Not to worry, it will work in 2009. See the official reply and instructions at 30gb zune issues -- official update.
Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...
Grisoft/AVG Version 8 Includes Yahoo Search Bar
Sun Java SE Update 5 (And another Toolbar)
SunJava Update Includes MSN Toolbar
"KSOD Defined: Where after a reboot the Windows Vista PC boots up to a black screen with a white mouse cursor and nothing else ever loads (no logon screen, etc). Safe mode does the same thing. Last Known Good configuration and System Restore do not fix it except in rare cases where performing a System Restore to 1 month ago or earlier does (thanks Mike Katz for figuring that out)."According to sources, the problem is related to the RPC service running under the LocalSystem account as opposed to the NT Authority\NetworkService account. Although the work-around is quite technical and should not be done by the inexperienced, it has been found to be successful. It can be found at "Windows Vista Black Screen with Mouse Cursor Only Issue."
You have arrived at the CastleCops website, which is currently offline. It has been our pleasure to investigate online crime and volunteer with our virtual family to assist with your computer needs and make the Internet a safer place. Unfortunately, all things come to an end. Keep up the good fight folks, for the spirit of this community lies within each of us. We are empowered to improve the safety and security of the Internet in our own way. Let us feel blessed for the impact we made and the relationships created.
With respect to the server marathon, by March 17 2009 CastleCops will refund contributions made through PayPal that were specifically designated for servers. Unfortunately, server donations made via check cannot be returned because we do not have the addresses for the donating entity. Unless instructed otherwise, CastleCops will re-allocate these funds as a donation to the Internet Systems Consortium (ISC.org). This organization sponsored our hosting environment for approximately the past 2 years. Please contact us [cc at laudanski dot com] before March 17, 2009, if you would like a return of your server marathon donation. Otherwise, we would like to thank the ISC for their unfettered support.
We thank everyone in creating our unique footprint and memories in time.
Love, Best Wishes and Happy Holidays, CastleCops
PST 23 Dec 2008"
Think before you click!
"The Microsoft Malware Protection Center (MMPC) recently noted the inevitable increase in holiday-themed viruses and worms.
There's not much new about this malware: You get an e-mail or instant message that promises a greeting, holiday image, or music.
If you click the message, your computer gets infected with the malware which can easily spread to all of your contacts.
Remember, take these five steps to help prevent any kind of malware:
- Use a firewall.
- Update your operating system.
- Use antivirus software and keep it updated.
- Use antispyware software and keep it updated.
- Approach links in e-mail, on social networking sites, or in IMs with caution.
To read more about holiday malware, see Merry Malware - You’d better watch out, you’d better think twice and O Come All Ye Malware or check out the entry in our virus encyclopedia."
MFSA 2008-69 XSS vulnerabilities in SessionStoreIn addition to the above securityissues, Firefox 3.0.5 fixes several additional issues found in Firefox 3.0.4:
MFSA 2008-67 Escaped null characters ignored by CSS parser
MFSA 2008-66 Errors parsing URLs with leading whitespace and control characters
MFSA 2008-65 Cross-domain data theft via script redirect error message
MFSA 2008-64 XMLHttpRequest 302 response disclosure
MFSA 2008-63 User tracking via XUL persist attribute
MFSA 2008-60 Crashes with evidence of memory corruption (rv:184.108.40.206/220.127.116.11)
"3 people helped each day, ‘paid forward’ by each person helps 4.7M people in two weeks."
· MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution (932349)
· MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution (956802)
· MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
· MS08-073: Cumulative Security Update for Internet Explorer (958215)
· MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
· MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349)
· MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807)
· MS08-077: Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)References:
"Users could be infected with the Trojan either from a drive-by download, which can infect a PC by exploiting a vulnerability in a browser, or by being duped into downloading it, Canja said.Recommendations:
When it runs on a PC, it registers itself in Firefox's system files as "Greasemonkey," a well-known collection of scripts that add extra functionality to Web pages rendered by Firefox."
As part of our regularly scheduled bulletin release, we’re currently planning to release eight security bulletins:
As we do each month, the Microsoft Windows Malicious Software Removal Tool will be updated.
- Six Microsoft Security Bulletins rated as Critical and two rated as Important. These updates may require a restart and will be detectable using the Microsoft Baseline Security Analyzer.
We are also planning to release high-priority, non-security updates on Windows Update and Windows Server Update Services (WSUS) as well as high-priority, non-security updates on Microsoft Update and Windows Server Update Services (WSUS). For additional information, please see the Other Information section of the Advanced Notification.
HP and Microsoft are spreading some magic this Holiday. Each of 50 sites are giving away a $6000 hardware package that includes four HP computers as well as additional peripherals. The package also includes a number of software offerings from Microsoft and the Windows Live team. Complete details of the hardware and software included on the official HP Magic Giveaway site.In HP's last "give away" (31 Days of the Dragon), I visited a number of the participating sites and found several that I liked. With the HP Magic Giveaway, there quite a few new sites that I am discovering. What is different about this contest is that the theme is to share the magic -- many of the participating sites using the phrase, "Pay it Forward". In case you didn't know, "3 people helped each day, "paid forward" by each person helps 4.7M people in two weeks."
"Gears Cross-Origin Worker VulnerabilityReminder: It is not advisable to use Beta software on production systems.
A vulnerability in Gears could allow an attacker to run code in the context of a site that serves user-controlled files. To exploit this, an attacker needs to upload a malicious file to the victim's site and convince the user to allow the attacker's site to use Gears.
Severity: High. Even though this requires convincing users to allow a third-party site to use Gears, it could allow data theft and cross-site scripting on sites hosting user-created content, even those that do not use Gears.Credit: Thanks to Yair Amit, Senior Security Researcher, IBM Rational Application Security Research Team for responsibly reporting the issue to Google."
Here are some limited-time offers and discounts from Kodak that you are sure to find useful this holiday season!
First, there are two coupons for digital photo gifts that can be made and personalized at the KODAK Picture Kiosk (the yellow touch-screen kiosks you see at retail stores like Walmart, Target, and CVS). The coupons offer big savings when you create a KODAK Photo Book or a KODAK Picture Movie DVD. Both of these products make really nice, high-quality gifts and can be made in minutes for under $30. Click the links below to access and print the coupons.
Photo Book Coupon:
Picture Movie DVD Coupon:
The other is a special Kodak “Friends and Family” discount code which lets you get 25% off on select KODAK digital cameras and photo frames.
Simply go to the KODAK Store at http://www.kodak.com/shop, select your products and enter Coupon Code FRIENDS25 in the promo offer field at checkout. The discount applies to the following products:- KODAK EASYSHARE M1033 digital camera
- KODAK EASYSHARE Z1015 digital camera
- KODAK EASYSHARE W820 8” wireless digital frame
Terms and Conditions
Save 25% when you buy a new KODAK EASYSHARE M1033 Digital Camera, KODAK EASYSHARE Z1015 IS Digital Camera or KODAK EASYSHARE W820 Wireless Digital Frame with Home Decor Kit at the KODAK Store.
To receive your 25% discount, just add the qualifying digital camera or digital frame to your shopping cart and enter code FRIENDS25 at checkout. Please note: code is case sensitive.
Offer valid from 11/21/2008 through 12/31/2008, while supplies last. Valid only on purchases at the KODAK Store (U.S. only). Price discounts cannot be used together or combined with other discount offers. If multiple discounts are applicable to a single item, the highest discount will be automatically applied at checkout. Kodak reserves the right to modify or discontinue this promotion at any time.
"Computer Security Day is an annual event that is observed worldwide. It was started in 1988 to help raise awareness of computer related security issues. The goal of Computer Security Day is to remind people to protect their computers and information. Officially, Computer Security Day is November 30th. However, some some organizations choose to have functions on the next business day or week if CSD falls on a weekend."The theme for Computer Security Day is "A Good Defense". Be a responsible and safe web surfer by ensuring that your defenses are up -- as indicated in the Security Garden header,
"The best way to protect your garden is to fence it in. The same applies to your computer."The tips provided during October (linked above) provide ways you can be proactive in protecting your information. Particularly with so many people doing online shopping, see SafeShopping.org.
Reminder: It is not advisable to use Beta software on production systems.
- This release fixes an issue with downloaded HTML files being able to read other files on your computer and send them to sites on the Internet. We now prevent local files from connecting to the network with XMLHttpRequest() and also prompt you to confirm a download if it is an HTML file.Severity: Moderate. If a user could be enticed to open a downloaded HTML file, this flaw could be exploited to send arbitrary files to an attacker.
[Originally fixed in 154.18]"
The new games are Checkers, the ever popular Sudoku and Space Battle. In addition, Texas Hold'em was updated with a new multiplayer mode and single player difficulty levels.
To get the new update, launch the Zune software on your computer and click settings > check for updates.Zune Pass Changes
The unbelievable story of Julie Amero concluded quietly Friday afternoon at Superior Court in Norwich, with the state of Connecticut dropping four felony pornography charges.Julie pleaded guilty to a misdemeanor, received a $100 charge and the revocation of her Connecticut teaching credentials.
"If that’s your strategy, you probably need to be aware that, at least in the current not-a-beta release, upgrades from XP to Win7 are blocked. (I don’t know whether this restriction will be in the final edition as well, but I bet it is.) You can do a clean install only, with all your old Windows files going to a Windows.old directory and none of your files and settings transferred (you can, however, use Windows Easy Transfer to save settings first and restore them later).
So the compatibility issues you’re ignoring right now aren’t going to go away. If you have apps or hardware drivers that only work on XP and aren’t compatible with Vista, you’re going to have those same issues with Windows 7, which isn’t going to magically fix anything."
Code-named “Morro,” this streamlined solution will be available in the second half of 2009 and will provide comprehensive protection from malware including viruses, spyware, rootkits and trojans. This new solution, to be offered at no charge to consumers, will be architected for a smaller footprint that will use fewer computing resources, making it ideal for low-bandwidth scenarios or less powerful PCs.Hat tip: Paddy
. . .
“Because uptake of standard anti-malware is low around the world, particularly in developing nations, the availability of basic protection for anyone who wants it is all the more important,” said Roger Kay, founder and president of Endpoint Technologies Associates. “By offering such basic protection at no charge to the consumer, Microsoft is promoting a safer environment for PCs, service providers and e-commerce itself, since it is through unprotected PCs that the worst threats are introduced to the system as a whole.”
“Morro” will be available as a stand-alone download and offer malware protection for the Windows XP, Windows Vista and Windows 7 operating systems. When used in conjunction with the ongoing security and privacy enhancements of Windows and Internet Explorer, this new solution will offer consumers a robust, no-cost security solution to help protect against the majority of online threats.
"On Tuesday, Nov. 18, Check Point Software will offer the ZoneAlarm Pro software package for free for 24 hours, in celebration of Check Point's 15th anniversary, a company spokeswoman said Friday.
ZoneAlarm Pro, which contains a firewall, antispyware, and ID protection service (including credit monitoring) normally costs $39.95. The download location for the free ZoneAlarm Pro package will go live at 6 AM PDT on Tuesday morning."
"Essentially, the offer covers a free year of AVG 8.0 service, or a free upgrade for AVG 7.5 users. The upgrade also includes users of the free AVG antivirus service. Not all customers will receive the license, just "affected users," AVG said. The company said it will contact affected customers beginning Nov. 24, and advise them of how to obtain the free year of service."No software is perfect and certainly cannot protect the computer from infections caused by the person behind the keyboard. However, considering the flood of logs by AVG users that I have been dealing with the past two weeks of computers infected with "Trojan Horse Agent 4.E" and the recent problems AVG users have faced, I shall stick with other vendors.