Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Trojan uses MS hole to hijack Web browsers
InfoWorld ^ | 10/02/03 | Paul Roberts

Posted on 10/03/2003 8:30:14 AM PDT by Salo

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-33 last
Comment #21 Removed by Moderator

Comment #22 Removed by Moderator

To: Salo
What a hit piece. This could have originally been a html hole. But no mention of even the word 'html'.
23 posted on 10/03/2003 11:34:49 AM PDT by Paul C. Jesup
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #24 Removed by Moderator

To: sethhenschon
The Dutch moniker was wrongly applies to both the beetle and the tree; hence "Dutch Elm Disease". FYI.

Good to know. If I'm going to be the destruction the elm beetle caused as an example of what happens when there is a lack of genetic/computer system variety, I should know the proper term(s).

That said, when there's the vast majority of the world uses one operating system, a hacker only needs to find the flaw in that one system to bring everything to a halt. The Microsoft monopoly is a danger to our country.

25 posted on 10/03/2003 12:03:26 PM PDT by libravoter (Live from the People's Republic of Cambridge)
[ Post Reply | Private Reply | To 24 | View Replies]

To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.

Wanna be Penguified? Just holla!

     .-.
     /v\    L   I   N   U   X
    // \\  >Phear the Penguin<
   /(   )\
    ^^-^^

Got root?

26 posted on 10/03/2003 1:07:47 PM PDT by rdb3 (2Pac could have used a decoy that night...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: steplock
, steplock wrote: **IF** apple - linux - xenix - etc were the MOST POPULAR programs and MS was HARDLY EVER used ....

Thanks for such a great illustration of post-modernist thinking. "Design doesn't matter. All operating systems regardless of design are equal. It's an OS ipso facto its design is inherently no better or worse than any others' design."

That's like the old post-modernist argument that an opinion is an opinion therefore all opinions are equal and one person's opinion is worth no more than any others' opinion.

27 posted on 10/03/2003 1:37:01 PM PDT by CodeMonkey
[ Post Reply | Private Reply | To 13 | View Replies]

To: Salo
However, even machines that applied that patch are vulnerable to the latest attack because of holes in that security patch...

ROFLOL

28 posted on 10/03/2003 4:42:40 PM PDT by Petronski (I'm not always cranky.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sigSEGV
Latest news is that software maker Valve, who made the game Half-life, had the entire source code to Half-life 2 ripped off due to this exploit. Don't ask me why they would be so stupid as to use Outlook.

I'm betting they'll be tearing it out soon enough.

29 posted on 10/03/2003 4:46:38 PM PDT by Petronski (I'm not always cranky.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Salo
BTW, it's not a "flaw" - it's a real-deal security hole. Again.

I thought MS software did not have holes, that it only had undocumented 'features'.

30 posted on 10/03/2003 6:30:01 PM PDT by gore3000 ("To say dogs, mice, and humans are all products of slime plus time is a mystery religion.")
[ Post Reply | Private Reply | To 16 | View Replies]

To: sethhenschon
I've been using Netscape v7.1 browser and email client for 3 months, after upgrading from their v4.79 and MSIE v6.02, and it's wonderful.

Mozilla is a wonderful browser also. It has very good rendering. It also has included pop up stopping, more control over outside programs and tabbed browsing. I prefer it to Netscape. There are choices out there.

31 posted on 10/03/2003 6:33:50 PM PDT by gore3000 ("To say dogs, mice, and humans are all products of slime plus time is a mystery religion.")
[ Post Reply | Private Reply | To 21 | View Replies]

To: thoughtomator
A quick question--

Norton caught two cases of the Trojan and quarentined them but I cannot delete it out of quarentine. Should I be concerned.

I am assumming that since the trojan virus is quarantined my computer is OK.

Feedback, please.
32 posted on 11/18/2003 4:53:53 PM PST by Salvation (†With God all things are possible.†)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Salvation
The same has happened to me.Trend Micros has a great web page with a virus encyclopedia where you can type in the name of the virus and it'll pull up the info on it as well as instuctions on removing it.You have to be careful in doing the removal because it sometimes requires pulling up the registry editer and deleteing certain lines or keys,then you should be able to delete the infected files.Pay close attention to the instructions so you don't delete the wrong files.If you're not sure of yourself handling this,try and get a friend who's familer with the task.I had six trojan virus'
at one time a couple of weeks ago.Some I was able to shut down certain programs before I could delete them.I since then starting using Netscape instead of IE.
33 posted on 11/18/2003 5:12:50 PM PST by Uncle Meat
[ Post Reply | Private Reply | To 32 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson