that use the IE engine so you never truly get away from it.
> -----Original Message-----
> From: Bill Wheatley [mailto:[EMAIL PROTECTED]
> Sent: Thursday, August 19, 2004 11:41 AM
> To: CF-Community
> Subject: Re: So much for SP2 security...
>
> Only if you use IE though, I don't so i'm not too pressed about it. You
can
> turn it off by going into the control panel and customize and make
> another browser your default. Just like they bundle messanger as a
> service taht can cause spam popup hell but you can disable it.
>
> Though i guess i can see where it will annoy people.
>
> Save yourself while there is still time ~~~~> www.opera.com <~~~~~~~~
>
> :>
>
>
>
> William Wheatley
> Coldfusion Guru
>
>
> ----- Original Message -----
> From: Marlon Moyer
> To: CF-Community
> Sent: Thursday, August 19, 2004 12:16 PM
> Subject: RE: So much for SP2 security...
>
>
> Yes, but when they bundle IE into the system and claim it cannot be
> taken
> out, then it becomes a windows bug also....
>
> > -----Original Message-----
> > From: Bill Wheatley [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, August 19, 2004 10:56 AM
> > To: CF-Community
> > Subject: Re: So much for SP2 security...
> >
> > its more a IE bug then a windows bug though.
> >
> >
> >
> > William Wheatley
> > Coldfusion Guru
> >
> >
> > ----- Original Message -----
> > From: Howie Hamlin
> > To: CF-Community
> > Sent: Thursday, August 19, 2004 11:35 AM
> > Subject: So much for SP2 security...
> >
> >
> > Basically, a user would have to follow instructions on a web site
and,
> in
> > essence, infect their own PC. I guess this is not a very big security
> risk but
> > it's another mark on the release of SP2. Note that this expolit also
> works
> > on a fully patched WinXP SP1 system.
> >
> > ####################
> >
> > A newly discovered vulnerability in Windows XP Service Pack 2 that
> > could allow a malicious Web site to deposit an attack program on a
> > user's system.
> > ADVERTISEMENT
> >
> > The attack utilizes Internet Explorer's drag-and-drop features and
the
> > Windows "shell folders" to copy an executable from a malicious Web
> site
> > to a user's startup folder, from which it would execute the next time
> the
> > user logged on. The researcher who reported the problem to security
> > mailing lists provided proof-of-concept code that leaves a file named
> > "malware.exe" in the user's startup folder.
> >
> > http://www.eweek.com/article2/0,1759,1637609,00.asp
> >
> >
> >
>
>
>
[Todays Threads] [This Message] [Subscription] [Fast Unsubscribe] [User Settings] [Donations and Support]
