Saturday, March 26, 2011

NEWS - March 24. 2011

Should you need approval before posting and tagging a person's photo on Facebook?

A recent case, discussed by Omer Tene from The Center of Internet and Society at Stanford Law School, opens a few interesting discussion points around this issue.

The Kentucky Court of Appeals recently stated that you don't need a person's permission to tag them in a Facebook photo (LaLonde vs. LaLonde).

The case synopsis is that mother loses custody of her child based on evidence featuring, among other things, Facebook photos showing her drinking. The problem was that she had received mental health advice to abstain from drinking due to her medication regime. She did not post the pictures or give consent for them to be broadcast for the world to see, yet they directly impacted her life.

Ouch. And according to Tene, Facebook "evidence" is increasingly being used in court.

Continued : http://nakedsecurity.sophos.com/2011/03/23/52408/

Also: Can Facebook use my name and profile picture in ads?

Reply 1 : NEWS - March 24. 2011

Windows users who install the latest Java security patches may end up with a little more security than they bargained for, at least that's the risk they take if they don't pay close attention to the installation process.

Starting last month, Oracle began bundling a security scanning tool called the McAfee Security Scan Plus with its Java updates for the Windows operating system. The software is installed by default with the Java update, so unless users notice and uncheck the McAfee installation box as they're updating Java, they'll end up downloading McAfee's software too.

Security Scan Plus checks the PC to see if has antivirus and firewall software and if they're both up-to-date. The program comes with pop-up windows and is a bit more noticeable than the previous software that was bundled with Java in the U.S., such as the Yahoo Toolbar. Oracle bundles different products with Java in different regions, so not all Windows users may get Security Scan Plus with their Java updates.

Once downloaded, the McAfee software prompts the user on a daily basis to accept McAfee's licensing terms to complete the installation. The user can cancel out of this prompt, but there is no option to decline the terms. To remove the software, the user must use the Windows "Uninstall a Program" feature.

A number of users have inadvertently installed the software since Oracle started the bundling deal with Intel's McAfee subsidiary last month.

Continued : http://www.pcworld.com/businesscenter/article/223153/update_java_and_you_may_get_annoying_mcafee_scanner_too.html

Reply 2 : NEWS - March 24. 2011

Business gurus have long maintained that time = $$, but that doesn't mean that playtime necessarily decreases the bottom line. Many corporations have discovered that their employees tend to be more productive when they have time to give their brains a break, and gameplay is the perfect escape. So it's not surprising that some cyber criminals have taken this lesson to heart, and are crafting crime machines to include games that allow their evildoing customers to steal money and set their hi-scores at the same time.

I had a laugh when I stumbled upon the administrative panel shown in the video below. It's a back-end Web database designed to interact with a collection of Windows PCs infected by the ZeuS Trojan. This panel receives financial data stolen from victim machines, including PayPal and Bank of America account credentials. This video shows the Bank of America tab of the tool, which also allows the criminal to inject specific "challenge/response" questions into BofA's Web page as displayed in the victim's browser, as a way to steal the answers to these questions should the criminal later be asked for them when later logging in to victim accounts.

Continued : http://krebsonsecurity.com/2011/03/big-scores-and-hi-scores/

Reply 3 : NEWS - March 24. 2011

One week after the much publicized Rustock botnet command and control take down, and subsequent drop in spam volumes, SophosLabs can confirm Rustock has not come back from the dead. "Dawn of the Dead" analogies need not apply.

To illustrate this, the graph below displays weekly spam volumes going back to the start of February (red line is the average volume prior to the take down). Notice the lighter blue line, which highlights the spam volume in the week since the take down: [Screenshot]

With the specific messages tied to Rustock remaining flatlined: [Screenshot]

For those wondering exactly what type of spam is no longer filling the pipes of networks worldwide, here are two recent examples of spam sent in the days prior to the take down:

Continued : http://nakedsecurity.sophos.com/2011/03/24/one-week-later-rustock-and-pharmacy-express-still-flatlined/

Reply 4 : NEWS - March 24. 2011

Greg Hoglund, CEO of HBGary, admits that lackluster security at his company played a central role in the breach that led to the release of some 50,000 company emails, but also disputes common understanding and reported details of the hack and the group behind it, going so far as to say there was actually no hack at all.

In an interview with CSO Online's Robert Lemos, Hoglund explains that Anonymous, the hacker-collective of online mischief makers that exposed the trove of HBGary emails, never entered the company's network, and in fact may not have even been aware of its existence until long after the fact. Instead, Anonymous members used a stolen password to gain access to the companies email spool.

The email spool was hosted in Google's cloud service. Hoglund reportedly spent the better part of Super Bowl Sunday trying to shut-down the HBGary site but only ended up getting the run-around from a Google service call center in India. As his company was in the process of getting "owned," so to speak, Google's call center set up elaborate hoops through which they expected Hoglund to jump in order to validate his identity. By the time he proved himself and was able to get technical support on the phone, the damage had already been done.

Continued : https://threatpost.com/en_us/blogs/hbgary-ceo-speaks-out-anonymous-hack-032311

Reply 5 : NEWS - March 24. 2011

A new malware distribution campaign that generates emails posing as delivery notifications from United Parcel Service (UPS) is currently hitting people's inboxes.

The rogue emails bear a subject of "United Parcel Service notification" and have spoofed headers to appear as originating from a infojs@ups.com address.

The contained message reads: "The parcel was sent your home address. And it will arrive within 7 business day. More information and the tracking number are attached in document below. Thank you."

The attachment is called UPSnotify.rar, which is a bit unusual as .zip would have probably made more sense. There is no native support for .rar in Windows.

The archive contains a file called UPSnotify.exe which is a trojan downloader. Once installed, this malicious file proceeds to download and execute additional malware on the computer.

According to independent security consultant Dancho Danchev, the threats associated with this attack include a fake antivirus, a Gbot backdoor and a variant of W32.Pilleuz which currently has a low detection rate.

An interesting aspect of this Pilleuz version is that it contacts gmail.com, yahoo.com and hotmail.com for no reason, except to throw researchers off.

Continued : http://news.softpedia.com/news/Fake-UPS-Email-Campaign-Serves-Malware-Cocktail-191161.shtml

Reply 6 : NEWS - March 24. 2011

Yes,dangerous and suspiciously deceptive as to timing because I am expecting an online order from the USA to Australia - within the 7 day time frame mentioned.
Never having had any dealings with UPS this is absolutely amazingly coincidental and I don't believe in such coincidences. I think the supplier, with whom I am doing business, is highly likely to have been hacked at some level.
Fortunately Zone Alarm was right on top of it and immediately quarantined it.

Reply 7 : NEWS - March 24. 2011

TripAdvisor, the popular travel-planning site, is warning customers that some portion of the company's customer email database was stolen recently by attackers. The company is not saying how many customers are affected or how the breach occurred.

TripAdvisor posted a message on its site warning customers about the attack, but offering little in the way of details on what actually happened.

"We discovered that an unauthorized third party has recently stolen part of TripAdvisor's member email list. We're taking this incident very seriously. We've identified the vulnerability, shut it down and are vigorously pursuing the matter with law enforcement. We sincerely apologize for this inconvenience," the company said in its statement.

"The portion of our membership that was impacted may receive some unsolicited emails (SPAM) as a result. No passwords were taken, and any and all password information is secure. TripAdvisor does not collect members' credit card or financial information, and we never sell or rent our member list."

Continued : https://threatpost.com/en_us/blogs/tripadvisor-warns-customers-data-breach-032411

Also: Hackers make off with TripAdvisor's membership list

Reply 8 : NEWS - March 24. 2011

Romanian antivirus vendor BitDefender has opened public beta testing for a free security solution designed specifically to protect users when browsing the Web.

Called TrafficLight, the product is capable of scanning Web traffic in real time and blocking malicious code and other threats.

It also taps BitDefender's cloud network to check if accessed URLs are associated with phishing or black hat SEO attacks.

Since search engines and social networks are popular distribution platforms for malicious URLs, TrafficLight adds visual safety indicators to all links listed in search results or popular social media sites.

These icons can be green for safe, yellow for suspicious and red for harmful. Users will have the option to force the loading of harmful pages with the known malicious elements stripped out.

The antivirus vendor takes pride in the browser-agnostic design of the product and work is being done to make it OS-independent too.

TrafficLight does not install any browser extensions which means that it functions at the protocol level, probably as a network filter driver.

Continued : http://news.softpedia.com/news/BitDefender-Launches-Free-Web-Antivirus-191224.shtml

Reply 9 : NEWS - March 24. 2011

"The traffic went through China Telecom and SK Broadband, perhaps due to an error, but it is still a mystery"

Traffic destined for Facebook from AT&T's servers took a strange loop though China and South Korea on Tuesday, according to a security researcher.

Barrett Lyon, who has worked for companies such as EveryDNS, did a traceroute -- a command that allows a user to see which network providers were used to reach a desired website -- to Facebook while on AT&T's network.

Lyon wrote on his blog that data from AT&T customers would usually go directly to Facebook's network provider. But due to what Lyon characterized as a routing mistake, the traffic first went through China Telecom and then to SK Broadband in South Korea before routing to Facebook.

Routing errors are not uncommon on the part of network operators. In insignificant cases, it can allow traffic to take circuitous routes to destinations. But in the worst scenarios, it can mean websites in certain IP ranges could be unreachable.

Continued : http://www.networkworld.com/news/2011/032411-att-facebook-traffic-takes-a.html

Reply 10 : NEWS - March 24. 2011

Password service Lastpass simply blocks the IP addresses of users who test the site's security measures in a move which may very well cause collateral damage. Lastpass offers a central storage facility for passwords that are then made available to devices independently of browsers and platforms, via extensions and apps.

This rather unusual security measure was discovered when an editor at c't magazine, The H's associates in Germany, in preparation for an article, routinely fed a few input fields with character strings that would indicate if there were XSS or SQL injection problems at the site. Unfortunately, such security holes are still very common and would be unforgivable for a central password storage service. When a colleague of the editor tried to access the Lastpass web site a little later, he was only presented with the message that his IP address had been blocked due to suspicious activities.

Since all of the publisher's employees use a joint proxy to access the internet, it was this proxy's IP address that had been blacklisted, and this promptly blocked all Heise employees; the address was unblocked again after a short email exchange. However, the question remains whether such a blacklist is really a suitable measure for increasing a service's security levels. Apparently, Lastpass only introduced the measure after information on an XSS hole in its web pages was published on the internet; Lastpass had closed the hole the following day - a Sunday.

Continued : http://www.h-online.com/security/news/item/Password-service-locks-out-hackers-1214086.html

Reply 11 : NEWS - March 24. 2011

.. Facebook apps

Below we have a rather fetching page located at helpjapan(dot)co(dot)tv: [Screenshot]

"Japan Earthquake Relief: Help raise money for disaster relief in Japan with a few clicks of your mouse".

That's great, except hitting the Connect with Facebook button reveals an app called "your age pic" located at apps(dot)facebook(dot)com/youwilllooklike - at least, it would if it wasn't currently offline due to an "issue with its third party developer".
[Screenshot]

Check out the reviews, which mention friend spamming. Here's someone having problems with rapid fire messages being sent out.

The message posted to Facebook pages looks like this: [Screenshot]

"YOUR 1 click = $0.5 for Japan Relief Fund !! Guys ! Japan needs ur help real bad !! People are suffering,lost their homes,friends,family and more Please Support the earthquake victims @ helpjapan(dot)co(dot)tv/"

There's quite a few off those knocking around in public Facebook searches right now. Given that the whois info for the website looks fake ("the almsn ddsfg Afghanistan"?) and it is hosted alongside what look like Call of Duty Facebook scam sites I doubt we'll be seeing this app reactivated.

Continued : http://sunbeltblog.blogspot.com/2011/03/japan-earthquake-relief-and-young-girl.html

Reply 12 : NEWS - March 24. 2011

Five men have been jailed for their roles in a huge missing-trader fraud which netted £140m.

The men were sentenced to 37 and a half years in prison in total.

HMRC said the five were motivated by pure greed. They were convicted of various counts of cheating the Revenue contrary to Common Law.

Andrew Hart (40) of Cricklewood, London, Mohammed Chaudhery (36) of Slough, Berkshire, Kevin Davis (46) of Kilburn, London, and Abdul Jabbar Butt (49) of Wembley, Middlesex set up their own limited companies, most of which traded for five weeks or less.

A fifth man, Tariq Sarwar, of Ryecroft Street, Gloucester acted as organiser. He pleaded guilty to five counts of cheating the Revenue and was sentenced to nine years in prison.

They imported mobile phones and computer chips VAT-free from other EU countries, then sold them on, with VAT added to UK customers. Each company owed the Revenue between £26.5m and £39.1m when it shut.

The money was never paid to the Rev but was laundered through various offshore firms.

Continued : http://www.theregister.co.uk/2011/03/24/hmrc_vat_fraud_sentence/

Reply 13 : NEWS - March 24. 2011

The EU has reported a "serious" cyber attack on the Commission and External Action Service on the eve of a summit in Brussels, a spokesman told the BBC.

Crucial decisions on the future structure of the EU, economic strategy and the ongoing war in Libya are to be discussed at the two-day talks.

Details were not given but other sources compared the attack to a recent assault on France's finance ministry.

"We're often hit by cyber attacks but this is a big one," one source said.

The European Commission has been assessing the scale of the current threat and, in order to prevent the "disclosure of unauthorised information", has shut down external access to e-mail and the institutions' intranet.

Staff have been asked to change their passwords.

'Serious cyber attack'

"The Commission and External Advisory Service are subject to a serious cyber attack," Antony Gravili, the spokesman for the inter-institutional relations and administration commissioner, told the BBC News website.

Continued : http://www.bbc.co.uk/news/world-europe-12840941

Also: Major cyber attack hits EU Commission and EEAS days before Brussels summit meeting

Reply 14 : NEWS - March 24. 2011

Sony claims that PlayStation 3 jailbreaker George "GeoHot" Hotz fled to South America to avoid legal action. But according to Hotz, he's just on vacation.

Earlier this week, Sony filed papers in a California court, which accuse Hotz of fleeing the country to avoid handing over "components of his hard drives as requested" to the court. Sony says Hotz has attempted "to dodge this Court's authority," which raises "very serious questions" about Hotz and his defense in Sony's lawsuit against him.

According to a post by Hotz on his blogspot blog, "GeoHot Got Sued," the hacker is actually just in South America for some much-needed R&R. The post, entitled "Fearmongering" [sic] reads:

Continued : http://www.digitaltrends.com/gaming/sony-playstation-3-hacker-george-hotz-denies-fleeing-to-south-america/

Also: Sony: PS3 hacker GeoHot fled to South America

Reply 15 : NEWS - March 24. 2011

A Chinese mobile security firm has been accused of bundling viruses with their anti-malware software in an expose aired on Chinese state-run television.

The expose claims the company, NetQin, partnered with another mobile software firm Feiliu to deliberately infect smartphones with malware and then charge users for removing it, according to CNET's Asian blog Sinobytes. The expose was first aired on a state-run Chinese Centeral Television program on March 15, according to the blog.

NetQin sells its mobile security app for various platforms on at least three Chinese network app stores. The country's three major cellular communications companies-China Mobile, China Telecom and China Unicom-have blocked sales of the software through their app stores for the time being pending further investigation, according to both Asian branches of ZDNet and CNET. The carriers have also stopped all payment processes, preventing NetQin from charging customers for the updates on their phone bills.

When users downloaded and installed the NetQin antivirus application on their device, it allegedly downloaded the malware from Feiliu. It is unclear at this time whether Feiliu is a legitimate tool that happened to be malware-ridden or if it was a stand-alone virus.

Continued : http://www.eweek.com/c/a/Security/NetQin-Accused-of-Bundling-Malware-with-AntiVirus-Software-560890/

CNET Asia: Anti-virus maker NetQin found to be infecting and defrauding its users

Reply 16 : NEWS - March 24. 2011

Yesterday we learned that Elizabeth Taylor, an American icon for some seven decades, died of congestive heart failure at 79. Today, Kaspersky Lab expert Dmitry Bestuzhev informs us that the news of her death is being exploited via social engineering scams on Twitter.

The scam uses a shortened, malicious link that has been in circulation since November of 2010, and has been used in various pay-per-click scams by the same affiliate program.

If nothing else, the scam proves Elizabeth Taylor was an international star, as the phishing scam successfully lured and hooked individuals from 48 countries.

This news comes with little surprise, as trends of exploiting high profile world events to propagate phishing scams and spread malware becomes more and more commonplace.

https://threatpost.com/en_us/blogs/elizabeth-taylors-death-triggers-spam-campaign-032411

Reply 17 : NEWS - March 24. 2011

Kaspersky Lab is still monitoring malicious websites involved in the recent Japan spam campaigns.

For those who may have missed the two first blogs, you can read them here and here However, today we discovered than some of the payloads were not the usual Trojan-Downloader.Win32.CodecPack.*.

Instead, the payload is now Ransomware (detected as Trojan-Ransom.Win32.PornoBlocker.jtg), disguising itself as a fake warning message from the German Federal Police. The message pretends that your computer has been blocked because it was found to be hosting child pornography.

Victims are asked to pay a 100 euros fine to unlock the machine.

As if the German police logo wasn't enough, they also use logo from anti-virus companies such as Kaspersky Lab to look more convincing.

On successful exploitation, the malware hijacks the desktop to display the following warning: [Screenshot]

The victim can no longer use their computer, unless they pay a 100 euros ransom. Here is a translation of the blackmail test:

Continued :http://www.securelist.com/en/blog/6155/Ransomware_Fake_Federal_German_Police_BKA_notice#readmore

Reply 18 : NEWS - March 24. 2011

Google leveled new charges against China this week, claiming that the country has interfered with some citizens' access to the Internet giant's Gmail service, disguising the interference as technical glitches.

Security experts say that China is most likely using invisible intermediary servers, or "transparent proxies," to intercept and relay network messages while rapidly modifying the contents of those communications. This makes it possible to block e-mail messages while making it appear as if Gmail is malfunctioning.

Companies regularly use transparent proxies to filter employees' Web access. Some ISPs have also used the technique to replace regular Web advertisements with those of their own. But it's becoming increasingly common for governments to use transparent proxies to censor and track dissidents and protestors. All traffic from a certain network is forced through the proxy, allowing communications to be monitored and modified on the fly. Intercepting and relaying traffic is known as a "man in the middle" attack.

"What you are doing is rewriting the content as it is delivered back to the user," says Nicholas J. Percoco, the head of SpiderLabs, which is part of the security firm Trustwave. Percoco said China's ISP could track everyone who uses Gmail. To do this, it would "inject a JavaScript keystroke logger, which would record every keystroke they typed on the service."

Robert Lemos article continued : http://www.technologyreview.com/web/37074/

Reply 19 : NEWS - March 24. 2011

If you got a call from a legitimate security source informing you that your website was infected, would you take action?

I certainly would, which is why I am rather frustrated when we take time to reach out to an organisation about a web infection, and they deliberately choose to do nothing about it.

Case in point: In January, Sophos contacted a Milan-based law firm, specialists in Intellectual Property, to inform them that its site was infected with Mal/Iframe-Gen. [Screenshot]

Turns out that they have not acted on the information we provided. In fact, if you look below, it looks like they haven't updated their site since November last year. We contact the firm again yesterday, and they are simply uninterested in dealing with the infection on their website.

Continued : http://nakedsecurity.sophos.com/2011/03/24/infected-website-ignored-by-law-firm/

RAM and Processor for VMWare

Hello Forum,



I don't know whether this is the right place to ask this question but please accept my aplogise in advance.



I want to install VMWare on my hp dv6.




Quote:







I want to know how much RAM and Processors should I dedicate to VMWare, Please before giving me your advice. Please note what I am trying to achieve in here.


I do alot of shopping via Credit card and other services and also I use to access company confidential things etc, So I dont want to use my laptop for other purposes, As I dont want that information to be leaked...



With VMWare what I will do:

Video rendering, Software installation and designing, watching movies, internet. Means all the heavy load will be performed in VMWare.



So please suggest how much RAM and Processor should I dedicate to VMWare.



Hardware: I7, 6GbRam

Host OS: Win 7

Guest OS: Win XP.



Thanks.

Reply 1 : RAM and Processor for VMWare

Are you Win7 Home Premium or Pro?



VMWare is nice, but I had problems with it hogging my processor and running it at 100% of whatever I allocated to it. If you have 7Pro or higher, you can download the XP Mode, which is pretty darned handy and integrates better into your system. If you don't have pro or higher, it's a very easy hack to get.

Reply 2 : RAM and Processor for VMWare


Quote:








Originally Posted by anseio
View Post

Are you Win7 Home Premium or Pro?



Win7 Home Premium ):



VMWare is nice, but I had problems with it hogging my processor and running it at 100% of whatever I allocated to it. If you have 7Pro or higher, you can download the XP Mode, which is pretty darned handy and integrates better into your system. If you don't have pro or higher, it's a very easy hack to get.



Previously I Installed VMWare assigning 1 Gb Ram and 1 Processor and you are right, all the time 100% Consumed both, even with small programs. So I remove it and that is the reason I ask this question.



I would love to see the hack and get my Home to Preofessional



Thanks man for the reply..

I hope someone can clarify it more as the minimum requirements according to my needs..

Reply 3 : RAM and Processor for VMWare

There are known issues with vmware sometimes maxing out its CPU allocation regardless of load. I could find no solution.



Check your private messages.

Reply 4 : RAM and Processor for VMWare

I don't think you should do video rendering on a virtual system. You are really slowing your system down by wanting to do all the heavy stuff in the virtual system. I would not recommend it.



If you must then assign as much resources as possible to the virtual system. I assume if the virtual system is running you will run it full screen and not use the normal windows at all. And if you are online banking / shopping the virtual machine will not be running.



I don't think what you are doing is a good solution. Invest some money in something like Norton Internet security. It has Anti phishing (anti spy ware), Identity protection (makes sure applications are not sending private data such as CC no) and Safe web (makes sure you are really using your banks site and not some redirected phishing site). This should make you feel save.



I normally would not recommend Norton IS but in your case I guess you will feel safer with it. A good Virus scanner and melware scanner is normally more than enough.

Reply 5 : RAM and Processor for VMWare

Processor? On a core duo I'm fine with giving it all cores, although if you want to actively use your "native OS" you might want to retain 1 or 2 cores for it.



RAM -> depends on what you want to do. Just fiddle around or actively use it. Just go by the manufacturer's specs for the OS, also, the allocated amount isn't gone, it's just in use when VMWare is Open.

On that note - on a 32Bit OS you can easily give a Virtual Machine (running one) 1024-1536MB of RAM without many issues.

Reply 6 : RAM and Processor for VMWare

There other alternative than VMWare like Virtual box.



If you really are concern about security, this is what I would recommend:



1. Use the host for video heavy stuff like video editing, photo editing, game etc.

2. create a VM, call it 'danger zone'. Use this for you xxx, facebook etc. sites

3. create a VM, call it 'safe zone'. use this for online banking etc.

4. never use the host OS to open anything that is suspicious(thus don't use the browser there)



Now you should be fine as whatever virus is contained in danger zone. You don't need huge resources to run these VMs. I have 2 XP each with 256M for this kind of thing and you can easily increase that to 512M or more and most of the time, you don't need to run them simultaneously. My XP vm boot up really fast as well, like < 10 seconds.

Reply 7 : RAM and Processor for VMWare

Thanks Guys,



Awesome suggestions..



anseio: Thanks for the PM, I will let you know..



wave: I noted your points and they are valid I guess, I already have Kaspersky Anti Virus but I can upgrade it to Kaspersky Internet security for free.



DetlevCM: I am 64Bit and I guess if I use VM the way I mentioned then I should give the maximum to the guest OS. If the guest OS is not running then I have all the cores and RAM available for my Host OS.



chimpanzee: This is what I called out of the box thinking. great. I guess this is a great idea. I will use my Host OS for heavy weight stuff and the VM's for as mentioned above.

What are your recommendation for Virtual Box. Is it VMWare or something else. Please guide..



thanks again for everyone..

Reply 8 : RAM and Processor for VMWare

If you're fullscreening vmware with nothing in the background... just give it all CPU and like 4GB of RAM.



I don't know why you'd want to do it in a VM. You can secure your host OS just fine.





edit: But if you are feeling a bit paranoid do what Chimp says.

F13 Screen - dark band

Hello there, I just switched on my new vpcf13s0e for the first time and it takes you throught a series of windows set up screens with a light blue background. On looking very closely at the screen, I can see a slight dark band along the bottom edge about 5mm wide all the way across. I have never owned a computer before so I am wondering if this is a normal charachteristic of laptop screens or whether there is a slight defect with the screen. It is only a little darker than the rest of the screen so maybe it is within the normal tollerance? Does anyone else have the same model with this "dark band"? It is the premium 1080p version. (Maybe I'm just being overly fussy cos it cost so much?)



Thanks

Friday, March 25, 2011

Building A Vintage PC

I'm trying to build an older PC for all of my old games. My question is, if I try building a PC with 2 256MB RAM modules and a NVIDIA GeForce 2 card, what kind of tower would I need to buy? Also, I'm trying to go for AMD for a processor and I want to know which of the NVIDIA GeForce 2 series is the best? The Ultra, GTS, MX, Pro, or Ti? Finally, with processors what is the best one that will support my motherboard for either Intel or AMD?

Reply 1 : Building A Vintage PC

Umm if I remember correctly the Ultra was the most powerful version of Nvidia cards back then. It would help if you gave us the motherboard socket in order to recommend a processor. My old comp was built using a AMD Athlon 3400+

Reply 2 : Building A Vintage PC

In the end, it would probably be cheaper just to build a modern pc. It could run all your old games, AND all your new games. Not sure on the processor, but for Intel, maybe the Pentium series (I remember that my family desktop is a 2.8GHz Pentium 4 with 512mb of ram)



And Ultra was the best Nvidia card back then

Reply 3 : Building A Vintage PC

buy one off of craigslist tons of P4's on there.

Reply 4 : Building A Vintage PC

Craigslist or eBay. There are tons of really old machines that were used by businesses that you can pick up for a song. I had a P4 tower for a little while that ran Windows 98 with a Voodoo3. Total cost was less than $150, and that was about 6 years ago so. I don't doubt you could buy one for even less.

Reply 5 : Building A Vintage PC


Quote:








Originally Posted by APersonOnALaptop
View Post

I'm trying to build an older PC for all of my old games.



Check out Good Old Games (http://www.gog.com). They sell several older classic games for $5-$10 each. They are essentially older DOS / Win 3.1 / Win95 games that come in pre-configured DOSBox wrappers. They have full manuals in PDF, are clock-throttled to run on modern hardware, do not contain any DRM, and operate within non-DOS operating systems like Windows 2000 / XP / Vista / 7. It is definitely worth the money (even if you are re-buying a game you already own), because you don't have to deal with getting an old machine configured and running.





If you are dead-set on getting an older machine, I would go with Saturnotaku's advice - buy an already-built machine. Trying to build your own machine by buying your own parts is going to be a headache. Parts are going to be hard to find, they are going to be more expensive than buying an already-built system, and you can't get support if anything is defective or needs RMA. Just buy a pre-built system from the Pentium II / Pentium III era, and replace parts from it as needed.




Quote:








Originally Posted by KillerBunny
View Post

In the end, it would probably be cheaper just to build a modern pc. It could run all your old games, AND all your new games.



The problem with building a modern PC is driver support for older OS'es. I know people with Core i3/i5/i7 machines, that still keep old 486's in a closet somewhere, and pull them out whenever they want to play retro games.



They don't do that because of money or performance. They do it because of compatibility... you can't find Windows 95 or DOS drivers for a modern card like a GeForce GTX560Ti.

Reply 6 : Building A Vintage PC


Quote:








Originally Posted by APersonOnALaptop
View Post

My question is, if I try building a PC with 2 256MB RAM modules and a NVIDIA GeForce 2 card, what kind of tower would I need to buy?



You really should post this at NBR's sister site, DesktopReview.com, since NBR isn't really the venue for this discussion.




Quote:








Originally Posted by APersonOnALaptop
View Post

Also, I'm trying to go for AMD for a processor and I want to know which of the NVIDIA GeForce 2 series is the best? The Ultra, GTS, MX, Pro, or Ti?



The Ultra series were nVidia's top of the line gaming videocards. In fact, I still have two, fully functional BFG GeForce 6800 Ultra videocards. They remain one of the more powerful AGP graphics cards today.

Reply 7 : Building A Vintage PC


Quote:







They don't do that because of money or performance. They do it because of compatibility... you can't find Windows 95 or DOS drivers for a modern card like a GeForce GTX560Ti.


Is there really a problem? I thought you can emulate anything.

Reply 8 : Building A Vintage PC


Quote:








Originally Posted by Lieto
View Post

Is there really a problem? I thought you can emulate anything.



Well, there are two approaches to playing old games:



(1) Use emulation tools and compatibility programs like DOSBox (or, buy games with pre-packaged and pre-configured DOSBox wrappers from Good Old Games). You can run these programs on just about any modern hardware and any modern OS.



OR



(2) Forget emulation, forget the headache of tweaking DOSBox, and forget re-buying games I already own from Good Old Games. Run native, by re-creating the original DOS / Win3.1 / Win95 environment. You need to specifically get your hands on hardware that has direct driver support for these old environments.





The Original Poster is asking specifically about Option #2 - building a machine for native execution. The option that you suggest (emulation) would require the OP to switch to Option #1.



For what it's worth, I believe that Option #1 (emulation and DOSBox) is the way to go. It's cheaper, more easily supported in the future on just about any OS, and doesn't require you to maintain 10+ year old hardware.

Reply 9 : Building A Vintage PC

This is what I've gotten to so far (Keep in mind that some older parts aren't around anymore):

AMD Sempron 2200+

512MB DDR RAM (2x256)

3dfx Voodoo5 5500



-Any help on what motherboard I could get, and what Shell I need? I am looking for a 20GB Hard Drive right now....

Upgrading Laptop Monitor/Memory/Video

Hi guys, so I apologise if this is in the wrong place, or if I could find this info elsewhere. There's just a bunch of stuff I'm not sure of so thought it would be easiest to ask it all in one place.

So I have a HP dv9000, bought it maybe 3-4 years ago. It only has 1GB RAM (lol) and has an Intel Core 1.8 Ghz processor. Basically, I am looking to hook up an extra 22-25 inch monitor and want to upgrade anything necessary to make it run smooth (but do it as cheaply as possible). Wanna run the external monitor at the same time as my laptop display obviously. I'm running Windows 7.

So the first thing is RAM, I'm assuming 2.5GB RAM is enough to run smoothly, so I figure just buy a 2GB stick since this computer has 2 500MB sticks. This all right or is 2.5 kinda on the small side these days? Clearly, 1GB sucks and my computer is fairly slow haha.

The rest is where I lose any certainty. The stock graphics card is a GeForce Go 7600, and I have one VGA connection and an expansion port.

Do I need to replace the video card, and if so do I need to buy some kind of connector to have a second monitor? I have hooked up a monitor before but I could only use that or the laptop, not both at the same time. Is a 1.8Ghz processor enough for what I wanna do?

Pretty much anything I need to do to safely upgrade the computer so it can handle an extra monitor, and as cheaply as possible. Can you help?

Thanks in advance for replies. If there are any more details you need let me know!

edit: Just thought I'd chuck in I'm not really using it for intense gaming. I play online poker, and watch movies on my computer and that's pretty much it except for word processing etc.

Firefox 4 installation has screwed up Firefox for me

Windows 7, HP dv7 1000 series, I was running FF3.1.6** with no problems. FireFox itself prompted me to move up to FF4 and I was fine with that until I downloaded it, but did not get a Run or a setup prompt. It apparently downloaded it, and if it actually did install itself, it did something wrong because now FF crashes every time I use it. Initially it crashed immediately, now it crashes after 3 or 4 minutes of browsing, usually on the third change of site.

Anybody come across this? Any suggestions? One thing I'd like to do is to save my bookmarks, but I've forgotten how.

The aged and decrepit, and now irritated Rob Boyter

Did you know that 'Mandrake' is an internal code name?

For the M18x!



Google Translate



This is too funny, it also has Inap's M15x in there.



One translated section says....


Quote:







A surface is almost from Alienware unused yellow and white, reflective effect from the point of view, such as through the paint surface treatment. "MANDRAKE" label, may be internal development code name, of course, is the publisher does not rule out the possibility of signing. "


They actually think the two M15x systems is the new M18x.

Reply 1 : Did you know that 'Mandrake' is an internal code name?

According to Eric G from Dell Posterous (pretty much the guy who broke the news abt the M18x), the codename of the M18X is "Avenger"

Reply 2 : Did you know that 'Mandrake' is an internal code name?

Yeah, I saw his blog. I actually thought he worked for Dell but now it seems Dell is unhappy with the blog.

Reply 3 : Did you know that 'Mandrake' is an internal code name?


Quote:








Originally Posted by Mandrake
View Post

For the M18x!



Google Translate



This is too funny, it also has Inap's M15x in there.



One translated section says....





They actually think the two M15x systems is the new M18x.



Classic

Wednesday, March 23, 2011

Video storage online

My vid files are from my digi cam H-264 MPG4. Flickr has a 90 second maximum and webshots won't accept any of my MPG4 vids.
Any suggestions for storage og MPG4 files?
txs

m11xr2 hdmi output not working

I connected my 42 inch hdtv to the m11xr2 with hdmi and when i switch to the TV screen view (FN + F1), it doesn't work.



it doesn't show up at all. I just re-installed the latest driver for the 335m and still doesn't work.



Am i missing something trivial here?

Reply 1 : m11xr2 hdmi output not working

Try Windows Key + P and try set Duplicate or Extend. Also, make sure that you're already on the HDMI channel on your TV.



By the way, HDMI output is handled by the Intel GPU on the M11xR2.

Reply 2 : m11xr2 hdmi output not working


Quote:








Originally Posted by namaiki
View Post

By the way, HDMI output is handled by the Intel GPU on the M11xR2.



Really? I didn't know that...

Reply 3 : m11xr2 hdmi output not working


Quote:








Originally Posted by MasivB
View Post

Really? I didn't know that...



For the M11x R2 which uses Optimus, the Intel GPU does output (it is turned on all the time) and the nVidia GPU which isn't connected to any screen is turned on to do processing when required or when asked and outputs through the Intel GPU.

Reply 4 : m11xr2 hdmi output not working


Quote:








Originally Posted by namaiki
View Post

For the M11x R2 which uses Optimus, the Intel GPU does output (it is turned on all the time) and the nVidia GPU which isn't connected to any screen is turned on to do processing when required or when asked and outputs through the Intel GPU.



Does that result in worse or better HD output (compared to R1)? I would assume it helps battery life playback.. but can Intel handle HD fine? After all it is called Intel HD Graphics or is that the NVIDIA processing part of it?

Reply 5 : m11xr2 hdmi output not working


Quote:








Originally Posted by MasivB
View Post

Does that result in worse or better HD output? I would assume it helps battery life playback.. but can Intel handle HD fine? After all it is called Intel HD Graphics or is that the NVIDIA processing part of it?



For video playback that is not hardware accelerated, like DXVA, it should be identical.

Hardware acceleration is there, but it seems to be a bit dodgy depending on what program.



The nVidia side should not be needed for video playback, if that's what you mean by HD.

Reply 6 : m11xr2 hdmi output not working

sorry for the late reply, but it still doesn't work.



I've tried connecting the hdmi to my LCD monitor and the same thing happens. I get a blank screen like there's no signal. I've updated both the drivers for the 335m and the Intel GPU.



i'm gonna try updating both of them one more time.



this is frustrating, since this is my only media player to the TV. it was working fine late last year, don't know what happened.

Reply 7 : m11xr2 hdmi output not working


Quote:








Originally Posted by varinsgolf
View Post

sorry for the late reply, but it still doesn't work.



I've tried connecting the hdmi to my LCD monitor and the same thing happens. I get a blank screen like there's no signal. I've updated both the drivers for the 335m and the Intel GPU.



i'm gonna try updating both of them one more time.



this is frustrating, since this is my only media player to the TV. it was working fine late last year, don't know what happened.



Make sure you are removing them correctly otherwise its pointless

Reply 8 : m11xr2 hdmi output not working

this is what i did and it still does not work.



1) I uninstalled the drivers through control panel -> Device Manager



2) reboot into safe mode



3) opened up driver cleaner pro



4) remove Intel Extreme Driver



5) install drivers i got from Dell's website, Intel Graphics HD, the one that they recommend. and then reboot



so after that i plugged in the HDMI cable to my LCD monitor and momentarily i see a not full scale output on the LCD monitor (yay). but then after that I switch to HDMI only, then all i got is blank (nooooo). and then switching to any mode, I will not see an output on the LCD monitor.



so.. what am i doing wrong??! or are there other drivers i should try?? I don't think i need to do remove and reinstall the nvidia driver too, am i right?

VULNERABILITIES / FIXES - March 22, 2100

RealPlayer IVR File Processing Buffer Overflow Vulnerability

Release Date : 2011-03-22

Criticality level : Highly critical
Impact : DoS
System access
Where : From remote
Solution Status : Unpatched

Software: RealPlayer 14.x

Description:
Luigi Auriemma has discovered a vulnerability in RealPlayer, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error in rvrender.dll when processing Internet Video Recording (IVR) files and can be exploited to cause a heap-based buffer overflow via a specially crafted file.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in version 14.0.2.633. Other versions may also be affected.

Solution:
Do not open IVR files from untrusted sources. Disable the browser plugin.

Provided and/or discovered by:
Luigi Auriemma

Original Advisory:
http://aluigi.altervista.org/adv/real_5-adv.txt

http://secunia.com/advisories/43847/

Reply 1 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Highly critical
Impact : Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where : From remote
Solution Status : Vendor Patch

Operating System: Apple Macintosh OS X

Description:
Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) A divide-by-zero error in AirPort when handling Wi-Fi frames can be exploited to cause a system reset.

2) Multiple vulnerabilities in Apache can be exploited by malicious people to disclose potentially sensitive information and by malicious users and malicious people to cause a DoS (Denial of Service).

3) A format string error within AppleScript Studio when handling certain commands via dialogs can be exploited to potentially execute arbitrary code.

4) An unspecified error in the handling of embedded OpenType fonts in Apple Type Services (ATS) can be exploited to cause a heap-based buffer overflow when a specially crafted document is viewed or downloaded.

5) Multiple unspecified errors in the handling of embedded TrueType fonts in Apple Type Services (ATS) can be exploited to cause a buffer overflow when a specially crafted document is viewed or downloaded.

6) Multiple unspecified errors in the handling of embedded Type 1 fonts in Apple Type Services (ATS) can be exploited to cause a buffer overflow when a specially crafted document is viewed or downloaded.

7) Multiple unspecified errors in the handling of SFNT tables in embedded fonts in Apple Type Services (ATS) can be exploited to cause a buffer overflow when a specially crafted document is viewed or downloaded.

8) An integer overflow error in bzip2 can be exploited to terminate an application using the library or execute arbitrary code via a specially crafted archive.

9) An error within the "FSFindFolder()" API in CarbonCore when used with the "kTemporaryFolderType" flag can be exploited to disclose the contents of arbitrary directories.

10) Multiple errors in ClamAV can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

11) An unspecified error in the handling of embedded fonts in CoreText can be exploited to corrupt memory when a specially crafted document is viewed or downloaded.

12) An integer overflow error within the handling of the F_READBOOTSTRAP ioctl in HFS, HFS+, and HFS+J filesystems can be exploited to read arbitrary files.

13) An error in ImageIO within the handling of JPEG files can be exploited to cause a heap-based buffer overflow.

14) An integer overflow error in ImageIO within the handling of XBM files can be exploited to potentially execute arbitrary code.

15) An error in libTIFF within the handling of JPEG encoded TIFF files can be exploited to cause a buffer overflow.

16) An error in libTIFF within the handling of CCITT Group 4 encoded TIFF files can be exploited to cause a buffer overflow.

17) An integer overflow error in ImageIO within the handling of JPEG encoded TIFF files can be exploited to potentially execute arbitrary code.

18) Multiple errors in Image RAW when handling Canon RAW image files can be exploited to cause buffer overflows.

19) An error in the Install Helper when handling URLs can be exploited to install an arbitrary agent by tricking the user into visiting a malicious website.

20) Multiple errors in Kerberos can be exploited by malicious users and malicious people to conduct spoofing attacks and bypass certain security features.

21) An error within the "i386_set_ldt ()" system call can be exploited by malicious, local users to execute arbitrary code with system privileges.

22) An integer truncation error within Libinfo when handling NFS RPC packets can be exploited to cause NFS RPC services to become unresponsive.

23) An error exists in the libxml library when traversing the XPath.

24) A double free error exists in the libxml library when handling XPath expressions.

25) Two errors in Mailman can be exploited by malicious users to conduct script insertion attacks.

26) Multiple errors in PHP can be exploited by malicious users and malicious people to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

27) Multiple errors in PHP can be exploited by malicious users and malicious people to bypass certain security restrictions.

28) An error in the OfficeImport framework when processing records containing formulas shared between multiple cells can be exploited to corrupt memory and potentially execute arbitrary code.

29) An error in QuickLook when handling certain Microsoft Office files can be exploited to corrupt memory when a specially crafted document is downloaded.

30) Multiple unspecified errors in QuickTime when handling JPEG2000, FlashPix, and panorama atoms in QTVR (QuickTime Virtual Reality) movie files can be exploited to corrupt memory via specially crafted files.

31) An integer overflow error in QuickTime when handling certain movie files can be exploited to potentially execute arbitrary code when a specially crafted file is viewed.

32) An error within QuickTime plug-in when handling cross-site redirects can be exploited to disclose video data.

33) An integer truncation error within the Ruby BigDecimal class can be exploited to potentially execute arbitrary code.

This vulnerability only affects 64-bit Ruby processes.

34) A boundary error in Samba can be exploited by malicious people to potentially compromise a vulnerable system.

35) A security issue in Subversion can be exploited by malicious people to bypass certain security restrictions.

36) A weakness in Terminal uses SSH version 1 as the default protocol version when using ssh via the "New Remote Connection" dialog.

37) Some vulnerabilities in FreeType can be exploited to cause a DoS (Denial of Service) or potentially compromise an application using the library.

Solution:
Update to version 10.6.7 or apply Security Update 2011-001.

Provided and/or discovered by:
15, 16, 33) Reported by the vendor.

The vendor credits:
3) Alexander Strange.
5) Christoph Diehl of Mozilla, Felix Grobert of the Google Security Team, Marc Schoenefeld of Red Hat Security Response Team, and Tavis Ormandy and Will Drewry of Google Security Team.
6) Felix Grobert, Google Security Team and geekable via ZDI.
7) Marc Schoenefeld, Red Hat Security Response Team.
11) Christoph Diehl, Mozilla.
12) Dan Rosenberg, Virtual Security Research.
13) Andrzej Dyjak via iDefense.
14) Harry Sintonen.
17) Dominic Chell, NGS Secure.
18) Paul Harrington, NGS Secure.
19) Aaron Sigel, vtty.com.
21) Jeff Mears.
22) Peter Schwenk, University of Delaware.
28) Tobias Klein via iDefense.
29) Charlie Miller and Dion Blazakis via ZDI.
30) Will Dormann of CERT/CC, Damian Put and an anonymous researcher via ZDI, and Rodrigo Rubira Branco of Check Point Vulnerability Discovery Team.
31) Honggang Ren, Fortinet's FortiGuard Labs.
32) Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR).
36) Matt Warren, HNW Inc.

Original Advisory:
Apple:
http://support.apple.com/kb/HT4581

iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=898

http://secunia.com/advisories/43814/

Reply 2 : VULNERABILITIES / FIXES - March 22, 2100

Symantec LiveUpdate Administrator Cross-Site Request Forgery Vulnerability

Release Date : 2011-03-22

Criticality level : Less critical
Impact : Cross Site Scripting
Where : From remote
Solution Status : Vendor Patch

Software: Symantec LiveUpdate Administrator 2.x

Description:
A vulnerability has been reported in Symantec LiveUpdate Administrator, which can be exploited by malicious people to conduct cross-site request forgery attacks.

The management interface of the application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. execute arbitrary commands by tricking an administrator into visiting a malicious web site while being logged-in to the application.

The vulnerability is reported in versions 2.2.2.9 and prior.

Solution:
Update to version 2.3.

Provided and/or discovered by:
The vendor credits Nikolas Sotiriu, nikolas sotiriu - it services.

Original Advisory:
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110321_00

http://secunia.com/advisories/43820/

Reply 3 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Moderately critical
Impact : DoS
Where : From local network
Solution Status : Vendor Workaround

Software: OpenSLP 1.x

Description:
A vulnerability has been reported in OpenSLP, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the parsing of SLP extensions, which can be exploited to trigger an infinite loop by sending specially crafted SLP packets.

The vulnerability is reported in version 1.2.1. Other versions may also be affected.

Solution:
Fixed in the SVN repository for version 2.x.

Provided and/or discovered by:
US-CERT credits Nicolas Gregoire, Agarri.

Original Advisory:
OpenSLP:
http://openslp.svn.sourceforge.net/viewvc/openslp?view=revision&revision=1647

US-CERT VU#393783:
http://www.kb.cert.org/vuls/id/393783

http://secunia.com/advisories/43742/

Reply 4 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Moderately critical
Impact : DoS
Where : From remote
Solution Status : Vendor Patch

Software: Quagga 0.x

Description:
Two vulnerabilities have been reported in Quagga, which can be exploited by malicious people to cause a DoS (Denial of Service).

1) A NULL-pointer dereference error when parsing certain extended community attributes can be exploited to crash the "bgpd" daemon via specially crafted extended community attributes.

Note: Successful exploitation may require that the attacker is a directly configured peer.

2) An error within the AS path limit/TTL functionality when parsing certain AS_PATHLIMIT attributes can be exploited to reset BGP sessions by sending specially crafted AS_PATHLIMIT attributes.

The vulnerabilities are reported in versions prior to 0.99.18.

Solution:
Update to version 0.99.18.

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
Quagga:
http://www.quagga.net/news2.php?y=2011&m=3&d=21#id1300723200

DSA-2197-1:
http://lists.debian.org/debian-security-announce/2011/msg00065.html

http://secunia.com/advisories/43770/

Reply 5 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Highly critical
Impact : DoS
System access
Where : From remote
Solution Status : Vendor Patch

Software: Xpdf 3.x

Description:
A vulnerability has been reported in Xpdf, which can be exploited by malicious people to cause a DoS and potentially compromise a user's system.

The vulnerability is caused due to the Xpdf binaries for Linux being linked against a vulnerable version of t1lib.

The vulnerability is reported in the Xpdf binaries for Linux prior to version 3.02pl6.

Solution:
Update to version 3.02pl6 of the Linux binaries.

Provided and/or discovered by:
US-CERT credits Jonathan Brossard.

Original Advisory:
Xpdf:
http://www.foolabs.com/xpdf/download.html

US-CERT VU#376500:
http://www.kb.cert.org/vuls/id/376500

http://secunia.com/advisories/43823/

Reply 6 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Highly critical
Impact : Manipulation of data
Exposure of sensitive information
DoS
System access
Where : From remote
Solution Status : Vendor Patch

Operating System: SUSE Linux Enterprise Server (SLES) 10
SUSE Linux Enterprise Server (SLES) 11

Description:
SUSE has issued an update for java-1_6_0-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

Solution:
Apply updated packages via the zypper package manager.

Original Advisory:
SUSE-SU-2011:0206-1:
https://hermes.opensuse.org/messages/7707692

http://secunia.com/advisories/43813/

Reply 7 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Less critical
Impact : Cross Site Scripting
Where : From remote
Solution Status : Vendor Patch

Operating System: Fedora 13
Fedora 14

Description:
Fedora has issued an update for mailman. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks.

Solution:
Apply updated packages via the yum utility ("yum update mailman").

Original Advisory:
FEDORA-2011-2102:
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.html

FEDORA-2011-2125:
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.html

http://secunia.com/advisories/43829/

Reply 8 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Highly critical
Impact : DoS
System access
Where : From remote
Solution Status : Vendor Patch

Operating System: Red Hat Desktop 4.x
Red Hat Enterprise Linux 5 (Server)
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux Desktop 5
Red Hat Enterprise Linux ES 4
Red Hat Enterprise Linux WS 4
RHEL Desktop Workstation 5

Description:
Red Hat has issued an update for wireshark. This fixes several vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

1) A boundary error within wiretap/pcapng.c when processing certain pcap-ng files can be exploited to cause a heap-based buffer overflow.

Solution:
Updated packages are available via Red Hat Network

Original Advisory:
RHSA-2011:0370-1:
http://rhn.redhat.com/errata/RHSA-2011-0370.html

http://secunia.com/advisories/43821/

Reply 9 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Moderately critical
Impact : DoS
Where : From remote
Solution Status : Vendor Patch

Operating System: Debian GNU/Linux 5.0
Debian GNU/Linux 6.0

Description:
Debian has issued an update for quagga. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

Solution:
Apply updated packages via the apt-get package manager.

Original Advisory:
DSA-2197-1:
http://www.debian.org/security/2011/dsa-2197

http://secunia.com/advisories/43499/

Reply 10 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Not critical
Impact : DoS
Where : Local system
Solution Status: Vendor Patch

Software: PaX

Description:
A vulnerability has been reported in PaX, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the heap / stack gap functionality, which can be exploited to trigger an infinite loop via certain mmap operations.

Solution:
Update to version 2.2.1-2.6.32.33.

Provided and/or discovered by:
Francisco Blas Izquierdo Riera

Original Advisory:
grsecurity:
http://grsecurity.net/changelog-stable.txt

Francisco Blas Izquierdo Riera:
http://www.openwall.com/lists/oss-security/2011/03/21/15

http://secunia.com/advisories/43791/

Reply 11 : VULNERABILITIES / FIXES - March 22, 2100

RealWin FlexWin Connection Packet Processing Buffer Overflow Vulnerabilities

Release Date : 2011-03-22

Criticality level : Moderately critical
Impact : System access
Where : From local network
Solution Status : Unpatched

Software: RealWin 2.x

Description:
Luigi Auriemma has discovered multiple vulnerabilities in RealWin, which can be exploited by malicious people to compromise a vulnerable system.

1) A boundary error when processing "On_FC_CONNECT_FCS_LOGIN" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

2) A boundary error when processing "On_FC_CTAGLIST_FCS_CADDTAG", "On_FC_CTAGLIST_FCS_ADDTAGMS", and "On_FC_BINFILE_FCS_OPENREADFILE" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

3) A boundary error when processing "On_FC_CTAGLIST_FCS_CDELTAG" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

4) A boundary error when processing "On_FC_RFUSER_FCS_LOGIN" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

5) A boundary error when processing "On_FC_BINFILE_FCS_DIRLIST" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

6) An input validation error when processing "On_FC_MISC_FCS_MSGBROADCAST" packets can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to TCP port 910.

7) An input validation error when processing "On_FC_MISC_FCS_MSGSEND" packets can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to TCP port 910.

8) A boundary error when processing "On_FC_CGETTAG_FCS_GETTELEMETRY" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

9) A boundary error when processing "On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

10) A boundary error when processing "On_FC_CPUTTAG_FCS_SETTELEMETRY" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

11) A boundary error when processing "On_FC_CPUTTAG_FCS_SETCHANNELTELEMETRY" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

12) A boundary error when processing "On_FC_SCRIPT_FCS_STARTPROG" packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 910.

Successful exploitation of the vulnerabilities allows execution of arbitrary code.

The vulnerabilities are confirmed in version 2.1 Build 6.1.10.10. Other versions may also be affected.

Solution:
Restrict access to trusted hosts only (e.g. via network access control lists).

Provided and/or discovered by:
Luigi Auriemma

Original Advisory:
http://aluigi.altervista.org/adv/realwin_2-adv.txt
http://aluigi.altervista.org/adv/realwin_3-adv.txt
http://aluigi.altervista.org/adv/realwin_4-adv.txt
http://aluigi.altervista.org/adv/realwin_5-adv.txt
http://aluigi.altervista.org/adv/realwin_6-adv.txt
http://aluigi.altervista.org/adv/realwin_7-adv.txt
http://aluigi.altervista.org/adv/realwin_8-adv.txt

http://secunia.com/advisories/43848/

Reply 12 : VULNERABILITIES / FIXES - March 22, 2100

SUSE aaa_base Tab Expansion Filename Handling Privilege Escalation

Release Date : 2011-03-22

Criticality level : Less critical
Impact : Privilege escalation
Where : Local system
Solution Status : Vendor Patch

Operating System: openSUSE 11.3

Description:
SUSE has acknowledged a vulnerability in aaa_base, which can be exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to an error within the handling of filenames containing meta characters when performing tab expansions, which can be exploited to e.g. trick another user into executing arbitrary commands via specially named files.

Solution:
Apply updated packages via the zypper package manager.

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
openSUSE-SU-2011:0207-1:
https://hermes.opensuse.org/messages/7712778

http://secunia.com/advisories/43825/

Reply 13 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Moderately critical
Impact : Privilege escalation
DoS
System access
Where : From remote
Solution Status : Unpatched

Operating System: Linux Kernel 2.6.x

Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS and potentially compromise a vulnerable system.

The vulnerabilities are caused due to various errors within the implementation of the ROSE protocol and can be exploited to e.g. cause memory corruptions via specially crafted FAC_CCITT_DEST_NSAP or FAC_CCITT_SRC_NSAP fields.

Solution:
Restrict access to trusted users only. Do not use the ROSE protocol.

Provided and/or discovered by:
Dan Rosenberg and Ben Hutchings.

Original Advisory:
http://www.spinics.net/lists/netdev/msg158874.html
http://www.spinics.net/lists/netdev/msg158900.html

http://secunia.com/advisories/43846/

Reply 14 : VULNERABILITIES / FIXES - March 22, 2100

Release Date : 2011-03-22

Criticality level : Less critical
Impact : Exposure of system information
Exposure of sensitive information
Where : From local network
Solution Status : Unpatched

Software: TIOD 1.x (iPhone/iPod touch)

Description:
A vulnerability has been discovered in TIOD, which can be exploited by malicious people to disclose potentially sensitive information.

Input passed to the "Ready 4 Others" FTP functionality of the application is not properly sanitised before being used to access files. This can be exploited to access files outside of the application root and e.g. download an iPhone address book via directory traversal attacks.

Note: The "Ready 4 Others" FTP functionality is not enabled by default and only accessible through WLAN.

The vulnerability is confirmed in version 1.3.3. Other versions may also be affected.

Solution:
Only use the "Ready 4 Others" FTP functionality within a trusted WLAN.

Provided and/or discovered by:
R3d@l3rt and H@ckk3y.

Original Advisory:
http://www.exploit-db.com/exploits/16271/

http://secunia.com/advisories/43789/

Can Ping a PC on network but can not access it

Hi all

I facing an irritating problem for the last few days.... I m using my office network, the printer is installed on a desktop, all my colleagues can acces it, but when I try I can't. I can even ping the computer but can not access the shared resources on it.... a message appears when i try to access the IP " No network provider can accept the given path"

I m unable to access even my own PC and the above mentioned message appears. My firewall is off.

Reply 1 : Can Ping a PC on network but can not access it

Let's hope your IT and network guys understand the links from http://www.google.com/search?q="No+network+provider+accepted+the+given+network+path".

It's a slightly different error message ("accepted" in stead of "can accept"), but that might not be a problem.

Kees

Reply 2 : Can Ping a PC on network but can not access it

Since this is an office environment your first step would be to see what your IT Department has to say.

If they experience difficulty, then may be the article below will help;
http://support.microsoft.com/?kbid=841570

I wasn't sure I understood your last sentence, you are "unable to access even my own PC and the above mentioned message appears". Access your computer from where?

Mark

Reply 3 : Can Ping a PC on network but can not access it

Ideally when u access your computer by putting ur own IP in RUN, then it shows ur shared folders and printers etc. but in my case when i put my own IP it returns the same message as in the case of another computers. i hope u understand what i mean.

HD camcorder for Final Cut Pro

I'm having troubles finding a decent HD prosumer camcorder that I can use Final Cut Pro with. From my research, the AVCHD format isn't compatible. Does anyone know which formats/camcorders work on the Mac?

Reply 1 : HD camcorder for Final Cut Pro

http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?mco=FA147F0&nplm=TH102LL%2FA
http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?mco=945A5CB0&nplm=TK798LL%2FA

Head to the Apple Store to see if they have it set up for you to try out.

Bob

Reply 2 : HD camcorder for Final Cut Pro

That means the HVR-A1 will work as well - that said, and of the miniDV tape based high-definition camcorders (connecting via FireWire) from Sony (FX1 and FX7) or Canon will be fine. They are all 1080i. There is only one 1080p camcorder out there from Panasonic, but it is a bit pricey (US$8,000+).

To the best of my knowledge there is currently no Windows or Macintosh based video editor that can deal with AVCHD-based compression. Sony has indicated a Spring upgrade to Vegas (Windows only) - but nothing, yet. Note that the Sony high definition camcorders which are hard drive or DVD based use AVCHD - as does a new Panasonic. There is a JVC high definition camcorder that is hard drive based that does not use AVCHD...

None of the miniDV tape based high-definition camcorders use AVCHD compression...

Oh... I edit on a G5 flat panel iMac using iMovie and FinalCut Pro... and I have also used my HC1 on my son's CoreDuo flat panel iMac with iMovie.

Reply 3 : HD camcorder for Final Cut Pro

The SONY HDR-HC3 is cheapest pro-sumer High Definition camcorder I've found that works with Final Cut Pro HD

Reply 4 : HD camcorder for Final Cut Pro

Hi, I'm trying to capture HD picture from my sony HDR-HC3E into Final Cut Pro HD 4. There is an option to capture from DVCPRO HD 1080i60 which I've tried many times. I've changed settings on the camera and nothing seems to work, Would it be because this HD camera is 1080i/576i and not 1080i/60i????
FCP takes control of the deck when I have a DV recorded tape in the camera no problems....Any suggestions please?? Thanks a million

Reply 5 : HD camcorder for Final Cut Pro

used by your Sony HDR-HC3...

Is the video on the tape form the HDR-HC3? If so, using the DVCPRO option will not understand the DVCPRO format.

Is the video on the tape from a Panasonic high definition camcorder? If so, the HDR-HC3 will not understand what to do with that format.

You camera records high definition in HDV to miniDV tape...

I don't know about "Final Cut Pro HD 4", but I know a little about FinalCutPro 5.1.4... In the Audio/Video settings, the Apple Intermidiate Codec 1080i60 is the Sequence Prest selection; the HDV-Apple Intermediate Codec is the Capture Preset and the Device Control Preset is Sony HDV FireWire...

I use a Sony HDR-HC1...

10.6.7 is out.

update your Macs, folks.




Quote:







he 10.6.7 Update is recommended for all users running Mac OS X Snow Leopard and includes general operating system fixes that enhance the stability, compatibility, and security of your Mac, including fixes that:



- Improve the reliability of Back to My Mac

- Resolve an issue when transferring files to certain SMB servers

- Address various minor Mac App Store bugs



For detailed information on this update, please visit this website: http://support.apple.com/kb/HT4472.

For information on the security content of this update, please visit: http://support.apple.com/kb/HT1222.


OS X 10.6.7 Update: http://support.apple.com/kb/DL1363



OS X 10.6.7 Combo Update: http://support.apple.com/kb/DL1361



OS X Server 10.6.7 Update http://support.apple.com/kb/DL1362



OS X Server 10.6.7 Combo Update http://support.apple.com/kb/DL1364



Security Update 2011-001 (Client) http://support.apple.com/kb/DL1366



Security Update 2011-001 (Server) http://support.apple.com/kb/DL1367



10.6.7 Server Admin Tools http://support.apple.com/kb/DL1365

Reply 1 : 10.6.7 is out.

Thanks for the heads-up.

Hopefully, it'll address the issues some of you guys are having with your MBPs freezing. They're very nice machines .

Reply 2 : 10.6.7 is out.

sweet! .

Reply 3 : 10.6.7 is out.

Do you guys have problem after update to this version? I can't connect to my internet connection after I update to this version. I have Macbook pro early 2010. Anyone else have this problem?

Reply 4 : 10.6.7 is out.

Nope, my 2011 13" MBP is actually acting a little better especially now that it can output video via VGA without issues to my monitor at work (I was running into problem outputting high resolution video and was forced to use 1024X78 but now that problem has been solved).

Reply 5 : 10.6.7 is out.

No problems... no improvements that I have noticed either.

URGENT HELP for a dead mac, I'm stranded in Panama!

Hey, I know some stuff about computers but this site had forums and seems really popular so Im hoping one of you guys on this site can help me out since Im so stressed i havent the time nor patience to try and figure out the mac website so heres the deal.

I just moved to panama, im working in a tiny little fishing village 5 or 6 hours from panama city and 45 min to the closest (very small) town so i cant get to a lifesaving genius bar and my computer has all my photos and documents for my company's website and advertising along with all my music and stuff. All but the media in the last 3 weeks has been backed up but theres been a ton in that time plus my computer is the only way i can talk to my ex'wife and kid.

I was on facebook earlier today and the harddrive (i think) made some weird clicks ive never heard (the harddrive has been replaced in thes notebook once already 2 years ago) i kept getting the rainbow pinwheel loading nothing for a sort of long time and id type a chat message and the pinwheel would come up for a minute then id type a couple words then it happened again. so i (probably a bad idea.. im retarded) just held the power button down to restart. When i booted up again i get the "bdrahhh" but then it goes to just the grey screen. Last time the hard drive went it did that but there was a folder with a question mark in it so I am super frustrated and stressed but I have a sliver of hope cuz that little question folder icon isnt there. I looked on a few sites online and they say to start it up with an external hard drive and hold down C and put in the mac os X cd but the problem with being a scuba instructor, kiteboarder and photographer is i have so much heavy **** to travel with I ditch anything not nessicary to survival or work so i dont have any of the cds or start up discs except for an ilife 06 burnt copy cd.

thats my situation, If someone can help me out youll be a ******* hero to me forever, hope all my **** isnt lost, thanks

Reply 1 : URGENT HELP for a dead mac, I'm stranded in Panama!

will miraculously come back to life.
The weird clicks and the grey screen to not bode well for the health of your hard drive.

Given that you have nothing to boot this machine from, other than the external drive, I would suggest that you pack it away and deal with it when you get back to home base.
At the very least, I would suspect that you will need a new hard drive.

Extracting the data from the old hard drive is another matter. It "might" mount if it were attached to another computer but there is no guarantee.
All is not lost though. There are a number of excellent companies that specialize in retrieving data from crashed hard drives but, brace yourself, the cost is very high.
It is at this point that you make the decision as to what the missing data is actually worth.

P

Reply 2 : URGENT HELP for a dead mac, I'm stranded in Panama!

I'd concur, what you describe is classic failing HDD symptoms.

If you get an external enclosure you MIGHT be able to get SOME of the data off the old drive, but I wouldn't go getting my hopes up, and then you need to contend with the fact that you would need a new drive with a copy of Mac OS X on it.

As said, there are companies that deal with data recovery, but we're talking about $500 for them to just look at the drive and see whether or not they can do anything with it. Grand total you will probably be looking at something in the neighborhood of $2,000 or more, depending on how much effort they have to go to in order to retrieve data.

May not be much consolation, but the drive was going to die no matter what you did. Even if you had it in an Apple store at the time it started acting up, there's probably nothing they could have done. Truth be told, Apple's odd hiring practices often leads to some pretty clueless "geniuses".

At this point, you're going to need a new drive and copy of Mac OS X just to get back up and running without any data retrieval. Data retrieval will be expensive, and will also likely be a couple of weeks minimum for them to get it back to you, so you may just be better off starting from scratch. And this time, make sure you get a SECOND drive to use as a time machine backup drive. Help avoid these kinds of things in the future.

no HDMI sound on tv though computer

I know there have been numerous threads like this, but my is different. I used to use a sharp 40" LCD tv with my xps1330 no problems. I moved and now I have an insignia LCD tv. When i connect my computer to the tv with an HDMI cable and changed my sound settings to HDMI as my output I do not get any sound out. The green bar on the right moves up and down with music I play like it used to. I have tried using different HDMI ports on the tv and none of them with any luck. I have gone though the settings in my computer to DTS, Dolby and Windows at all the different Hz and no luck even with the test. I have looked though the TV's sound settings as well and can not seem to find anything. I used my HDMI cable about 3 months ago and it was working then. I used an xbox HDMI cable and that didnt work either.

Thanks for the help

Tuesday, March 22, 2011

UPDATES - March 20, 2011

TrojanHunter Ruleset Update - Mar 20, 2011
You should have 371689 rules
http://www.misec.net/forum/board/RulesetUpdates/1300619984

My program is showing 371687

Reply 1 : UPDATES - March 20, 2011

Latest ClamAV? stable release is: 0.97
ClamAV Virus Databases:
main.cvd ver. 53 released on 14 Nov 2010 09:58 :0500 (sig count: 846214)
daily.cvd ver. 12864 released on 19 Mar 2011 22:42 :0400 (sig count: 74876)
bytecode.cvd ver. 142 released on 08 Mar 2011 13:28 :0500 (sig count: 40)
safebrowsing.cvd ver. 28080 released on 20 Mar 2011 06:45 :0400 (sig count: 652355)

http://www.clamav.net/

Reply 2 : UPDATES - March 20, 2011

The latest iAVS update was published on: 20.03.2011 - 110320-0
http://www.avast.com/download-update
http://www.avast.com/virus-update-history

Reply 3 : UPDATES - March 20, 2011

The latest iAVS update was published on: 20.03.2011 - 110320-1
http://www.avast.com/download-update
http://www.avast.com/virus-update-history

Reply 4 : UPDATES - March 20, 2011

March 20, 2011
http://www.grisoft.com/us.download-update
http://free.avg.com/us-en/download-update

Reply 5 : UPDATES - March 20, 2011

Last updated: 2011-03-20 10:57:
http://www.emsisoft.com/a2/changelog/personal//?showmalware=updates
http://www.emsisoft.com/en/support/malware/

Reply 6 : UPDATES - March 20, 2011

Update time: Sun Mar 20 14:18:17 2011
Signature number: 6549898
Update time GMT: 1300616297
Version: 7.36691
http://download.bitdefender.com/updates/bitdefender_v9/plugins/update.txt

Reply 7 : UPDATES - March 20, 2011

Latest definition version: 1.99.1562.0
Released: Mar 20, 2011 05:30 AM UTC
Microsoft Security Essentials Version:2.0.657.0
Engine Version: 1.1.6603.0
Antimalware Client Version:3.0.8107.0
https://www.microsoft.com/security/portal/Definitions/HowToMSE.aspx
http://www.microsoft.com/security_essentials/

Reply 8 : UPDATES - March 20, 2011

Latest definition version: 1.99.1574.0
Released: Mar 20, 2011 01:30 PM UTC
Microsoft Security Essentials Version:2.0.657.0
Engine Version: 1.1.6603.0
Antimalware Client Version:3.0.8107.0
https://www.microsoft.com/security/portal/Definitions/HowToMSE.aspx
http://www.microsoft.com/security_essentials/

Reply 9 : UPDATES - March 20, 2011

2011-03-20 21:31
http://www.eset.eu/podpora/aktualizacia-5969?lng=en
http://www.eset.eu/support/update-xy1

Reply 10 : UPDATES - March 20, 2011

Version: 7.11.05.02
Date: Sunday, March 20, 2011
Time: 9:20 PM GMT+01:00
http://www.avira.com/en/pages/index.php
http://www.avira.com/en/threats/section/vdfhistory/index.html

Reply 11 : UPDATES - March 20, 2011

Virus Signature File
Sunday, 20 March 2011
http://www.pandasecurity.com/homeusers/downloads/clients/?

Reply 12 : UPDATES - March 20, 2011

DATs 6291 - 3/20/2011
Super DATs 6291 - 3/20/2011

http://www.mcafee.com/apps/downloads/security_updates/dat.asp
http://vil.nai.com/vil/datreadme.aspx

Reply 13 : UPDATES - March 20, 2011

Daily Updates
Symantec Endpoint Protection 11
Norton AntiVirus 2008 and newer

Virus Definitions created 3/20/2011
Virus Definitions released 3/20/2011
Defs Version: 130320c
Sequence Number: 121382
Extended Version: 3/20/2011 rev. 3
Total Detections (Threats & Risks): 11050532

Multiple Daily Updates
Symantec Endpoint Protection 11
Norton AntiVirus 2008 and newer

Virus Definitions created 3/20/2011
Virus Definitions released 3/20/2011
Defs Version: 130320c
Sequence Number: 121382
Extended Version: 3/20/2011 rev. 3
Total Detections (Threats & Risks): 11050532
http://www.symantec.com/business/security_response/definitions/download/index.jsp

Reply 14 : UPDATES - March 20, 2011

Core Definitions 6636- 03/20/2011 07:57AM PDT
Trace Definitions 4448- 03/20/2011 07:57AM PDT
http://www.superantispyware.com/definitions.html

Reply 15 : UPDATES - March 20, 2011

The hpHOSTS Hosts file has been updated. There is now a total of 121,974 listed hostsnames.

If you are NOT using the installer, please read the included Readme.txt file for installation instructions.

? Latest Updated: 20/03/2011 14:56
? Last Verified: 20/03/2011 05:00


Download hpHosts now!
http://www.hosts-file.net/?s=Download

hpHOSTS is a community managed hosts file. What that means to you is that you have a key role to play in improving hpHOSTS by submitting undesirable sites you think should be listed or by requesting removal of sites you think may have been added in error. This process is performed in our public forums and all decisions to add or remove sites are subject to public criticism and ongoing re-evaluation. If you would like to get involved, please register* at the hpHOSTS Hosts File Support Forum.

* Registration is free and is not required to download the hpHOSTS hosts file.

--------------------------------------------------------------------------
Alternative hosts file providers.

*MVPS - http://mvps.org/winhelp2002/hosts.htm
*Peter - http://pgl.yoyo.org/as/
*Malware Domain List - http://www.malwaredomainlist.com/hostslist/hosts.txt

Reply 16 : UPDATES - March 20, 2011

Date: 3/20/2011
Database version: 6113
Fingerprints loaded: 314501
http://malwarebytes.org/mbam.php
http://www.malwarebytes.org/

Reply 17 : UPDATES - March 20, 2011

Incremental Database Update 7673 - 20 March 2011
http://www.simplysup.com/tremover/update3.html

Reply 18 : UPDATES - March 20, 2011

Definitions 8767 - March 19, 2011
http://research.sunbelt-software.com/
http://www.sunbeltsecurity.com/definitions.aspx