QuoteThe third is a denial-of-service flaw that affects a component known as the remote procedure call (RPC) process. The RPC process facilitates activities such as sharing files and allowing others to use a computer's printer. By sending too much data to the RPC process, an attacker can cause the system to grant full access to its resources. By using the flaws in tandem, a hacker could load unwanted programs onto computers through the buffer overrun flaws and then use the infected computers to launch a denial-of-service attack.
QuoteAs part of Microsoft's announcement, HP is unveiling the HP StorageWorks NAS 2000s, which runs Storage Server 2003. The product can handle up to 24 terabytes of data and is geared toward customers that have storage and server consolidation needs at the departmental or remote office level, according to HP. A version of the NAS 2000s with 580GB will cost $8,295, said Harry Baeverstad, director of HP's NAS business segment.
QuoteAmerican teenager Jeffrey Lee Parson was arrested last month on charges he created and distributed another toned-down MSBlast variant, known as MSBlast.B. He faces imprisonment of 10 years and a $250,000 fine if convicted.
QuoteIndeed Comcast is not the only company that offers higher than average speeds. Cablevision Systems Corp. CVC.N users are reporting download speeds of up to 4.3 megabits per second, according to a Broadbandreports.com, which tracks the industry. Comcast users reported speeds of about 1.6 megabits per second.
QuoteMicrosoft plans to use the study's findings in its effort to convince customers that Linux is not necessarily a cheaper alternative to Windows, once all costs have been taken into account.
QuoteThe specialized version of the Windows XP operating system provides an extra interface to make it easy for people to view photos, listen to music and watch videos on a television hooked up to the PC.
QuoteSeveral other alerts also involve Office applications. A vulnerability in recent versions of Word could allow hackers to automatically run macros, which are mini-programs typically used to automate routine tasks. The flaw--classified as "important"--requires opening a maliciously crafted document, according to the security bulletin. Customers using Word 2002, 2000, 98 or 97 or Works Suite 2003, 2002 or 2001 are urged to apply the patch, as described in the bulletin.
QuoteSCO argues that Linux contains intellectual property from Unix, an operating system to which SCO holds copyrights and which it licenses to companies such as Hewlett-Packard and Sun Microsystems. SCO argues that some Linux source code was copied directly from Unix. It also claims that other Linux source code stems from improvements made to Unix by IBM and others, which then illegally moved the changes to Linux.
QuoteDel Smith, senior product manger for Symantec, said activation is intended to protect consumers from widespread counterfeit copies of Symantec programs. The company estimates at least 3.6 million bogus copies of its programs are sold annually, causing headaches both for Symantec and unsuspecting buyers, who find out too late that the software isn't doing the job.