New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online.
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO8)
· Paul's (AR 5)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 470
Comments: 13
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image cybsec: Weekly Summaries: Weekly summary image
Cyber Security


There is no greater harm than that of time wasted.
Michelangelo Buonarroti (1475-1564);
Italian architect, sculptor and painter.

- Weekly summary -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, May 15, 2004 - This week, Oxygen3 24h-364d has offered subscribers
the news summarized below, which can be accessed at:
http://www.pandasoftware.com/about/press/oxygen3/oxygen.asp

- Passwordless remote administration of SMC routers (05/10/04).
SecuriTeam has informed that several SMC routers do not close the
administration port to external users, or require access authentication. As
a result, a malicious user could compromise an organization's intranet, as
they could bypass the restrictions imposed by the router.

- Critical vulnerability in Eudora (05/11/04).
SecurityTracker has reported a buffer overflow vulnerability in the mail
client Eudora, which could allow an attacker to run arbitrary code and
compromise affected systems. This vulnerability has been detected in
versions 6.1, 6.0.3 and 5.2.1 of Eudora for Windows, and lies in the
processing of URLs that start with 'file://'.

- Update for Windows XP and Windows 2003 (05/12/04).
Microsoft has published the monthly security bulletin for May, which informs
of a vulnerability in the Help and Support Center in Windows XP and in
Windows Server 2003. The security bulletin also announces that the
corresponding update is available and advises users to install it as soon as
possible through the Windows Update web page.

- (III) The evolution of computer viruses (05/13/04).
Internet and e-mail revolutionized communications. However, as expected,
virus creators didn't take long to realize that along with this new means of
communication, an excellent way of spreading their creations far and wide
had also dawned. Therefore, they quickly changed their aim from infecting a
few computers while drawing as much attention to themselves as possible, to
damaging as many computers as possible, as quickly as possible. This change
in strategy resulted in the first global virus epidemic, caused by the
Melissa worm.

- Malware activation techniques (05/14/04).
The first types of malicious code were activated when a user executed an
infected file or, in the case of boot viruses, when the computer read an
infected floppy disk. Nowadays, the most widespread malware are Internet
worms and Trojans with the capacity to create backdoors. These ensure that
they are run whenever the system starts up by inserting a key with a
reference to the infected executable file in the Windows Registry.

NOTE: The address above may not show up on your screen as a single line.
This would prevent you from using the link to access the web page. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
Posted on Sunday, 16 May 2004 @ 10:08:57 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· More about Cyber Security
· News by phoenix22


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register