summaryrefslogtreecommitdiff
path: root/published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt
diff options
context:
space:
mode:
authorluxagraf <sng@luxagraf.net>2019-05-04 15:48:55 -0500
committerluxagraf <sng@luxagraf.net>2019-05-04 15:48:55 -0500
commit79fafe2f44f5e31522dd93013950474342bfdfb0 (patch)
treebc9ccf5b4eadeebf3a2f86b21f9b382edfa41735 /published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt
parent62167091560c908db0613bcb35ff9ae8292f5961 (diff)
archived all the stuff from freelancing for wired
Diffstat (limited to 'published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt')
-rw-r--r--published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt10
1 files changed, 0 insertions, 10 deletions
diff --git a/published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt b/published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt
deleted file mode 100644
index 6328624..0000000
--- a/published/Webmonkey/Monkey_Bites/2007/05.07.07/Wed/microsoft.txt
+++ /dev/null
@@ -1,10 +0,0 @@
-Microsoft has official released their May security bulletin with fixes for some serious flaws including a zero-day flaw in Windows that is already being exploited in the wild.
-
-The zero-day flaw stems from a vulnerability in the Windows DNS system which affects Windows 2000 Server and Windows Server 2003. The patches are now available through the [Microsoft Security Advisory][2] site.
-
-As we [mentioned last week][1], other bulletins address flaws in Windows, Office, Exchange and BizTalk, all four of which contain at least one patch rated as critical, meaning that an attacker can execute remote code to hijack a user's system.
-
-The updates are recommended for all users.
-
-[2]: http://www.microsoft.com/technet/security/bulletin/ms07-may.mspx "Microsoft Security Bulletin Summary for May 2007"
-[1]: http://blog.wired.com/monkeybites/2007/05/microsoft_addre.html "Microsoft Addresses Critical Flaws" \ No newline at end of file