This was originally linked as: Active Exploitation of a Vulnerability in Microsoft Remote Procedure Call http://www.us-cert.gov/current/current_activity.html#msrpcexp
But this was quickly changed to "in Microsoft Windows" and "#msvuls", well not quick enough ;) Thanks for the heads up, cheers Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ------------------------------------------------------------------------------ This List Sponsored by: Black Hat Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas. World renowned security experts reveal tomorrow's threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations. http://www.blackhat.com ------------------------------------------------------------------------------
