Here's one for you Valroe, find me straight from the ol'Microlips, what causes the issue in the first place, and assume all else is cracker-foo secrets. (i.e. locate cause, how to reproduce on a production machine, work around the problem until fixed, and final remedy actions)
Then figure out the possibilities for danger of attack lol.
If one wants a secure web browser for sketchy websites, just use Lynx, and all problems are moot
That was English lol. It's much much longer, but perhaps this will make more sense to you. Here is the same thing rewritten in a more paragraphed order like format:
A.) Only microsoft sources can be trusted for Intelligence Gathering purposes.
Here's one for you Valroe, find me straight from the ol'Microlips, what causes the issue in the first place, and assume all else is cracker-foo secrets.
B.) Objectives:
Figure out what causes the vulnerability (i.e. how can a person be attacked from it)
[/*]
Figure out how to simulate this in on test machines (within a secure military intelligence research setting of course)
[/*]
Figure out how to reduce threat from vulnerability, without applying updates that correct the problem (WORK AROUND)
[/*]
Find the necessary update procedures -> This includes all Windows 2000, XP, and Vista machines with/without service packs, and includes their original IE versions as well as current releases (This means IE 5, 6, and 7) [/*]
(i.e. locate cause, how to reproduce on a production machine, work around the problem until fixed, and final remedy actions)
C.) Commanders Intent: Gather necessary INTEL to access possible THREAT from unpatched vulnerability, and RECOMMEND actions to be taken for both machines that MAY or MAY NOT be able to be UPDATED do to operational needs.
Then figure out the possibilities for danger of attack lol.
D.) Time frame: A.S.A.P., until report tis filed all machines with internet access or connected to a network that grants machines access to the internet, shall be considered SECURITY LIABILITY and forbidden from processing secure data.
That is how to access what risk a problem in all versions of Internet Explorer can cause to a group, and lead people into the necessary protective measures.
Microsoft has issued a security patch to fix a critical vulnerability in its Internet Explorer browser which it said has attacked over 2m Windows users.
....
Microsoft estimated that one in every 500 Windows users had been exposed to sites that tried to exploit the flaw and the number of victims was increasing at a rate of 50% daily.
I wouldn't call over 2,000,000 people a piss in the bucket either, especially when you consider how many Windows machines are configured in securely at home or by incompetent administrators in some places of business.
Yeah, I nearly cried when OpenBSD had to change their home page, to read "Only two remote holes in the default install, in more than 10 years!", but not all projects do good work.
haha....that's SO microsoft :roll:
lol
It's typical MS, IE is for the web the worst choice you can take. But sometimes (spec. on buss. application) you you don't have the choice.
Updates for IE are always neccessary.
(formerly known as SAS_LCpl_Hunter)
Less than 0.02 percent of the IE users... Why don`t you just stop driving and flying as well. Oh and did i mention not to go to any sketchy sites?
Here's one for you Valroe, find me straight from the ol'Microlips, what causes the issue in the first place, and assume all else is cracker-foo secrets. (i.e. locate cause, how to reproduce on a production machine, work around the problem until fixed, and final remedy actions)
Then figure out the possibilities for danger of attack lol.
If one wants a secure web browser for sketchy websites, just use Lynx, and all problems are moot
Speak english please lol
That was English lol. It's much much longer, but perhaps this will make more sense to you. Here is the same thing rewritten in a more paragraphed order like format:
A.) Only microsoft sources can be trusted for Intelligence Gathering purposes.
B.) Objectives:
[/*]
[/*]
[/*]
C.) Commanders Intent: Gather necessary INTEL to access possible THREAT from unpatched vulnerability, and RECOMMEND actions to be taken for both machines that MAY or MAY NOT be able to be UPDATED do to operational needs.
D.) Time frame: A.S.A.P., until report tis filed all machines with internet access or connected to a network that grants machines access to the internet, shall be considered SECURITY LIABILITY and forbidden from processing secure data.
That is how to access what risk a problem in all versions of Internet Explorer can cause to a group, and lead people into the necessary protective measures.
http://news.bbc.co.uk/2/hi/technology/7788687.stm
I wouldn't call over 2,000,000 people a piss in the bucket either, especially when you consider how many Windows machines are configured in securely at home or by incompetent administrators in some places of business.
Yeah Open source is much better
Yeah, I nearly cried when OpenBSD had to change their home page, to read "Only two remote holes in the default install, in more than 10 years!", but not all projects do good work.
And whom gets the most attacks? Microsoft or Open S(hit)ource?
it depends on the product and the competency of those using it.
If you use it like a newb, you will get beaten like one lol.