Chirurgia cranio-cerebrală minim invazivă
Tehnicile minim invazive impun utilizarea unei tehnologii ultramoderne. Endoscoapele operatorii de diverse tipuri, microscopul operator dedicat, neuronavigația, neuroelectrofiziologia, tehnicile avansate de anestezie, chirurgia cu pacientul treaz reprezintă armamentarium fără de care neurochirurgia prin "gaura cheii" nu ar fi posibilă. Folosind tehnicile de mai sus, tratăm un spectru larg de patologii cranio-cerebrale. www.neurohope.ro |
Breaking news 2007
Last Updated: Apr 29 2008 14:46, Started by
Daisuke
, Feb 15 2007 22:02
·
0
#1
Posted 15 February 2007 - 22:02
Aici puteti posta informatii despre virusi noi, vulnerabilitati noi si pericole.
Breaking news din 2006 pot fi gasite aici: http://forum.softped...showtopic=50474 |
#2
Posted 15 February 2007 - 22:12
Stirile de azi
Firefox Cross-site scripting hole in Firefox Firefox: serious cookie stealing / same-domain bypass vulnerability Versiuni afectate: toate Solutii: folositi extensia NoScript, asteptati un update, folositi Opera Microsoft Extremely critical: vulnerabilitatea este exploatata activ Microsoft Hit with Another Zero-Day Attack New zero-day hole in Word Produse afectate: Office 2000, Office XP, Word 2000, Word 2002 Solutie: scanati orice fisier inainte de a-l deschide Edited by Daisuke, 16 February 2007 - 00:30. |
#3
Posted 21 February 2007 - 23:03
Stirile de azi
Critical vulnerability in Google Desktop fixed Analiza aici: Overtaking Google Desktop (PDF) Firefox Maine se asteapta un update la FF (2.0.0.2 / 1.5.10) Vad ca se lucreaza intens. 2.0.0.2 a ajuns la rc5. |
#4
Posted 22 February 2007 - 20:39
Firefox din nou
Firefox bookmark cross-domain travel vulnerability Cel putin interesant. Atentie la ce apasati Ctrl-D exploit.gif 11.5K 98 downloads |
#5
Posted 24 February 2007 - 10:03
Update pentru Firefox
FF 2.0.0.2: http://www.mozilla.com/en-US/firefox/ FF 1.5.0.10: http://www.mozilla.c...s/1.5.0.10.html 1.5.0.x va mai primi update-uri de securitate si stabilitate pana pe 24.04.07 |
#6
Posted 26 February 2007 - 22:31
Vulnerabilitate in Publisher 2007
Severitate: Critical (remote code execution) Alte detalii nu sunt cunoscute deocamdata: http://research.eeye...g/20070216.html Vulnerabilitate in MSIE 7 (inca in cercetare) NIST said: This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary. Severitate: less critical (spoofing) Detalii (SANS): onunload() Nota: Aceasta vulnerabilitate a fost eliminata in FF 2.0.0.2 / 1.5.0.10 Mozilla Firefox fails to properly handle Javascript onunload events Edited by Daisuke, 26 February 2007 - 22:34. |
#7
Posted 27 February 2007 - 22:21
Daca folositi Netscape
Vulnerabilitatile din FF se regasesc aici si bineinteles dureaza mai mult pana apare un patch. Netscape Multiple Vulnerabilities Severitate: Highly critical (Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access, from remote) Versiuni afectate: 8.1.2, probabil si altele mai vechi. Solutie: asteptati un patch sau folositi FF 2.0.0.2 |
#8
Posted 06 March 2007 - 20:33
#9
Posted 13 March 2007 - 08:38
HijackThis 2.0 Beta de la TrendMicro
Trend Micro Hijack This™ Anuntul de la merijn.org: http://www.merijn.org/ Quote I sold HiJackThis because I had been sitting on an unfinished update for over a year and I still could not make enough time to finish it. Quote [v2.00.0] * AnalyzeThis added for log file statistics * Recognizes Windows Vista and IE7 * Fixed a few bugs in the O23 method * Fixed a bug in the O22 method (SharedTaskScheduler) * Did a few tweaks on the log format * Fixed and improved ADS Spy * Improved Itty Bitty Procman (processes are frozen before they are killed) * Added listing of O4 Autoruns from other users * Added listing of the Policies Run items in O4 method, used by SmitFraud trojan * Added /silentautolog parameter for system admins * Added /deleteonreboot [file] parameter for system admins * Added O24 - ActiveX Desktop Components enumeration * Added Enhanced Security Confirguration (ESC) Zones to O15 Trusted Sites check |
#10
Posted 19 March 2007 - 21:13
Pentru fanii Nod32
Eset Smart Security AV + fierwall + anti-spam Incepand cu 2 aprilie poate fi downlodata versiunea beta. |
|
#12
Posted 29 March 2007 - 20:45
Vulnerability in Windows Animated Cursor Handling
Microsoft: Microsoft Security Advisory (935423) Trendmicro: TROJ_ANICMOO.AX McAfee: Unpatched Drive-By Exploit Found On The Web McAfee (update): Unpatched Drive-By Exploit Found on the Web (Follow-Up) Severitate: extremely critical (vulnerabilitatea este exploatata pe internet, inclusiv pe email) Patch: inca nu exista Sisteme afectate: Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 2 Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) Microsoft Windows XP Professional x64 Edition Microsoft Windows Server 2003 Microsoft Windows Server 2003 for Itanium-based Systems Microsoft Windows Server 2003 Service Pack 1 Microsoft Windows Server 2003 with SP1 for Itanium-based Systems Microsoft Windows Server 2003 x64 Edition Microsoft Windows Vista XP fara SP si SP1 nu sunt vulnerabile. Internet Explorer 7 in modul protejat din Vista nu este afectat de exploiturile din paginile web. Firefox 2.0 nu pare a fi vulnerabil. Recomandari: Actualizati semnaturile AV-ului (insa nu toti AV-ii detecteza inca exploiturile). Scanati fisierele pe baza de continut (nu extensii) Cititi emailurile doar in format text. Home useri: nu stiu inca daca se pot bloca intr-un fel fisierele *.ani , folositi contul limitat in XP / Vista (nu administrator). Edited by Daisuke, 29 March 2007 - 21:23. |
#13
Posted 30 March 2007 - 18:18
Daisuke, on Mar 29 2007, 21:45, said: Vulnerability in Windows Animated Cursor Handling Microsoft: Microsoft Security Advisory (935423) Trendmicro: TROJ_ANICMOO.AX McAfee: Unpatched Drive-By Exploit Found On The Web McAfee (update): Unpatched Drive-By Exploit Found on the Web (Follow-Up) Severitate: extremely critical (vulnerabilitatea este exploatata pe internet, inclusiv pe email) Patch: inca nu exista Sisteme afectate: Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 2 Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) Microsoft Windows XP Professional x64 Edition Microsoft Windows Server 2003 Microsoft Windows Server 2003 for Itanium-based Systems Microsoft Windows Server 2003 Service Pack 1 Microsoft Windows Server 2003 with SP1 for Itanium-based Systems Microsoft Windows Server 2003 x64 Edition Microsoft Windows Vista XP fara SP si SP1 nu sunt vulnerabile. Internet Explorer 7 in modul protejat din Vista nu este afectat de exploiturile din paginile web. Firefox 2.0 nu pare a fi vulnerabil. Recomandari: Actualizati semnaturile AV-ului (insa nu toti AV-ii detecteza inca exploiturile). Scanati fisierele pe baza de continut (nu extensii) Cititi emailurile doar in format text. Home useri: nu stiu inca daca se pot bloca intr-un fel fisierele *.ani , folositi contul limitat in XP / Vista (nu administrator). |
#14
Posted 30 March 2007 - 20:07
Vulnerability in Windows Animated Cursor Handling - Update
Ce clienti de email sunt vulnerabili si cand ? Ani cursor exploits against Microsoft E-mail clients Outlook 2007 nu este vulnerabil. Asa cum ne-am obisnuit a aparut un patch neoficial. Patch neoficial: acesta nu este un patch Microsoft, il instalati pe propria raspundere Windows .ANI Processing, la sfarsitul postului. Daca instalati acest patch nu uitati sa-l dezinstalati cand apare patch-ul Microsoft. [later] Si un update de la McAfee: ANI File Exploit Has Connection With Hacked Super Bowl Site [/later] Edited by Daisuke, 30 March 2007 - 20:14. |
#15
Posted 31 March 2007 - 18:04
Vulnerability in Windows Animated Cursor Handling - Update
Microsoft stia de acesta vulnerabilitate din 20 decembrie 2006. De atunci pana acum s-a chinuit sa inteleaga profund ce se intampla ) Si ... surpriza. In timp de MS investiga vulnerabilitatea "baietzii dastepti" s-au gandit sa o exploateze. Detalii aici: Update on Microsoft Security Advisory 935423 In timp ce MS se gandeste profund la pericole pe net SANS ISC trece la Threat Level: YELLOW. Codul exploitului este public si oricine doreste se poate "juca" cu el. Numarul site-urilor infectate este in crestere. Have fun ! Nu deschideti emailuri de la necunoscuti si nu vizitati site-uri suspecte. Edited by Daisuke, 31 March 2007 - 18:05. |
|
#16
Posted 01 April 2007 - 10:57
Vulnerability in Windows Animated Cursor Handling - Update
Sisteme vulnerabile - update: Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 2 Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) Microsoft Windows XP Professional x64 Edition Microsoft Windows Server 2003 Microsoft Windows Server 2003 for Itanium-based Systems Microsoft Windows Server 2003 Service Pack 1 Microsoft Windows Server 2003 Service Pack 2 Microsoft Windows Server 2003 with SP1 for Itanium-based Systems and Microsoft Windows Server 2003 with SP2 for Itanium-based Systems Microsoft Windows Server 2003 with SP2 for Itanium-based Systems Microsoft Windows Server 2003 x64 Edition Microsoft Windows Server 2003 x64 Edition Service Pack 2 Microsoft Windows Vista Nu sunt vulnerabile - update: XP fara SP si SP1 nu sunt vulnerabile. Internet Explorer 7 in modul protejat din Vista nu este afectat de exploiturile din paginile web. Internet Explorer Protected Mode Firefox 2.0 nu este vulnerabil. Outlook 2007 nu este vulnerabil daca editorul de email este MSWord (default). Recomandari - update: Antivirus: Actualizati semnaturile AV-ului. Scanati fisierele pe baza de continut (nu extensii). Outlook: Cititi emailurile doar in format text. Disable preview pane. Note: Outlook Express cu optiunea de citire a emailurilor in format text este vulnerabil; Windows Vista Mail: Forward sau Reply la un email citit in format text permite executarea exploitului. Windows Explorer: Disable "Show common tasks in folders". Browser + email: nu faceti click pe linkuri din email, mesaje instant (Yahoo, etc.), forum, IRC. Copy & paste linkul in browser. Asta insa nu garanteaza protectia. Windows: folositi contul limitat (nu administrator). SANS ISC: Threat Level - YELLOW. Yellow inseamna: Este investigata o noua amenintare. Impactul este necunoscut sau e de asteptat sa fie minor pentru infrastructura. Impactul local poate fi semnificativ. Utilizatorii sunt sfatuiti sa ia masuri imediate pentru a diminua impactul. Exemple cand s-a mai anuntat "Threat Level - YELLOW" 23 martie 2006 - createTextRange exploit 27 decembrie 2005 - vulnerabilitatea WMF 1 mai 2004 - viermele Sasser |
#17
Posted 02 April 2007 - 04:18
Vulnerability in Windows Animated Cursor Handling - Update
Patch-ul vine marti 3 aprilie. Microsoft said: On Tuesday 3 April 2007 Microsoft is planning to release: Security Updates One Microsoft Security Bulletin affecting Microsoft Windows. The highest Maximum Severity rating for these is Critical. These updates will require a restart. |
#18
Posted 03 April 2007 - 20:21
Vulnerability in Windows Animated Cursor Handling - Patch !
Nu uitati sa dezinstalati patch-ul neoficial, daca l-ati instalat. Patch-ul de la Microsoft: Microsoft Security Bulletin MS07-017 Daca aveti Realtek HD Audio Control Panel cititi cu atentie: The Realtek HD Audio Control Panel may not start, and you receive an error message when you start the computer: "Illegal System DLL Relocation" Edited by Daisuke, 03 April 2007 - 20:22. |
Anunturi
▶ 0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users