SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : All About Sun Microsystems -- Ignore unavailable to you. Want to Upgrade?


To: cheryl williamson who wrote (18922)8/26/1999 9:50:00 PM
From: JC Jaros  Respond to of 64865
 
Three 'showcase' markets (and I think one of them is Detroit).

-JCJ



To: cheryl williamson who wrote (18922)8/28/1999 4:19:00 PM
From: Michael F. Donadio  Read Replies (2) | Respond to of 64865
 
Hi Cheryl, MSFT giving SUNW another opportunity to shine:
dailynews.yahoo.com

Saturday August 28 03:20 PM EDT

IE5 Security Hole Makes Users' PCs Vulnerable

Brett Glass, ZDNet

Some hackers search for security holes in order to exploit them; others do it for the sheer intellectual challenge. The latter is true in the case of Bulgarian hacker Georgi Guninski, who has repeatedly exposed dangerous security holes in Microsoft products. Guninski's latest discovery -- a treacherous design flaw in Internet Explorer 5.0 -- is perhaps the most serious ever. It allows anyone with a Web page to take over your computer system via a few simple lines of text within the HTML (hypertext markup language) code that comprises the page. If you so much as visit the page, your system may be subject to the exploit. As if this weren't bad enough, hostile HTML code can also be included in an e-mail message. This is possible because many e-mail programs, including Outlook Express, Outlook, Eudora Lite, and Eudora Pro, invoke IE5 "behind the scenes" to display e-mail that contains HTML code. So, even if you are not using IE5 for your usual Web browsing, you may be susceptible. Finally, the exploit can be triggered if you read Internet newsgroups with IE5, because -- as with e-mail -- a public message posted to one of these groups can contain the hostile HTML code that compromises your system. ActiveX-ploit Guninski's discovery involves an ActiveX control, included with IE5, which is designed to create "scriptlets" -- small programs that run on the user's machine when he or she views a Web page or e-mail message. (The control is called "Object for constructing type libraries for scriptlets".) Unfortunately, the ActiveX control has free access to the user's file system, and can easily be made to run amok, overwriting vital system files or planting Trojan Horse programs within the system. Because Windows 95, Windows 98, and Windows NT systems are all susceptible, the hole allows anyone with a Web page to plant malicious programs such as Back Orifice or Back Orifice 2000 on the system, invisibly taking it over. Guninski's explanation of the hole, and the ways in which it can be abused, can be found at nat.bg. ActiveX, a scheme used by Microsoft to create software "components" that can be run by other programs, has been critiqued by computer security experts because it lacks safeguards against abuse by malicious hackers. ...

A partial solution is to run a different browser, such as Netscape Navigator (http://www.netscape.com) or Opera (http://www.operasoftware.com).
(Opera is gaining in popularity because, unlike Netscape, it does not flash distracting advertisements at the user while files are being downloaded or divert the user to Netscape's search pages.) However, because IE5 is very tightly "wired" into Windows 98, and may pop up unexpectedly or be invoked by third-party programs such as Quicken, TurboTax, or Eudora, it is also important to take measures to disable the ActiveX feature that causes the vulnerability. ...


All the best,
Michael