I'm using Mozilla FireFox 0.9.1 as my browser. I took the browser test in the last paragraph. My browser passed the test with no problem. That leads me to believe that this version of FireFox was not vulnerable to this particular attack.
I have downloaded and installed the latest critical update from Microsoft for IE 6.0. My IE 6.0 browser did not pass this test.
Test your browser.
1 posted on
07/03/2004 9:46:15 PM PDT by
Eagle9
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-48 next last
To: Eagle9
Makes me glad I have a Mac-
2 posted on
07/03/2004 9:50:00 PM PDT by
mean lunch lady
("There is a light at the end of the tunnel - Oh, no, it's a train.")
To: Eagle9
Mozilla 1.7 under Windows does not seem to be vulnerable.
3 posted on
07/03/2004 9:52:55 PM PDT by
Arkinsaw
To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
4 posted on
07/03/2004 9:55:10 PM PDT by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: Eagle9
Hmm, even the previous Netscape Browser (7.1) is vulnerable...that is surprising.
5 posted on
07/03/2004 9:55:56 PM PDT by
swilhelm73
(We always have been, we are, and I hope that we always shall be detested in France.")
To: Eagle9
As if to prove the point that security is like the Dutch boy at the dike, Thank God I have taken more effective measures to alleviate my system from such concerns. (without giving up the usability given by IE)
6 posted on
07/03/2004 9:56:18 PM PDT by
EGPWS
To: Eagle9
I tried it with Opera 7.51 identifying itself as Mozilla. It failed.
However, when I try to open my bank account with Opera, it won't work if Opera identifies itself as Opera, only as Mozilla. Weird.
To: Eagle9
How do we know that "checking" our browser is safe?
I'm not the most computer savvy guy around..
10 posted on
07/03/2004 10:00:43 PM PDT by
Ethrane
("semper consolar")
To: Ernest_at_the_Beach; ShadowAce; backhoe; TechJunkYard; Golden Eagle; Bush2000; Nick Danger
Updated info Ping.
It seems to me that there is a contradiction in this article, or it's addressing two separate issues.
13 posted on
07/03/2004 10:03:52 PM PDT by
Eagle9
To: Eagle9
"Test your browser."
Internet Explorer failed. Firefox passed.
To: Eagle9
15 posted on
07/03/2004 10:05:08 PM PDT by
First_Salute
(May God save our democratic-republican government, from a government by judiciary.)
To: Eagle9
Iam using mozilla 1.7 after dumping IE last week. I took the test and mozilla passed.
17 posted on
07/03/2004 10:08:13 PM PDT by
suzyq5558
(Slicks bracelet is a secret mood ring when its red he's fondly remembering the KSNAP of the thong)
To: Eagle9; All
19 posted on
07/03/2004 10:10:47 PM PDT by
backhoe
(Just an old Keyboard Cowboy, ridin' the Trackball into the Sunset...)
To: Eagle9
Appreciate it, Eagle.
We've had Bill Gates out here this week, meeting with our Prime Minister. And all week I've been battling IE problems- the Byte.Verify trojan, Bloodhound, and CoolWebSearch. And I must have thought, at least ten times, 'go home, Gates. Just go home, and fix up the holes in your product.'
22 posted on
07/03/2004 10:32:05 PM PDT by
Byron_the_Aussie
(http://www.theinterviewwithgod.com/popup2.html)
To: Eagle9
Well I downloaded the update last night from MS , restarted the puter and this "test" still seems to show I'm vulnerable based on their "test" ?
I'm running Norton Pro, Spybot & Blaster, Ad-Aware, AVG and Zone alarm pro all up to date with latest and greatest..... ???
Suggestions ? I know buy a Mac or go with mozilla.......:o)
33 posted on
07/03/2004 10:55:09 PM PDT by
Squantos
(Be polite. Be professional. But, have a plan to kill everyone you meet.)
To: TechJunkYard; ShadowAce; Nick Danger
On Friday, however, the security vendor modified the alert to claim that virtually every browser, from Internet Explorer and Mozilla to Opera and Netscape -- including browsers for both Windows and the Mac OS -- has this flaw.
See, cretins? Don't say you weren't warned.
35 posted on
07/03/2004 11:03:53 PM PDT by
Bush2000
To: Eagle9
Thanks for the post. I was running Mozilla 1.1, didn't know it was that old and it was vulnerable so I downloaded v1.7 and that solved the problem.
To: Eagle9
Interestingly, IE failed the test but iRider passed using IE as its rendering engine...
48 posted on
07/03/2004 11:42:11 PM PDT by
DB
(©)
To: Eagle9
Thanks for posting this important information. I have just finished installing a crital patch from Microsoft.
Here's hoping!
To: Eagle9; EGPWS; WestVirginiaRebel; First_Salute; backhoe; Byron_the_Aussie; TexasTransplant; ...
The update, which Microsoft tagged as Critical, isn't a patch per se, but rather an change to Windows that disables the ADODB.Stream object
FYI, the Internet Storm Center tested this latest Microsoft/IE 'fix' and found it
inadequate to stop hackers...
"...even after 'ADODB.Stream' is disabled, it is still possible to launch programs on the users system without user interaction."
A related suggestion was distributed
by security experts this week that could ALSO be of interest. They reiterate an MS security note (Microsoft Knowledge Base Article 833633) concerning the "Local Machine zone"...
For those of you that don't mind tinkering under the hood" of your computer such as to tighten ALL the security settings in every zone with: Control Panel --> Internet Options --> Security
MS announced a FIFTH security zone NOT shown in that tool with suggestions of tightening things THERE as well...
The control panel tool shows only these four zones:
- Trusted sites
- Local intranet
- Internet
- Restricted sites
The 5th (even higher level) zone is known as "Local Machine zone", and the MS article suggested it may be helpful for the security conscious, in some cases to even
strengthen some security settings there.
"a malicious user may try to take advantage of the power of the Local Machine zone to elevate their permissions and to run arbitrary code on your computer."
Those zone settings can only be tweaked using the registry editor (regedit), and the changes do the following for the Local Machine zone:
- Disables ActiveX Controls and plug-ins
- Disables Active scripting
- Disables data sources across domains
- Disables Java
If any of you say "you no longer use IE", be aware that a Windows computer STILL HAS SEVERAL OTHER programs that venture out on the internet and can be at risk (Windows Media Player) for example. Shutting off these vulnerabilities helps security in those OTHER programs as well.
With the latest sophistication of trojans, worms, and virus, I recommend tightening EVERY security zone (there is practically no such thing as a 'trusted site' anymore, and even the 'Local intranet' zone is commonly corrupted).
Then install a non-MS browser and emailer if you haven't already.
To: Eagle9
68 posted on
07/04/2004 4:10:15 AM PDT by
Musket
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-48 next last
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson