Ipso Facto Comic

Zero Income Tax and Zero Payroll Tax

Opera: simply the best internet experience

Download Opera

Just Google It


porkbustersNo More Jean Fraud sKerry Bullshit

Open Trackback Alliance

Get the code for this blogroll

Add to My Yahoo!

Free John Kerry's SF-180 Blogroll


The Community for Life, Liberty, Property

Guard the Borders

Email Me

If you're using Internet Exploder to view this blog, tough. Get a real browser. :-)

Ignore the Blogspot "profile"—here's the real scoop

What's this blog about, anyway?

Comment-Trackback Policy

Stop the ACLU Blogburst Blogroll

Powered by Blogger

Anti-PC League

Monday, January 02, 2006


Yeh, only applies to ALL WINDOWS USERS!!! Steve Gibson (developer of Spinrite) has perhaps the best material on the Windows Metafile security flaw and what to do about it NOW. Just CLICK on over and follow directions. He even posts a link to a patch (for Win2000, XP/SP2 and 2003 systems only) developed by a NON-Micro$oft software engineer that Steve recommends highly. Steve also posts a workaround for older Windows OS systems and a vulnerability test. See more info at Ilfak Guilfanov's site. I take Steve Gibson's word to be extremely reliable on this issue. Do NOT rely on your anti-virus to catch this, folks. The hooks into the OS are too deep for that to be a reliable solution. DO take this as a serious security warning. Further update (for those who are not yet inclined to CLICK through to the links above). From the highly-respected anti-virus/security firm F-Secure, this:
1) There are probably other vulnerable functions in WMF files in addition to SetAbortProc 2) This bug seems to affect all versions of Windows, starting from Windows 3.0 - shipped in 1990! "The WMF vulnerability" probably affects more computers than any other security vulnerability, ever.
Don't say you weren't warned. PSA Pinned to Conservative Cat's Bulletin Board with a link to Ferdy's predictions for 2006... uhm, 2005. heh