OT: Linux most breached OS

Bill Vermillion fp at wjv.com
Sun Nov 21 21:14:25 PST 2004


On Sun, Nov 21 20:36  Walter Vaughan said 'Who you talkin' to? You talkin'
to Walter Vaughan?  I didn't do nuttin'.  I said: 

> John Esak wrote:

> >Mark, I'm sorry, but you could not be more wrong. I have been
> >getting updates on all of our 2000 and XP systems for the past
> >couple years now.

> Uh, not so sure that's of any help

> http://www.theregister.co.uk/2004/11/21/register_adserver_attack/

> Crap.
> This weeks gonna be nothing but heck.

> (Where did I put those extra DT-100 terminals?)

Oh those?  We threw them out last week.

But on the register article it appears it's all Iframe problems.

Brian Livingston has two newletters, one free, one paid.

In this weeks free letter - the second of 2 parts on how
to make IE secure without XP2 he has this information.

[just an excerpt - if you want the NL's go to windowssecrets.com
and sign up.  IE doesn't have to be the Ap that kills your system.]

----------------------------------------
    To make your Internet Zone more secure, pull down the Tools menu in
   IE, then click Internet Options and select the Security tab. (You can
      also access Internet Options as an applet in the Control Panel.)
    Select the Internet Zone, then click the Custom Level button. In the
    dialog box that appears, change the following settings to the values
                                   shown:
     * ActiveX controls and plug-ins
       o Download signed ActiveX controls: Disable
       o Download unsigned ActiveX controls: Disable
       o Initialize and script ActiveX controls not marked as safe:
       Disable
       o Run ActiveX controls and plug-ins: Disable
       o Script ActiveX controls marked safe for scripting: Disable

     * Downloads
       o Font Download: Disable

     * Microsoft VM
       o Java permissions: Disable Java

     * Miscellaneous
       o Allow META REFRESH: Disable
       o Display mixed content: Disable
       o Drag and drop or copy and paste files: Disable
       o Installation of desktop items: Disable
       o Launching programs and files in an IFRAME: Disable
       o Navigate sub-frames across different domains: Disable
       o Software channel permissions: High Safety
       o Userdata persistence: Disable

     * Scripting
       o Active scripting: Disable
       o Allow paste operations via script: Disable
       o Scripting of Java applets: Disable

     * User Authentication
       o Logon: Prompt for username and password

   If you made the Local Machine Zone visible using the manual technique
     described in the previous section of this article, make the above
   changes to that zone as well. InfiniSource also recommends some other
----------------------------------------

I hope that helps.  I never wanted to learn this much about
Windows.

Bill.
-- 
Bill Vermillion - bv @ wjv . com


More information about the Filepro-list mailing list