|
|
User Controls
|
New User
|
Login
|
Edit/View My Profile
|
|
|
|
ActiveMac
|
Articles
|
Forums
|
Links
|
News
|
News Search
|
Reviews
|
|
|
|
News Centers
|
Windows/Microsoft
|
DVD
|
ActiveHardware
|
Xbox
|
MaINTosh
|
News Search
|
|
|
|
ANet Chats
|
The Lobby
|
Special Events Room
|
Developer's Lounge
|
XBox Chat
|
|
|
|
FAQ's
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
DirectX
|
DVD's
|
|
|
|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 4
|
Internet Explorer 5
|
Windows NT Tips
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|
|
|
|
Latest Reviews
|
Applications
|
Microsoft Windows XP Professional
|
Norton SystemWorks 2002
|
|
Hardware
|
Intel Personal Audio Player
3000
|
Microsoft Wireless IntelliMouse
Explorer
|
|
|
|
Site News/Info
|
About This Site
|
Affiliates
|
ANet Forums
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
Member Pages
|
Site Search
|
Awards
|
|
|
|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
|
|
|
|
|
Time:
11:53 EST/16:53 GMT | News Source:
CNET |
Posted By: Robert Stein |
The latest mass-mailing worm, Atak, hides by going to sleep when it suspects that antivirus software is trying to detect it.
Atak was first discovered Monday. Although antivirus companies do not expect it to cause much damage, they say it will be a nuisance because it can generate a large amount of spam.
Graham Cluley, senior technology consultant for antivirus company Sophos, said authors of malicious software generally try to make the job of antivirus researchers as difficult as possible by adding confusing code and using evasion techniques.
|
|
#1 By
7797 (63.76.44.16)
at
7/13/2004 12:25:04 PM
|
"Secunia is reporting on 4 new vulnerabilities in IE that allow for arbitrary code execution and placing content over other windows."
http://secunia.com/advisories/12048/
"What's sad is that Internet Explorer 6 was released about two and a half years ago, has had [virtually] no new features added, and they still haven't finished fixing it."
This post was edited by tgnb on Tuesday, July 13, 2004 at 12:26.
|
#2 By
2960 (156.80.64.137)
at
7/13/2004 1:38:59 PM
|
"In the jungle, the mighty jungle, the wormy sleeps tonight...."
:)
TL
|
#3 By
2960 (156.80.64.137)
at
7/13/2004 4:10:42 PM
|
Hehe :)
TL
|
#4 By
11888 (64.230.11.168)
at
7/13/2004 6:24:01 PM
|
#6 By Parkker (548 Posts) at 7/13/2004 4:28:24 PM (Score:5, Funny)
This post was edited by MrRoper on Tuesday, July 13, 2004 at 18:25.
|
#5 By
2332 (65.221.182.2)
at
7/14/2004 1:32:52 AM
|
#6 - Don't you see that your argument is falling apart around you? When confronted with the fact that IE is obviously riddled with holes you side step it and point to completely unrelated open source projects.
The fact of the matter is that even if you assume that a browser like Firefox has just as many holes as IE (an assumption that, at least at this point, would be unwarrented), it would STILL be FAR safer to use Firefox because it lacks the targeted nature of IE.
95% of people use IE, so malware writers target IE. It only makes sense.
IE is easily the single best attack vector into a user's computer right now. Stop using it and you've dramatically decreased your attack surface. Simple as that.
And, please, remind yourselves that this is RMD talking. The same RMD that has tirelessly defended Microsoft from every irrational, MS bashing, Linux loving, OSS zealot on this site.
I'm still a big fan of Microsoft, but I know a pile of crap when I see it...
This post was edited by RMD on Wednesday, July 14, 2004 at 01:34.
|
#6 By
2960 (156.80.64.137)
at
7/14/2004 8:50:54 AM
|
#9,
You ARE absolutely kidding us, right?
You can't even come CLOSE to comparing the update/security issue patch history of IE with Mozilla/Firefox.
Man, give us a break!
TL
|
#7 By
20418 (64.228.39.174)
at
7/14/2004 9:12:33 AM
|
#10
Parkker: "Just in case I wasn't clear, here is a bug that affects IE that also affects every other browser on the planet."
Not true.
http://secunia.com/advisories/11978/
Solution:
Do not browse untrusted sites while browsing trusted sites.
The following browsers are not affected:
* Mozilla Firefox 0.9 and later
* Mozilla 1.7
* Opera 7.52
Changelog:
2004-07-02: Updated solution.
2004-07-07: Opera Software issues updated version (7.52), which fixes the vulnerability
|
#8 By
2960 (156.80.64.137)
at
7/14/2004 9:15:59 AM
|
BTW #9...
There have been 20 versions of IE. This does not include the patches and service packs inbetween...
|
#9 By
2332 (65.221.182.2)
at
7/14/2004 9:43:42 AM
|
Guys, just give it up. Parker is delusional.
He will continue to ignore sound logic and rational thought in favor of trying to prop up his discredited argument. I really don't think it matters what we say at this point.
Ironcially, I'm reading "How We Know What Isn't So - The Falibility of Human Reason in Everyday Life". Perhaps it will explain why Parker is so irrational.
|
#10 By
11888 (64.230.11.168)
at
7/14/2004 4:56:00 PM
|
When do we get to vote Parkker off the island?
|
#11 By
20418 (64.228.39.151)
at
7/14/2004 10:12:16 PM
|
#17
Parkker: #14 Yes. They fixed the bug. But it was in the code until then.
Sorry, my mistake. I was not sure what time frame you were referring to.
By the way, just to be fair, Opera 7.52 (the lastest release) has a serious bug whereby Opera "ignores" the user's request to cancel a download. The download will continue in the background even though Opera will tell you that it has been cancelled. The only way to stop it is by closing Opera down.
Not sure how this one got by Opera's developers.
|
#12 By
2332 (65.221.182.2)
at
7/15/2004 1:07:19 AM
|
Surprise, surprise... Parker YET AGAIN misses the point.
SWITCHING TO FIREFOX RIGHT NOW WILL MAKE YOU SAFER.
Period.
Will it always be safer? That remains to be seen, but that is also besides the point. IE is unsafe RIGHT NOW.
|
#13 By
7797 (63.76.44.66)
at
7/15/2004 4:07:24 PM
|
"Apache 2.0.x is a piece of insecure junk averaging 1 security hole a month. Which really affects downtime. All that regression testing, updating the webfarm to keep the Denial of Service attack from succeeding."
Your lack of knowlege about what youre talking about shines through once again. There is virtually NO downtime required when upgrading apache. An updated version of apache can be installed while the older version is still runnning. The new version of apache can even be tested on a seperate port of the same machine if one so desires. Once the new version is installed a simplre restart of the service suffices. Then the old version can be safely removed. No reboot, and the downtime is limited to the time it takes to restart the service which is a couple seconds of most.
|
|
|
|
|