by wwarren | Jul 31, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
Normally I advocate caution in major patches. This hole however is so important that i am going to immediately patch and then workaround any issues this is going to cause. Again on mOnday htis patch gets released. PATCH IMMEDIATLY!!! Read the previous advisories I...
by wwarren | Jul 22, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
Steve Gibson talks about this issue in a very understandable manner. Look at my previous post at the bottom..aka update 3.
by wwarren | Jul 22, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
Well the vulnerabilities threat profile has expanded: http://www.f-secure.com/weblog/?p=00001994.html If the .lnk is inside a document windows will execute the code. Again..i hope this fizzles..if it doesn’t I want folks to be aware. Well the vulnerabilities...
by wwarren | Jul 21, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
New Zero Day problem with all versions of windows(High Potential for Mass Infections..Stay Alert)*UPDATED* The podcast software crashed so I was able to make a written update to the post with the help of Arstechnica.com. Go checkout the updated...
by wwarren | Jul 20, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
I am going to provide you with the summary from Ars Technica as it’s the clearest explanation of the problem I have seen: The attack uses specially crafted shortcut (.lnk) files, which trick Windows into running code of an attacker’s choosing. Any Windows...
by wwarren | Jul 17, 2010 | Cloud Computing, Open Source, Security, Vendors
This is very good reading. IF you decide to go with a cloud solution the big question is..are you in control of your data or are you at the total mercy of the cloud vendor? This has significant ramifications for your business if the cloud vendor either fails to...