"The vulnerabilities addressed in MS005-038, MS005-039, MS05-040 and MS-043, all covered in this month's Fat Tuesday festivities, AKA Microsoft Security Bulletin Summary, have fallen victim already to publicly released exploits. Both bugtraq and Daily Dave have postings today announcing the availability of said code. Now, I haven't built or tested any of it, so I can't personally vouch for the effectiveness ot any of it, but if it isn't working as intended you can bet it will be shortly. Patch up, folks. "
Thursday, August 11, 2005
SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System - Current Infosec News and Analysis
Mozilla and hypocrisy
Right, but what about the experiences that Mozilla chooses to default for users like switching to Yahoo and making that the default upon ...
-
via VMware blog
-
AJAX: redesign your PHP applications? - ThinkPHP /dev/blog : "First of all, XMLHttpRequest has a problem: in InternetExplorer, it doesn...
-
Intrusion Detection with Tripwire : "Do this by adding a comma after the severity= line and putting emailto= on the next line, followed...