-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
____/ Investigative Reporter Web server on Wednesday 04 February 2009 22:30 :
\____
>
>
> nessuno@xxxxxxxxxxxxxxxxxxx wrote:
>> <Quote>
>> Researchers have uncovered yet another flaw in Microsoft's Windows 7
>> beta that could allow attackers to gain full administrative privileges
>> by bypassing the operating system's UAC, or user access control....
>>
>> "Unfortunately this flaw is not just a single point of failure,"
>> writes security blogger Long Zheng. "The breadth of Windows
>> executables is just too many and too diverse and many are
>> exploitable." ...
>> </Quote>
>>
>> http://www.theregister.co.uk/2009/02/04/windows_uac_flaw/
>
> <Quote>
> Both researchers say they've received word that Microsoft has already
> changed the UAC behavior in internal Windows 7 builds. A Microsoft
> spokesman said he was looking into the matter. We'll update if we hear
> back. In the meantime, Windows 7 users may want to set UAC to "high."
> <Quote>
They must already be "high" is they run BetaVista7.
- --
~~ Best of wishes
Roy S. Schestowitz | Open Source Othello: http://othellomaster.com
http://Schestowitz.com | RHAT Linux | PGP-Key: 0x74572E8E
23:05:01 up 13 days, 7:51, 2 users, load average: 0.79, 0.95, 1.02
http://iuron.com - Open Source knowledge engine project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkmKICEACgkQU4xAY3RXLo71HACghXpM0yYmM/rVdNQV4Lz2InFq
91cAoJ4ZHFjFTQLgelzQZEMvSyqAiyUQ
=1XWv
-----END PGP SIGNATURE-----
|
|