Reply to Thread New Thread |
![]() |
#1 |
|
On 11 April 2006 Microsoft is planning to release:
Security Updates • Four Microsoft Security Bulletin affecting Microsoft Windows. The highest Maximum Severity rating for these is Critical. Some of these updates will require a restart. These updates will be detectable using the Microsoft Baseline Security Analyzer and the Enterprise Scan Tool. One of the updates will be a cumulative Internet Explorer update that addresses the publicly known "CreateTextRange" vulnerability. • One Microsoft Security Bulletin affecting Microsoft Office and Microsoft Windows. The highest Maximum Severity rating for this is Moderate. These updates may require a restart. These updates will be detectable using the Microsoft Baseline Security Analyzer and the Enterprise Scanning Tool. |
![]() |
![]() |
#3 |
|
|
![]() |
![]() |
#6 |
|
Wow you totally failed to see my point...and you showed in one post how clueless you really are. This post is about MS & security flaws. The reason for just about every windows update is to patch security holes in IE that can allow people to do harm to your windows install on purpose as opposed to a critical bug that could cause a crash. So I fail to see the comparison of IE (a web browser & essentially the windows part of windows) & Oracle an enterprise class database that nobody outside of a work environment uses. And as for other companies out there & their buggy programs, name some that are as widely used as IE & have even a fraction of the security issues? Nero used to crash on me all the time, but I highly doubt someone could use it to take over my PC remotly. I've noticed you like to do the equivelent of name dropping with technology & do it in an aloof manner. |
![]() |
![]() |
#7 |
|
If I wasn't, I would of called him a poser. :wink: But the last thing I want is a geek war. Google skills can only get you so far when the big guns are pulled out. ![]() |
![]() |
![]() |
#8 |
|
There's no need for hostilities, I'm just saying all applications have vulnerabilities...that's all I'm saying. Some more than others but the issue remains that the more widely used applications have more publicity regarding the vulns.
Oh and about Nero... http://www.nero.com/nero6/en/GDIPlus_Patch.html See MS04-028 which allows for "Remote Code Execution" ![]() |
![]() |
Reply to Thread New Thread |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|