summaryrefslogtreecommitdiff
path: root/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue
diff options
context:
space:
mode:
authorluxagraf <sng@luxagraf.net>2020-04-28 10:21:17 -0400
committerluxagraf <sng@luxagraf.net>2020-04-28 10:21:17 -0400
commita222e73b9d352f7dd53027832d04dc531cdf217e (patch)
treeccc1b5c54986980141faee867318ca80e45ebef5 /old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue
parent1337c4eafe29252d892d2bde0276212ac77382d4 (diff)
parente67317b0a6f02fd75f198cd22f83c20076c61dcf (diff)
Merge remote-tracking branch 'wired/master' adding wired to conde
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue')
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/badbunny.jpgbin0 -> 10790 bytes
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/dell.txt18
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/macrovirus.txt27
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/msupdate.txt13
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.jpgbin0 -> 5050 bytes
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.txt18
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.jpgbin0 -> 6418 bytes
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.txt25
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta1.jpgbin0 -> 69098 bytes
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta2.jpgbin0 -> 82500 bytes
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta3.jpgbin0 -> 56341 bytes
11 files changed, 101 insertions, 0 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/badbunny.jpg b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/badbunny.jpg
new file mode 100644
index 0000000..cdff88c
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/badbunny.jpg
Binary files differ
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/dell.txt b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/dell.txt
new file mode 100644
index 0000000..6bc1463
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/dell.txt
@@ -0,0 +1,18 @@
+According to rumors making their way around the web, Dell will begin shipping its first round of Ubuntu equipped PCs later this week. The founder of LinuxQuestions.org claims that a Dell employee sent him a leaked email which says the new Ubuntu machines will [go on sale Thursday][2].
+
+Although Dell has not made any official announcement yet, John Hull, Dell's Manager of Linux OS Technologies, has published a short overview of what customers can expect on their new Ubuntu PCs when they are released.
+
+"Before we announce the availability of Ubuntu 7.04 on select Dell client systems, I'd like to give an overview of what customers can expect from our initial Ubuntu offering," Hull writes in his post. He goes on to say that "the default software from the Ubuntu media will be installed on the system, including kernel and applications."
+
+Hull says Dell will configure and install open-source hardware drivers whenever possible, but will use "partial open-source or closed-source drivers where there is no equivalent open-source driver." The main source of non-open drivers will be Intel wireless cards and Conexant modems.
+
+Interestingly, Hull also notes that "at this time, we are not including any support for proprietary audio or video codecs that are not already distributed with Ubuntu 7.04."
+
+Due to patent law restrictions the default version of Ubuntu does not ship with support for formats like MPEG, WMA, DVD, QuickTime, and other proprietary codecs, however, it's not hard for users to install support for those formats.
+
+According to the leaked email, the initial Dell PCs to offer Ubuntu will include the Inspiron E1505 laptop ($700 to $1100), the Dimension E520 desktop (starts at $370 sans monitor) and the somewhat nicer XPS 410 desktop ($900 to $2500).
+
+
+[1]: http://direct2dell.com/one2one/archive/2007/05/21/15563.aspx "Ubuntu 7.04 Offering—Technical Details"
+[2]: http://jeremy.linuxquestions.org/2007/05/18/dell-announces-the-models-for-ubuntu/ "Dell announces the models for Ubuntu"
+
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/macrovirus.txt b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/macrovirus.txt
new file mode 100644
index 0000000..7b4ad7a
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/macrovirus.txt
@@ -0,0 +1,27 @@
+A post on the [virus blog VirusList][3] is warning users about a macro virus that affects the OpenOffice and StarOffice suites. No doubt a number of engineers in Redmond are cackling with delight, but in fact the virus technically isn't a virus at all and poses little or no threat to users.
+
+As with any macro system, a script written in StarBasic -- the macro scripting language of the OpenOffice suite -- can execute any arbitrary code that a user allows it to execute.
+
+In the case of this new proof-of-concept macro, the code is embedded in a Draw file named badbunny.odg.
+
+The macro in question will ask users if they would like to execute the script. Should the user be foolish enough to agree, the script will attempt to download and display a bit of porn -- an image of a man wearing a bunny suit performing a sex act in the woods. Yes, you did read that right.
+
+Because StarBasic macros run on any platform that OpenOffice does, the "virus" can affect Windows, Linux and Mac OS X. The results vary somewhat according to your system. [According to APC][1], the macro will do the following depending on the system it runs on:
+
+>* Windows: The worm drops a file called drop.bad which is then moved to system.ini in your mIRC folder (if you have one) and also drops and executes badbunny.js which is a JavaScript virus that replicates to other files in the folder.
+* MacOS: The worm drops one of two Ruby script viruses (in files called badbunny.rb or badbunnya.rb).
+* Linux: The worm drops badbunny.py as an XChat script and also drops badbunny.pl which is a tiny Perl virus infecting other Perl files.
+
+The makers of OpenOffice are understandably somewhat annoyed at this bit of code being called a virus since it doesn't execute arbitrary code without user permission and can't self-replicate.
+
+A short [announcement sent to an OpenOffice mailing list][2] reads:
+
+>The OpenOffice.org engineers take the security of the software very seriously, and will react promptly to any new issues. This "proof of concept" virus is not new information, and does not require a software patch. Technically, it is not even a virus, as it is not "self-replicating" - with OpenOffice.org's default settings, it cannot spread without user intervention.
+
+As with anything, never trust a file from unknown sources. As long as users are smart enough to follow that timeless advice they should be in no danger whatsoever.
+
+[Photo from [APC][1]]
+
+[1]: http://apcmag.com/6162/first_openoffice_virus_emerges "First OpenOffice virus emerges"
+[2]: http://www.openoffice.org/servlets/ReadMsg?list=announce&msgNo=287 "proof-of-concept macro virus"
+[3]: http://www.viruslist.com/en/weblog?weblogid=187738337 "Stardust -- a macro curiosity" \ No newline at end of file
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/msupdate.txt b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/msupdate.txt
new file mode 100644
index 0000000..a1ea0dd
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/msupdate.txt
@@ -0,0 +1,13 @@
+<img border="0" src="http://blog.wired.com/photos/uncategorized/office2007_2.jpg" title="Office2007_2" alt="Office2007_2" style="margin: 0px 0px 5px 5px; float: right;" />Microsoft has acknowledged that flaws in Vista's security update system may have left some Office 2007 users with unpatched, vulnerable systems.
+
+Mark Griesi, a Microsoft Security Response Communications team member, [writes][2] on the Microsoft Security Response blog that systems running Windows Vista and Office 2007 may not have received all of [this month's security updates][3], or that the updates may not have installed successfully.
+
+Griesi goes on to say that Microsoft has revamped the "detection logic for the May 8th Security and Non-Security Updates for Office 2007. The changes to the detection logic only pertain to a patch for a [flaw in Microsoft Excel][1] that allows for remote code execution.
+
+If you're running Microsoft Office 2007 on Windows Vista, Griesi says that "you will see new versions of the updates and will need to approve them."
+
+Note that there has been no change to the patches themselves. If by chance your machine managed to successfully install the updates under the old system, you will not be prompted for the new updates.
+
+[1]: http://support.microsoft.com/?kbid=934233 "Vulnerabilities in Microsoft Excel could allow remote code execution"
+[2]: http://blogs.technet.com/msrc/archive/2007/05/17/new-detection-logic-for-may-8th-office-2007-updates.aspx "New Detection Logic for May 8th Office 2007 Updates"
+[3]: http://blog.wired.com/monkeybites/2007/04/microsoft_relea.html "Microsoft Releases Windows Security Patch" \ No newline at end of file
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.jpg b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.jpg
new file mode 100644
index 0000000..75385ed
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.jpg
Binary files differ
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.txt b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.txt
new file mode 100644
index 0000000..eef0280
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/symantec.txt
@@ -0,0 +1,18 @@
+Symantec, makers of the Norton Anti-virus software created a massive SNAFU for Chinese users when an update mistakenly identified two critical system files in the Simplified Chinese edition of Windows XP Service Pack 2 as Trojan horses.
+
+The two files, netapi32.dll and lsasrv.dll, were erroneously quarantined by the anti-virus software leaving users with a crippled installation of Windows. Rebooting the affected PCs caused Windows to fail on start-up and display the dreaded [blue screen of death][1].
+
+Symantec uploaded a revised update some 13 and a half hours later, but by then it was too late for users who had already updated and restarted.
+
+By quarantining critical system files Symantec effectively rendered perhaps as many as a million, if China's state-sponsored Xinhau News Agency is to be believed (other reports range from 7,000 to several hundred thousand), Windows installations completely useless.
+
+Affected users will need to install new copies of the two .dll files.
+
+To compound matters, Symantec, in addition to their slow-as-molasses response, has yet to post any real notice of the problem on its site.
+
+Symantec did post a support document on its Chinese-language site that outlines how to use the Windows XP installation CD to re-install the files, but that document is buried deep in the site and Symantec homepage has no information on the issue at all.
+
+[via [Computer World][2]]
+
+[2]: http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9020058&intsrc=hm_list "Chinese PC users still contending with Symantec signature foul-up"
+[1]: http://blog.wired.com/wiredphotos30/ "BSOD Through the Ages" \ No newline at end of file
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.jpg b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.jpg
new file mode 100644
index 0000000..54d4c76
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.jpg
Binary files differ
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.txt b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.txt
new file mode 100644
index 0000000..d64a4f9
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta.txt
@@ -0,0 +1,25 @@
+Yapta, a new way to track and compare airline ticket prices has opened its doors to the public. The private beta, which [launched a while back][3], is now open to anyone, though the service is still in beta.
+
+[Yapta][2] is a bit different than other services we've reviewed, like FareCast. Rather than plugging directly into the airline system as FareCast and Expedia do, Yapta simply tracks the data from other sites.
+
+Yapta currently supports a handful of airfare aggregators like Expedia, Orbitz and Travelocity as well as over half a dozen individual airline sites. Yapta says that it will be adding more sites as the beta period progresses.
+
+To use Yapta you can either enter your travel data by hand and search flights, or for batch tracking there is a browser add-on. Currently Yapta only offers an add-on for IE, but the download page says a Firefox version is coming soon.
+
+The Yapta browser add-on injects code into pages when you browse sites like Expedia (see screenshots below) with links to "tag" the selected flight in Yapta. Once you've tagged a flight, Yapta tracks the price and watches for changes.
+
+If a price changes Yapta will send you an email notification.
+
+The money saving part revolves around that fact that the airline industry offers what is known as the "guaranteed airfare rule." This rule says which says that if you buy a ticket directly from an airline and the price drops afterward, you're eligible for a refund.
+
+The airlines seem to make the voluntary offer on the basis that almost no one is aware or has the time to actually track and take advantage of the offer. Yapta's killer feature, as it were is that it handles the tracking and notification for you.
+
+Unfortunately it doesn't automate the process of contacting the airline, for that you're one your own.
+
+Yapta is simple to use and can in theory save you time and money. The principle is very similar to [Offertrax][1], but rather than retail prices, Yapta is in the airfare market.
+
+Unfortunately the lack of a Firefox plugin is a bit of deal breaker for me. However, when a Firefox version of the Yapta Tracker arrives I do think that Yapta, in combination with FareCast will be a boon for budget minded travelers.
+
+[1]: http://blog.wired.com/monkeybites/2006/11/offertrax_an_in.html "OfferTrax: RSS Shopping"
+[2]: http://www.yapta.com/ "Yapta"
+[3]: http://blog.wired.com/monkeybites/2007/04/yapta_revolutio.html "Yapta: Revolutionizing How You Buy Airline Tickets" \ No newline at end of file
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta1.jpg b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta1.jpg
new file mode 100644
index 0000000..1cdec76
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta1.jpg
Binary files differ
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta2.jpg b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta2.jpg
new file mode 100644
index 0000000..9b0291c
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta2.jpg
Binary files differ
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta3.jpg b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta3.jpg
new file mode 100644
index 0000000..96e13b0
--- /dev/null
+++ b/old/published/Webmonkey/Monkey_Bites/2007/05.21.07/Tue/yapta3.jpg
Binary files differ