Undergoing MyBlogLog Verification

Wednesday, February 13, 2008

Windows Kernel Flaw

To some IT security gadflies, Microsoft's latest "unpatched patch" incident involving a transfer protocol bug in the Windows Kernel is a sign that Redmond should change not only its security priorities but also the manner in which it discloses vulnerabilities.

But from Microsoft's perspective, the impact of a flaw disclosed last week involving Windows Kernel TCP/IP/IGMPv3 and MLDv2 -- mainly affecting supported editions of Windows Small Business Server 2003 and Windows Home Server -- merely represents the cost of doing business.

Either way, the release of a proof of concept flash video on Jan. 30 by Miami-based Immunity Inc. was one of more than half a dozen incidents over the past six months where Microsoft finds itself playing defense in regards to vulnerabilities surfacing soon after patch release announcements. Not to mention the fact that it's yet another example of reoccurring kernel overflow exploit issues.

"When you look at it from a patch management standpoint -- I mean from zero to exploit -- the current patch release structure is like a Dutch boy with his finger in the dyke trying not to drown," said Bas Alberts, senior security researcher at Immunity. "Windows architecture goes patch by patch and really doesn't have mechanisms to prevent whole types of bug classes in different areas and therefore has to fight the topsy-turvy battle between usability and security one patch at a time."

According to Alberts, who led the team that released the video, the hole in the system gives hackers the ability to send bad packets to a Web address and embed malicious code via the subnet, which is comprised of a range of addresses assigned to a specific network or enterprise organization. The subnet addresses usually feed up into one single network ID, which a hacker would have control of if the exploit is successful. The hacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Reached this week for comment, Alfred Huger, Symantec's VP of Engineering for Security Response, said news of the exploit was relatively routine and that Microsoft is doing as well as it can in disclosing vunerabilities.

That said, Symantec still sent a warning to its customers via its DeepSight threat network. And the company still conceded that Immunity's demonstration of a Windows XP SP2 computer on a local subnet being compromised was still very possible.

"I don't think this is a huge deal," Huger said. "Companies such as (Immunity) put out exploit concepts all the time; that's what they do. What's getting people's attention is that Microsoft didn't think it could be exploited and said as much and then it happened."

For its part, Microsoft continues to downplay the severity of the breaches outlined in the flash video demonstration even after it said the Jan. 8 patch would render such incursions difficult and unlikely in the "real world."

Indeed Bulletin MS08-001 included a fix for TCP/IP issues that involve bad code sent over a stream of information packets used for jobs such as file transfer and e-mail transmissions.

There is no word on whether the issue will be patched this week or sometime in the near future.

Both Huger and Immunity's Alberts agree that Microsoft has made some improvements on overflow protection for Vista SP1, but that it's still a long haul for more comprehensive, one-stop-shop security programs that can be found in the Linux Kernel and other Unix-based operating systems.

"The main thing to do is, patch what you can but make sensible choices about which third-party software you're using," cautions Alberts. "I would say, look at Windows and then look at the security track record of the third-party software you're using and plan accordingly because in that regard, patch management just isn't enough."

Tuesday, February 12, 2008

Embed & Publish any RSS Feed at your Blog with Wigitize

Wigitize is a free web based service that allows you to embed and publish any RSS feed on your blog or website.

Just grab the RSS feed URL you want to embed and publish. Input the valid RSS feed URL and click on ‘generate blog widget’. Next step involves stylising of HTML display of the feed. There are 3 options: no style, peachy, dark.

You also have option to configure number of enteries to display, feed title and date of publishing. Here is view of configuration settings and final output.

Copy the Javascript code and paste in your blog template.

http://wigitize.com/

Invisible Yahoo messenger friend finder

Here is a link which will help you to find whether the yahoo member in
your buddy list is really offline or invisible:

http://www.invisible.ir/

Tuesday, January 22, 2008

Retrive Password

A lot of users are using the remeber me or keep me signed in option in
the browsers and if we forget the password, there is an option to
retrieve the password from your browser. The following steps applies for
Firefox browser users:

* Click on Tools menu.
* Select Options.
* Click on Security icon on the top bar.
* Click on the Show Passwords button.
* In the list, select the Web site for which you forgot the password and
click on Show Passwords button.

Post your suggestions/comments if you have idea about retrieving
passwords from Internet Explorer.

Tuesday, January 8, 2008

XP Home edition password

Here is a simple set of steps to provide password for XP Home edition:

1. Power on the computer and hit F8 just after the BIOS check is
complete. Select Safe Mode from the List.
2. Goto Control panel...by:
*Clicking on Start\settings\ControlPanel
3. Double Click on Users Accounts
4. Select the Administrators Account from the list.
5. Apply a password.

Restart the computer and you will be able to provide password protection
for your XP Home edition.