Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Jasper The Rasper

Pages: [1] 2 3 ... 5
1
LandzDown Lounge / Re: COU...DOWN?
« on: October 07, 2019, 07:40:17 PM »
Well you all tried to keep it going, but thank you for all the work you put into it.

2
Computer Problems, Questions and Solutions! / Re: windows update Problem
« on: February 05, 2019, 01:08:38 PM »
Thank you Paddy.
I have just got on here and it is working finally, thank you, it took some doing but it is good to see things moving again.

3
Computer Problems, Questions and Solutions! / Re: windows update Problem
« on: February 04, 2019, 01:48:09 PM »
No luck yet here in West Berkshire.

4
Computer Problems, Questions and Solutions! / Re: windows update Problem
« on: February 03, 2019, 05:45:16 PM »
Thank you for the update Paddy.
No luck here yet but I may leave it until tomorrow yet.

5
Computer Problems, Questions and Solutions! / Re: windows update Problem
« on: February 02, 2019, 02:51:55 PM »
Still no luck using BT yet.

6
Meet & Greet! / Re: Welcome New Members!
« on: January 07, 2019, 07:48:28 PM »
Greetings Sherry, it is great to see you here.


7
Meet & Greet! / Re: MERRY CHRISTMAS!
« on: December 30, 2018, 07:13:57 PM »
I hope everyone has a healthy and prosperous New Year.
Whatever you plans are for tomorrow, if you are out make sure you all drive carefully.

8
Web News / REDACTION: WinRAR Vulnerability
« on: October 07, 2015, 04:00:37 PM »
October 7, 2015 | BY Adam Kujawa

Quote
Hey Folks,

We here at Malwarebytes take pride in our ability to find the latest threats that users face on daily basis and do our best to not only block and remove them with our products but also inform the general public about their danger through our blog.

In a very few cases, we jump the gun in our efforts to explain a threat and end up posting information that hasn’t been thoroughly analyzed.

This is one of those cases.

We want to offer our most sincere apologies to WinRAR for any harm done by our reporting on a post first seen through the Full-Disclosure mailing list, we simply echoed the original reporting.

https://blog.malwarebytes.org/news/2015/10/redaction-winrar-vulnerability/

9
From Security Week http://www.securityweek.com/ad-fraud-trojan-kovter-patches-flash-player-ie-keep-other-malware-out

Quote
The ad fraud Trojan known as Kovter has been updating Adobe Flash Player and Microsoft Internet Explorer on infected systems, most likely in an effort to keep other malware out.

The French security researcher known as Kafeine discovered this new Kovter trick when he noticed that some of his virtual machines were attempting to download the latest version of Flash Player.

That is cunning.

10
Meet & Greet! / Re: Welcome, hewee!
« on: July 01, 2015, 05:57:49 PM »
Hi Hewee, it is great to see you again. Yes CoU may be down but it is certainly not out.

11
After all the mental torture those families had to go through, I think an apology is 26 years too late.
But what punishment can be given?

12
Meet & Greet! / Re: Happy Birthday Hardhead
« on: February 28, 2015, 05:19:15 PM »
Happy Birthday Tim, I hope you are having a great day.

13
Summary: Drupal has issued a highly critical announcement that unless Drupal installs were patched against the latest SQL injection attack within seven hours of its unveiling, the site should be considered compromised.

Drupal's security team has released a "public service announcement" calling upon all users of the Drupal content management framework to consider their sites as compromised, and to start afresh, unless their sites were patched against the SQL injection attack revealed two weeks ago within seven hours of the announcement of the vulnerability.

Full Article - http://www.zdnet.com/drupal-warns-unless-you-patched-within-seven-hours-youre-hacked-7000035219/

14
Quote
Could allow attackers to execute code on Linux, Unix, and Mac OS X.
by Sean Gallagher - Sept 24 2014

A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called by an application,” a Red Hat security advisory warned.

The bug, discovered by Stephane Schazelas, is related to how Bash processes environmental variables passed by the operating system or by a program calling a Bash-based script. If Bash has been configured as the default system shell, it can be used by network–based attackers against servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts.

Full Article - http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/

15
by Pierluigi Paganini on September 20th, 2014

Egyptian bug hunter discovered that Avira Website is affected by CSRF flaw that allows attackers to hijack users’ accounts and access to their online backup.
What do you think about if tell you that an antivirus could represent a menace for your system? Antivirus like any other kind of software could be exploited by threat actors to compromise the machine as already explained my previous post.
The popular antivirus software Avira that includes a Secure Backup service is vulnerable to a critical web application vulnerability that could allow an attacker to take over the user’s account.
The Egyptian 16 year-old expert Mazen Gamal reported to The Hacker News that the Avira Website is affected by a CSRF (Cross-site request forgery) vulnerability that allows an attacker to hijack users’ accounts and access to their online secure cloud backup files.

Full Article - http://securityaffairs.co/wordpress/28496/hacking/avira-csrf-flaw.html

Pages: [1] 2 3 ... 5