[News] New worm feeds on latest Microsoft bug - Linux

This is a discussion on [News] New worm feeds on latest Microsoft bug - Linux ; Moshe Goldfarb. wrote: Look, these *clowns* really don't know what is happening with the Windows O/S or .Net managed code solutions. Many COM components of the Windows O/S are going to be replaced by .Net managed code components, as MS ...

+ Reply to Thread
Page 3 of 3 FirstFirst 1 2 3
Results 41 to 44 of 44

Thread: [News] New worm feeds on latest Microsoft bug

  1. Re: [News] New worm feeds on latest Microsoft bug

    Moshe Goldfarb. wrote:



    Look, these *clowns* really don't know what is happening with the
    Windows O/S or .Net managed code solutions. Many COM components of the
    Windows O/S are going to be replaced by .Net managed code components, as
    MS is already changing the Windows O/S to work with .Net components as
    part of the O/S. It's already happening, such as WinFX as opposed to
    using COM Windows API.

    And MS will remove COM off the Windows platform eventually. Right now,
    COM is not dead, and MS must keep backwards compatibility with old COM
    legacy solutions. There is always going to be that vulnerability on the
    Windows platform as long as COM is in play. MS made the bed and MS is
    going to have to lay in it for now, until COM is eliminated off of the
    platform. Nothing happens over night.


  2. Re: [News] New worm feeds on latest Microsoft bug

    Linux Pimps wrote:
    > Richard Rasker wrote:
    >> Linux Pimps wrote:
    >>> Richard Rasker wrote:
    >>>
    >>>> tells me that Windows doesn't deserve the qualification
    >>>> of "operating system". It's a glorified application
    >>>> starter, which isn't designed with security (or even
    >>>> networking) in mind.
    >>>
    >>> This person is talking out the side of his head too.
    >>>
    >>> http://www.petri.co.il/unblock-files-windows-vista.htm
    >>>
    >>> Windows Vista is known to be much more picky about the
    >>> file types it allows the user to use than previous
    >>> operating systems. Some file types are considered to be a
    >>> potential threat, and therefore are blocked.
    >>> -----------------
    >>>
    >>> One downloads files from a reputable source. One doesn't
    >>> run around to p2p's and other such dubious places
    >>> downloading files. And that's called use commonsense with
    >>> computers while in a social engineering setting.> Richard
    >>> Rasker wrote:

    >>
    >> If this is proof of anything, it's that Microsoft are
    >> utterly incompetent morons who have NO IDEA what "security"
    >> means. Just give a file a different extension, and oh looky,
    >> it's downloaded right away, no questions asked.
    >>
    >> This is the same kind of utter stupidity in Vista where an
    >> executable file with the string "install" in its name
    >> triggers a security warning, but the exact same file renamed
    >> "fred" (or whatever else) is merrily executed right away.
    >> And remember the Zune? It had this (don't laugh) "DRM" on
    >> board, where copying music files between users was prevented
    >> by, yup, looking at extensions. If it weren't so sad, it
    >> would be laughable. It's like having a guard dog which only
    >> barks at stealthy moving masked intruders, but wags its tail
    >> when strangers in plain clothes walk into the house.
    >>
    >> What is this with Microsoft? Howcome that in 2008, these
    >> idiots /still/ design software that treats a file name or
    >> extension as any reliable indication of a file's nature? And
    >> in the process of (hahaha) "securing the OS" and (pffrrrt)
    >> "protecting the users" all they achieve is making Windows
    >> more of a hassle to use (sheesh, editing the Registry to be
    >> able to receive MP3 files ...). But apparently, the OS is
    >> still as secure as a wet paper bag, and needs all the
    >> "protection" from the binary equivalent of sticky tape,
    >> paperclips, elastic bands, and shielding baggies it can get.
    >> And sure, i'll help. As long as the bad guys stick to
    >> Microsoft's naming and extension conventions as well. Duh.

    >
    >
    >
    > You're no expert on anything. You are a dumb home user. And I
    > wouldn't trust anything you have to say as far as I could
    > toss a building somewhere. When you pull out a link from the
    > year 2006 and give false information or your spin on it as if
    > it's the gospel, then no, no one should trust anything you
    > have to say.
    >
    > You are guru's guru and an expert's expert in your own
    > worthless mind, *clown*.


    Rather sad that this troll has consistently attacked the poster
    with insults instead of a proper reply.

    This is an example of:

    http://www.hyphenologist.co.uk/killf..._troll_faq.htm

    Subject: 3.4 The nasty Troll

    If anyone does anything which will interfere with the
    troll's ability to cause mayhem, they can become very
    nasty, posting from obviously incorrect variations of the
    name etc. insults, call them netcops, netnannies,
    homosexuals.
    --
    HPT
    Quando omni flunkus moritati
    (If all else fails, play dead)
    - "Red" Green

  3. Re: [News] New worm feeds on latest Microsoft bug

    Linux Pimps wrote:
    > Peter Köhlmann wrote:
    >> Linux Pimps wrote:
    >>> Peter Köhlmann wrote:
    >>>> Roy Schestowitz wrote:
    >>>>> Peter Köhlmann on Sunday :
    >>>>>
    >>>>>> In principle a machine with a running firewall
    >>>>>> should be safe, but a small error in setting the
    >>>>>> firewall will make the machine wide open.
    >>>>>
    >>>>> Based on what I've read, it can bypass firewalls by
    >>>>> attacking (spreading) from local networks, assuming
    >>>>> these are not blocked.
    >>>>
    >>>> Certainly. There is lots of malware which shuts off the
    >>>> toy windows uses as "firewall". When malware has entered
    >>>> the system, all bets for windows are off.
    >>>
    >>> That holds for any O/S stupid. If the exploit can get
    >>> there and is executed all bets are off stupid, no matter
    >>> what O/S is being used, if the exploit is running under
    >>> the context of a user/admin.

    >>
    >> *If* little cretin, *if*
    >>
    >> You wintendo fanbois constantly forget that little word.
    >>
    >> Windows "security" is not quite as strong as a wet paper bag

    >
    > Another one of your worthless one liners.
    >
    > Stupid, if the user is running as a Standard user which is a
    > user that doesn't have admin privileges, then how can malware
    > do anything under the context of a Standard user account?
    >
    > If the user on Linux logs onto Linux with the root admin
    > account, then the machine is going to get attacked.
    >
    > The user/admin running on Vista as user/admin with UAC enabled
    > on Vista, is assigned two access. One token is for full admin
    > rights, and another one is for Standard user rights, with
    > Standard user rights being assigned as the default.
    >
    > The user/admin must be escalated to the full admin token at
    > the moment of privileged escalation to complete the task,and
    > then the user/admin is returned to using the Standard user
    > token.
    >
    > Look you moron, nothing is bullet proof not even Linux. But MS
    > is moving to better protect the O/S with UAC and some other
    > things under the hood.


    But this shows otherwise:

    http://www.theregister.co.uk/2008/03...left_standing/

    Only Ubuntu left standing, as Flash vuln fells Vista in Pwn2Own
    hacking contest

    Contestant overcomes bout of 'hacktile dysfunction'
    By Dan Goodin in Vancouver
    Published Saturday 29th March 2008 21:27 GMT

    CanSecWest A laptop running a fully patched version of
    Microsoft's Vista operating system was the second and final
    machine to fall in a hacking contest that pitted the security of
    Windows, OS X and Ubuntu Linux. With both a Windows and Mac
    machine felled, only the Linux box remained standing following
    the three-day competition.
    OSX and Vista pwned by Ubuntu! Linux security unsurpassed.

    --
    HPT
    Quando omni flunkus moritati
    (If all else fails, play dead)
    - "Red" Green

  4. Re: [News] New worm feeds on latest Microsoft bug

    High Plains Thumper wrote:



    You can chase you old ass-pimple, but that's about all you can do. :-)

+ Reply to Thread
Page 3 of 3 FirstFirst 1 2 3