Friday, December 10, 2004

Most Browsers Buggy

Most Browsers Buggy:
A European security vendor warned Wednesday that most browsers sport a bug that hackers can exploit to spoof a Web site and trick users into trusting bogus pop-up windows.

The vulnerability, which Danish security firm Secunia rated as "moderately critical" is similar to previous bugs in browsers that was disclosed in July and September of 2004. Attackers could use it to add content into a trusted Web site's window by, for instance, inserting a fake form in a pop-up window seemingly opened by that site.

Affected browsers, said Secunia, include the popular Internet Explorer and the up-and-coming Firefox, as well as third-tier alternatives like Mozilla, Opera, Apple's Safari, and the open-source Konqueror.

IE 5.01, 5.5, and 6.x are vulnerable, claimed Secunia, and the "vulnerability has been confirmed on a fully patched system with Microsoft Windows XP SP1/SP2."

Secunia has posted a test that users can run to determine if their browser's got the bug”

http://www.crn.com/sections/breakingnews/dailyarchives.jhtml?articleId=55300447

Laptop Use Can Damage Male Fertility

Laptop Use Can Damage Male Fertility

http://www.eweek.com/article2/0,1759,1738419,00.asp?kc=ewnws121004dtx1k0000599

Microsoft Security Bulletin Advance Notification

Microsoft Security Bulletin Advance Notification:

“On December 14, 2004 the Microsoft Security Response Center is planning to release:

5 Microsoft Security Bulletins affecting Microsoft Windows

The greatest maximum severity rating for these security updates is Important

Some of these security updates may require a restart

No additional details about bulletin severities or vulnerabilities will be made available until December 14 , 2004.”


http://www.microsoft.com/technet/security/bulletin/advance.mspx

Thursday, December 09, 2004

Using the Windows Firewall INF File in Microsoft Windows XP Service Pack 2

Using the Windows Firewall INF File in Microsoft Windows XP Service Pack 2:
“Microsoft Windows XP Service Pack 2 (SP2) includes the Windows Firewall, a replacement for the Internet Connection Firewall component in previous versions of Windows XP. Windows Firewall is a stateful host firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. Network administrators can use the Windows Firewall INF file (Netfw.inf) to modify default settings either before installation or after installation. This article describes the usage of the Windows Firewall INF file.”

System Requirements

  • Supported Operating Systems: Windows XP

Microsoft Word

File Name:

WFINF_Guide.doc

Download Size:

109 KB

Date Published:

11/16/2004

Version:

1.4


http://www.microsoft.com/downloads/details.aspx?familyid=cb307a1d-2f97-4e63-a581-bf25685b4c43&displaylang=en

Wednesday, December 08, 2004

The Hidden Risks of Demo Discs

The Hidden Risks of Demo Discs :
“In mid-November, members of Sony's PlayStation Underground received the Holiday Demo Disc and discovered that after executing one of the game demos on the disc, their PS2 memory cards were completely erased. While that doesn't mean much to nongamers, for anyone who has spent 40-plus hours building a character in a role-playing game or playing through a season of football—well, it's a huge boot in the trousers.

The sampler disc was sent via mail to members of the PlayStation Underground, an opt-in promotional group that Sony calls a ‘personal link to all the insider info from the PlayStation world.’”

There's more to the story than a handful of gamers losing their saved game files. The implications of such a glitch can be huge, especially as consumers start to set up networked computing systems in their homes, complete with routers, networks and servers. Minus cubicles and a water cooler, it's the equivalent of a small enterprise network.

Rick Fleming, chief technology officer at Digital Defense Inc., said that although most consumers don't realize it, game consoles are computers that run off their own proprietary operating systems. As a result, a bug in a demo CD, CD-ROM or DVD-ROM could affect the rest of a home network and spread to an enterprise network through a VPN connection or portable storage devices.

"PlayStation and Xbox are being networked with home computers … so I can easily see how something like that would spread across a network," Fleming said. "Every time you connect to something else, there's another opportunity for something to go wrong."


http://www.eweek.com/article2/0,1759,1735609,00.asp?rsDis=The_Hidden_Risks_of_Demo_Discs-Page001-140370

Java stir puts Sun in a spot

Java stir puts Sun in a spot:

“A flaw in Sun Microsystems' Java software has highlighted the difficulty the company faces as flocks of tech novices start to turn to it for support.

Sun disclosed a serious security flaw in its Java virtual machine (JVM) software last month. The rare problem, which affects Sun's plug-in for running Java on a variety of Web browsers and operating systems, could allow a virus to spread through PCs running both Microsoft Windows and Linux.

A flaw-free version of the JVM software is available on Sun's Web site, and the company is encouraging people to swap it out. But some users of the Firefox Web browser who attempted to download the new software received a version that contained the vulnerability, Sun representatives told CNET News.com.

On Tuesday, Sun was in the process of updating the download pages on Java.com and its download site to fix that problem, having previously said it would make the change on Dec. 13.

Sun said the mix-up in support arose because it had not had a chance to update the download features for Firefox. It also said that it first concentrated on developing a patch for the more pervasive browsers--Microsoft's Internet Explorer, Netscape and Mozilla.…”


http://news.zdnet.com/2100-9593_22-5482023.html

Monday, December 06, 2004

Colly's CSS rollover generator

Colly's CSS rollover generator:
“By removing the advanced fields, you can simply create a standard "sliding doors" rollover, or use the extra fields to create an advanced rollover with background and text elements. The CSS produced is lean and clean”

http://www.collylogic.com/index.php?/weblog/comments/
collys_advanced_css_rollover_generator/

The Ten Commandments of Keyword Selection

The Ten Commandments of Keyword Selection :
“Is your website getting a lot of traffic, but not a lot of sales? Maybe you need to take a look at the keywords you're using. Praveen Viswanath walks you through keyword selection process, and sums it up with ten keyword selection commandments to help keep you on track.

A term or a phrase used by a searcher to find information on a particular topic is called a "keyword." "Keyword selection" is the process of scrutinizing different prospective keywords to select the right ones for your campaign. It is the stepping stone to your success in the Web world. Find the right keyword, and you strike gold. Make a mistake, and you've just punched yourself in the face.

There are two categories of people interested in keyword selection: those trying to get more website traffic in general, and those trying to get more ‘qualified’ traffic. This article is for the latter type. What is the use, if you have some 10,000 hits a day but the business conversion is just 0.1%? Wouldn't it be better to have only 1000 visitors with a 30% conversion rate? After all, 300 is better than 10. From here on, whatever we do, our final aim shall be to get more "qualified" traffic.”



The Ten Commandments
http://www.seochat.com/c/a/Choosing-Keywords-Help/The-Ten-Commandments-of-Keyword-Selection/3/

http://www.seochat.com/c/a/Choosing-Keywords-Help/The-Ten-Commandments-of-Keyword-Selection/