Security woes continue at Adobe, which is warning about a new unpatched zero-day flaw in its Flash media-player technology, which could enable a hacker to take control of a user's system.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-1528 Improper Input Validation vulnerability
7.8
Kerberos
Solaris 11.1
11.1
CVE-2011-1529 Improper Input Validation vulnerability
7.8
CVE-2011-4151 Improper Input Validation vulnerability
7.8
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-0465 Improper Input Validation vulnerability
9.3
X.Org
Solaris 10
SPARC: 147227-01 X86: 147228-01
Solaris 9
Contact Support
Solaris 8
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
I encourage clients to use web tools that have been developed for the masses and are free online. Of course they need to meet my criteria for security, user-friendly functions, and multi functions-- it needs to have the ability to meet the needs of different users. One of my favorites is the Google Calendar.
Before creating a data application in Windows Azure, it is important to make choices based on the type of data you have, as well as the security and the business requirements. There are a wide range of options, because Windows Azure has intrinsic data storage, completely separate from SQL Azure, that is highly available and replicated. Your data requirements are likely to dictate the type of data storage options you choose.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2009-4270 Denial of Service (DoS) vulnerability
9.3
Ghostscript
Solaris 10
SPARC: 122259-05 X86: 122260-05
CVE-2010-1628 Memory Corruption vulnerability
9.3
CVE-2010-1869 Buffer Overflow vulnerability
9.3
CVE-2010-2055 Arbitrary Code Execution vulnerability
7.2
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
The next patch Tuesday ( the second Tuesday of the month) is expcted to be big. Since several of the issues being fixed are already being exploited, the patches should be applied sooner rather than later.
http://www.microsoft.com/technet/security/Bulletin/MS11-feb.mspx
http://news.cnet.com/8301-1009_3-20030613-83.html?tag=mncol;title
http://www.computerworld.com/s/article/9208038/Microsoft_to_patch_22_bugs_3_zero_days_next_week?taxonomyId=17
Join us in New Orleans for your choice of 200- to 400-level ASP.NET sessions on using Microsoft SharePoint Server 2010, creating report subscriptions, deploying cohesive web service security and more.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-2214 Resource Management Errors vulnerability
3.5
Pidgin
Solaris 10
SPARC : 147992-04 , x86 : 147993-04
Solaris 11
11/11 SRU 10.5
CVE-2012-2318 Improper Input Validation vulnerability
5.0
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3905 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
5.0
libxml2
Solaris 11
Contact Support
Solaris 10
SPARC: 125731-07 X86: 125732-07
Solaris 9
Contact Support
CVE-2011-3919 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
7.5
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2821 Resource Management Errors vulnerability
7.5
libxml2
Solaris 11
Contact Support
Solaris 10
SPARC: 125731-07 X86: 125732-07
Solaris 9
Contact Support
CVE-2011-2834 Resource Management Errors vulnerability
6.8
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2010-4008 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
4.3
libxml2
Solaris 10
SPARC: 125731-07 X86: 125732-07
Solaris 11
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
New to terminal and having problems out of the gate. Using Terminal 2.1.2 on a Mac running 10.6.8. Using the "ls Documents" will list the contents, but when I try to change directories, which I tried several different ways, I get the following results:
new-host-2:~ MDimond$ cd.
-bash: cd.: command not found
new-host-2:~ MDimond$ cd./Users/MDimond/Documents
-bash: cd./Users/MDimond/Documents: No such file or directory
new-host-2:~ MDimond$ cd. /Documents
-bash: cd.: command not found
The /usr/bin has the cd command listed; the /bin does not. Any assistance would be greatly appreciated. Thanks, md
<b>Help Net Security:</b> "The word about Immunet's free anti-virus solution is spreading fast. The agent installed on my computer tells me that there are currently 162,597 people in the Immunet Cloud, and that I'm protected from 12,637,576 threats"
The attractive ThinkCentre M90z all-in-one desktop is highly suitable as a small business computer, and it also offers security and desktop management features.
Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3102 Numeric Errors vulnerability
10.0
libxml2
Solaris 11
11/11 SRU 10.5
Solaris 10
SPARC : 125731-08 , x86 : 125732-08
Solaris 9
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-3461 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
4.3
libotr
Solaris 11
11/11 SRU 12.4
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
I want to use Android phones to check tickets at the gate of an event.
These phones are connected to a password protected router (WPA2) and a PC to validate.
That all works nicely in a test setting, but I'm worried it might collaps if there are many other competing phones around.
How can I get a stable WIFI connection between my phones and my router when thousands of irrelevant phones are around?
Do the other phones clogg the router with requests even when the router is password protected?
Shall I hide the SSID?
<b>Simple Thoughts:</b> "There are five distributions to compare - Debian, CentOS, Slackware , Ubuntu and Gentoo. One of the main consideration for server use is stability and long term security support. After extensive research we queued up the top 5 free Linux distros for server in 2010."
<b>Datamation:</b> "It's not like Google was ever going to be a showcase customer for Microsoft, but a report that the search giant is phasing out Microsoft Windows underscores security concerns that have long dogged the widely-used software."
This article lists the technical and functional specifications allowing you to attain both strength and flexibility for your SaaS application. It will help you conceptualize the security of your application, taking into account important constraints from the beginning of your project. You will thus be able to cover short terms needs, while at the same time anticipation any future evolutions necessary to the development of your business.
Microsoft has released its latest round-up of security patches, and with ten bulletins covering a wide range of products and operating systems, system administrators hoping for an easy week may want to start revising their expectations.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2009-4270 Denial of Service (DoS) vulnerability
9.3
Ghostscript
Solaris 10
SPARC: 122259-05 X86: 122260-05
CVE-2010-4054 Denial of Service (DoS) vulnerability
4.3
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
After a thick April patch, this month's security update, released today, is light with only two "critical" fixes....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.