On 11/30/2016 07:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox browser, officials of the anonymity service
confirmed Tuesday.
The versions span from 41 to
Lee wrote:
On 12/2/16, Frank-Rainer Grahl wrote:
Glad that 2.47 works well but you are likely running Adrians unofficial
version :)
yes
Official one is still stuck in l10n mud.
Stuck how?
W dniu 12/02/2016 o 08:13 PM, Lee pisze:
>
>> Official one is still stuck in l10n mud.
>
> Stuck how?
> https://l10n.mozilla-community.org/~akalla/unofficial/seamonkey/nightly/latest-comm-release-windows32/
> has lots of seamonkey-2.47.XX.langpack.xpi files - do they not work,
> is it just a
On 12/2/16, Frank-Rainer Grahl wrote:
> Glad that 2.47 works well but you are likely running Adrians unofficial
> version :)
yes
> Official one is still stuck in l10n mud.
Stuck how?
Glad that 2.47 works well but you are likely running Adrians unofficial
version :) Official one is still stuck in l10n mud.
FRG
Lee wrote:
On 12/2/16, Frank-Rainer Grahl wrote:
> LOL! I think you meant "everything", but "anything" is probably
>
jupp. ewong is still
On 12/2/16, Frank-Rainer Grahl wrote:
> > LOL! I think you meant "everything", but "anything" is probably
> >
> jupp. ewong is still fighting with the 2.46 repacks so best to use
> Adrians version right now until this is sorted out. A 2.47 should follow
> soon but first 2.46 to
> LOL! I think you meant "everything", but "anything" is probably
>
jupp. ewong is still fighting with the 2.46 repacks so best to use
Adrians version right now until this is sorted out. A 2.47 should follow
soon but first 2.46 to get the build bugs out.
FRG
Lee wrote:
On 12/1/16,
On 12/1/2016 10:46 AM, TCW wrote:
> On 12/1/2016 12:29 PM, NoOp wrote:
>> On 12/1/2016 10:23 AM, TCW wrote:
>>> On 12/1/2016 12:12 PM, NoOp wrote:
On 12/01/2016 08:40 AM, Lee wrote:
> On 12/1/16, TCW <"."> wrote:
>> On 11/30/2016 8:06 AM, WaltS48 wrote:
There's a zero-day
On 12/1/2016 12:29 PM, NoOp wrote:
On 12/1/2016 10:23 AM, TCW wrote:
On 12/1/2016 12:12 PM, NoOp wrote:
On 12/01/2016 08:40 AM, Lee wrote:
On 12/1/16, TCW <"."> wrote:
On 11/30/2016 8:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on
On 12/1/2016 10:23 AM, TCW wrote:
> On 12/1/2016 12:12 PM, NoOp wrote:
>> On 12/01/2016 08:40 AM, Lee wrote:
>>> On 12/1/16, TCW <"."> wrote:
On 11/30/2016 8:06 AM, WaltS48 wrote:
>> There's a zero-day exploit in the wild that's being used to execute
>> malicious code on the computers
On 12/1/2016 12:02 PM, Chris Ilias wrote:
On 01/12/2016 12:52 PM, TCW wrote:
I was *told* to not post long URLs before by Chris I and someone else.
Short URLs is the preferred method is what I was told.
I never said that. I told you not to refer to contributor builds as
official releases.
On 12/1/2016 12:12 PM, NoOp wrote:
On 12/01/2016 08:40 AM, Lee wrote:
On 12/1/16, TCW <"."> wrote:
On 11/30/2016 8:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the
On 12/01/2016 10:12 AM, NoOp wrote:
> On 12/01/2016 08:40 AM, Lee wrote:
>> On 12/1/16, TCW <"."> wrote:
>>> On 11/30/2016 8:06 AM, WaltS48 wrote:
> There's a zero-day exploit in the wild that's being used to execute
> malicious code on the computers of people using Tor and possibly other
On 12/01/2016 08:40 AM, Lee wrote:
> On 12/1/16, TCW <"."> wrote:
>> On 11/30/2016 8:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox browser,
On 01/12/2016 12:52 PM, TCW wrote:
I was *told* to not post long URLs before by Chris I and someone else.
Short URLs is the preferred method is what I was told.
I never said that. I told you not to refer to contributor builds as
official releases.
On 12/1/2016 10:40 AM, Lee wrote:
On 12/1/16, TCW <"."> wrote:
On 11/30/2016 8:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox browser, officials of the
On 12/1/16, TCW <"."> wrote:
> On 11/30/2016 8:06 AM, WaltS48 wrote:
>>> There's a zero-day exploit in the wild that's being used to execute
>>> malicious code on the computers of people using Tor and possibly other
>>> users of the Firefox browser, officials of the anonymity service
>>> confirmed
On 12/1/16, Frank-Rainer Grahl wrote:
> Likely 2.40 is affected. There will always be 0 day bugs and even a
> fully patched Firefox will contain some. That is why I use Noscript and
> an Adblocker. If a site wants that I turn off the Adblocker its a site I
> will no longer visit.
On 12/1/16, Ray_Net wrote:
> WaltS48 wrote on 30-11-16 15:06:
>>> There's a zero-day exploit in the wild that's being used to execute
>>> malicious code on the computers of people using Tor and possibly
>>> other users of the Firefox browser, officials of the
On 11/30/2016 8:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox browser, officials of the anonymity service
confirmed Tuesday.
The versions span from 41 to
Likely 2.40 is affected. There will always be 0 day bugs and even a
fully patched Firefox will contain some. That is why I use Noscript and
an Adblocker. If a site wants that I turn off the Adblocker its a site I
will no longer visit. Even with Noscript there is a risk that a
whitelisted site
WaltS48 wrote on 30-11-16 15:06:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly
other users of the Firefox browser, officials of the anonymity
service confirmed Tuesday.
The versions span from 41 to 50,
On 11/30/2016 7:51 PM, NoOp wrote:
> On 11/30/2016 6:55 AM, Chris Ilias wrote:
>> On 30/11/2016 9:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox
On 11/30/2016 6:55 AM, Chris Ilias wrote:
> On 30/11/2016 9:06 AM, WaltS48 wrote:
>>> There's a zero-day exploit in the wild that's being used to execute
>>> malicious code on the computers of people using Tor and possibly other
>>> users of the Firefox browser, officials of the anonymity service
On 11/30/16, Chris Ilias wrote:
> On 30/11/2016 9:06 AM, WaltS48 wrote:
>>> There's a zero-day exploit in the wild that's being used to execute
>>> malicious code on the computers of people using Tor and possibly other
>>> users of the Firefox browser, officials of the anonymity
WaltS48 wrote on 11/30/2016 03:06 PM:
There's a zero-day exploit in the wild that's being used to execute malicious
code on the computers of people using Tor and possibly other users of the
Firefox browser, officials of the anonymity service confirmed Tuesday.
The versions span from 41 to
On 30/11/2016 9:06 AM, WaltS48 wrote:
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox browser, officials of the anonymity service
confirmed Tuesday.
The versions span from 41 to
There's a zero-day exploit in the wild that's being used to execute
malicious code on the computers of people using Tor and possibly other
users of the Firefox browser, officials of the anonymity service
confirmed Tuesday.
The versions span from 41 to 50, with version 45 ESR being the
28 matches
Mail list logo