| ||||
New attack proves critical Windows bug 'highly exploitable' Written by Daniel Wednesday, 30 January 2008 Security researchers report a working exploit for the TCP/IP flaw that Microsoft had claimed was 'unlikely' to be used by attackers By Gregg Keizer, Computerworld January 30, 2008 InfoWorld Security researchers Tuesday said they'd discredited Microsoft's claim that the year's first critical Windows vulnerability would be "difficult and unlikely" to be exploited by attackers... Front Page
__________________ "Though all men live in ignorance before mystery, they need not live in darkness... Justice is foundation and Mercy ETERNAL." DKE "All that we do is touched by Ocean Yet we remain on the shore of what we know." Richard Wilbur [img]/forum/attachments/random-nonsense/16515-sigs-dan_drag.jpg[/img] Subscribers! Ask Pitch about a Custom Sig Graphic |
| |||
That reminds me: Quote:
__________________ |
| ||||
Are L0pht still around? I thought they disappeared? L0phtcrack was a GREAT tool..... |
| |||
L0pht formed in the shapeless form that was Boston. @stake and L0pht merged, keeping the @stake name. @stake was swallowed by Symantec... the rest is history (and it better stay there). Various L0pht members are still around, if you know where to go looking for them. You will be able to find some of them speaking at SOURCE Boston 2008 on Friday 14 March.
__________________ |
| ||||
Its sad because L0pht Heavy industries is one of the coolest names ever. @stake was at least clever. Nobody puts enough effort in anymore =(
__________________ Notebook: Apple Macbook Pro 13" i7 2.7Ghz (3.4Ghz max) 8GB DDR3 1333Mhz (Mac OSX 10.6.7) Desktop: ASUS Rampage Formula X48 Intel Core 2 Quad Q9450 (Yorkfield) @ 3.60Ghz (Folding SMP Linux) Running Fedora 15 Linux (GNOME 3) Dual Dell 2407WFP ![]() Drivers, Games, Demos, Mods and Overclocking Tools At AOAFiles |
| |||
@stake was a fairly clever name from more than one angle. You see, if you went to your web browser and typed in "www.@stake.com", it would work - actually it would try to log you into a website called stake.com with a username of "www.". Fortunately, there was a website called stake.com, although it appears to no longer be registered to symc, instead being squatted.
__________________ |
| ||||
Kind of like bar.com The number of people, particularly sysadmins that set automated scripts and web applications to pipe their output to an email and send it to foo@bar.com must be absolutely huge.
__________________ Notebook: Apple Macbook Pro 13" i7 2.7Ghz (3.4Ghz max) 8GB DDR3 1333Mhz (Mac OSX 10.6.7) Desktop: ASUS Rampage Formula X48 Intel Core 2 Quad Q9450 (Yorkfield) @ 3.60Ghz (Folding SMP Linux) Running Fedora 15 Linux (GNOME 3) Dual Dell 2407WFP ![]() Drivers, Games, Demos, Mods and Overclocking Tools At AOAFiles |
![]() |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Rate This Thread | |
| |
![]() | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Windows Small Business Server at risk from critical flaw | Daniel ~ | OS, Software, Firmware, and BIOS | 0 | 24th January, 2008 08:17 PM |
Critical Windows update eating CPU cycles | danrok | OS, Software, Firmware, and BIOS | 9 | 17th May, 2007 05:07 PM |
"Security App Protects Against Windows Attack!" | Daniel ~ | Data Security | 0 | 3rd April, 2007 05:35 PM |
New Windows attack can kill firewall | Gizmo | Data Security | 9 | 10th November, 2006 05:24 PM |
AMD proves superiority | Carthesis | AMD Motherboards & CPUs | 6 | 28th June, 2002 06:38 PM |