.:HSTuners::::Hondas Wanted:: |
01-06-2002, 05:24 PM | #1 |
Repost Wagon
Join Date: Dec 2001
Location: over here
Age: 44
Posts: 17,266
|
Attention Windows 98, Me and XP users
__________________
|
01-06-2002, 05:50 PM | #2 |
Project Combat Honda
Join Date: Sep 2001
Location: Highland,OH
Age: 45
Posts: 7,985
|
Thanks for the heads up..
__________________
Racing Rice |
01-06-2002, 06:07 PM | #3 |
THE GENERAL
Join Date: Aug 2001
Location: Earth (usually)
Age: 42
Posts: 5,698
|
Cool..
Is there any stuff like that for win2k users?
__________________
HondaStyle.com Babysitter's Club Member #0 Soon to be >Dr Max Immuh< |
01-07-2002, 12:30 AM | #4 |
Repost Wagon
Join Date: Dec 2001
Location: over here
Age: 44
Posts: 17,266
|
nope. never heard of anything like that for 2k
__________________
|
01-07-2002, 12:43 AM | #5 |
It has 4 Doors...
Join Date: Nov 2001
Location: Fredericksburg,Va
Age: 49
Posts: 907
|
WOW thanks for the link and heads up for sure...appreciate it.
I'll be sure to pass that on to some friends that use it.... |
01-07-2002, 02:52 AM | #6 |
Insomniac Moderator
Join Date: Aug 2001
Location: OR
Age: 43
Posts: 11,142
|
Thanks for the heads up. Damn windows... :P
__________________
1994 Accord EX coupe --Need hosting for your pics on HST? PM me...-- |
01-07-2002, 12:20 PM | #7 |
Project Combat Honda
Join Date: Sep 2001
Location: Highland,OH
Age: 45
Posts: 7,985
|
Yeah really.. Microsoft's security sucks... Glad we use Novell!
__________________
Racing Rice |
01-09-2002, 01:14 PM | #8 | |
Zoom-Zoom
Join Date: Sep 2001
Location: Ohio
Posts: 3,924
|
Yeah that UPNP one has been around for a while.
Security Alert, December 21, 2001 * MULTIPLE VULNERABILITIES IN MICROSOFT UNIVERSAL PLUG AND PLAY SERVICE Multiple vulnerabilities exist in Microsoft's implementation of Universal Plug and Play (UPnP). The first vulnerability is a remotely exploitable buffer overflow that can result in system-level access to the vulnerable host. This vulnerability results from an unchecked buffer in one of the service's components that handles notify directives. By sending malformed UPnP notify directives generated at various intervals, an attacker can cause access violations on the vulnerable system, which results in pointers being overwritten. Because the UPnP service runs with SYSTEM privileges, a hacker can gain complete control of the system remotely. The second vulnerability involves a variant of this first vulnerability in that the UPnP service doesn't take sufficient steps to limit how far the service goes to obtain information about a discovered service. Two Denial of Service (DoS) scenarios exist for exploiting this vulnerability. The first is that a potential attacker could send a notify directive to a vulnerable host and loop the request. This loop would eventually consume all system resources on the vulnerable system. The second scenario involves specifying a third system in the notify directive for the vulnerable system(s) to respond to. As the UPnP service responds to both multicast and broadcast UDP requests, the potential for Distributed Denial of Service (DDoS) attacks exist. Microsoft has released a bulletin and patch to remedy this vulnerability. Please visit the URL below for links to the bulletin and patch. http://www.secadministrator.com/arti...rticleid=23594
__________________
Quote:
|
|
Thread Tools | |
Display Modes | |
|
|