Threat has been detected?

wtf? – Since purchase(ing) Telstra-TURBO-Prepaid-USB-Modem – I get regular notifications via Avast-(anti-virus) – “Threat has been detected” -???- AND; It persists every-time some DCOM thingy does sumfink! uhmph!

Exploit-Blocked - (Dont want -/- need to think ANY more about this error message?)
Exploit-Blocked - (Dont want -/- need to think ANY more about this error message?)

Do I really need to do SOMETHING about this error message -???-

Previous efforts on the topic – pasted below – (Why should I re-write this? – BUT; – now I have to make it into something that “reads-in-a-linear” manner, … and add some useful-links, … maybe a picture, … (more effort required)
dcomcnfg.exe – THIS – COMMAND; – Opens ‘a’ console called “Component Services”

It is a new one for me – Never needed to adjust these setting until now { Recently purchase a Telstra-Prepaid-USB-Modem-MODEL -???-}

THIS-CONSOLE;- Also contains “plugin-components”, …

#1: – Component Services
#2: – Event Viewer (Local)
#3: – Services (Local)

– 5:17pm Wednesday 11 August 2010 –

GOOGLED – dcom exploit

OPENED-URL: –
http://www.killertechtips.com/2010/01/14/avast-network-shield-blocked-dcom-exploit/

As of now – (Monday 23 August 2010) – I have not made any changes to my system, … (maybe I need to be poking around a little bit to CHECK this dcom-FEATURE is turned off, …

THIS-BIT; – (Makes sense to me) – QUOTED – (from Steve-Gibsons “DCOMbobulator” tool)

Enabling & Disabling DCOM

Almost no one needs DCOM and it should
NEVER be left running if it is not needed.

DCOM is a seldom used technology built into Windows to allow system and application components to inter-operate across a network. Microsoft appears to have gone a little overboard with DCOM (aside from having it always running when it’s almost never needed). Unlikely Windows applications such as Paintbrush, Sound Recorder, Voice Dictation Manager (whatever that is), Media Player, and WordPad, are all “DCOM ready” and waiting to be taken over by someone else on your network, or over the public Internet. How handy.

UPDATED-POST; – “The computer says no” – Stop searching for something that does NOT exist? – (When do you stop searching?) – some people dont think of searching – (added emphasis on “SEARCH-skill-sets”) –

PS – an added note – that helps explain WHAT/WHY Mirco$oft(s) DCOM-Feature, … is, .. is not. Read the paragraphs titled –
The strange history of DCOM
What does all this have to do with you?
What does DCOM do for you?

It is NOT very long or complicated – Steve has this way – of taking me on a journey – Distracted by his friendly -and- clear writing style – VISIT – http://www.grc.com/pdp-8/pdp-8.htm – (There goes the next hour or two) – Thanks Steve for making this page, and presenting it in such an easily accessible form.

OpenVMS – still actively being developed?

OpenVMS – still actively being developed?

Two-comments (prompted this post) – on article – “Why is Apple Meddling With My Windows AutoRun?

THOSE COMMENTS – (Pasted here directly from the commments forum/section Quoted here)

Submitted by Alphaman (not verified) on Tue, 11/10/2009 – 11:36am.

Heh… OpenVMS is dead. If I had a nickle for every time I heard that… Let’s see, OpenVMS outlasted Digital. Compaq. Tru-64. OSF-1. HP-UX. SunOS. Apollo. Next. OS/2. SGI. Tandem. Cray. and tons of others that tried to kill it. Even HP.

Check out this article posted just last week…

Why OpenVMS?

Now, about AutoRun. Seems MS didn’t really “disable” autorun, but rather just turned it off. And based on the screenshot shown above, it looks like iTunes defaults to “NO”, don’t turn on AutoRun. Yeah, the option needs to be removed, but since everyone gave Microsoft 25 years to fix their built-in security flaw, perhaps we should give Apple a little more than a couple months to adapt their software?

I’m just sayin’…

* reply

Submitted by Anonymous (not verified) on Mon, 05/17/2010 – 10:58am.

OpenVMS is not dead. (rumor has it that is till gererates about $4B for HP). I have been running clusters since 1988; now on my 4th generation of hardware (785’s, 8530’s, 4/275 2100’s, DS15’s). With a Cluster and shadow sets, I never loose data or much downtime. My record is only 1226 days on one node (2100’s) without reboot and currently 843 days on one DS15. Still used on wall street (unconfirmed) and by DOD since is have been pretty much hack proof.

http://en.wikipedia.org/wiki/VAX
wikipedia.org ~ VAX

Vintage Hardware (DEC) in the mid-1970s

The Author – Bob Gezelter – (Provides a VERY interesting insight into some alternative systems) – Pasted below are three of the starting paragraphs

The benefits of OpenVMS accrue throughout the system lifecycle; not merely during development. Testing, production, enhancement, and other phases of the system lifecycle all benefit. Costs and risks are reduced over the system lifetime.

This is an important business issue, not a mere technical nicety. A well structured OpenVMS system evolves far more smoothly than one on other platforms. This is manifest when clusters maintain continuous application availability over decades while both hardware and software evolve. Cluster availability can persist across CPU upgrades, CPU architecture changes, system updates, and changes in storage, networks, and individual applications. Users can remain completely unaware that any transitions have occurred.

This defies the conventional wisdom that all operating systems are the same: that what is true for Windows® and Unix®-derived operating systems must be true for all operating systems. It has become fashionable to assert that operating systems do not matter; that we are in a post-operating system world. Often this is accompanied by a comment that “Frameworks and virtual machines are what matters.” This is disingenuous.

SEARCHED – Google-Image – vms

IMAGE – vms-v21.jpg – From-URL – http://www.olddec.nl/Thanks-41-Years/software.htm – (Thanks)

Shrink-wrapped software
New VAX software

VMS verses VAX -???- (same?) I dont think so, … but I LIKE this picture, … It hints that this product is still alive, working, and development continues – Check the date on this image 1980 – VAX verses VMS

The “native” VAX operating system is DEC’s VAX/VMS (renamed to OpenVMS in 1991 or 1992 when it was ported to Alpha, “branded” by the X/Open consortium, …
VISITED – http://en.wikipedia.org/wiki/VAX

10+ Mistakes Linux newbies make (ZDNET)

10+ mistakes Linux newbies make

10+ mistakes Linux newbies make

Here’s a look at the most common Linux desktop mistakes by new users. Avoiding these pitfalls can prevent a lot of frustration.

THATS-GREAT; – (Just copied and pasted the image-and-text, from google-Chrome, into this post open in Firefox) – and it will be published exactly as is, without any further formatting from me.
Opps spoke to soon, … I want the link to open in another window, AND, the font is way to small.

This article, managed to keep my attention, and I actually read the whole article from start to finish (Including ALL the comments), .. that is most uncommon for me.

hosts file

The host file defined; ~ I found this VERY useful in terms of what is a *.pac file.

‘PAC = Proxy Access Control’

NSW – Schools use such configuration for ALL their computer system web browser’s. (OR; I could say it like this) All Internet access MUST be filtered via the ‘pac-file’.

[QUOTE – START] A “hosts” file is a list of sites your computer is not allowed to connect to. A PAC (Proxy Access Control) file is a set of rules defining what type of content your web browser is not allowed to view. When used together, these files act like a wall, blocking where your computer is allowed to go on the Internet. By using a pseudo HTTP Daemon (a specialized web server), your web browser never even realizes it’s being blocked. [QUOTE – END] ~ FROM – URL: http://hostsfile.org/

The path information; (Ie, where to find the hosts file)
Operating System | Location on Hard Drive

Linux/Unix                              /etc/hosts
Windows 3.1/95/98/ME     c:\windows\hosts
Windows NT/2000/XP Pro     c:\winnt\system32\drivers\etc\hosts

or c:\windows\system32\drivers\etc\hosts

Windows XP Home     c:\windows\system32\drivers\etc\hosts
Netware         SYS:ETC/HOSTS
Apple             System Folder:Preferences and in the System Folder itself.

Formatting ‘Text-in-Wordpress’ – requires some improvement (Or a ‘Column’s’ plugin)

OTHER LINKs: (Related to topic ‘Hosts File’)

#1: ~ Googled ‘hosts file

#2: _enWiki ~ http://en.wikipedia.org/wiki/Hosts_file’

#3: ~ http://www.mvps.org/winhelp2002/hosts.htm

#4: ~ http://someonewhocares.org/hosts/

#5: ~ http://support.microsoft.com/kb/972034

#6: ~ http://www.bleepingcomputer.com/tutorials/tutorial51.html

SSL VPN

The Barracude SSL VPN – Secure Remote Access from Any Web Browser

WARNING; Technical-Content ~ Hard core geek-stuff

Googled – ssl explorer

FOUND: (Amongst a lot of other stuff, something that I found useful in helping to understand ‘Secure Socket Layers’, and other related technologies, and theory, BUT; The best thing that helped with this topic was the barracudanetworks.com site, which has a nice-short flash video detailing HOW to setup and configure the device named the “Barracude SSL VPN”) ~ Price’s starting at $7197 + P&H

LINK; The Barracuda SSL VPN is an integrated hardware and software solution enabling secure, clientless remote access to internal network resources from any Web browser.

OTHER RELATED SITEs and SEARCHs;

#1: http://en.wikipedia.org/wiki/Transport_Layer_Security

#2: Google – secure sockets layer ssl

#3: Google – secure socket tunneling protocol service

Anit-Virus Rants @ Blogspot

In the process of deciding what to post today – I found some interesting stuff – One site in particular stood out, and that site url is >>> http://anti-virus-rants.blogspot.com/ <<<

GOOGLED – other possible exploit code

FOUND – what-are-heuristics – by Kurt Wismer – Posted – Monday, April 28, 2008 –
[QUOTE] “in anti-malware, heuristics refer to a family of techniques/technologies meant to determine if a given program is malware based on a collection of rules (heuristic can be considered to be a fancy word for “rule of thumb”) derived from past experience with malware…” [END-QUOTE]

Some other links on http://anti-virus-rants.blogspot.com/ – That I found amusing / useful, ..

#1:  – some-new-snake-oil-from-kaspersky.html

#2: – what-is-snake-oil.html

#3: – what-is-fud.html

LISTING OF ANTI – VIRUS VENDORs;

http://www.checkvir.com/index.php?CN=70&CIE=0

f-secure

Just making a note of this page for later reference;

http://www.f-secure.com/en_EMEA/security/security-lab/tools-and-services/online-scanner/index.html

NEW DISCOVERY (~ Found this article dated September 2007)

It’s all but official: the Bugatti Veyron is no longer the fastest production car in the world, as US-based Shelby Supercars (SSC) has just snared the record with its Ultimate Aero Twin Turbo. (Which is NEW-news to me – just shows how interested I am in speed records – )

End User Access? – With Joomla

The Jumpbox Official Blog – provides a “More-Comlete-Overview”on the Joomla CMS, .. [Quote] – “Joomla is an extremely popular Open Source content management system and is known for its intuitiveness and simplicity. It’s noteworthy features include:” – AND there is a VIDEO provided also.

End-User Access? PDF Print E-mail
Written by Gordon Danson
Sunday, 15 November 2009 05:18
THIS – POST; QUESTION: How much access does the end-user have? (Simple question)

THIS-POST; Has been input using – “an ordinary user account”

A Problem with getting elevated privileges, just dont want to go back to an ordinary account.

OTHER ISSUES; (As ordinary user ‘grd’)

#1: Can select the available categories YES.

#2: Have option to place THIS, on the front page? – YES.

ACCESS LEVEL – OPTIONS (available to the ‘grd-account’ – Leaving on Public for this post)

Public > Registered > Special

The assumption – would be that, IF someone wanted to SEE this article (AND I used the ‘Registered-AccessLevel’ – THEN that user would have to logon BEFORE they could see that article. (But the theory need to be CONFIRMED)