The Department of Homeland Security (DHS) yesterday issued an unusual press release urging Windows users to apply a specific security patch from Microsoft. That patch, MS06-040, was just released as part of Microsoft’s monthly cycle of security updates, so most home users should already be secure. IT departments and home users who have disabled automatic updates should install the patch as soon as possible. As the DHS ominously notes, "attempts to exploit vulnerabilities in operating systems routinely occur within 24 hours of the release of a security patch."
While the DHS rarely issues patch advisories, the department seems keen to prevent massive damage from another worm like MSBlast, which made the rounds several years ago and brought down computers around the world. The concern appears to be justified; both CERT and Microsoft claim that they have already seen code which exploits this particular vulnerability.
The problem was found in the Server service, which is responsible for file and printer sharing, among other things. The service does not properly check the length of Remote Procedure Call (RPC) messages, and a purposely malformed RPC can trigger a buffer overflow and allow the attacker to execute any code with full system privileges. It doesn’t affect all versions of Windows equally, though; Microsoft notes that "Windows 2000 systems are primarily at risk due to the unique characteristics of the vulnerability and affected code path."
For those users who have not yet patched their machines, the government recommends that they block access to Server Message Block (SMB) services from untrusted networks and disable anonymous SMB access. The new patch fixes the problem by having the Server service validate RPC messages before passing them to the appropriate buffer.
Because the DHS warning was so unusual, it has prompted some wild talk that the Microsoft security patch is, in reality, a government surveillance tool designed to spy on Windows users around the world. While this makes for some entertaining speculation, it’s the sort of thing that would single-handedly eviscerate Microsoft’s business, and would no doubt be uncovered quickly by security researchers. The user backlash from such a program would be little short of astonishing.
We’ll leave our tinfoil hats in the Orbiting HQ Storage Module this time.
Google is a fully automated search engine, which employs robots that never sleep known as ‘spiders’, ‘web robots’ or ‘web bots’ to crawl over 8 billion URL’s or web pages.
The Google robot, known as Googlebots, will visit a well established site several times a day to check for updates. The Googlebot spider never sleeps, so it can pick up the changes in websites and add that information to its search engine database. Even how spiders ‘think’ is evolving and the engineers behind the spiders rarely sleep.
Spiders never sleep, every so often they dance. Everyday, Google sends out robots (spiders) to crawl the web and archive every website it finds. These archived websites will be presented in the next update of the Google index (database), that’s when the dance occurs. Some websites get invited to higher rankings dance and others are relegated to sit-this one out with lower rankings.
Xponex is dedicated to meet and greet the Google Spiders with your website information. We monitor your site for spider visits and we modify your website based on changes in Google, so we can continue to improve your website ranking.
Spiders never sleep… neither should your web company.
More about the Googlebot:
Of all the spiders who traverse the sites for which we have web log access, Googlebot is by far the most active, on average around twice as active as the Yahoo! crawler and six times more active than the new msnbot spider. On their website, Google refers to Googlebot as “Google’s web crawler” and as “Google’s web-crawling robot.”
Two-Way Audio Over Internet ConnectionWatch, Hear and Respond RemotelySomeone has broke into your business and your GeoVision Security Camera system has notified you. Wouldn’t it be great to tell the trespasser to go away! You can say loudly thru speakers strategically located throughout your building “Please leave the premises immediately! I’ve dispatched the police and they are on the way.”
Watch, remote record on your local computer, and respond to security threats from the comfort and safety of your home or other remote monitoring location.
All you need on the remote end is an Pentium 4 Windows XP computer with internet connection, microphone and speakers!
The headline story ” Tased Grandma Heading to Court” was reported by the local newspaper. The video was caught digitally by a security camera system sold in 2002 by Camera Security Now, Franklin, Ohio.
What started out as a local story featuring Camera Security Now video footage, has turned into a national TV news and internet news stories. Continued
match the brightness of the projector to your audience and room size. Large rooms and audiences require high bulb strength brightness. (Projector bulb strength brightness is measured in ANSI lumens or lumens).
October 20, 2005: You should be scared of spam-bots missions that complete orders with free e-mail account addresses this Halloween.
Products in your estore are at risk and ‘Free Email Accounts’ are often an indicator. Free email accounts are often used in fraudulent activity such as stolen credit cards, bank accounts and company credit information.
If you own a website with an estore, beware of users with free email address accounts. Many emails with the intent to fraud use ‘Free Email Accounts’ such as hotmail, yahoo and gmail. ‘Free Email Accounts’ are easy to setup and easy to dispose of after completing a spam-bot mission.
Fact: Not all orders from free email accounts are fraudulent. But, fraudulent emails, overwhelmingly come from ‘Free Email Accounts’ .
‘Free Email Accounts’ have been such a problem with business to business sites that many B to B websites won’t accept free email accounts to transact business.
At minimum: Verify that the email address really goes to the intended recipient of the product ordered. This will at least assure you that you are taking to a real person and not a ‘bot’ running ‘scripts’ on your estore or product inquiry form.
There are over 1 billion malicious ‘bots’ on the web that do nothing but deliver spam services to every email and website order form findable on the internet.
Here’s why: An unscrupulous programmer who asked not to be identified explained the logic behind the huge influx of spam: “When I create one bot, it goes on a mission 24-7. That bot will find at least one thing to exploit every hour of every day. I don’t just make one bot and neither do my friends.”
Bottom line: Verify before working a lead or shipping a product. It could be worse than a waste of time.
There is an easier way to rent the latest computer and audio visual technology. Hire a Tech Travel Agent© from Rentacomputer.com, RentOurLaptops.com or pcAVrent.com.
Tech Travel Agents deploy the Tech-Army Organization, an army of computer engineers, technicians, audio visual technicians, equipment installers and technology event coordinators.
Any project, no matter the size, scope or location, can be handled efficiently and cost effectively with the least amount of effort on your part.Technology Travel Agents© book nationwide and worldwide technology rentals the same way your travel agent books your airline and hotel reservations. Technology Travel Agents© schedule all types of technology rentals for conventions, trade shows, conferences, computer training, legal department war rooms, inventory or other corporate projects! (Continued)
People Counting Feature Helps with Marketing Analysis
Want to find out how many people entered or exited the various areas of the trade show? Our surveillance system does just that. People are a lot more than just a number with the Corporate Event Portable Camera Surveillance System, they are and analysis tool to judge the popularity of various show venues.
The system provides event organizers with an integrated solution for measuring traffic and reviewing traffic flows at the multiple areas of your event.
People Counting can help event planners assess the success of advertising campaigns, schedule employees efficiently, design top notch floor layouts, merchandising displays, and more.
When the numbers count, event planners need People Counting.
Both IN and OUT are counted separately!
Counted results will be logged in the system database. The database can be used to report for specified period of times. For more information on object counting: