|
|
|
||||
|
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() |
|
|||||||
| Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
|
Thread Tools |
|
|
#1 |
|
Confirmed User
Join Date: Aug 2003
Location: Someplace Windy
Posts: 4,501
|
Cyber Security Alert for MAC Users
Hit apple update kids...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-132A Apple Mac Products Affected by Multiple Vulnerabilities Original release date: May 12, 2006 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X version 10.3.9 (Panther) and version 10.4.6 (Tiger) * Apple Mac OS X Server version 10.3.9 and version 10.4.6 * Apple Safari web browser * Apple Mail Previous versions of Mac OS X may also be affected. Please see Apple Security Update 2006-003 for further information. Overview Apple has released Security Update 2006-003 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser, Mail, and other products. The most serious of these vulnerabilities may allow a remote attacker to execute arbitrary code. Impacts of other vulnerabilities include bypassing security restrictions and denial of service. I. Description Apple Security Update 2006-003 resolves a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, Mail, and other products. Further details are available in the individual Vulnerability Notes. II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service. III. Solution Install an update Install Apple Security Update 2006-003. This and other updates are available via Apple Update. Disable "Open 'safe' files after downloading" For additional protection, disable the option to "Open 'safe' files after downloading," as specified in "Securing Your Web Browser." Appendix A. References * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/#Safari> * Apple Security Update 2006-003 - <http://docs.info.apple.com/article.html?artnum=303737> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> __________________________________________________ __________________ These vulnerabilities were reported in Apple Security Update 2006-003. Please see the Vulnerability Notes for individual reporter acknowledgements. __________________________________________________ __________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-132A.html> __________________________________________________ __________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <[email protected]> with "TA06-132A Feedback VU#519473" in the subject. __________________________________________________ __________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. __________________________________________________ __________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> __________________________________________________ __________________ Revision History May 12, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRGTxnX0pj593lg50AQKebgf+PTa7qCt6QQRcXGlJ3v jPFOdO1VNRMGr8 WOP8JKHbCK93O3E6YtHJ3nQTJBfyq169TQijWvoWvjjXM603Do jGXUXgTBZFhTSG c4L0jE2+nD3273nZXGPreFJAsPxK6me7d4Of/KQ/prJnUfrnWNxfrP90CmXRKNLD +4eC4BEjNXCqpb0ki62WQM7NED6IgfgNZWfO7faTSRYNRdEyLA getQxZVm5eepyK BJO3rRBBRkOIkIIG5o/J5ViqgiuUP75N37QqTc7BtyzQR2OeWepytJvkMvJUBVAG r0fLUKvhT4wdHxsNGVGCxLNf3NHG1UuWNO3UZ9MeBmREdmeT+K 0l9Ahahahaha =cabu -----END PGP SIGNATURE-----
__________________
Perfect Gonzo |
|
|
|
|
|
#2 |
|
8.8.8.8
Industry Role:
Join Date: Mar 2006
Location: Noordermarkt
Posts: 30,509
|
i guess nobody knows that .mac got hacked and all the credit card were downloaded?
.... whoops
__________________
TAEMDLRMSKRJIXMRLSMRJ. |
|
|
|