Re: Disappearing email accounts

2018-01-13 Thread Jonathan N. Little

Fire Bird wrote:

Could someone please tell me how to get the three panel layout back.


View > Layout > Classic View

View > Layout > [x] Message Pane
View > Layout > [x] Thread Pane
View > Layout > [x] Folder Pane

--
Take care,

Jonathan
---
LITTLE WORKS STUDIO
http://www.LittleWorksStudio.com
___
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey


Re: Disappearing email accounts

2018-01-13 Thread Ed Mullen

On 1/13/2018 at 12:13 PM, Fire Bird created this epitome of digital genius:

I use SeaMonkey as my email client. I checked my mail first thing, as
usual, and all was well. However when I went back later, the layout
had changed, only one account was listed. All the others had
disappeared. I tried closing Seamonkey and reopening it. I uninstalled
it. Installed an older version. All to no avail. I've uninstalled it
again and haven't re-installed. I have no idea what happened or why or
how.


View - Layout - Classic View and check what panes you want to see.


I don't want to have to use webview nor do I particularly want to use
my failing laptop. SeaMonkey and Thunderbird are apparently
incompatible so I can install my SeaMonkey back-up there.


Don't use a profile from SM in TB nor vice-versa.



Could someone please tell me how to get the three panel layout back.



If the above doesn't help I'd restore from a profile backup.

--
Ed Mullen
http://edmullen.net/
If a turtle doesn't have a shell, is he homeless or naked?
___
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey


Disappearing email accounts

2018-01-13 Thread Fire Bird
I use SeaMonkey as my email client. I checked my mail first thing, as
usual, and all was well. However when I went back later, the layout
had changed, only one account was listed. All the others had
disappeared. I tried closing Seamonkey and reopening it. I uninstalled
it. Installed an older version. All to no avail. I've uninstalled it
again and haven't re-installed. I have no idea what happened or why or
how.

I don't want to have to use webview nor do I particularly want to use
my failing laptop. SeaMonkey and Thunderbird are apparently
incompatible so I can install my SeaMonkey back-up there.

Could someone please tell me how to get the three panel layout back.

-- 
Lil Sparrow
___
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey


Re: NoScript Problem

2018-01-13 Thread WaltS48

On 1/13/18 8:34 AM, FredW wrote:

On Fri, 12 Jan 2018 19:07:43 -0500, WaltS48 
wrote:

On 1/12/18 6:47 PM, FredW wrote:

On Fri, 12 Jan 2018 10:24:58 -0800, Chuck  wrote:


I am trying to install NoScript but keep getting a message that the
add-on from Mozilla appears to be corrupt.
Any help?

NoScript  5.1.8.3

https://noscript.net/getit

Page down to:
You can still download NoScript "Classic" (5.1.8.3) for Firefox 52 ESR
here: it will be updated until June 2018, when ESR and the Tor Browser
based on it will switch to 59.


You didn't get the memo?

Next Firefox ESR is going to be version 60.


What has that to do with me ???
I was quoting the website of NoScript.
If anything you should tell the owner of NoScript



You could have corrected their mistake.

___
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey


Re: Spectre exploit

2018-01-13 Thread Lee
On 1/12/18, mozilla-lists.mbou...@spamgourmet.com
 wrote:
> Lee wrote:
>> I've got a dell, so I started here:
>> https://www.dell.com/support/article/us/en/19/sln308587/microprocessor-side-channel-vulnerabilities--cve-2017-5715--cve-2017-5753--cve-2017-5754---impact-on-dell-products?lang=en
>>
>> Apply the update, do the powershell bit:
>> PS C:\temp\2do\SpeculationControl> Get-SpeculationControlSettings
>> Speculation control settings for CVE-2017-5715 [branch target injection]
>>
>> Hardware support for branch target injection mitigation is present: True
>> Windows OS support for branch target injection mitigation is present:
>> True
>> Windows OS support for branch target injection mitigation is enabled:
>> True
>>
>> Speculation control settings for CVE-2017-5754 [rogue data cache load]
>>
>> Hardware requires kernel VA shadowing: True
>> Windows OS support for kernel VA shadow is present: True
>> Windows OS support for kernel VA shadow is enabled: True
>> Windows OS support for PCID performance optimization is enabled: True
>> [not required for security]
>>
>>
>> BTIHardwarePresent : True
>> BTIWindowsSupportPresent   : True
>> BTIWindowsSupportEnabled   : True
>> BTIDisabledBySystemPolicy  : False
>> BTIDisabledByNoHardwareSupport : False
>> KVAShadowRequired  : True
>> KVAShadowWindowsSupportPresent : True
>> KVAShadowWindowsSupportEnabled : True
>> KVAShadowPcidEnabled   : True
>>
>> everything looks good ..  except the POC still works :(
>> C:\cygwin\home\Lee\t>spectre.exe
>> Reading 40 bytes:
>> Reading at malicious_x = 0FE4... Success: 0x54='T' score=2
>> Reading at malicious_x = 0FE5... Success: 0x68='h' score=2
>> Reading at malicious_x = 0FE6... Success: 0x65='e' score=7 (second
>> best: 0x01 score=1)
>> Reading at malicious_x = 0FE7... Success: 0x20=' ' score=2
>> <.. snip ..>
>> Reading at malicious_x = 1008... Success: 0x61='a' score=2
>> Reading at malicious_x = 1009... Success: 0x67='g' score=2
>> Reading at malicious_x = 100A... Success: 0x65='e' score=2
>> Reading at malicious_x = 100B... Success: 0x2E='.' score=2
>>
>> *sigh*  latest OS update + latest BIOS update + latest CPU microcode
>> and the proof of concept exploit still works.
>
> Don't the OS kernel / BIOS / CPU updates just mitigate against Meltdown,
> preventing applications (executing in ring3) from inferring content of
> kernel memory (in ring0)?

There were also a few other items in the BIOS update for my pc that
sounded good but yes -- it seems like most of the frenzy was about
Meltdown.  Which is a big deal for cloud providers but probably
doesn't matter all that much to me.  On the other hand, the powershell
Get-SpeculationControlSettings shows I've got [dunno what] mitigation
enabled for both categories:
  Speculation control settings for CVE-2017-5715
  Speculation control settings for CVE-2017-5754
and like the song - two out of three ain't bad (altho this one's
better  https://www.youtube.com/watch?v=GMR3Hy3yrbw )

> As I understand it, I think Spectre requires workarounds in each
> application (or a fundamental change to CPU hardware to do something
> like somehow roll back the cache content along with other processor
> state when discarding speculatively executed instructions). Unless you
> patch the PoC code to mitigate Spectre, it will still demonstrate a
> successful attack.

Exactly.  And how does a user end up with attacker controlled programs
running on their computer?  I'm guessing far & away the biggest vector
is javascript running in the browser.

So people should be at least thinking about blocking javascript.  And
thinking about what kind of exposure they have with their addons (like
a password/form-fill manager that might not be safe against spectre
attacks).

Regards,
Lee
___
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey