Jump to content

Robert

User Admin
  • Posts

    12,747
  • Joined

  • Last visited

  • Days Won

    282

Everything posted by Robert

  1. This trojan can download a ddos remote-controlled bot, which is controlled via a secret IRC channel, and instructed to conduct a denial of service attack on a selected victim. Since SP2 firewall only blocks incoming ports, outgoing attacks can continue unimpeded.
  2. Mozilla and Firefox flaws exposed Mozilla and Firefox users were warned of a number of potentially troublesome security vulnerabilities this week. The most serious flaw involves a buffer overflow bug in the way Mozilla processes the NNTP (news) protocol. The bug creates a means for hackers inject hostile code into vulnerable systems, providing they trick users into executing maliciously constructed news server links. All versions of Mozilla prior to 1.7.5 are affected. Firefox users are advised to make sure they are running version 1.0 to minimise any risk. The flaw was discovered by Maurycy Prodeus of Polish firm iSEC Security Research. Next up, Secunia has discovered a flaw that creates a means to spoof the source displayed in the Firefox's download dialog box. The vulnerability has been confirmed in Mozilla 1.7.3 for Linux, Mozilla 1.7.5 for Windows, and Mozilla Firefox 1.0. Other versions may also be affected, Secunia warns. It advises Firefox users to avoid download links from untrusted sources pending the availability of patches from the Mozilla project. Finally, there's a less serious problem affecting Firefox and its email client Thunderbird. Security researchers have found that temporary files are stored by the popular packages in a format that makes it possible for snoops to read the content of downloads and attachments of other users on the same machine. An overview of these flaws and suggested workarounds can be found here
  3. Just when you thought microsoft had fixed the security problems... A new Trojan horse - named Phel - that punishes users of Microsoft Windows XP operating system is in the wild. Security software firm Symantec has issued a bulletin warning Windows XP users to be on the look out for the program, which is distributed as an.html file. The malicious code can attack systems running XP Service Pack 2. The vuln was first found in October, and Microsoft is busy trying to catch up to it. "Microsoft is taking this vulnerability very seriously, and an update to correct the vulnerability is currently in development," the company told ComputerWorld. "We will release the security update when the development and testing process is complete, and the update is found to effectively correct the vulnerability." Symantec warns that users will see two Internet Explorer windows pop up when an.html file with Trojan.Phel.A is opened. If the code does its worst, the Trojan will automatically be executed every time a Windows user turns on his machine More information from Symantec is available here
  4. I didn't notice the link.... you have a nice site there And a forum. Excellent.
  5. Will the BIOS be able to handle these new drives?
  6. Here are some screenshots of exeem... http://www.neowin.net/forum/index.php?showtopic=265728 Statement of adware in exeem... http://www.nikush.com/forum/viewtopic.php?t=85 I know you guys are really sensitive about links, so if it's against the rules, remove them. (the links)
  7. Imagine trying to backup that lot. How long to format?
  8. Much off-topic stuff here... anyway welcome to anyone who joined recently.
  9. That is some site GameCop, I just hours reading their stuff. Heaps of useful stuff for wannabe webmasters.
  10. I have that virus scanner. I find it effective against adware and exe files that websites try to stick in your computer. You probably found that when you try to empty the Quarantine folder, that the virus scanner stepped in and prevented it. There are two ways to do it 1. Hold down shift while deleting it. This will delete it instead of going to the recycle bin. OR 2. Do it in safe mode
  11. More: start reading from post 2 EDIT by GryphonKlaw: I'm sure you had good intentions by posting that link but unfortunately they have ROMs there. You can get a glimpse of the drama here: http://www.mame.net/cgi-bin/wwwthreads/sho...&sb=#Post163601
  12. The roms have some encrypted instructions. The original game's CPU decrypted them on the fly. The emulator cannot do that yet, so some kind person has created a XOR "rom" to do the conversion of encrypted to clear codes.
  13. Keep up the good work GC and may the stress levels be Less than last year.
  14. I've tested version 1d, and it Passed All Tests. :yay:
  15. Those cards are called Punch Cards. Each could hold 24x80 characters, which is why a dos screen is that size. They were gone when I started. There are some funny stories about them, such as someone dropping a pile of them and spending hours getting them back in order. Also it was bad if they got wet. At my very first job, they had a teletype machine. They have become extinct now. It was basically a printer with a keyboard, connected to the phone network. You would type up something, and it would be stored on paper tape. Then you would feed the tape back in, enter the destination code, and the text would be printed at another machine somewhere in the world. No electronics, all mechanical.
  16. I can't download anything off that site it says I don't have permission. any advice people?
  17. Thanks man, but that's not precisely correct. I've actually done a few different jobs at that company. I actually started off as a train driver, before moving to IT in 1986. Back then we had these enormous main frames that took up more space than your entire house. The mainframe was slow and crashed at least once a day. I've seen the progression to LANs, Networks, PC's, and servers. So I've been in IT a long time. However the corporate world lags behind the home user in terms of faster pcs, and newer software. Also things like forums, chats, torrents, IRC, cracks, etc are unknown. These are things I'm trying to learn about.
  18. Well that was different. I learned many things in just 25 minutes. KryphonClaw, your microphone sounds excellent. James sounds like he's using a power mike. I think the microphone gain should be turned down a bit. And James makes things... excellent. I'll have to get a copy of it.
  19. Megabyte said to put dumps in. I'll remove it now. I didn't know.
  20. You need to get a job. I've got a job - in fact I've worked for the same company for 27 years, currently I do Desktop Support, that is, to make peoples computers work.
×
×
  • Create New...