To: ShadowAce
To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
3 posted on
01/03/2006 10:19:45 AM PST by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: Ernest_at_the_Beach
I notice that any machine using an AMD64 CPU is not vulnerable to this or to any similar exploit. This is probably true of Intel 64 bit enabled chips also.
6 posted on
01/03/2006 10:52:15 AM PST by
js1138
(Great is the power of steady misrepresentation.)
To: Ernest_at_the_Beach
Not all computers are vulnerable to the WMF threat: those running non-Windows operating systems are not affected.Sometimes it pays to be different.
Actually, it pays almost all the time in this case.
7 posted on
01/03/2006 10:54:25 AM PST by
zeugma
(Warning: Self-referential object does not reference itself.)
To: Ernest_at_the_Beach
No, Microsoft never sits on a patch, or so the cheerleaders here tell us.
To: Ernest_at_the_Beach; All
I have some links handy ( rummaging around old files hastily )...
John's Note:
I tried this-- seems OK on Win 2K:
Here's an update to the unofficial fix posted above. The folks at sans.org have taken the patch apart and modified it to work on WIN2K systems.. It's running on my system with no apparent ill effects. I'll be patching the other computers in the house shortly. The upshot is this: You cannot wait for the official MS patch, you cannot block this one at the border, and you cannot leave your systems unprotected. ----------------------------------------------------------------------------------------
Subnote: V-lan works fine on my home machines- others I know swear it "hosed my codecs"- so be advised I provide that and other links on a "use with caution" basis.
19 posted on
01/03/2006 4:23:03 PM PST by
backhoe
(-30-)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson