Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3114
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 3044
Total: 3046









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: b_gates
« on: 13. October 2009., 00:00:22 »

we get the lastest updates for Adobe Reader
Posted by: bobbintb
« on: 09. October 2009., 18:43:15 »

yikes :/
Posted by: Berbe
« on: 07. October 2009., 23:02:48 »

Who said that PDF was safe? Proprietary, for sure, but safe?!
Posted by: Amker
« on: 22. September 2007., 23:32:52 »

The hacker who discovered a recently patched QuickTime flaw affecting the Firefox browser says he has found an equally serious flaw in Adobe Systems Inc.'s PDF file format.

"Adobe Acrobat/Reader PDF documents can be used to compromise your Windows box. Completely!!! Invisibly and unwillingly!!!," wrote Petko Petkov, in a breathless Thursday blog posting. "All it takes is to open a PDF document or stumble across a page which embeds one."

Petkov said he had confirmed the issue on Adobe Reader 8.1 on Windows XP and that other versions may be affected.

The security researcher said he would not release code that shows how this attack works until Adobe provided a patch for the problem, but he has already sent other software developers scrambling for bug fixes over the past week.

On Sept. 12, Petkov reported that attackers could run unauthorized software on a Firefox user's PC by exploiting a flaw in Apple Inc.'s QuickTime media format. Mozilla Corp. offered a partial fix for this problem on Tuesday but said Apple would ultimately have to address the issue in its QuickTime media player.

And on Tuesday Petkov posted code showing how Windows Media Player files could be used to make Web surfers susceptible to Internet Explorer bugs, even if they were running another browser such as Firefox or Opera. Microsoft Corp. has said it is investigating this issue.

If Petkov's PDF claims are true, it could be bad news for business users, who are used to opening PDF attachments without thinking twice, said Andrew Storms, director of security operations with nCircle Network Security Inc.

Though some attackers have crafted pdf attacks in recent years, Petkov's code could also be more effective than typical exploits, Storms added. "Historically, those other exploits have been targeted for specific versions of Adobe Reader," he said via instant message. "According to the information, this affects all versions. It's an inherent architectural problem in the way files are read."

(Copyright by PC World)

http://www.pcworld.com/article/id,137456-pg,1/article.html

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023