[Vision2020] Major flaw revealed in Internet Explorer; users urged to switch

Sam Scripter moscowsam at verizon.net
Wed Dec 17 14:01:18 PST 2008


Yes, I'd like to attend a Linux workshop!

Thank you.

Sam Scripter

Dave wrote:
> When I build windows machines now (which is a pain the a-- compared to
> Linux machines), I use a slipstream install in which I completely remove
> some of Windows' worst vulnerabilities, mainly IE and Outlook. 
>
> I learned about slipstream installs because since service pack 2 Windows
> will overwrite the manufactures' drivers (the ones that work) with MS
> ones (which often don't work), and a slipstream install is the only way
> that I know of to override this behavior.
>
> Also:
>
> If you want to be safer on the net then you should also install the
> Firefox plug-in called NoScript, which prevents sites from running
> JavaScript programs on your computer unless you allow it.
>
> I also routinely install AdBlockPlus, which simply removes most banner ads.
>
> Of course if you really want to be safe then install Linux.  The only
> way Malware could theoretically get in (so far) is if they trick you
> into installing it with something like the Facebook worm.  Because
> NOTHING gets installed unless you approve it!
>
> You also get the bonus of being able to install any type of application
> that you can think of with just a couple of clicks.  All this for the
> whopping price of one CDR, thanks to the Open Source community.
>
> If I were to offer a Linux workshop (for free, of course), would there
> be any interest in attending it?
>
> Dave
>
>
> Kenneth Marcy wrote:
>   
>> Major flaw revealed in Internet Explorer; users urged to switch
>>
>> Tue Dec 16, 2008 11:49AM EST
>>
>> Here's the link to the article:
>> http://tech.yahoo.com/blogs/null/111811
>>
>> Here's the link to the discussion page:
>> http://buzz.yahoo.com/article/1:y_tech:e10b28ebd5ae33777e8dac9f065278e7
>>
>> The major press outlets are abuzz this morning with news of a major new 
>> security flaw that affects all versions of Internet Explorer from IE5 to the 
>> latest beta of IE8. The attack has serious and far-reaching ramifications -- 
>> and they're not just theoretical attacks. In fact, the flaw is already in 
>> wide use as a tool to steal online game passwords, with some 10,000 websites 
>> infected with the code needed to take advantage of the hole in IE.
>>
>> Virtually all security experts (as well as myself) are counseling users to 
>> switch to any other web browser -- none of the others are affected, including 
>> Firefox, Chrome, and Opera -- at least for the time being, though Microsoft 
>> has stubbornly said it "cannot recommend people switch due to this one flaw." 
>> Microsoft adds that it is working on a fix but has offered no ETA on when 
>> that might happen. Meanwhile it offers some suggestions for a temporary 
>> patch, including setting your Internet security zone settings to "high" and 
>> offering some complicated workarounds. (Some reports state, however, that the 
>> fixes do not actually work.)
>>
>> Expedient patching or switching are essential. Security pros fear that the 
>> attack will soon spread beyond the theft of gaming passwords and into more 
>> criminal arenas, as the malicious code can be placed on any website and can 
>> be adapted to steal any password stored or entered using the browser. It's 
>> now down to the issue of time: Will Microsoft repair the problem and 
>> distribute a patch quickly enough to head off the tsunami of fraud that's 
>> about to hit or will it come too late to do any good?
>>
>> Meanwhile, I'll reiterate my recommendation: Switch from Internet Explorer as 
>> soon as you can. You can always switch back once the threat is eliminated.
>>
>> Links for other browsers to try: Firefox Chrome Safari Opera 
>>
>> Firefox: http://www.mozilla.com/en-US/firefox/
>>
>> Chrome: http://www.google.com/chrome
>>
>> Safari: http://www.apple.com/safari/
>>
>> Opera: http://www.opera.com/
>>
>>
>> Ken
>>
>> =======================================================
>>  List services made available by First Step Internet, 
>>  serving the communities of the Palouse since 1994.   
>>                http://www.fsr.net                       
>>           mailto:Vision2020 at moscow.com
>> =======================================================
>>
>>
>>   
>>     
>
>
>   
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.fsr.com/pipermail/vision2020/attachments/20081217/b56495ad/attachment.html 


More information about the Vision2020 mailing list