I use ConText for my script editing.   Built in file-compare,
color-coding, you can download all kinds of language definitions.
Unfortunately it hasn't been updated since 12/2006
 
http://www.contexteditor.org/
 
 
Thanks,
 
Jake Gardner
TTC Network Administrator
Ext. 246
 

________________________________

From: tony patton [mailto:[email protected]] 
Sent: Wednesday, July 08, 2009 3:18 AM
To: NT System Admin Issues
Subject: Re: New IE zero day exploit in the wild



PFE32 was a life saver in the day :-) 

think Notepad++ is now the most used app on my work PC, for text,
vbscript, logs & regfiles. 

Regards

Tony Patton
Desktop Operations Cavan
Ext 8078
Direct Dial 049 435 2878
email: [email protected] 



Kurt Buff <[email protected]> 

07/07/2009 17:41 
Please respond to
"NT System Admin Issues" <[email protected]>


To
"NT System Admin Issues" <[email protected]> 
cc
Subject
Re: New IE zero day exploit in the wild

        




I'm just pushing out the .reg file in the login script:

    regedit /s \\fileserver\public\patches\videokillbits.reg

The file was easy to create, in a capable editor (not notepad or
wordpad) that allows metacharacter search and replace, such as '\n'
for CRLF and '\t' for tab. I used the ancient, no-longer-supported
PFE32. I really should switch to VIM, I suppose.

On Tue, Jul 7, 2009 at 08:40, Eric
Wittersheim<[email protected]> wrote:
> I'm pushing out the .reg via GP.  So far so good.
>
> On Tue, Jul 7, 2009 at 10:38 AM, David Lum <[email protected]> wrote:
>>
>> The "Microsoft fix-it" is an MSI that I am pushing via SMS and is
pushing
>> fine (so far just a few test cases have it, but no issues). Beats
trying to
>> push out a .REG or something...
>>
>>
>>
>> David Lum // SYSTEMS ENGINEER
>> NORTHWEST EVALUATION ASSOCIATION
>> (Desk) 971.222.1025 // (Cell) 503.267.9764
>>
>>
>>
>>
>>
>>
>>
>> From: J Kyo [mailto:[email protected] <mailto:[email protected]> ]
>> Sent: Tuesday, July 07, 2009 8:18 AM
>> To: NT System Admin Issues
>> Subject: Re: New IE zero day exploit in the wild
>>
>>
>>
>> Curious if anyone has used the "Microsoft Fix It" from:
>> http://support.microsoft.com/kb/972890
<http://support.microsoft.com/kb/972890> .
>>
>> On Mon, Jul 6, 2009 at 6:24 PM, Carl Houseman <[email protected]>
>> wrote:
>>
>> Recommendation from MS is to set the killbits everywhere.
>>
>>
>>
>> http://www.microsoft.com/technet/security/advisory/972890.mspx
<http://www.microsoft.com/technet/security/advisory/972890.mspx> 
>>
>>
>>
>> Carl
>>
>>
>>
>> From: Ken Schaefer [mailto:[email protected]
<mailto:[email protected]> ]
>> Sent: Monday, July 06, 2009 9:06 PM
>>
>> To: NT System Admin Issues
>>
>> Subject: RE: New IE zero day exploit in the wild
>>
>>
>>
>> Seems to be XP / Windows Server 2003 only?
>>
>> Cheers
>>
>> Ken
>>
>>
>>
>> ________________________________
>>
>> From: Alex Eckelberry [[email protected]]
>> Sent: Tuesday, 7 July 2009 5:56 AM
>> To: NT System Admin Issues
>> Subject: New IE zero day exploit in the wild
>>
>> Our labs have confirmed this and it is quite nasty.  Best bet for now
is
>> to set the killbits. Or don't use IE.
>>
>>
>>
>> Some references:
>>
>>
>>
>> Microsoft:
>>
>>
>>
>> http://www.microsoft.com/technet/security/advisory/972890.mspx
<http://www.microsoft.com/technet/security/advisory/972890.mspx> 
>>
>>
>>
>> SANS:
>>
>>
>>
>> http://isc.sans.org/diary.html?storyid=6733
<http://isc.sans.org/diary.html?storyid=6733> 
>>
>>
>>
>> I would take this one quite seriously.
>>
>>
>>
>> Alex
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> >  ~



====================================================================
http://www.quinn-insurance.com

This e-mail is intended only for the addressee named above. The contents
should not be copied nor disclosed to any other person. Any views or
opinions expressed are solely those of the sender and
do not necessarily represent those of QUINN-Insurance, unless otherwise
specifically stated . As internet communications are not secure,
QUINN-Insurance is not responsible for the contents of this message nor
responsible for any change made to this message after it was sent by the
original sender. Although virus scanning is used on all inbound and
outbound e-mail, we advise you to carry out your own virus check before
opening any attachment. We cannot accept liability for any damage
sustained
as a result of any software viruses.

====================================================================

QUINN-Life Direct Limited is regulated by the Financial Regulator.
QUINN-Insurance Limited is regulated by the Financial Regulator and
regulated by the Financial Services Authority for the conduct of UK
business.

====================================================================

QUINN-Life Direct Limited is registered in Ireland, registration number
292374 and is a private company limited by shares.
QUINN-Insurance Limited is registered in Ireland, registration number
240768 and is a private company limited by shares.
Both companies have their head office at Dublin Road, Cavan, Co. Cavan.

 

 


***Teletronics Technology Corporation*** 
This e-mail is confidential and may also be privileged.  If you are not the 
addressee or authorized by the addressee to receive this e-mail, you may not 
disclose, copy, distribute, or use this e-mail. If you have received this 
e-mail in error, please notify the sender immediately by reply e-mail or by 
telephone at 267-352-2020 and destroy this message and any copies.  

Thank you.

*******************************************************************



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to