![](http://content.invisioncic.com/d154966/set_resources_6/84c1e40ea0e759e3f1505eb1788ddf3c_pattern.png)
Humpty
-
Posts
2,107 -
Joined
-
Last visited
Posts posted by Humpty
-
-
Description:
Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.
Successful exploitation allows execution of arbitrary code.
The vulnerability is confirmed in version 2.3 build 2825. Other versions may also be affected.
Solution:
The vulnerability is fixed in upcoming version 2.3 build 2912.
Provided and/or discovered by:
Dyon Balding, Secunia Research.
-
-
You've probably checked that it's allowed through your firewall.
Is there a portable opera version around that you could try?
-
Haven't seen that error here either Dennis.
-
Are you able to right click on the install exe within the cd and select "Run Sandboxed" from the context menu?
-
Good one Tunerz.
Will be emailing that to everyone.
-
INSTALLING A HUSBAND
Dear CCleaner Tech support,
Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed a distinct slow-down in overall system performance, particularly in the flower and jewelry applications, which operated flawlessly under Boyfriend 5.0.
In addition, Husband 1.0 uninstalled many other valuable programs, such as Romance 9.5 and Personal Attention 6.5 and then installed undesirable programs such as NBA 5.0, NFL 3.0 and Golf Clubs 4.1.
Conversation 8.0 no longer runs, and Housecleaning 2.6 simply crashes the system. I've tried running Nagging 5.3 to fix these problems, but to no avail.
What can I do?
Signed, Desperate.
Humpty:
Dear Desperate, way too hard for me to sort as I always thought this was normal.
-
Look at the picture now get up and walk back a few steps while looking at it.
Weird huh?
-
Um, err Chris, it's linking to East-Tec Backup 2007.
Can this app create images of the operating system?
-
-
I have been trying to access that site and see the permalink you are referring to but I can't seem to get in there for the last hour or so.
Hmm, your right Anthony, can't get to it either atm.
-
Well here is an example of what I was asking to do. Hazlenut posted a link to an article about antivirus software and the link opens the page right where the article starts. How did she do that? Here is the thread she started and the link is in her post.
The little red triangle next to to article title is a permalink that gives a direct link to the article.
-
SSC Ultimate Aero
Base manufacturer's suggested retail price: $654,400
Top Speed: 257 mph
Acceleration: 0-60 in 2.78 seconds
Horsepower: 1,183
Country of Origin: U.S.
-
Some quite ancient software downloadable at the link below.
Probably useless to most but may bring back fond memories to any dinosaurs lurking here such as myself.
Example:MS DOS 6.22 (53250)
Windows 3.1 (38212)
MS DOS 6.22 ru (29975)
OS/2 Warp 4 (28904)
Windows for Workgroups 3.11 (25117)
-
LOL, what a laugh.
Funny thing is I seem to agree with those assumptions as I haven't used an AV/AS for quite a while on my own machines.
-
Haven't used PS in a fair while now so can't really comment on the newer edition you are using.
You could have a look at the link below for Hal.dll probs, towards the bottom of the page entitled
"Shaun Gray (3/2005) states:
Let me review my experience / problem with hal.DLL with you all:"
-
This moon of Saturn is turning up some amazing stuff.
-
Security experts have warned that new developments in malware are allowing criminals to stay one step ahead of security software.
Marc Henauer, head of the cyber-crime division at the Swiss Justice and Police Department, said in an interview last week that viruses and other malware now have the capability to change their signature every few hours.
This means that the attackers are often one step ahead of protection software.
Geoff Sweeney, chief technology officer at Tier-3, a behavioural analysis IT security firm, echoed the remarks.
"Self-changing code designed to dynamically evade recognition is a fact of life," he said. "It automatically adapts to the anti-spam and anti-malware engines that it encounters."
-
Downloaded utorrent and went through the preferences but couldn't seem to hide the tray icon without actually shutting it down.
If the tray icon isn't showing it still shows in the takbar as minimized.
-
Can you right click the tray icon and hide it if it has that feature?
-
The scams rely on a technique known as social engineering to trick computer users into divulging personal information that the cybercriminals or their customers can use to bilk unwary taxpayers.
The new phishing scams use spam e-mails to gull prospective refund recipients into providing their bank account information and other personally identifiable data via a fraudulent form that is attached to the original message by a hyperlink.
The bureau?s fraud notice also echoes IRS? own anti-phishing warnings and actions against IRS spoof sites. The IRS recently stated that the number of bogus IRS sites has increased twelvefold this year over last year.
-
You could try another optical drive or run a cd lens cleaner through the one you are using now.
-
Blimey!
Zango?s high-profile lawsuit against anti-spyware company Kaspersky Lab is ?akin to a cat burglar suing the alarm company,? Kaspersky?s law firm argued to a federal appellate court.In papers filed this week with the 9th Circuit, Kaspersky said that Zango has no grounds to sue the security company for removing Zango?s software, which serves pop-up ads. ?Allowing Zango?s suit will have a chilling effect on the Internet security industry and, ultimately, on use of the Internet,? Kaspersky argues.
Calling security software vendors ?the sentinels of the Internet,? Kaspersky argued that forcing such companies ?to allow malware to pass through a computer?s ?gates? unchallenged will compromise computer security and, ultimately, the free flow of information over the Internet.?
-
Ethical or not?
There has been a fair amount of controversy as of late surrounding The Race to Zero contest to be unofficially held at DEFCON 16 this coming August. To briefly summarize, contestants are to be given samples of computer viruses/malware and access to a contest portal. The portal will take malware samples submitted by the contestants and run them through a collection of anti-virus engines, checking to see if the samples are detected. The contestants will make modifications to the malware samples in attempts to slip modified samples past the AV engines undetected. In keeping with the mischievous hacker zeitgeist of DEFCON, awards will be given for the ?Most Elegant Obfuscation,? ?Dirtiest Hack of an Obfuscation,? ?Comedy Value? and ?Most Deserving of Beer.?AV vendors were predictably upset by the prospect of this exercise. Most objections seemed to boil down to two main assertions:
1. The contest involves the creation of new strains of malware, which can serve no constructive purpose.
2. The contest will only serve to help the bad guys learn new techniques in their arms race with AV vendors.
Contest organizers have stated their goal is simply to demonstrate the limitations of AV software, information that AV customers deserve to have. Their position is that the contest explores legitimate areas of security research and that investigation of AV bypass techniques is a worthwhile goal. Organizers have also pointed out that new malware is being created 24?7x365 in the wild, while at the contest?s conclusion any new malware samples created will be securely deleted from the contest systems.
I'm really freaked out now...
in Windows Security
Posted
What happened after the warning and what app were you using at the time?