14 Apr 2010

It’s been a busy Tuesday. Three companies have released security alerts. Please read the highlights below: Oracle: The Oracle Critical Patch Update Advisory – April 2010 addresses 47 vulnerabilities in various Oracle products and components, including 16 vulnerabilities in Sun Solaris. The Advisory provides information about affected components, access and authorization required for successful exploitation, […]

31 Mar 2010

Microsoft has released updates for multiple vulnerabilities in Internet Explorer, including the vulnerability detailed in Microsoft Security Advisory (981374). By convincing a user to view a specially crafted HTML document or Microsoft Office document, an attacker may be able to execute arbitrary code with the privileges of the user. Microsoft has released updates to address […]

29 Mar 2010

A very interesting article on exploiting NIC for running arbitrary code (hacking). Presentation entitled “Can you still trust your network card?”. Explains how an attacker could be able to exploit a flaw to run arbitrary code inside some network controllers (NICs). The attack uses routable packets delivered to the victim’s NIC. Consequently, multiple attacks can […]

23 Dec 2009

1. ReactOS – http://www.reactos.org Goal: Run Windows apps on an open-source OS 2. Haiku – http://www.haiku-os.org Goal: Be a free reincarnation of BeOS 3. AROS – http://aros.sourceforge.net Goal: Recreate the glory days of AmigaOS 4. Aranym – http://aranym.sourceforge.net Goal: Keep the Atari ST/TT/Falcon alive 5. Syllable – http://www.syllable.org Goal: Provide a user-friendly desktop OS 6. […]

02 Nov 2009

· Firefox · FileZilla · 7-Zip · FullSync · Gimpshop · ClamWin · OpenOffice · Notepad++ · TightVNC · Blender · Audacity More details @ http://www.smashingapps.com/2009/10/27/11-most-popular-open-source-softwares-of-all-time.html Peace Deepak Lalan

07 Jul 2009

Microsoft has released Security Advisory (972890) to describe attacks on vulnerability in the Microsoft Video ActiveX control. Because no fix is currently available for this vulnerability, please see the Security Advisory and US-CERT Vulnerability Note VU#180513 for workarounds. http://www.kb.cert.org/vuls/id/180513 http://www.microsoft.com/technet/security/advisory/972890.mspx Protect. Secure. Share Peace Deepak Lalan