Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FReeper Canteen ~ Sunday Chapel ~ THE MAN IN THE GLASS ~ 06 November 2011
Serving The Best Troops and Veterans In The World !! | The Canteen Crew

Posted on 11/05/2011 5:07:53 PM PDT by Kathy in Alaska

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-135 next last
To: Kathy in Alaska

BTTT


81 posted on 11/06/2011 2:51:54 AM PST by E.G.C. (Edward's Soft Rock Playlist: On Youtube: http://www.youtube.com/my_playlists?p=A7A56731DE671E6A)
[ Post Reply | Private Reply | To 5 | View Replies]

To: All

Welcome Troops, Veterans, Families, and Allies!
God Bless You and Keep You Safe.

Thanks, unique, for our troop blessing.

Fields of Plenty ~ Be Still My Soul

What You Already Own


82 posted on 11/06/2011 3:00:16 AM PST by Kathy in Alaska ((~ RIP Brian...heaven's gain...the Coast Guard lost a good one.~))
[ Post Reply | Private Reply | To 74 | View Replies]

To: E.G.C.

Good Lord’s Day to you and yours, E...((HUGS))...Oklahoma has had some earthquake action. Did you feel it?

How did your teams do? Looks like you got your clocks turned back. Have a great day.


83 posted on 11/06/2011 3:06:39 AM PST by Kathy in Alaska ((~ RIP Brian...heaven's gain...the Coast Guard lost a good one.~))
[ Post Reply | Private Reply | To 79 | View Replies]

To: All; Kathy in Alaska; SandRat; Arrowhead1952; LUV W; MS.BEHAVIN; ConorMacNessa; AZamericonnie; ...

*Wishing The Canteen A Blessed Sunday*


*May God Keep Safe Those Who Keep Us Safe*

84 posted on 11/06/2011 3:29:18 AM PST by MEG33 (God Bless Our Military Men And Women)
[ Post Reply | Private Reply | To 64 | View Replies]

To: Kathy in Alaska

Wonderful devotion, Kathy!


85 posted on 11/06/2011 3:32:06 AM PST by MEG33 (God Bless Our Military Men And Women)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kathy in Alaska
Well, we had a 5.4 earthquake take place East of Oklahoma City last night. I did feel it here at the house in Comanche.

This was one of the stronger quakes, Oklahoma has had.

86 posted on 11/06/2011 3:38:45 AM PST by E.G.C. (Edward's Soft Rock Playlist: On Youtube: http://www.youtube.com/my_playlists?p=A7A56731DE671E6A)
[ Post Reply | Private Reply | To 83 | View Replies]

To: E.G.C.
Here is a complete listing of upcoming updates from Microsoft on Tuesday. the updates are listed in order Bulletin ID, Bulletin Title and Executive Summary, Maximum Severity Rating and Vulnerability Impact, Restart Requirement and Affected Software
MS11-078

Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2604930)

This security update resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.

Critical
Remote Code Execution
May require restart
Microsoft .NET Framework, Microsoft Silverlight

MS11-081
Cumulative Security Update for Internet Explorer (2586448)

This security update resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical
Remote Code Execution
Requires restart
Microsoft Windows, Internet Explorer

MS11-075
Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution (2623699)

This security update resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.

Important
Remote Code Execution
Requires restart
Microsoft Windows

MS11-076
Vulnerability in Windows Media Center Could Allow Remote Code Execution (2604926)

This security update resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file.

Important
Remote Code Execution
May require restart
Microsoft Windows

MS11-077
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2567053)

This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment.

Important
Remote Code Execution
Requires restart
Microsoft Windows

MS11-079
Vulnerabilities in Microsoft Forefront Unified Access Gateway Could Cause Remote Code Execution (2544641)

This security update resolves five privately reported vulnerabilities in Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.

Important
Remote Code Execution
May require restart
Microsoft Forefront United Access Gateway

MS11-080
Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege (2592799)

This security update resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.

Important
Elevation of Privilege
Requires restart
Microsoft Windows

MS11-082
Vulnerabilities in Host Integration Server Could Allow Denial of Service (2607670)

This security update resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet.

Important
Denial of Service
May require restart
Microsoft Host Integration Server

87 posted on 11/06/2011 3:48:26 AM PST by E.G.C. (Edward's Soft Rock Playlist: On Youtube: http://www.youtube.com/my_playlists?p=A7A56731DE671E6A)
[ Post Reply | Private Reply | To 86 | View Replies]

To: MEG33; Kathy in Alaska; txradioguy; StarCMC; Lady Jag; laurenmarlowe; GodBlessUSA; fatima; LUV W; ..









Good morning to everyone at the Canteen.
Have a Blessed Lord's Day today.






88 posted on 11/06/2011 4:42:12 AM PST by Arrowhead1952 (Dear God, thanks for the rain, but please let it rain more in Texas. Amen.)
[ Post Reply | Private Reply | To 84 | View Replies]

To: oldteen

Don’t Forget your wristwatch! LOL!


89 posted on 11/06/2011 4:46:37 AM PST by left that other site (Psalm 122:6)
[ Post Reply | Private Reply | To 48 | View Replies]

To: Kathy in Alaska

Good Morning, Kathy!

(((HUGS)))


90 posted on 11/06/2011 4:53:06 AM PST by left that other site (Psalm 122:6)
[ Post Reply | Private Reply | To 58 | View Replies]

To: y'all; Arrowhead1952; beachn4fun; E.G.C.; GodBlessUSA; ConorMacNessa; Kathy in Alaska; HiJinx; ...

Happy end-of-daylight-savings-time, Early Birds!
...except I forgot to change the alarm clock! Ugh!
Have a blessed Sunday!
(((hugs)))

91 posted on 11/06/2011 6:02:08 AM PST by luvie (This tagline reserved for a hero.......)
[ Post Reply | Private Reply | To 88 | View Replies]

To: MEG33
And a Blessed Lord's Day to you, Meg!

Lamh Foistenach Abu!
92 posted on 11/06/2011 6:05:30 AM PST by ConorMacNessa (HM/2 USN, 3/5 Marines RVN 1969 - St. Michael the Archangel defend us in Battle!)
[ Post Reply | Private Reply | To 84 | View Replies]

To: All


Good morning to our valiant Troops, to our Vets, to our Families, our FRiends, our Allies and to all Canteen Denizens!

Godspeed our Troops around the Globe, especially those in combat!








Lamh Foistenach Abu!
93 posted on 11/06/2011 6:07:15 AM PST by ConorMacNessa (HM/2 USN, 3/5 Marines RVN 1969 - St. Michael the Archangel defend us in Battle!)
[ Post Reply | Private Reply | To 92 | View Replies]

To: Kathy in Alaska

I am wide awake an hour earlier. ugh.


94 posted on 11/06/2011 6:10:51 AM PST by television is just wrong
[ Post Reply | Private Reply | To 16 | View Replies]

To: LUV W

Good morning LUV W and (((HUGS))) to you.

I set most of the clocks back yesterday.

I still have to set the one in my pickup.


95 posted on 11/06/2011 6:51:25 AM PST by Arrowhead1952 (Dear God, thanks for the rain, but please let it rain more in Texas. Amen.)
[ Post Reply | Private Reply | To 91 | View Replies]

To: LUV W

((HUGS))Good Sunday morning, LUV W. How’s it going?


96 posted on 11/06/2011 6:58:38 AM PST by E.G.C. (Edward's Soft Rock Playlist: On Youtube: http://www.youtube.com/my_playlists?p=A7A56731DE671E6A)
[ Post Reply | Private Reply | To 91 | View Replies]

To: E.G.C.

Howdy, EGC! It’s going well! (((hugs)))

Hope you and Bo are having a nice weekend! Did you feel the earthquake? My kids did!


97 posted on 11/06/2011 7:08:28 AM PST by luvie (This tagline reserved for a hero.......)
[ Post Reply | Private Reply | To 96 | View Replies]

To: LUV W

?


98 posted on 11/06/2011 7:08:57 AM PST by luvie (This tagline reserved for a hero.......)
[ Post Reply | Private Reply | To 97 | View Replies]

To: LUV W

?


99 posted on 11/06/2011 7:09:16 AM PST by luvie (This tagline reserved for a hero.......)
[ Post Reply | Private Reply | To 98 | View Replies]

To: LUV W

?


100 posted on 11/06/2011 7:09:31 AM PST by luvie (This tagline reserved for a hero.......)
[ Post Reply | Private Reply | To 99 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-135 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson