I use ConText for my script editing. Built in file-compare, color-coding, you can download all kinds of language definitions. Unfortunately it hasn't been updated since 12/2006 http://www.contexteditor.org/ Thanks, Jake Gardner TTC Network Administrator Ext. 246
________________________________ From: tony patton [mailto:[email protected]] Sent: Wednesday, July 08, 2009 3:18 AM To: NT System Admin Issues Subject: Re: New IE zero day exploit in the wild PFE32 was a life saver in the day :-) think Notepad++ is now the most used app on my work PC, for text, vbscript, logs & regfiles. Regards Tony Patton Desktop Operations Cavan Ext 8078 Direct Dial 049 435 2878 email: [email protected] Kurt Buff <[email protected]> 07/07/2009 17:41 Please respond to "NT System Admin Issues" <[email protected]> To "NT System Admin Issues" <[email protected]> cc Subject Re: New IE zero day exploit in the wild I'm just pushing out the .reg file in the login script: regedit /s \\fileserver\public\patches\videokillbits.reg The file was easy to create, in a capable editor (not notepad or wordpad) that allows metacharacter search and replace, such as '\n' for CRLF and '\t' for tab. I used the ancient, no-longer-supported PFE32. I really should switch to VIM, I suppose. On Tue, Jul 7, 2009 at 08:40, Eric Wittersheim<[email protected]> wrote: > I'm pushing out the .reg via GP. So far so good. > > On Tue, Jul 7, 2009 at 10:38 AM, David Lum <[email protected]> wrote: >> >> The "Microsoft fix-it" is an MSI that I am pushing via SMS and is pushing >> fine (so far just a few test cases have it, but no issues). Beats trying to >> push out a .REG or something... >> >> >> >> David Lum // SYSTEMS ENGINEER >> NORTHWEST EVALUATION ASSOCIATION >> (Desk) 971.222.1025 // (Cell) 503.267.9764 >> >> >> >> >> >> >> >> From: J Kyo [mailto:[email protected] <mailto:[email protected]> ] >> Sent: Tuesday, July 07, 2009 8:18 AM >> To: NT System Admin Issues >> Subject: Re: New IE zero day exploit in the wild >> >> >> >> Curious if anyone has used the "Microsoft Fix It" from: >> http://support.microsoft.com/kb/972890 <http://support.microsoft.com/kb/972890> . >> >> On Mon, Jul 6, 2009 at 6:24 PM, Carl Houseman <[email protected]> >> wrote: >> >> Recommendation from MS is to set the killbits everywhere. >> >> >> >> http://www.microsoft.com/technet/security/advisory/972890.mspx <http://www.microsoft.com/technet/security/advisory/972890.mspx> >> >> >> >> Carl >> >> >> >> From: Ken Schaefer [mailto:[email protected] <mailto:[email protected]> ] >> Sent: Monday, July 06, 2009 9:06 PM >> >> To: NT System Admin Issues >> >> Subject: RE: New IE zero day exploit in the wild >> >> >> >> Seems to be XP / Windows Server 2003 only? >> >> Cheers >> >> Ken >> >> >> >> ________________________________ >> >> From: Alex Eckelberry [[email protected]] >> Sent: Tuesday, 7 July 2009 5:56 AM >> To: NT System Admin Issues >> Subject: New IE zero day exploit in the wild >> >> Our labs have confirmed this and it is quite nasty. Best bet for now is >> to set the killbits. Or don't use IE. >> >> >> >> Some references: >> >> >> >> Microsoft: >> >> >> >> http://www.microsoft.com/technet/security/advisory/972890.mspx <http://www.microsoft.com/technet/security/advisory/972890.mspx> >> >> >> >> SANS: >> >> >> >> http://isc.sans.org/diary.html?storyid=6733 <http://isc.sans.org/diary.html?storyid=6733> >> >> >> >> I would take this one quite seriously. >> >> >> >> Alex >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ ==================================================================== http://www.quinn-insurance.com This e-mail is intended only for the addressee named above. The contents should not be copied nor disclosed to any other person. Any views or opinions expressed are solely those of the sender and do not necessarily represent those of QUINN-Insurance, unless otherwise specifically stated . As internet communications are not secure, QUINN-Insurance is not responsible for the contents of this message nor responsible for any change made to this message after it was sent by the original sender. Although virus scanning is used on all inbound and outbound e-mail, we advise you to carry out your own virus check before opening any attachment. We cannot accept liability for any damage sustained as a result of any software viruses. ==================================================================== QUINN-Life Direct Limited is regulated by the Financial Regulator. QUINN-Insurance Limited is regulated by the Financial Regulator and regulated by the Financial Services Authority for the conduct of UK business. ==================================================================== QUINN-Life Direct Limited is registered in Ireland, registration number 292374 and is a private company limited by shares. QUINN-Insurance Limited is registered in Ireland, registration number 240768 and is a private company limited by shares. Both companies have their head office at Dublin Road, Cavan, Co. Cavan. ***Teletronics Technology Corporation*** This e-mail is confidential and may also be privileged. If you are not the addressee or authorized by the addressee to receive this e-mail, you may not disclose, copy, distribute, or use this e-mail. If you have received this e-mail in error, please notify the sender immediately by reply e-mail or by telephone at 267-352-2020 and destroy this message and any copies. Thank you. ******************************************************************* ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
