To: Eagle9; EGPWS; WestVirginiaRebel; First_Salute; backhoe; Byron_the_Aussie; TexasTransplant; ...
The update, which Microsoft tagged as Critical, isn't a patch per se, but rather an change to Windows that disables the ADODB.Stream object
FYI, the Internet Storm Center tested this latest Microsoft/IE 'fix' and found it
inadequate to stop hackers...
"...even after 'ADODB.Stream' is disabled, it is still possible to launch programs on the users system without user interaction."
A related suggestion was distributed
by security experts this week that could ALSO be of interest. They reiterate an MS security note (Microsoft Knowledge Base Article 833633) concerning the "Local Machine zone"...
For those of you that don't mind tinkering under the hood" of your computer such as to tighten ALL the security settings in every zone with: Control Panel --> Internet Options --> Security
MS announced a FIFTH security zone NOT shown in that tool with suggestions of tightening things THERE as well...
The control panel tool shows only these four zones:
- Trusted sites
- Local intranet
- Internet
- Restricted sites
The 5th (even higher level) zone is known as "Local Machine zone", and the MS article suggested it may be helpful for the security conscious, in some cases to even
strengthen some security settings there.
"a malicious user may try to take advantage of the power of the Local Machine zone to elevate their permissions and to run arbitrary code on your computer."
Those zone settings can only be tweaked using the registry editor (regedit), and the changes do the following for the Local Machine zone:
- Disables ActiveX Controls and plug-ins
- Disables Active scripting
- Disables data sources across domains
- Disables Java
If any of you say "you no longer use IE", be aware that a Windows computer STILL HAS SEVERAL OTHER programs that venture out on the internet and can be at risk (Windows Media Player) for example. Shutting off these vulnerabilities helps security in those OTHER programs as well.
With the latest sophistication of trojans, worms, and virus, I recommend tightening EVERY security zone (there is practically no such thing as a 'trusted site' anymore, and even the 'Local intranet' zone is commonly corrupted).
Then install a non-MS browser and emailer if you haven't already.
To: FL_engineer
To: FL_engineer
Appreciate the info. I'm still cleaning garbage out of my machine.
70 posted on
07/04/2004 4:28:07 AM PDT by
backhoe
(1990's? Decade of Frauds. 2000's? Decade of Lunatics...)
To: FL_engineer
I am using FireFox. I switched a couple of weeks ago at the suggestoin of some Freepers.
So far I like it.
75 posted on
07/04/2004 6:07:27 AM PDT by
SeeRushToldU_So
(I laugh when I see women driving with cellphones in their ear.)
To: FL_engineer
79 posted on
07/04/2004 6:19:19 AM PDT by
lainde
(Heads up...We're coming and we've got tongue blades!!)
To: FL_engineer
Thanks, but I don't use Microsoft products. I'm a sworn Apple user and Safari is my browser.
83 posted on
07/04/2004 6:39:19 AM PDT by
mass55th
To: FL_engineer
I installed Mozilla Firefox (as you suggested)
& have been using it ever since
I like it very much
thanks for the ping
85 posted on
07/04/2004 6:49:54 AM PDT by
firewalk
To: FL_engineer
I abandoned IE last week after the second time I had to spend 3 hours searching out and removing spyware.
88 posted on
07/04/2004 7:16:49 AM PDT by
Blood of Tyrants
(Even if the government took all your earnings, you wouldn't be, in its eyes, a slave.)
To: FL_engineer
Thanks for the ping.
My new SBC/Yahoo DSL downloaded the updates/patches in seconds. Then my computer installed them in about a minute.
I shut down and restarted my computer to come back to Free Republic. All was done in less than 3 minutes.
91 posted on
07/04/2004 8:00:53 AM PDT by
Grampa Dave
(Salute the 4th, Free Republic, and Jim Rob, become a monthly donor to Free Republic!)
To: FL_engineer
Thanks.
It should be pointed out the root of this is not so much IE browsers as much as (per the article) previously infected servers, if I read that right.
I will stick with IE. If a server is compromised by a hacker, then they can target any browser where there's an opportunity to exploit a problem.
The fact that IE is targeted in this one does not by default mean Mozilla or any other is immune to exploits.
To: FL_engineer
The MS critical update worked for my PC. Had to restart the service (or reboot) though.
To: FL_engineer; All
Thanks for
interpreting all of that. By that I mean, I am not anywhere even close to being an expert on this subject. I just just barely enough to read and follow instructions from people like yourself. I had read that about the LMZ last night and all I got out of it was a headache. So, I decided not to even mention it and wait for someone who knew what they doing to interpret it.
Now, I just need to go back and read your instructions again ... no, I can do that later. I'm just gonna shutdown the computer, enjoy the day, and come back tonight or tomorrow. Again, thank you.
_________________________________________________________________
To everyone else: I posted this article for informative purposes only, and am not a technical expert. If you have technical questions, I can only suggest that you ask any those FReepers on this thread that are giving advice.
104 posted on
07/04/2004 10:23:58 AM PDT by
Eagle9
To: FL_engineer
161 posted on
07/05/2004 5:53:26 AM PDT by
windchime
(Podesta about Bush: "He's got four years to try to undo all the stuff we've done." (TIME-1/22/01))
To: FL_engineer
Thanks for the ping. Needed the info!
180 posted on
07/05/2004 10:41:08 PM PDT by
skr
(Tired of Tirkut Teddy and Najaf Nancy)
To: FL_engineer
Wow, thanks for the ping! This is more for me to read as I experiment with my recently installed Norton System Works. It seems like I'm zipping along at a snail's pace (LOL!), but I'm learning a whole heck of a lot!
A real pain in the neck, but an excellent learning opportunity. :o)
185 posted on
07/06/2004 7:37:20 PM PDT by
Lauren BaRecall
(Just give the kid a pack of cigarettes - you know he's only gonna go out and smoke anyway!)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson