MY PROFILE | PRIVACY 
Vol. 14, #37 - Sep 7, 2009 - Issue #742
How Not To Get Scammed

This issue of WServerNews is sponsored by
  1. Editors Corner
    • How Not To Get Scammed
    • Quotes Of The Week - both by famous Science Fiction writers
  2. Admin Toolbox
    • Admin Tools We Think You Shouldn't Be Without
  3. Webinars & Seminars
    • Protecting Desktops from Malware without Impacting User Productivity and System Performance - 9/22
    • Securing your Exchange Server with VIPRE Email Security - 9/15
    • VIPRE Enterprise Product Demonstration - 9/22
    • Kiss Your Antivirus Bloatware Goodbye: A Look at VIPRE Enterprise - 9/29
  4. Tech Briefing
    • Roger Grimes: "We're Losing The War On Cybercrime"
    • Windows 7's 64-Bit Troubles
    • The 11 Most Influential Microprocessors Of All Time
    • The Hypervisor War Rages On: A Look At The New Hyper-V R2
    • Dual-Screen Laptop Provokes Lust, Derision
  5. Windows Server News
    • Microsoft Promises Patch For Critical Web Server Bug, And 5 More
  6. Third Party News
    • Get A MilSpec Vulnerability Scanner For Next To Nothing
  7. WServerNews Fave Links
    • This Week's Links We Like. Tips, Hints And Fun Stuff.
  8. WServerNews - Product of the Week
    • Save 500 IT Admin Hours and 40% on Web Filtering + Free T-shirt
Save 500 IT Admin Hours and 40% on Web Filtering + Free T-shirt

The iPrism Web Filter saves you 500 hours of IT Admin in the first year over competing filters - proven by an independent TCO study. For a limited time, you can get the TCO leader in Web Filtering for up to 40% off.

Forget about the Nonsense from Websense and switch to a Security Appliance that saves you the hassle. Find out how much you will save today and get a free t-shirt for attending an online demo!
http://www.wservernews.com/090907-Switch


Editors Corner

How Not To Get Scammed

You all know that Symantec once a year does their State Of The Nation regarding security called Internet Security Trends. The last one was December 2008. One of their people has done a half-year interim update on their predictions, and to see what other developments have occurred. It's a good read.

In short, attackers take advantage of the economic crisis with scams regarding home foreclosure, refinancing, economic stimulus packages, unemployment, classified ads, and work-at-home schemes. Don't fall for any of it and warn your end-users if you can.

Social networking is becoming very popular attack vector, so you might want to block access to these sites if you haven't already. Web threats continue to grow in complexity and sophistication, and new malware variants explode onto the scene at an unprecedented rate. They are now using modern marketing methods to get as many PCs infected as possible.

What you as a system admin need to be specifically careful of is that cyber crime is now using deceptive methods that imitate traditional business practices to penetrate your networks. A good example is an employee receiving a known corporate document, but it has a malicious payload. The full article is here:
http://www.wservernews.com/090907-Security-Trends


Quotes Of The Week - both by famous Science Fiction writers

"A society that gets rid of all its troublemakers goes downhill." -- Robert A. Heinlein

"If pigs could vote, the man with the slop bucket would be elected swineherd every time, no matter how much slaughtering he did on the side." -- Orson Scott Card




Warm regards, and thank you for being a WServerNews subscriber. No trees were killed in the sending of this message, but a large number of electrons were terribly inconvenienced. Please tell your friends about us. They can subscribe here:
http://www.wservernews.com/090907-Subscribe

PS: Did you know this newsletter has a sister publication for XP users called WXPnews? You can subscribe here, and tell your friends:
http://www.wservernews.com/090907-WXPNews

PPS: And of course we also have our weekly VistaNews. It will soon be renamed to Win7News! You can subscribe here, and tell your friends:
http://www.wservernews.com/090907-VistaNews

Hope you enjoy this issue of WServerNews! Warm regards, Stu Sjouwerman  |   Email me: [email protected]


Join The 1,000 Sites A Month That Switch To VIPRE Enterprise

No more 2-day SEP Migration Classes! Sunbelt built VIPRE Enterprise; a completely new technology combining corporate antivirus plus an enterprise antispyware solution for total endpoint security designed by admins for admins. And that means EASY DEPLOYMENT. Save your IT budget and don't renew products from Symantec, McAfee and Trend Micro, Learn how VIPRE Enterprise takes much less resources than the competition! It's clearly time to kiss your antivirus bloatware goodbye! Competitive Upgrade price: $10/seat:
http://www.wservernews.com/090907-VIPRE-Enterprise


Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

Save 500 IT Admin Hours and 40% on Web Filtering + Free T-shirt iPrism is the TCO industry leader. Save up to 40% today.
http://www.wservernews.com/090907-iPrism

Don't take unnecessary risks during your data migration! LinkFixerPlus lets you migrate files without creating broken links!:
http://www.wservernews.com/090907-LinkFixerPlus

Need to know everywhere "Bob" has access on your file servers and revoke his privileges? Now you can, User-Centric Security Management from ScriptLogic:
http://www.wservernews.com/090907-User-Centric

Run Exchange? Need to comply with email retention laws? Sunbelt Exchange Archiver is a great solutions and very affordable! Ask for a quote here:
http://www.wservernews.com/090907-SEA


Webinars & Seminars

Protecting Desktops from Malware without Impacting User Productivity and System Performance - 9/22

Join Sunbelt Software and Mike Osterman, president and founder of Osterman Research, Inc. for an informative seminar that examines the current malware landscape and the economic and performance impact of malware infections on your organization. Learn why a new approach to malware protection is required to better protect your users and your data - all without the performance and resource headaches of many traditional enterprise antivirus products.

Hosted at Microsoft in Bellevue, WA on Tuesday, September 22nd, Register here:
http://www.wservernews.com/090907-Protecting-Desktops


Securing your Exchange Server with VIPRE Email Security - 9/15

Tuesday, September 15, 2009, 2:00pm - 3:00pm EDT

Securing your Exchange Server is key to protecting your enterprise environment from spam, viruses, phishing, and other messaging threats. In this webinar, learn how the new version of VIPRE Email Security for Exchange (formerly Ninja Email Security) can help protect your network and cut your Exchange admin time in half with this powerful, policy-based email security product.
http://www.wservernews.com/090907-VIPRE-Email-Security


VIPRE Enterprise Product Demonstration - 9/22

Tuesday, September 22, 2009, 2:00pm - 2:30pm EDT

Want total malware protection without the bloat? Join us for a look at VIPRE Enterprise and learn how Sunbelt started with a blank slate to design a new, next-generation antivirus and antispyware technology to deal with today's complex malware in the most comprehensive, highly efficient manner.
http://www.wservernews.com/090907-VIPRE-Demo


Kiss Your Antivirus Bloatware Goodbye: A Look at VIPRE Enterprise - 9/29

Tuesday, September 29, 2009, 2:00pm - 3:00pm EDT

Want total malware protection without the bloat? Join us for a look at VIPRE Enterprise and learn how Sunbelt started with a blank slate to design a new, next-generation antivirus and antispyware technology to deal with today's complex malware in the most comprehensive, highly efficient manner.
http://www.wservernews.com/090907-Goodbye-Bloatware


Tech Briefing

Roger Grimes: "We're Losing The War On Cybercrime"

Roger Grimes is InfoWorld's Security Columnist, and fairly well known. He's got a gripe, which is that the big cyber criminals are not being caught. He starts out with: "You may have read the reports: We have captured Albert Gonzalez, one of the "world's biggest malicious hackers." Big deal. I've been fighting cybercrime for more than 20 years, so you'll have to excuse me if I'm a little jaded for thinking that this "huge" hacker is but another small-time player in the big-time world of cybercrime. In fact, I'm pretty sure that we still haven't captured a single major player -- the Pablo Escobars." More at:
http://www.wservernews.com/090907-Cybercrime-War


Windows 7's 64-Bit Troubles

eWEEK has a very interesting story here. It starts with: "A move to Windows 7 was driven less by the new operating system's features and more by the 64-bit performance promise, but unexpected issues forced unwanted compromises.

"When the Windows 7 RTM became available for download via MSDN last month, I hurried to move my primary work PC to the new operating system. The move wasn't based on disappointment with my previous Vista Ultimate installation, nor due to any overwhelming desire for new features in Windows 7. Instead, I wanted to move from 32-bit to 64-bit so I could utilize all 4GB of RAM in my Lenovo x61 laptop, and moving to Microsoft's latest and greatest simply made sense from a timing perspective.

"With the move between operating systems and architectures, I knew a lot could go wrong. I knew I could not perform a direct upgrade (as I was switching architectures) and would have to reinstall all my applications and move my data to the new system. I protected myself from any data and productivity losses by taking a snapshot of my old OS with Acronis True Image Home 2009, moving to a new, larger hard drive while keeping the old Vista disk in reserve. But even with all of this careful planning, I missed some obvious holes when it came to a few third-party software solutions and XP mode. Read more at:
http://www.wservernews.com/090907-64Bit-Troubles


The 11 Most Influential Microprocessors Of All Time

From the brains of the Voyager space mission to the inspiration for modern CPUs, here are the chips that built our modern technological culture. Click on this link for the article at ComputerWorld if you want a blast from the past:
http://www.wservernews.com/090907-Microprocessors


The Hypervisor War Rages On: A Look At The New Hyper-V R2

Peter Bruzzese compared Rev 1 and Rev 2 in a handy dandy grid that I thought you would appreciate. Here it is:
http://www.wservernews.com/090907-Hypervisor-War


Dual-Screen Laptop Provokes Lust, Derision

An unknown company in Alaska is attracting attention with a $3K laptop it plans to build that will apparently be the first to sport two 15.4-inch LCD screens. Supposed to arrive in time for Christmas, the SpaceBook from gScreen Computer Corp. has two identically sized LED backlit screens, one sliding out from behind the other. Here is a picture:
http://www.wservernews.com/090907-Coming-Soonish


Windows Server News

Microsoft Promises Patch For Critical Web Server Bug, And 5 More

ComputerWorld reported that Microsoft on September 1st said it is working on a patch for a bug in its popular Web server software, but it's unlikely the company will field a fix fast enough to make next week's regular release. Late Tuesday, Microsoft issued a formal security advisory for a vulnerability in three older editions of IIS, just hours after confirming that its security team was poking into exploit code that went public Monday.

"Microsoft is currently working to develop a security update to address this vulnerability," the company said in the advisory. The bug is in the file transfer protocol (FTP) server included in IIS. The FTP server fails to properly parse specially-crafted directory names, which hackers can leverage to force a stack buffer overflow and then inject their own malicious code onto the Web server. Here is the advisory:
http://www.wservernews.com/090907-Security-Advisory

Redmond will deliver five security updates next Patch Tuesday, all affecting Windows and all ranked "critical," their highest threat rating. Unlike some months when Redmond publishes its usual advance notification for upcoming updates, this time 'mum was the word'. We'll have to see what they come up with.

Third Party News

Get A MilSpec Vulnerability Scanner For Next To Nothing

Sunbelt runs a 50% off special this month for our Network Security Inspector. The normal price for Small Business (0-100 employees) is $795 per admin. So now, for less than 400 bucks, you can get your hands on the scanner that is used by more 'Three-Letter-Agencies' that I am allowed to mention here.

SNSI uses the latest Mitre Common Vulnerabilities and Exposures (CVE) list of computer incidents. It also contains the latest SANS/FBI top 20 vulnerability list. SNSI also uses the latest CERT, CIAC Microsoft and FedCIRC (Department of Homeland Security) advisories.

New Checks
 S372 Xscreensaver Trusted Extensions regression vulnerability - Solaris  
L1430 PulseAudio setuid immediate bindings weakness in /usr/bin - MDV  
L1431 Dhcp improper handling of DHCP requests error - MDV  
L1432 Pidgin XMPP file transfer weakness - MDV  
L1433 PERL Compress::Raw::Zlib inflatevulnerability - MDV  
L1434 Pango glyph_string_set_size arbitrary long string flaw - MDV  
L1435 GIT infinite loop in GIT daemon due to unrecognized arguments - MDV  
L1436 Ruby BigDecimal library context error - MDV  
L1437 Squid buffer limits & malformed requests vulnerabilities - MDV  
L1438 MySQL dispatch_command string vulnerabilities - MDV  
L1439 Compface long declaration in .xbm file error - MDV  
L1440 ISC BIND "ANY" record dynamic handling flaw - MDV  
L1441 Firefox & XulRunner multiple vulnerabilities - July 2009 - MDV  
L1442 Beagle Search Mozilla security vulnerabilities July 2009 - MDV  
L1443 Devhelp multiple security vulnerabilities July 2009 - MDV  
L1444 Epiphany multiple security vulnerabilities July 2009 - MDV  
L1445 Gnome-Python multiple security vulnerabilities July 2009 - MDV  
L1446 BlogRovR Mozilla security vulnerabilities July 2009 - MDV  
L1447 Foxmarks multiple security vulnerabilities Jul 2009 - MDV  
L1448 ScribeFire Blog Editor Mozilla vulnerabilities July 2009 - MDV  
L1449 Thunderbird-beagle security vulnerabilities July 2009 - MDV  
L1450 XulRunner multiple security vulnerabilities July 2009 - MDV  
L1451 Yelp multiple security vulnerabilities July 2009 - MDV  
L1452 OpenSC multiple security vulnerabilities July 2009 - MDV  
L1453 Python-xpcom multiple security vulnerabilities July 2009 - MDV  
L1454 Google-Gadgets Mozilla related security vulnerabilities - MDV  
L1455 Firebird src/remote/server malformed request message flaw - MDV  
L1457 Apache-mod_security multipart processor via form datapost - MDV  
L1458 Mozilla Firefox multiple security vulnerabilities - MDV  
L1459 Nagios statuswml.cgi shell metacharacter Ping & Traceroute errors - MDV  
L1460 Mod_auth_mysql mod_auth_mysql multibyte escape flaw - MDV  
L1461 OpenEXR IMF::PreviewImage overflows & decompression flaw - MDV  
L1462 PhpMyAdmin SQL bookmark injection vulnerability - MDV  
L1463 Ruby X.509 certificate verifying & decimal conversion errors - MDV  
L1464 Wireshark CPHAP/PN-DCP dissector & Tektronix .rf5 flaws - MDV  
L1465 APR runtime & Utility library crafted call weakness - MDV  
L1466 Samba Multiple string format vulnerabilities Aug 2009 - MDV LowHigh 
L1467 NSPR or NSS regex parser/NULL handling & MD2 errors - MDV  
L1468 Firefox regular expression error & multiple Mozilla vulnerabilities - MDV  
L1469 Xulrunner invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1470 Yelp invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1471 Beagle invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1472 Devhelp invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1473 Epiphany invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1474 Gnome-Python invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1475 BlogRovR invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1476 Foxmarks invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1477 ScribeFire invalid URL/domain mismatch & regex vulnerabilities - MDV  
L1478 Mozilla-thunderbird-beagle invalid vulnerabilities - MDV  
L1479 Subversion libsvn_delta large windows overflow error - MDV  
L1480 Libxml2 stack consumption via large depth of declarations flaw - MDV  
L1481 Fetchmail socket.c NULL handling flaw - MDV  
L1482 Memcached length attribute multiple overflows - MDV  
L1483 cURL "null prefix attack" in X.509 signatures - RHE  
L1484 WxWidgets/GTK2 compat-wxGTK26 JPEG image decoder error - MDV  
L1486 Wget \0 character handling in Common Name field flaw - MDV  
L1487 Perl-Compress-Raw-Bzip2 crafted bzip2 stream OBO weakness - MDV  
L1488 Libgadu large length contact description error - MDV  
L1489 Java-1.6.0-openjdk multiple vulnerabilities Aug 2009 - MDV  
L1490 GnuTLS NULL character handling in X.509 signatures - MDV  
L1492 Expat xmltok_impl.c crafted XML weakness - MDV  
L1493 Python xmltok_impl.c crafted XML weakness - MDV  
L1501 WxWidgets/GTK2 xmltok_impl.c crafted XML weakness - MDV  
L1502 Python-celementtree xmltok_impl.c crafted XML weakness - MDV  
L1503 Audacity xmltok_impl.c crafted XML weakness - MDV  
L1504 Thunderbird \0 character handling in Common Name field flaw - MDV  
L1505 W3c-libwww xmltok_impl.c crafted XML weakness - MDV  
L1506 Kompozer xmltok_impl.c crafted XML weakness - MDV  
L1507 Davfs xmltok_impl.c crafted XML weakness - MDV  
L1508 Neon \0 character & recursion during entity expansion flaws - MDV  
L1509 SquirrelMail multiple cross-stie forgery errors Aug 2009 - MDV  
L1511 PostFix e-mail append hard link flaw - MDV  
M87 Opera Vulnerabilities - Mac OS X  
N130 Cisco 1100/1200 Wireless Access Point Found Informational 
N131 Unified Communication Manager Vulnerability  
S115 Sockfs remote HTTP client may induce panic - Solaris 10  
W1988 Open Office Word document processing Vulnerabilities  
W2056 Anti-virus signature outdated - Norman  
W2325 Sun Java System Web Server 7 jsp file reading vulnerability  
W2682 IWA Credential Forwarding Protection Opt-In Informational 
W3075 Opera Multiple Vulnerabilities / latest not installed.  
W3342 IIS FTP Server NLST Handling - W2K/XP/W2K3  

Updated Checks H19 Kernel Vulnerability - HP-UX 11 H23 Csh/ksh/sh-posix - here document Unsafe Temporary Files - HP-UX 10^11 H114 OpenView NNM Vulnerabilities HP-UX 11 S190 Cluster 3.1/3.2 hangs in VLAN environments - Solaris 8 - 9 S302 Snoop SMB Traffic Display Vulnerability - Solaris 8 - 10 S466 Flash Player multiple vulnerabilities - Solaris 10 W1142 Anti-virus signature outdated - McAfee W1986 Anti-virus signature outdated - Symantec W1999 Anti-virus signature outdated - Trend Micro W2067 Anti-virus signature outdated - F-Secure W2070 Anti-virus signature outdated - CA eTrust W3677 Office 2003 Web Components ActiveX errors - W2K/XP/W2K3 H131 OpenView NNM 7.01/7.51/7.53 vulnerabilities - HP-UX 11 M76 ClamXav / ClamAV signatures not the latest - Mac OS X M80 Virex signature file out of date - Mac OS X S33 ClamAV signatures not updated - Solaris S419 Apache 1.3 mod_perl vulnerability - Solaris 8 - 10 S480 Symantec/Veritas NetBackup Vnetd Vulnerability - Solaris 8 - 10 W2012 Anti-virus signature outdated - Avast! 4 W2013 Anti-virus signature outdated - AVG 8 - W2K/XP/W2K3
Sunbelt Network Security Inspector version 2.0.2670.0 Definition Set 194 was released September 4, 2009. Sunbelt Software recommends you download the new SNSI Vulnerability Update Definitions 194, scan, and patch your machines today. To get the latest SNSI version, visit:
http://www.wservernews.com/090907-SNSI


WServerNews Fave Links

This Week's Links We Like. Tips, Hints And Fun Stuff.



WServerNews - Product of the Week

Save 500 IT Admin Hours and 40% on Web Filtering + Free T-shirt

The iPrism Web Filter saves you 500 hours of IT Admin in the first year over competing filters - proven by an independent TCO study. For a limited time, you can get the TCO leader in Web Filtering for up to 40% off.

Forget about the Nonsense from Websense and switch to a Security Appliance that saves you the hassle. Find out how much you will save today and get a free t-shirt for attending an online demo!
http://www.wservernews.com/090907-Switch-to-iPrism