Internet Explorer, the big one.

12 posts / 0 new
Last post
Spidey01
Offline
Last seen: 3 months 1 week ago
Internet Explorer, the big one.

http://news.bbc.co.uk/2/hi/technology/7784908.stm

lol

SAS_Hostile
Veteran
Veteran
Offline
Last seen: 9 years 4 months ago

haha....that's SO microsoft Lol :roll:

IMAGE(http://freenet-homepage.de/mortipussy/katzen.gif)

Hunter
Offline
Last seen: 1 year 11 months ago

lol

It's typical MS, IE is for the web the worst choice you can take. But sometimes (spec. on buss. application) you you don't have the choice. Sad

Updates for IE are always neccessary.

(formerly known as SAS_LCpl_Hunter)

Valroe
Offline
Last seen: 8 years 10 months ago

Less than 0.02 percent of the IE users... Why don`t you just stop driving and flying as well. Oh and did i mention not to go to any sketchy sites?

Spidey01
Offline
Last seen: 3 months 1 week ago

Here's one for you Valroe, find me straight from the ol'Microlips, what causes the issue in the first place, and assume all else is cracker-foo secrets. (i.e. locate cause, how to reproduce on a production machine, work around the problem until fixed, and final remedy actions)

Then figure out the possibilities for danger of attack lol.

If one wants a secure web browser for sketchy websites, just use Lynx, and all problems are moot Blum 3

Valroe
Offline
Last seen: 8 years 10 months ago

Speak english please lol

Spidey01
Offline
Last seen: 3 months 1 week ago

That was English lol. It's much much longer, but perhaps this will make more sense to you. Here is the same thing rewritten in a more paragraphed order like format:

A.) Only microsoft sources can be trusted for Intelligence Gathering purposes.

Here's one for you Valroe, find me straight from the ol'Microlips, what causes the issue in the first place, and assume all else is cracker-foo secrets.

B.) Objectives:

  • Figure out what causes the vulnerability (i.e. how can a person be attacked from it)
    [/*]
  • Figure out how to simulate this in on test machines (within a secure military intelligence research setting of course)
    [/*]
  • Figure out how to reduce threat from vulnerability, without applying updates that correct the problem (WORK AROUND)
    [/*]
  • Find the necessary update procedures -> This includes all Windows 2000, XP, and Vista machines with/without service packs, and includes their original IE versions as well as current releases (This means IE 5, 6, and 7) [/*]

(i.e. locate cause, how to reproduce on a production machine, work around the problem until fixed, and final remedy actions)

C.) Commanders Intent: Gather necessary INTEL to access possible THREAT from unpatched vulnerability, and RECOMMEND actions to be taken for both machines that MAY or MAY NOT be able to be UPDATED do to operational needs.

Then figure out the possibilities for danger of attack lol.

D.) Time frame: A.S.A.P., until report tis filed all machines with internet access or connected to a network that grants machines access to the internet, shall be considered SECURITY LIABILITY and forbidden from processing secure data.

That is how to access what risk a problem in all versions of Internet Explorer can cause to a group, and lead people into the necessary protective measures.

Spidey01
Offline
Last seen: 3 months 1 week ago

http://news.bbc.co.uk/2/hi/technology/7788687.stm

Microsoft has issued a security patch to fix a critical vulnerability in its Internet Explorer browser which it said has attacked over 2m Windows users.

....

Microsoft estimated that one in every 500 Windows users had been exposed to sites that tried to exploit the flaw and the number of victims was increasing at a rate of 50% daily.

I wouldn't call over 2,000,000 people a piss in the bucket either, especially when you consider how many Windows machines are configured in securely at home or by incompetent administrators in some places of business.

Valroe
Offline
Last seen: 8 years 10 months ago

Yeah Open source is much better Blum 3

Spidey01
Offline
Last seen: 3 months 1 week ago

Yeah, I nearly cried when OpenBSD had to change their home page, to read "Only two remote holes in the default install, in more than 10 years!", but not all projects do good work.

Valroe
Offline
Last seen: 8 years 10 months ago

And whom gets the most attacks? Microsoft or Open S(hit)ource?

Spidey01
Offline
Last seen: 3 months 1 week ago

it depends on the product and the competency of those using it.

If you use it like a newb, you will get beaten like one lol.