Security 10940 Published by Philipp Esselbach 0

Still patching your SQL Server databases? Well, be sure not to miss the post-Slammer sale!

The new W32.Slammer worm, a nuisance for network administrators worldwide, has turned into a marketing boon for companies that sell a wide range of technology products and services.

Read more

Security 10940 Published by Philipp Esselbach 0

As corporate IT departments go about the business of cleaning up their networks, there are strong indications that the SQL Slammer worm that brought down portions of the Internet over the weekend is based on the work of an obscure Chinese cracking group.

Signatures within the worm's source code indicate that a group known as the Honker Union of China-also known as the Hacker Union of China-may be responsible for writing the code, according to security experts who have analyzed the code. However, experts caution that although they are certain of the code's origins, someone else may have actually loosed the worm on the Internet.

Read more

Security 10940 Published by Philipp Esselbach 0

Microsoft's policy of relying on software patches to fix major security flaws was questioned Monday after a series of internal e-mails revealed that the software giant's own network wasn't immune from a worm that struck the Internet last weekend.

Read more

Security 10940 Published by Philipp Esselbach 0

More than 48 hours since it first appeared, the spread of a new worm that targets servers running the Microsoft SQL Server database software had slowed and there had been no repeats of the major disruption caused to the Internet on Saturday.

Read more

Security 10940 Published by Philipp Esselbach 0

Microsoft has released a new security patch for Outlook 2002:

Flaw in how Outlook 2002 handles V1 Exchange Server Security Certificates could lead to Information
Microsoft Outlook 2002 provides the facility to encrypt e-mails sent between e-mail recipients. Encryption is used to prevent parties other than the intended recipients from reading the contents of an e-mail. Outlook uses public key certificates to facilitate the exchange of the cryptographic keys that are used in the encryption process, and Outlook offers a number of different options as to what type of certificates can be used. S/MIME certificates are the most commonly used (and are not affected by the vulnerability that is the subject of this bulletin), but there are other certificate options including V1 Exchange Server Security certificates.

A vulnerability exists because there is a flaw in the way Outlook
2002 handles a V1 Exchange Server Security certificate when using it to encrypt e-mail. As a result of this flaw, Outlook fails to encrypt the mail correctly and the message will be sent in plain text. This could cause the information in the e-mail to be exposed when the user believed it to be protected through encryption.
Read more

Security 10940 Published by Philipp Esselbach 0

Multiplayer game servers that let players attack each other in virtual worlds could be the latest tool for online scofflaws to digitally attack other computers on the Internet, a security firm said Thursday.

Read more

Security 10940 Published by Philipp Esselbach 0

Adrian's Rojak Pot has posted a short note on how to detect and conquer the pesky Optix Pro 10 trojan!

What happened here was that Norton AV wasn't able to block the torjan from editing the registry (Optix Pro successfully blocked the AV at first) But Norton was later able to detect and quarentine the winampw.exe file. This prevented all .exe files from running as there's no more winampw.exe file. Here's how to get control of your PC...
Read more

Security 10940 Published by Philipp Esselbach 0

LESS THAN HALFWAY through the first calendar month of 2003, and already end-users have had to stave off computer threats such as a DHCP multiple buffer overflow vulnerability, the Sobig worm, the Lirva worm, and remnants of the Yaha virus. Blended and longer lifespan malicious code attacks are expected to run rampant in the new year, but they are far from the only dangers angling to make life miserable for security administrators.

Read more

Security 10940 Published by Philipp Esselbach 0

Rnav2003.exe is a utility that manually uninstalls the program files and registry entries that are installed by NAV 5.0/2000/2001/2002/2003. It does not remove the files or registry keys for the virus definitions, subscription information, entries in the Task Scheduler, or other shared files. The utility should be used only when you cannot uninstall through the Add/Remove Programs applet. Uninstalling NAV through Windows does a more thorough job of removing the program.

Read more