Saturday, September 18, 2004

How to Handle Copyright Infringement Found by the Search Engines

How to Handle Copyright Infringement Found by the Search Engines:
"
  1. Take screen captures of the pages
  2. Download Google/Yahoo/SE cache as proof (if available)
  3. Document whois information and figure out who the ISP is
  4. Call or Email the number (if any) listed on the contact us page
  5. If no response in a few days, send an email to the ISP with the subject Digital Millennium Copyright Act Copyright Infringement with the proof listed above. I ask them to take down the pages that were stolen, providing the file names and paths.
  6. Send email/fax to the search engines
    - Google's DMCA
    - Yahoo's Copyright Infringement & Yahoo's Page Deletion Process
    - Ask Jeeves TOS, scroll down and you will see 'Copyrights and Copyright Agent' section with a form."

http://www.seroundtable.com/archives/000826.html

Serious Kerberos flaws affect Cisco and Mac, but not Windows

Serious Kerberos flaws affect Cisco and Mac, but not Windows:
"MIT's Kerberos authentication utility has been found to have some serious vulnerabilities. Windows is not affected, but other widely used products from Cisco and Apple are definitely vulnerable, as are many third-party applications that rely on Kerberos 5."

http://techrepublic.com.com/5100-6264-5366280.html

Friday, September 17, 2004

Don't get phished again: Check trustwatch.com | Tech News on ZDNet

Don't get phished again: Check trustwatch.com | Tech News on ZDNet:
"Noting that businesses lost close to $50 billion in 2003 as a result of covering the costs of identity theft, GeoTrust on Monday made available a free domain-verification service that consumers can use to check the security and trustworthiness of Web sites.

Before providing a credit card number, personal identification information or other confidential data to a Web site, a consumer can use the TrustWatch service to check that the site has been verified by a trusted third party and is using appropriate safeguarding measures.

Typing a Web site address or domain name into a search box on the TrustWatch site will return a confidence rating based on GeoTrust's data about that site. "


http://news.zdnet.com/2110-3513_22-5367650.html

Thursday, September 16, 2004

Add clickable icons to your links

Add clickable icons to your links:
"When you're working with CSS, sometimes the obvious technique doesn't produce the effect you might expect or desire. Fortunately, there's a good chance that you can achieve the effect you want if you're willing to look beyond the obvious and try other methods. "

http://builder.com.com/5100-6371_14-5354381.html?tag=e601

Major graphics flaw threatens non XP SP2 Windows PCs | Tech News on ZDNet

Major graphics flaw threatens non XP SP2 Windows PCs | Tech News on ZDNet:
"The critical flaw has to do with how Microsoft's operating systems and other software process the widely used JPEG image format and could let attackers create an image file that would run a malicious program on a victim's computer as soon as the file is viewed. Because the software giant's Internet Explorer browser is vulnerable, Windows users could fall prey to an attack just by visiting a Web site that has affected images.…"

"The potential is very high for an attack," said Craig Schmugar, virus research manager for security software company McAfee. "But that said, we haven't seen any proof-of-concept code yet." Such code illustrates how to abuse flaws and generally appears soon after a software maker publishes a patch for one of its products.

The flaw affects various versions of at least a dozen Microsoft software applications and operating systems, including Windows XP, Windows Server 2003, Office XP, Office 2003, Internet Explorer 6 Service Pack 1, Project, Visio, Picture It and Digital Image Pro. The software giant has a full list of affected applications in the advisory on its Web site. Windows XP Service Pack 2, which is still being distributed to many customers' computers, is not vulnerable to the flaw.…

http://news.zdnet.com/2100-1009_22-5366314.html

Windows XP Security Guide Overview

Windows XP Security Guide Overview:
"The Windows® XP Security Guide v2.0 describes the features and recommended settings for Microsoft Windows XP Service Pack 2 (SP2). The Guide includes thoroughly tested templates for security settings for Windows Firewall, which replaces Internet Connection Firewall (ICF). Information is provided about closing ports, Remote Procedure Call (RPC) communications, memory protection, e-mail handling, Web download controls, spyware controls, and much more."

In addition to describing the features and recommended settings for Windows XP
SP2, this guide includes thoroughly tested templates for security settings for
Windows Firewall, which replaces Internet Connection Firewall.

http://www.microsoft.com/technet/security/prodtech/winclnt/secwinxp/default.mspx

The Great Debates: Pass Phrases vs. Passwords. Part 1 of 3

The Great Debates: Pass Phrases vs. Passwords. Part 1 of 3:
"Information security fosters some interesting debates. The issues range in importance, but they all demonstrate that the field is still growing and exciting. I would like to summarize some of these debates, and offer my own partial entries. For the first set of these articles, I will enter the passwords fray and address the issue of pass phrases versus passwords."

OK, maybe “pass phrases versus passwords” is really “the other great debate” or the “kind of boring and few people care” debate. In any case, which is more secure, pass phrases or passwords? The answer is not as clear-cut as it may seem.…

http://www.microsoft.com/technet/security/secnews/articles/itproviewpoint091004.mspx

Download details: Visual Basic and C# Code Samples

Download details: Visual Basic and C# Code Samples:
"This download includes a master set of Visual Basic and Visual C# code samples demonstrating various aspects of the language in the following areas: syntax, data access, Windows Forms, Web development and Web services, XML, security, the .NET Framework, file system and file I/O, interop and migration issues, COM , ADO.NET, and advanced topics including graphics with GDI , remoting, serialization, MSMQ, and Windows services."

Download Size: 6578 KB - 13400 KB
Date Published: 3/11/2004
Version: 7.1

CSharp.msi 6578KB
http://download.microsoft.com/download/6/4/7/6474467e-b2b7-40ea-a478-1d3296e78adf/CSharp.msi
VisualBasic.msi 6822KB
http://download.microsoft.com/download/6/4/7/6474467e-b2b7-40ea-a478-1d3296e78adf/VisualBasic.msi


http://www.microsoft.com/downloads/details.aspx?FamilyId=08E3D5F8-033D-420B-A3B1-3074505C03F3&displaylang=en

Wednesday, September 15, 2004

Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2

Download details: Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2:
"Windows XP Service Pack 2 (SP2) includes the Windows Firewall, a replacement for the Internet Connection Firewall (ICF) in previous versions of Windows XP. Windows Firewall is a stateful host-based firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. This new behavior can impair some types of communications. This article describes how to deploy the appropriate configuration settings for Windows Firewall on an organization network so that it is enabled and providing protection, and so that communications are not impaired."

File Name:

WF_XPSP2.doc

Download Size:

942 KB

Date Published:

8/12/2004

Version:

2.4


Manually Configuring Windows Firewall in Windows XP Service Pack 2
http://go.microsoft.com/?linkid=664515

http://www.microsoft.com/downloads/details.aspx?FamilyID=4454e0e1-61fa-447a-bdcd-499f73a637d1&displaylang=en