto:drod...@gmail.com]
Sent: Thursday, June 10, 2010 11:41 AM
To: NT System Admin Issues
Subject: Google and stupid
Thats hilarious!
- Original Message -
From: Ben Scott mailvor...@gmail.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Wednesday, June 09, 2010 2:43 PM
Subject: Re: [HUMOR] Someone misconfigured something somewhere, I think
On Wed, Jun 9, 2010 at 8:54 AM,
That kind of looks bingish to me.
On Thu, Jun 10, 2010 at 10:40 AM, Daniel Rodriguez drod...@gmail.comwrote:
To all,
Ok, I have seen some rants about what Google has done on their main search
page. I don't like it either.
So, instead of ranting and complaining about to Google on getting it
SCALE Computing is a SAN manufacturer.
John-AldrichTile-Tools
From: Jay Dale [mailto:jay.d...@3-gig.com]
Sent: Thursday, June 10, 2010 11:43 AM
To: NT System Admin Issues
Subject: RE: SAN Solution
What exactly is SCALE? A vendor?
Jay Dale
I.T. Manager, 3GiG
Mobile: 713.299.2541
For sure.
If you're following the competition, you aren't leading any more.
On Jun 10, 2010, at 11:51 AM, Steve Ens wrote:
That kind of looks bingish to me.
On Thu, Jun 10, 2010 at 10:40 AM, Daniel Rodriguez
drod...@gmail.com wrote:
To all,
Ok, I have seen some rants about what Google
First - do not use Restricted Group on your servers without
understanding it. You'll most likely strip out every service account in
one quick step and break your entire business!!
Second - yes, you can just create a domain group and have that added to
local Administrators groups on every server
they added a little bing to their site.
- Original Message -
From: Daniel Rodriguez
To: NT System Admin Issues
Sent: Thursday, June 10, 2010 11:40 AM
Subject: Google and stupid background pictures
To all,
Ok, I have seen some rants about what Google has done on their
sad, as the simple, clean interface was one of the things I liked.
On Thu, Jun 10, 2010 at 11:40 AM, Daniel Rodriguez drod...@gmail.comwrote:
To all,
Ok, I have seen some rants about what Google has done on their main search
page. I don't like it either.
So, instead of ranting and
Earlier today, that wasn't an option. Guess someone else uploaded that.
On Thu, Jun 10, 2010 at 11:42 AM, Kennedy, Jim kennedy...@elyriaschools.org
wrote:
Hit change background and hit ‘editors pics’ and use their white
background.
Tomorrow they release ‘remove background’ as an option
+1
I get nightmares thinking about what it was like before.
On 6/10/2010 10:29 AM, Ben Scott wrote:
On Thu, Jun 10, 2010 at 11:17 AM, Joseph Heaton jhea...@dfg.ca.gov wrote:
What are you guys using for automating patch management for your servers?
WSUS.
--
Phil Brutsche
I have used restricted groups before and would be not be keen to use them on
servers.
Further discussions with the client and he revealed it was a hypothetical
from HR as to whether or not it could be done.
Thanks for all the suggestions.
Graeme
On 10 June 2010 16:55, Alan Davies
I currently have 67 boxes that I patch manually each month, ranging from XP to
2k8R2. It's actually kind of nice, at the moment, as I do it at night from
home, through a VPN back to the office.
Phil Brutsche p...@optimumdata.com 6/10/2010 9:15 AM
+1
I get nightmares thinking about what it
Got several users around the world complaining about BB devices not
send/receiving emails.
Anyone else seeing this?
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Not here.
Verizon
Colorado
--
Sent using BlackBerry
- Original Message -
From: Rubens Almeida rubensalme...@gmail.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Thu Jun 10 10:20:18 2010
Subject: Anyone having issues with BB?
Got
On the server side that won't change muchI don't think you want download
and install automatically as a server option. I have my servers set to download
but not install. Then I hit each one and tell it to install, so you skip the
step of downloading on each server that is already done.
Not here
New England
Sprint/Nextel
-Original Message-
From: Eldridge, Dave [mailto:d...@parkviewmc.com]
Sent: Thursday, June 10, 2010 12:22 PM
To: NT System Admin Issues
Subject: Re: Anyone having issues with BB?
Not here.
Verizon
Colorado
--
Sent using
http://www.google.com/search?q=ipad+security+breach
--
ME2
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Fixed that for you. J
http://www.bing.com/search?q=ipad+security+breach
http://www.bing.com/search?q=ipad+security+breachgo=form=QBLHqs=nsk
go=form=QBLHqs=nsk=
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Thursday, June 10, 2010 12:57 PM
To: NT System Admin Issues
I love how all the wire services are reporting the name of the 'security firm'
that discovered the flaw, Goatse Security. I am guessing they don't know the
history on Goatse. Or maybe they do and have an awesome sense of humor
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent:
Fine here from near Philadelphia, PA, Verizon and ATT.
Don Guyer
Systems Engineer - Information Services
Prudential, Fox Roach/Trident Group
431 W. Lancaster Avenue
Devon, PA 19333
Direct: (610) 993-3299
Fax: (610) 650-5306
don.gu...@prufoxroach.com
-Original Message-
From: David
Only a matter of time, no shock there.
Don Guyer
Systems Engineer - Information Services
Prudential, Fox Roach/Trident Group
431 W. Lancaster Avenue
Devon, PA 19333
Direct: (610) 993-3299
Fax: (610) 650-5306
don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com
From: Micheal
(WHEW!) Fortunately, not here...
I say Fortunately because I have just finished installing a few service
packs and maintenance releases to my BES server...
--
Richard D. McClary
Systems Administrator, Information Technology Group
ASPCA®
1717 S. Philo Rd, Ste 36
Urbana, IL 61802
I disagree. You illustrated that Google's links are more relevant. :-P
--
ME2
On Thu, Jun 10, 2010 at 10:01 AM, Rod Trent rodtr...@myitforum.com wrote:
Fixed that for you… J
http://www.bing.com/search?q=ipad+security+breachgo=form=QBLHqs=nsk=
*From:* Micheal Espinola Jr
On Thu, Jun 10, 2010 at 11:30 AM, David Lum david@nwea.org wrote:
So what does Help and Support have to do with it? It tells the OS that
hcp://
is a valid URL? Would that also mean disabling that service mitigates it?
I don't think the HS service per se actually enters into it; just
the
Ya sure do harv ah purdy mouf!
--
ME2
On Thu, Jun 10, 2010 at 5:38 AM, Andy Shook andy.sh...@peak10.com wrote:
ME2 has validated a Shook post. I feel pretty….
Shook
*From:* Micheal Espinola Jr [mailto:michealespin...@gmail.com]
*Sent:* Wednesday, June 09, 2010 6:58 PM
*To:* NT
No doubt. It was pre-destined to be a major target.
--
ME2
On Thu, Jun 10, 2010 at 10:01 AM, Don Guyer don.gu...@prufoxroach.comwrote:
Only a matter of time, no shock there.
Don Guyer
Systems Engineer - Information Services
Prudential, Fox Roach/Trident Group
431 W. Lancaster
iPad or ATT?
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Thursday, June 10, 2010 1:20 PM
To: NT System Admin Issues
Subject: Re: ATT/iPad security breach
No doubt. It was pre-destined to be a major target.
--
ME2
On Thu, Jun 10, 2010 at 10:01 AM, Don Guyer
Yea, I thought this was a website exploit that hit ATT.
From: Rod Trent [mailto:rodtr...@myitforum.com]
Sent: Thursday, June 10, 2010 1:24 PM
To: NT System Admin Issues
Subject: RE: ATT/iPad security breach
iPad or ATT?
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent:
echo. abc.txt
abc.txt now contains a line with one space and a newline.
Tested on Windows 7 only so YMMV.
Carl
-Original Message-
From: Derrenbacker, L. Jonathan [mailto:jderrenbac...@kshgs.com]
Sent: Thursday, June 10, 2010 1:17 PM
To: NT System Admin Issues
Subject: re: Scripting --
-Original Message-
From: Derrenbacker, L. Jonathan
Sent: Thursday, June 10, 2010 1:17 PM
To: 'ntsysadmin@lyris.sunbelt-software.com'
Subject: re: Scripting -- How to Echo Spaces???
Thanks for everyones responses!
I gave a bad example of what I'm trying to do.
I'm trying to echo spaces
Maybe our search was too narrow. We looked at HP, IBM, SCALE and
Equalogic. SCALE would have been my choice based on price/features, but the
guy I work with has LOTS of SAN experience to my NONE, the price diff wasn't
huge, so we went with EQ.
On Mon, Jun 7, 2010 at 12:03 PM, John Aldrich
Yeah.it's ATT's issue, not Apple's.
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Thursday, June 10, 2010 1:24 PM
To: NT System Admin Issues
Subject: RE: ATT/iPad security breach
Yea, I thought this was a website exploit that hit ATT.
From: Rod Trent
Not here, western Oregon.
On Thu, Jun 10, 2010 at 9:20 AM, Rubens Almeida rubensalme...@gmail.comwrote:
Got several users around the world complaining about BB devices not
send/receiving emails.
Anyone else seeing this?
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
Good question, but both really...It appears to be an ATT breach, but as
you know it specifically effects the iPad.
But, I beleive Apple fails here as well for he provider that they chose to
host thier equipment and services with.
--
ME2
On Thu, Jun 10, 2010 at 10:24 AM, Rod Trent
*Easiest Approach*
ECHO ALT-255 C:\Temp\FileName.TXT
{where ALT-255 is the actual character, not that whole text}
-ASB: http://XeeSM.com/AndrewBaker
On Thu, Jun 10, 2010 at 1:22 PM, Derrenbacker, L. Jonathan
jderrenbac...@kshgs.com wrote:
-Original Message-
From: Derrenbacker,
I don't know. I think it's a stretch to say it's Apple's fault - and I'm
not an Apple fan.
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Thursday, June 10, 2010 1:40 PM
To: NT System Admin Issues
Subject: Re: ATT/iPad security breach
Good question, but both really...
By that rationale, everyone that offers a phone for ATT is guilty of a
security lapse. That would be, well, everybody, right?
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Thursday, June 10, 2010 1:40 PM
To: NT System Admin Issues
Subject:
Well, I'm looking at trying to get as much bang for the buck as I can
without having a rip and replace solution when I want to upgrade. IIRC, EQ
has a rip and replace (AKA Forklift Upgrade) solution, which doesn't
make a whole lot of sense. Why would I necessarily need to buy a new head
unit?
Apparently it targeted only IPad's based upon the ICC-IDs of the devices. So
in essence, the target was through ATT focused on IPads, and geared towards
capturing the email information of A-Listers who would be getting the device
sooner than the general public.
Wouldn't be surprised if it
Awesome. Thanks everyone!!!
Jon
On Thu, Jun 10, 2010 at 1:41 PM, Andrew S. Baker asbz...@gmail.com
wrote:
Easiest Approach
ECHO ALT-255 C:\Temp\FileName.TXT
{where ALT-255 is the actual character, not that whole text}
-ASB: http://XeeSM.com/AndrewBaker
~ Finally, powerful endpoint
I have to agree that this is a bad idea on Google's part. I liked
Eric's Brouwer remark about following the competition. Google has
noted for bucking trends and thinking outside the box; this is a
blatant copy-cat move. Bing hasn't been an overwhelmingly phenomenal
success, and I'm pretty
1 - 100 of 182 matches
Mail list logo