If you do that.. you will no longer be able to access windowsupdate.microsoft.com to download updates.
Jeremy Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may NOT copy, forward, CC, BCC or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you do not consent to Internet email for messages of this kind. Opinions, conclusions and other information in this message do not relate to the anyone other than the sender. ----- Original Message ----- From: "Jeremy Shelley" <[EMAIL PROTECTED]> To: "Premek Marek" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Thursday, March 07, 2002 12:00 PM Subject: RE: scary site Disable Active Scripting and this web page no longer works. Much thanks to my associate Kevin Ladd for assisting me on this one. Jeremy Shelley MCSE, MCT, MCIWA, CIWCI, CCNA, A+, Net+, I-Net+ ------------------------------------------------------------------------ ----------------------------- Technical Trainer New Horizons of Raleigh/Durham/Chapel Hill ------------------------------------------------------------------------ ----------------------------- -----Original Message----- From: Premek Marek [mailto:[EMAIL PROTECTED]] Sent: Wednesday, March 06, 2002 1:15 PM To: leon Cc: [EMAIL PROTECTED] Subject: Re: scary site > http://www.liquidwd.freeserve.co.uk/ > Try it with a windows machine and IE with all patches. > Be afraid be very afraid. > FYI this is for all those people who are think that just having a > firewall is enough. Guess what? > This works through packet filter, stateful inspection and proxy > servers. Guess what? nothing happened to me. IE 5.0, win 2000, no patches, all settings set to default. (had to reboot from linux to test it :)) MSIE says page loaded with errors .. C:/windows/system32/cmd.exe exists and is accessible. And why would you think that some packet filters and stateful inspection could stop it? Here you'd need content filter on some very high level to guess what this script could be doing. -- Premek Marek Unix systems administrator, Hosting CZ s.r.o. mailto:[EMAIL PROTECTED] tel: +420-602-386703
