Jump to content

curtis

Members
  • Posts

    683
  • Joined

  • Last visited

Everything posted by curtis

  1. community (Community Coffee, a local brand of coffee made in south LA.)
  2. Jamie's got a gun next: Tom Petty
  3. A Whiter Shade of Pale Next: Edgar Winter
  4. Straight from the Heart next: Norah Jones
  5. I got stoned and I missed it. (Dr. Hook use to play in the Baton Rouge-New Orleans area every couple of months. I have no idea how many time I have gone to see them, but I enjoyed every one.) next: Grace Slick
  6. Another good use once mail is Mailinator
  7. WORM_GREW.A propagates by attaching copies of itself to email messages that it sends to target addresses, using its own Simple Mail Transfer Protocol (SMTP) engine. It can then send email messages without using mailing applications (such as Microsoft Outlook). It gathers email addresses from files with certain extensions, such as DOC, PSD, RAR, and ZIP. It also propagates through network shares, by searching the network for ADMIN$ and C$ shares, where it drops a copy of itself using the file name WINZIP_TMP.EXE. It is currently spreading in-the-wild, and infecting computers that run Windows 98, ME, NT, 2000, XP, and 2003 Server. Upon execution, it drops and opens a .ZIP archive named SAMPLE.ZIP in the Windows system folder. This worm also deletes autostart registry entries, as well as associated files of several programs, most of which are related to security and antivirus applications. These routines may cause referenced programs to malfunction, effectively making the affected system more vulnerable to further attacks. In addition, it is capable of disabling the mouse and keyboard of an affected system.
  8. So Far Away next: James Taylor
  9. Katmandu next: Jon Bon Jovi
  10. Rock & Roll, Hoochie Koo next: Stevie Nicks
  11. Life's Been Good next: John Mellencamp
  12. Stairway To Heaven next: Aerosmith
  13. occupation (nope, i'm not a salesman)
  14. TROJ_WMFCRASH.B is a .WMF file that takes advantage of an unpatched vulnerability found in Windows Picture and Fax Viewer. It runs on Windows XP and Server 2003, and is currently spreading in-the-wild. The Windows Picture and Fax Viewer vulnerability is a zero-day exploit that is capable of remote code execution. Zero-day exploits are thus named because the unpatched vulnerability and its corresponding exploit code are released within the same day. This may leave systems vulnerable, due to the availability of exploit code, and the fact that the vendor has not been given enough time to patch it. Once this malicious .WMF file is opened, it proceeds to launch a denial of service attack in an attempt to restart or terminate the legitimate system process EXPLORER.EXE. The said action leaves an affected user unable to navigate through Windows. After performing its routine, this Trojan terminates itself.
  15. Dan, my thoughts and wishes are with you and your family.
×
×
  • Create New...