Skip to comments.
Trojan uses MS hole to hijack Web browsers
InfoWorld ^
| 10/02/03
| Paul Roberts
Posted on 10/03/2003 8:30:14 AM PDT by Salo
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-33 last
Comment #21 Removed by Moderator
Comment #22 Removed by Moderator
To: Salo
What a hit piece. This could have originally been a html hole. But no mention of even the word 'html'.
Comment #24 Removed by Moderator
To: sethhenschon
The Dutch moniker was wrongly applies to both the beetle and the tree; hence "Dutch Elm Disease". FYI. Good to know. If I'm going to be the destruction the elm beetle caused as an example of what happens when there is a lack of genetic/computer system variety, I should know the proper term(s).
That said, when there's the vast majority of the world uses one operating system, a hacker only needs to find the flaw in that one system to bring everything to a halt. The Microsoft monopoly is a danger to our country.
25
posted on
10/03/2003 12:03:26 PM PDT
by
libravoter
(Live from the People's Republic of Cambridge)
To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.
Wanna be Penguified? Just holla!
.-.
/v\ L I N U X
// \\ >Phear the Penguin<
/( )\
^^-^^
Got root?
26
posted on
10/03/2003 1:07:47 PM PDT
by
rdb3
(2Pac could have used a decoy that night...)
To: steplock
, steplock wrote: **IF** apple - linux - xenix - etc were the MOST POPULAR programs and MS was HARDLY EVER used .... Thanks for such a great illustration of post-modernist thinking. "Design doesn't matter. All operating systems regardless of design are equal. It's an OS ipso facto its design is inherently no better or worse than any others' design."
That's like the old post-modernist argument that an opinion is an opinion therefore all opinions are equal and one person's opinion is worth no more than any others' opinion.
To: Salo
However, even machines that applied that patch are vulnerable to the latest attack because of holes in that security patch...ROFLOL
28
posted on
10/03/2003 4:42:40 PM PDT
by
Petronski
(I'm not always cranky.)
To: sigSEGV
Latest news is that software maker Valve, who made the game Half-life, had the entire source code to Half-life 2 ripped off due to this exploit. Don't ask me why they would be so stupid as to use Outlook.I'm betting they'll be tearing it out soon enough.
29
posted on
10/03/2003 4:46:38 PM PDT
by
Petronski
(I'm not always cranky.)
To: Salo
BTW, it's not a "flaw" - it's a real-deal security hole. Again. I thought MS software did not have holes, that it only had undocumented 'features'.
30
posted on
10/03/2003 6:30:01 PM PDT
by
gore3000
("To say dogs, mice, and humans are all products of slime plus time is a mystery religion.")
To: sethhenschon
I've been using Netscape v7.1 browser and email client for 3 months, after upgrading from their v4.79 and MSIE v6.02, and it's wonderful. Mozilla is a wonderful browser also. It has very good rendering. It also has included pop up stopping, more control over outside programs and tabbed browsing. I prefer it to Netscape. There are choices out there.
31
posted on
10/03/2003 6:33:50 PM PDT
by
gore3000
("To say dogs, mice, and humans are all products of slime plus time is a mystery religion.")
To: thoughtomator
A quick question--
Norton caught two cases of the Trojan and quarentined them but I cannot delete it out of quarentine. Should I be concerned.
I am assumming that since the trojan virus is quarantined my computer is OK.
Feedback, please.
32
posted on
11/18/2003 4:53:53 PM PST
by
Salvation
(†With God all things are possible.†)
To: Salvation
The same has happened to me.Trend Micros has a great web page with a virus encyclopedia where you can type in the name of the virus and it'll pull up the info on it as well as instuctions on removing it.You have to be careful in doing the removal because it sometimes requires pulling up the registry editer and deleteing certain lines or keys,then you should be able to delete the infected files.Pay close attention to the instructions so you don't delete the wrong files.If you're not sure of yourself handling this,try and get a friend who's familer with the task.I had six trojan virus'
at one time a couple of weeks ago.Some I was able to shut down certain programs before I could delete them.I since then starting using Netscape instead of IE.
Navigation: use the links below to view more comments.
first previous 1-20, 21-33 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson