Page 2 of 6 FirstFirst 123456 LastLast
Results 11 to 20 of 59

Thread: Dangerous!

  1. #11
    Join Date
    Jul 2004
    Location
    Sussex, UK
    Posts
    3,734
    i would say be careful what you delete in the windows folders, check it is something you dont need as you dont want to corrupt your version of xp.

  2. #12
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by Empty_5oul
    i would say be careful what you delete in the windows folders, check it is something you dont need as you dont want to corrupt your version of xp.
    Yes, i will be safe. I have don't delete any file.
    I am awaiting of Meckano and let him see what I have.
    I have never before deleted a file from Win32. Only files who has not been removed when I have remowed a program who not longer need it.
    Lagu
    Once an AMDuser always an AMD user

  3. #13
    Lagu, the file to search for is ......hosts.....
    I don't know how you got wpa.bak
    Sure you are in:
    WINDOWS\system32\drivers\etc
    ?

  4. #14
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by meckano
    Lagu, the file to search for is ......hosts.....
    I don't know how you got wpa.bak
    Sure you are in:
    WINDOWS\system32\drivers\etc
    ?
    Meckano!

    I searsh in WIN32
    Now I looked in windows\system32\drivers\etc
    On Swedish e.t.c is like as etcetera Ie and so on so I was thinking that this map not have this name
    Hosts 1 Kb file 4/8-2004
    Imhost 4 kb SAM-file 4/8-04
    Protocol 7kb 4/8 -04
    Service 7 kb 4/8-04
    I couldn't see any bak file
    Lagu
    Once an AMDuser always an AMD user

  5. #15

    now if you open that ....hosts.... file with notepad.exe
    and, if it is like mine, there is only one line without an # sign, like:

    # Copyright (c) 1993-1999 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host

    127.0.0.1 localhost
    # Start of entries inserted by Spybot - Search & Destroy
    # End of entries inserted by Spybot - Search & Destroy

    some of my *.bak's had many lines for spybot, but this is how it looks now, and it is now read-only.

    Add:
    You don't have to delete anything. That is just what I did.

  6. #16
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by meckano

    now if you open that ....hosts.... file with notepad.exe
    and, if it is like mine, there is only one line without an # sign, like:

    # Copyright (c) 1993-1999 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host

    127.0.0.1 localhost
    # Start of entries inserted by Spybot - Search & Destroy
    # End of entries inserted by Spybot - Search & Destroy

    some of my *.bak's had many lines for spybot, but this is how it looks now, and it is now read-only.

    Add:
    You don't have to delete anything. That is just what I did.
    Yes I hawe the same. Should I write 2 lines as this exaple with this typo # in the beginning?
    Once an AMDuser always an AMD user

  7. #17
    This part?
    # Start of entries inserted by Spybot - Search & Destroy
    # End of entries inserted by Spybot - Search & Destroy

    No, does not matter.
    anything after # is not used.
    # is a marker for notes.

  8. #18
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Quote Originally Posted by meckano
    This part?
    # Start of entries inserted by Spybot - Search & Destroy
    # End of entries inserted by Spybot - Search & Destroy

    No, does not matter.
    anything after # is not used.
    # is a marker for notes.
    It's done.
    Lagu
    Once an AMDuser always an AMD user

  9. #19
    Join Date
    Jan 2005
    Location
    Sundsvall, Sweden
    Posts
    3,532
    Hi again!

    Keep an eye of this! :shockingzap:

    "Experience: that most brutal of teachers.
    But you learn, my God do you learn."
    Â*C.S Lewis (1898-1963), British author.

    - Vulnerability in Java Web Start -
    Oxygen3 24h-365d, por Panda Software (http://www.pandasoftware.es)

    Madrid, March 24, 2005- Sun has reported a vulnerability in Java Web Start that could allow privilege elevation of a non-trusted application and indiscriminate permission to read, write and execute on the local system.

    Java Web Start is a platform that allows developers to deploy complete applications to final users accessible from any browser.

    By default Java applications run in a virtual environment, called "sandbox", to prevent security problems that indiscriminate access to system resources could imply. Read, write and command execution restrictions are imposed on a Java application to protect the system from possible attack.

    The vulnerability detected allows the files to be designed to prevent "sandbox" restrictions and take control of the system. The problem affects Java Web Start distributed with J2SE from versions 1.4.2 to 1.4.2_06, for Windows, Solaris and Linux platforms.

    To resolve the problem, users should update to J2SE version 1.4.07 or later, available from http://java.sun.com/j2se/1.4.2/download.html. As an additional preventive measure, until a vulnerable version is updated, we recommend disabling the execution of Java Web Start applications, removing support for JNLP files in browsers.

    NOTE: The addresses above may not show up on your screen as single lines. This would prevent you from using the links to access the web pages. If this happens, just use the 'cut' and 'paste' options to join the pieces of the URL.

    Lagu
    Once an AMDuser always an AMD user

  10. #20
    Thank you, doing update. :D

Page 2 of 6 FirstFirst 123456 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •