Chirurgia cranio-cerebrală minim invazivă
Tehnicile minim invazive impun utilizarea unei tehnologii ultramoderne. Endoscoapele operatorii de diverse tipuri, microscopul operator dedicat, neuronavigația, neuroelectrofiziologia, tehnicile avansate de anestezie, chirurgia cu pacientul treaz reprezintă armamentarium fără de care neurochirurgia prin "gaura cheii" nu ar fi posibilă. Folosind tehnicile de mai sus, tratăm un spectru larg de patologii cranio-cerebrale. www.neurohope.ro |
Patch ? pentru vulnerabilitati sisteme NT
Last Updated: Dec 04 2001 01:34, Started by
Mr_Woppit
, Dec 04 2001 01:34
·
0
#1
Posted 04 December 2001 - 01:34
[ http://grc.com/pw/patchwork.gif - Pentru incarcare in pagina (embed) Click aici ]
Quote Internet Anti-Intrusion Patch Verification and Intrusion Evidence Scanner — for Microsoft Windows NT Download -> aici - 27,5 Kb Quote On March 8, 2001, the Federal Bureau of Investigation released information about a series of economic extortion attacks that had already hit more than 40 e-banking and e-commerce sites running Windows NT. More than 1,000,000 credit cards have been stolen and the primary crime is extortion in which the criminals demand money to keep sites safe from "other hackers" and to keep the site's credit card information confidential. A more complete description of the attacks is posted at the SANS Institute site (www.sans.org). In its announcement, the FBI reported that the attackers were using specific well-known Windows NT vulnerabilities and often, after a successful attack, they left specific files on the victim's computers. SANS and the Center for Internet Security asked Steve Gibson of Gibson Research (www.grc.com) to create a program that would determine instantly whether a Windows NT system is vulnerable to the attack and whether it has the files that indicate it has already been compromised. The program he created is called PatchWork. PatchWork checks for the vulnerabilities listed by the FBI, and if any are found, points you directly to the Microsoft patches. Then PatchWork allows you to verify that they were installed correctly. Detalii -> aici si aici Pe scurt, vulnerabilitatile folosite in atacurile e-commerce la care se face referire sunt : Quote Unauthorized Access to IIS Servers through Open Database Connectivity (ODBC) Data Access with Remote Data Service (RDS) Systems Affected: Windows NT running IIS with RDS enabled. Quote SQL Query Abuse Vulnerability Affected Software Versions: Microsoft SQL Server Version 7.0 and Microsoft Data Engine (MSDE) 1.0 Quote Registry Permissions Vulnerability Systems Affected: Windows NT 4.0 Workstation, Windows NT 4.0 Server Quote Web Server File Request Parsing In plus, urmatoarele fisiere trebuie reverificate, deoarece prezenta lor indica compromiterea sistemului. Quote ntalert.exe sysloged.exe tapi.exe 20.exe 21.exe 25.exe 80.exe 139.exe 1433.exe 1520.exe 26405.exe i.exe lomscan.exe mslom.exe lsaprivs.exe pwdump.exe serv.exe smmsniff.exe Prezenta acestor fisiere este verificata de PatchWork . OK, nu este chiar un patch, dar anunta problemele .... (zic ei !) EndLess Point |
Anunturi
▶ 0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users