FIXIT MENU:
home about us contact us

WHAT'S AVAILABLE:
free scripts advanced scripts online tools great books web related tutorials contributed tutorials news archive geek toys!

SUPPORT:
help forum live chat help



Archive

Get Firefox! The most secure, and featured browser on the Internet.
RSS feed   enewsbar Live Subscribe    Add to MyYahoo

HTMLfixIT Archive for June, 2005




Sunday, June 19th, 2005 by Don

The University of Kansas attempted to notify 119 students that their failure to pass even a single class may make them inelligible for continued financial aid. Unfortunately the person in charge of the project gave each student on the list the names of all other failing students. As a result, Kansas will have to undergo an investigation of the privacy breach it created or itself risk loosing federal government aid.

The list reportedly included one woman who asserts she failed exactly one class, after receiving 200 hours of passing grades and a masters degree, according to USA Today. Her excuse is a good one, her daughter contracted pneumonia so she had to divert her attention.

This however raises several issues regarding email. We need to be very careful with addressing, the reply all button, getting a similiar name from our address book, etc.

No Comments »

Saturday, June 18th, 2005 by Don

I one single slip by a third party processor, one in each seven US Mastercard Accounts was exposed to possible identity theft as detailed at Security Focus. Fortunately the amount actually compromised will be much less. What makes this different than many other similiar glitches is that it exposed information for multiple branded cards issues on different financial institutions and organizations. Issues like this will continue to grow.

The day is coming where greater checks, perhaps pin numbers confirmed via independant routing for example will have to become common-place on purchases. Likewise with the advent of automated fingerprinting identification, I think prints or other equivalents must soon be required for the issuing of credit. Merely having my personal information and card numbers cannot be sufficient to allow access to my accounts or the granting of new credit.

No Comments »

Saturday, June 18th, 2005 by Franki

A Microsoft event called “Blue Hat” was held between Microsoft, their software engineers and the hacker community for the purpose of testing the security of their Windows Operating System. Apparently only minutes after allowing hackers onto the network, a Windows laptop was caused to join a malicious wireless network to the apparent dismay and anger of the Microsoft engineers. This is the story detailed by ZDnet’s Ina Fried.

It should be noted that the “hackers” that would respond to a request from Microsoft would be classed as “white hat” hackers, meaning they don’t use their power to the detriment of others and are usually called security researches. Black hat hackers, the bad sort, would not want to draw attention to themselves by revealing themselves to a company that would be quiet happy to sue them for past transgressions.

Microsoft managers are said to be happy at the shock and anger of their engineers, mostly because they have been trying to engender that response themselves with limited success. They didn’t say however, whether they were happy that their security measures failed in so short a period of time. It is also interesting to note that Microsoft hasn’t publicised their “Blue Hat” meeting. One wonders if they would have sang it from the rooftops had the result had gone the way they probably expected.

No Comments »

Saturday, June 18th, 2005 by Franki

According to this article at TheRegister. The US Navy is looking to standardize the second biggest network (after the Internet itself) on a Linux distribution. Apparently that amounts to 250,000 local servers and approximately the same number of remote servers. If a deal like that was to go to Novell or Redhat, it could single handedly make that distributor the biggest Linux distributor in the world (a place currently occupied by Redhat). Apparently Chris Christopher of the Navy’s Program Executive Office for Information Technology told ComputerWorld that they already have a significant Linux presence on their network along with most every other Operating System released in the last 15 years. Hence the need to standardize.

If the Navy standardizes on an Open Source Linux distribution, it would alleviate the worry about vendor lock-in which it seems is one of their more significant concerns. This concern is lessened somewhat by Linux because of the openness of the data formats in that one vendors distribution could take the place of another with minimal effort. The same cannot be said for companies like Microsoft who appear to have based their business on being hard to migrate away from, all the while touting interoperability in the press. That difficulty to migrate away from has resulted in much press from Microsoft’s “get the facts” campaign as being another reason why it’s better to stay with Windows. Obviously they never mention the fact that they themselves are the reason it is more difficult to migrate to another non-Microsoft platform.

No Comments »

Saturday, June 18th, 2005 by Franki

Microsoft has long received criticism for using proprietary undisclosed file formats to lock your data away where you can’t get it without Microsoft’s products or licenses. The problem with that approach is that the data belongs to you, you should not have to rely on an outside party for access to your own property. Anyway, to try to address this concern, Microsoft released the specification schemas for Office 2003 which will be the default file format for the version of Office due out next year. The release is “royalty free” meaning that you need not pay Microsoft for the use of the schemas. The problem is that the license is designed to exclude Microsoft’s biggest competitor GPL licensed Open Source programs. In short Microsoft requires that any software that is able to read/write to their format attribute that code to Microsoft, it seems that even if it doesn’t contain any of their code and is instead just an implementation of the bare essentials required to access them it must still attribute to Microsoft in the code.

There are some in the Open Source community that believe that there may be no enforcable rights that Microsoft can claim in the new license and that licences may not be required in this instance, but that is an issue probably best decided by lawyers. The fact is that if the license is required, it is not compatible with the GPL, which is the licence that the vast majority of true Open Source software is released under.

The fact that Microsoft is trying to lock out GPL developers is hardly surprising as they are doing something very similar in the EU as part of their punishment for being found guilty of anti-competitive practises in the European Union. They were told that they must make their server protocols available to competitors so as to improve interoperability but have again done so in a manner that locks out their biggest competitor, GPL licensed software.

The only truly open document standard at this time appears to be the OASIS XML OpenDocument format used by StarOffice/OpenOffice. This file format is completely open and can be adopted by anybody with a desire to do so, including Microsoft. But don’t expect them to support it any time soon as to do so would lessen the impact of their own less open format and make it easier for people to swap to competitive Office suites and Microsoft would apparently prefer not to compete on price and features if they don’t have to. It should be noted that Microsoft’s XML based file format is NOT currently approved by OASIS (Organization for the Advancement of Structured Information Standards).

I dream of a world where any text document/spreadsheet/presentation/database can be opened and saved by any Office application suite and that the only reason to choose one over another is the feature set and price of that Office suite. I suspect however, that Microsoft will be one of the last to join that party and will only do so when they are forced to by declining market share. Governments have become much more aware recently of the need to keep their information in non proprietary formats, so Microsoft may be pressured (by sales or the lack thereof) to comply sooner then expected. Governments make up a fairly significant portion of Microsoft Office sales.

You can get a more detailed look at the issue by reading Eweek’s write-up of the problem.

No Comments »

Saturday, June 18th, 2005 by Franki

According to ComputerWorld, which has it from the IDG news service, Mastercard has revealed that up to forty million (40,000,000) credit card numbers may have been acquired by a malicious hacker attacking CardSystems Solutions Inc, a company that provides back end services for card companies. Of those 40 million, roughly 13.9 million may have been Mastercards so Mastercard are not the only company affected, they are just the only one thus far to warn the public about it.

The point of the article, seems to be that if you have a credit card, you should check your statements regularly either online or via your bank statements and be sure contest or charge back any payments you didn’t make if there are any. (But you’re doing that already right?)

No Comments »

Saturday, June 18th, 2005 by Franki

In Mid April I wrote about the problem of security products actually hurting your security rather then helping as they are supposed to. BusinessWeekOline have an article that talks about a forthcoming report from the Yankee Group detailing how Anti-Virus/Spyware products together with other security products like Firewalls have had more flaws found in recent times then Microsoft’s own products. To even compete with Microsoft with regard to security flaws is amazing in itself, but when you consider that these products are actually supposed to protect you from external compromise it becomes a horrendous problem.

Security experts have long suggested to clients, that being protected by a current and actively updating Anti-Virus, Anti-Spyware and firewall product is part and parcel of staying secure online (for Windows users anyway, since Mac and Linux are mostly unaffected by such problems), but those very products themselves are in some instances being used as the attack vector used to get into your computers. A very dangerous state of affairs that requires an immediate response from the security vendors. It can’t be long before a company finds themselves beset by malicious software which was caused by a failure from a security product and that security company may find themselves in court being asked to explain themselves and pay damages.

No Comments »







This site is totally free to use, you have absolutely no moral or legal obligations to help us continue.
There are however, some costs involved in running the site.

<random humor>
Plus Don needs a new snow shovel.
</random humor>

So if this site helped you find your way, perhaps you could consider contributing to our costs. Whatever amount you feel this site was worth to you would be just wonderful.
Use PayPal if you do decide to share and help us with the costs and in appreciation for our time and attention, or alternatively buy a book from our Bookstore..


  Time  in  Don's  part  of the world is:   October 20, 2017, 3:16 am
  Time in Franki's part of the world is:   October 20, 2017, 4:16 pm
  Don't worry neither one sleeps very long!



privacy policy :: support us :: home :: live chat help
contact us :: forum ::tutorials :: bookstore :: Site Map



      Valid XHTML 1.0!             powered by Apache Server
Pic 3 Pic 3

SEARCH:
USEFUL LINKS:

CIGHTML Firefox Thunderbird ClamWin WordPress SpyBot S&D TheGIMP Apache for Windows Registry Cleaners More cool stuff:

//-->

HTMLfixIT Site Stats.

Browser Statistics
Internet Explorer 85.88%
IE 717.63%
IE 62.3%
IE 50.00%
IE other8.6%
Moz Firefox 3.x3.03%
Moz Firefox 2.x0.18%
Moz Firefox 0.x/1.x26.65%
Netscape 8.x0.00%
NS 6+/Mozilla2.73%
Moz Seamonkey0.00%
K-meleon0.00%
Epiphany0.00%
Netscape 4.x0.00%
Opera 9.x0.00%
Opera 8.x0.00%
Opera 7.x0.42%
Opera 6.x0.00%
Opera other0.42%
Safari Mac/Intel5.21%
Safari Mac/PPC0.06%
Safari Windows25.2%
Google Chrome1.51%
Konqueror0.18%
Galeon0.00%
WebTV0.00%


Resolution Statistics
640 x 4800.25%
800 x 60026.14%
1024 x 76836.55%
1152 x 8640.25%
1280 x 80011.68%
1280 x 8540.00%
1280 x 102417.01%
1400 x 10500.00%
1600 x 12001.02%
1920 x 12007.11%
2560 x 10240.00%


OS Statistics
Windows 741.55%
Windows Vista2.4%
Windows 20033.91%
Windows XP20.86%
Windows 20000.36%
Windows NT40.05%
Windows 98/ME0.05%
Windows 950.00%
Linux/UNIX/BSD8.76%
Mac OSX8.03%
Mac Classic0.00%
Misc14.03%



New Windows Virus Alerts
also by sophos.

17 Apr 2011 Troj/Mdrop-DKE
17 Apr 2011 Troj/Sasfis-O
17 Apr 2011 Troj/Keygen-FU
17 Apr 2011 Troj/Zbot-AOY
17 Apr 2011 Troj/Zbot-AOW
17 Apr 2011 W32/Womble-E
17 Apr 2011 Troj/VB-FGD
17 Apr 2011 Troj/FakeAV-DFF
17 Apr 2011 Troj/SWFLdr-W
17 Apr 2011 W32/RorpiaMem-A

For details and removal instructions, click the virus in question.