Monday, March 31
Comment becoming a post
"anonymous said...
How is it even remotely weak? Considering most virii spreading around these days is done via browser related vulnerabilities, I hardly would consider it "weak".
If it is so easy to discover browser vulnerabilities then how come IE7 held up on the Windows box (until the 3rd day when it was owned by flash)? How come you don't have any browser vulnerabilities credited to your name?
I hate to be "that guy", but the guy that won Pwn2Own walked away with $10k and a new laptop. I doubt he cares too much what bloggers think of him or his vulnerability, especially someone that hasn't done any similar research. Don't bash someone else's work unless you can reproduce it yourself.
Mon Mar 31, 08:55:00 AM"
My response:
Dear person-who-didn't-leave-their-name,
Who says I was bashing work? I still think it's a weak vulnerability.
I'm not saying that the guy that discovered it is stupid, or that the exploit itself is stupid -- props to him for getting 10k and a fat laptop. I'm saying that most of the journalists and bloggers out there are saying things like "Mac owned in 2 minutes". Really? Was it owned in two minutes? Or did the guy merely have the exploit already set up on his webpage before the contest began. Does that make sense? I don't like sensationalist headlines, essentially.
I'm also not saying it's easy for someone to discover the vulnerability, I am sure it took alot of research and fuzzing. I am saying now-a-days, there are alot of browser vulnerabilities. It seems like every week there is at least one. I'm not saying that the research that is done by the people isn't worthwhile, I am just not a fan of browser vulnerabilities, because, as I said.. It's easy to switch browsers.
I do think it was interesting that Windows held up until Flash was introduced. But what kind of metrics are we using here? A machine wasn't able to get exploited in one week? It takes more time than that doesn't it?
All punditry. I guess I just miss the days of remote server side exploits like ws_ftp, IIS, and the like.
Subscribe in a reader
Saturday, March 29
New Calendar phishing
Pwn2Own
New Calendar phishing
Friday, March 28
Top 30 podcasts in iTunes
Top 30 podcasts in iTunes
Thursday, March 27
A new podcast hits the airwaves
A new podcast hits the airwaves
Monday, March 24
Happy Birthday OSX!
Happy Birthday OSX!
Sunday, March 23
Happy Easter
Happy Easter
Wednesday, March 19
APPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1
Fresh on the heels of yesterday's huge Apple Security Update 2008-0002, today Apple released 2008-03-19 firmware update for the current (and pre-gigabit) Airport Extreme Base Stations.
AirPort Extreme Base Station with 802.11n*
CVE-ID: CVE-2008-1012
Available for: AirPort Extreme Base Station with 802.11n*
Impact: A maliciously crafted AFP request may lead to a denial of
service
Description: An input validation issue exists in the AirPort Extreme
Base Station's handling of AFP requests, which may cause file sharing
to become unresponsive. This update addresses the issue by performing
additional validation of AFP requests. This issue does not affect
Time Capsule or AirPort Express. The fix for this issue is available
in the following separate updates:
- - AirPort Extreme with 802.11n (Fast Ethernet) 7.3.1
- - AirPort Extreme with 802.11n (Gigabit Ethernet) 7.3.1
Credit to Alex deVries for reporting this issue.
More info here. (Although, I think I posted the whole thing above...)
To update to the newest firmware, open Airport Utility that is in your Utilities Folder in Applications. (If you are using a Mac, if you are using it for Windows, well, I don't know where it's at. ;) It should automatically check for the newest update and prompt you. It's a two click download and update.
Subscribe in a reader
APPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1
Fresh on the heels of yesterday's huge Apple Security Update 2008-0002, today Apple released 2008-03-19 firmware update for the current (and pre-gigabit) Airport Extreme Base Stations.
AirPort Extreme Base Station with 802.11n*
CVE-ID: CVE-2008-1012
Available for: AirPort Extreme Base Station with 802.11n*
Impact: A maliciously crafted AFP request may lead to a denial of
service
Description: An input validation issue exists in the AirPort Extreme
Base Station's handling of AFP requests, which may cause file sharing
to become unresponsive. This update addresses the issue by performing
additional validation of AFP requests. This issue does not affect
Time Capsule or AirPort Express. The fix for this issue is available
in the following separate updates:
- - AirPort Extreme with 802.11n (Fast Ethernet) 7.3.1
- - AirPort Extreme with 802.11n (Gigabit Ethernet) 7.3.1
Credit to Alex deVries for reporting this issue.
More info here. (Although, I think I posted the whole thing above...)
To update to the newest firmware, open Airport Utility that is in your Utilities Folder in Applications. (If you are using a Mac, if you are using it for Windows, well, I don't know where it's at. ;) It should automatically check for the newest update and prompt you. It's a two click download and update.
Subscribe in a reader
Verizon sets rules for Open Development
Verizon sets rules for Open Development
Tuesday, March 18
Questions I was Googled for today
Science fiction author Arthur C. Clarke dies aged 90
Questions I was Googled for today
Science fiction author Arthur C. Clarke dies aged 90
Microsoft Polishes a Turd with SP1
Answering Googled questions
Mail and it's conversion
echo search mdir-files in $1 and send them to mbox: $2
for file in `find $1 -type f`
do
echo parsing: $file
cat $file | formail >> $2
done
Microsoft Polishes a Turd with SP1
Answering Googled questions
Mail and it's conversion
echo search mdir-files in $1 and send them to mbox: $2
for file in `find $1 -type f`
do
echo parsing: $file
cat $file | formail >> $2
done
Wednesday, March 12
PaulDotCom Community Blog
Internet Zoning Initiative, and why it's stupid
Tuesday, March 11
SANSFIRE 2008
SANSFIRE 2008
Monday, March 10
Port 7100/udp part deux
Apple TV, my personal review
Port 7100/udp part deux
Apple TV, my personal review
Saturday, March 8
Subscribers Part 2
Thursday, March 6
Subscribers
Live from the Apple SDK event
Subscribers
Live from the Apple SDK event
Wednesday, March 5
Port 7100/udp
Tuesday, March 4
I'm over it. (The flu that is)
-
Without going off the deep-end here and discussing every single Snort rule keyword, I just wanted to touch on a few modifiers that people so...
-
Let me start off by saying I'm not bashing the writer of this article, and I'm trying not to be super critical. I don't want to...
-
Let's say you're like me, an avid Omnifocus user, but you've been hearing great things about Reminders on MacOS/iOS/iPadOS, and ...