Welcome to WebmasterWorld Guest from 18.104.22.168
Forum Moderators: phranque
Microsoft Corp issued software to fix a record 31 security flaws in its programs, and Adobe Systems Inc warned that glitches in its products could let hackers take control of a user's PC.
Microsoft released patches on Tuesday that repair vulnerabilities in Windows, Office and Internet Explorer, as well as key pieces of software that businesses use in their data centers.
Adobe said in a security bulletin on its website that Reader and Acrobat users should update their software to the newest versions. Additional software is available if those releases are not compatible with a customer's PC.
Adobe said the threat applies to users of Windows PCs as well as Apple Inc's Macintosh computers.
There's something really really wrong with an operating system when a vulnerability can let a program take over the computer.
If an operating system is done right, this can't happen, whether the application is a document reader or a shoot-em-up game or even a user-written program (and who knows what users are up to these days?)
- Open Internet Explorer
- Visit tools/Internet options and choose the connections tab.
- Click on the connection button and then on LAN settings.
- Select the "Use a proxy server for your lan" checkbox (un-select every other option you see).
- Enter 0.0.0.0 as your proxy address, port 80 and save.
This will completely disable Internet Explorer and will also cause any automatic updates or connections that aren't being initiated by you to fail. Of course IE won't work either but you can use other browsers.
Why do this? Because many viruses and hacks set to hijack your computer rely on Microsoft (operating system) to get in and anything microsoft related defaults to trying to use the same configuration as IE does when connecting to the net.
If you don't use IE anyway disabling it as mentioned above is an option.
edit: automatic adobe updates will also fail, they default to using IE settings. This is a temporary fix and will mean getting updates later on when you go to use the software (legitimate calls are blocked) but at the same time a hacker can't trick your system to check for an update from his/her servers either.
[edited by: JS_Harris at 2:01 am (utc) on June 11, 2009]
[edited by: JS_Harris at 2:29 am (utc) on June 12, 2009]