SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Stockman Scott's Political Debate Porch -- Ignore unavailable to you. Want to Upgrade?


To: SOROS who wrote (404)6/13/2002 1:58:55 PM
From: T L Comiskey  Read Replies (1) | Respond to of 89467
 
Soros...
In 1191 AD...
Richard the Lion Hearted beheaded 2700 Muslim men...women and children..( inhabitants of the city of Acre, Palestine) AFTER agreeing to free these Captives and exchange them for captured Christain prisoners and the return of The Relic of The One True Cross..
Saladin..(the Muslim Military Leader)
kept his part of the bargin..
Only. to see Richard break his word and commit Mass Murder
This.. Too was done in the name of God
T



To: SOROS who wrote (404)6/13/2002 5:22:29 PM
From: Jim Willie CB  Respond to of 89467
 
MSWindows sucks, more evidence -- open door to hackers
this is a $20 stock if not for their cash horde
Intel cut by 30%, Cisco maybe next, MSFT deserves it

MICROSOFT WARNS OF NEW SECURITY FLAWS

SAN FRANCISCO, June 13 (Reuters) - Microsoft Corp warned users of three new security flaws in its software on Wednesday, including one critical defect that could be exploited to allow a hacker to gain control of a computer running its Windows operating system software.

Those warnings took the total of such security bulletins issued by Microsoft this year to 30. The tally shows the company arguably has made slow progress in meeting its goal of making its software more secure, about half a year after making that a top priority.

Microsoft released 60 security bulletins for all of 2001, David Gardner, security program manager for Microsoft's Security Response Center, said on Thursday.

"The long-term goal is to get these down as low as we possibly can," he said. "It's a journey, not a destination."

In a rare companywide e-mail in January, Microsoft Chairman Bill Gates said the company's credibility with customers depended on its ability to release secure software, particularly with regard to its Web services plans.

Earlier this year, Microsoft put many of its developers and engineers through special security training and said it would scour its code looking for problems.

Although the number of security bulletins appeared to be tracking the number issued last year, that does not mean the company hasn't improved its record, according to Gardner.

"We are seeing effects" of the security initiative, he said. For example, engineers are finding that they are discovering many of the security flaws in software before they are reported by outside researchers, he said.

Although software companies try to catch and fix bugs before products are released, they typically end up having to release patches for security holes discovered afterward.

"It's gratifying to be working on a patch for something that's been reported and to find that we already" knew about it, Gardner said.

NEW CRITICAL FLAWS

Of the bulletins released this week, several are for vulnerabilities Microsoft has deemed "critical."

One critical flaw affects users of Windows NT 4.0, NT 4.0 Terminal server edition, Windows 2000, Windows XP and Windows Routing and Remote Access Server. A patch has been released that fixes a hole that could shut a system down or allow an attacker to run malicious code on a computer.

The other two critical vulnerabilities announced this week affect users of the Internet Explorer 5.01, 5.5 and 6.0 browser versions, Proxy Server 2.0 or Internet Security and Acceleration Server 2000, as well as Microsoft's instant messaging and chat programs.

A patch is being developed for the Internet Explorer flaw, which could allow an attacker to use an old Internet protocol to take control of a victim computer. The company has issued a temporary solution to protect customers in the meantime.

Microsoft has released a patch for the vulnerability in MSN Chat, MSN Messenger 4.5 and higher and Exchange Instant Messenger that could allow an attacker to run malicious code on a victim computer.

There were three other non-critical flaws announced this week, all of which have patches available. Two flaws affecting Microsoft SQL Server 2000 could allow an attacker to run code on a target computer.

A flaw affecting Windows NT 4.0 and Windows 2000 users running Internet Information Server 4.0 and IIS 5.0 could cause the software to fail or allow unwanted code to be run on the server, the company said.

-end-