<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-9159641333787395011</id><updated>2024-10-24T16:31:10.780-07:00</updated><category term="Internet Threats"/><category term="Software Vulnerabilities"/><category term="Adobe"/><category term="Software Updates"/><category term="Choosing Anti-Virus Software"/><category term="Humor"/><category term="Password Managers"/><category term="Rogue Security Software"/><category term="Social Engineering"/><category term="Spam"/><category term="Web Browser Vulnerabilities"/><category term="Windows Updates"/><title type='text'>Threat Level: Orange</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default?redirect=false&amp;orderby=published'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>19</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-3526188622140875389</id><published>2009-02-24T17:37:00.000-08:00</published><updated>2009-02-24T17:37:38.604-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software Vulnerabilities"/><title type='text'>Microsoft Security Advisory (968272)</title><summary type="text">Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution

Microsoft is currently investigating this vulnerability and as yet have not released a patch but does offer workarounds their Microsoft Security Advisory (968272) page.</summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/3526188622140875389/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2009/02/microsoft-security-advisory-968272.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3526188622140875389'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3526188622140875389'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2009/02/microsoft-security-advisory-968272.html' title='Microsoft Security Advisory (968272)'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-2709803142880444184</id><published>2008-12-14T11:19:00.000-08:00</published><updated>2008-12-23T17:04:57.389-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Threats"/><category scheme="http://www.blogger.com/atom/ns#" term="Rogue Security Software"/><title type='text'>Rogue Security Software</title><summary type="text">What is rogue security software?
Rogue security (anti-virus, anti-malware) software is fake software, designed to scare you into believing that your computer is infected and to entice you to buy the product for removal of said infections.
Most rogue security programs appear professionally designed and often mimic some portion of Microsoft&#39;s Security Center or other real security products. They </summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/2709803142880444184/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/12/rogue-security-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2709803142880444184'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2709803142880444184'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/12/rogue-security-software.html' title='Rogue Security Software'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-1640274496157169053</id><published>2008-12-13T13:29:00.000-08:00</published><updated>2008-12-26T14:32:12.170-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Password Managers"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Vulnerabilities"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Browser Vulnerabilities"/><title type='text'>Re-thinking  Password Managers</title><summary type="text">Using your web browser&#39;s built-in Password Manager can be a real life saver when it comes to remembering all your passwords but how secure is this feature?
Not very, according to the testing done by Chapin Information Services, Inc. The password managers of both Google Chrome and Safari scored the lowest while Opera and Firefox tied for the highest. Scoring the highest shouldn&#39;t really instill </summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/1640274496157169053/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/12/re-thinking-password-managers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/1640274496157169053'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/1640274496157169053'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/12/re-thinking-password-managers.html' title='Re-thinking  Password Managers'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-8154935405310530124</id><published>2008-11-27T02:45:00.000-08:00</published><updated>2008-12-12T10:18:49.882-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Threats"/><title type='text'>Protection against malicious web ads</title><summary type="text">Malicious Web AdvertisementsSeemingly benign advertisements for recognizable products or services appearing on trusted, reputable websites could offer more than you bargain for whether you click on the ad or not.
Malicious attackers inject code into the SWF file (Flash) of ads that redirect your browser to malware hosted websites. The most common goal of the redirection is to download rogue </summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/8154935405310530124/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/protection-against-malicious-web-ads.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/8154935405310530124'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/8154935405310530124'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/protection-against-malicious-web-ads.html' title='Protection against malicious web ads'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-4317177570753340012</id><published>2008-11-13T16:30:00.000-08:00</published><updated>2008-12-10T16:45:51.675-08:00</updated><title type='text'>Easily work with a Limited User Account</title><summary type="text">You may have thought or heard about certain limitations of working as a limited user, such as using certain programs that require administrative privileges or even having the ability to change the system time. Maybe your just not sure that you want to be limited in what you can do on your computer.
These are valid concerns, some programs do require administrative privileges (although, I beleive </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/4317177570753340012'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/4317177570753340012'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/easily-work-with-limited-user-account.html' title='Easily work with a Limited User Account'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-1238525832770681660</id><published>2008-11-12T16:11:00.000-08:00</published><updated>2008-12-10T16:12:45.180-08:00</updated><title type='text'>Online Malware Scanners</title><summary type="text">Scan your computer for malware at least once a week using one of the online scanners listed below. Do this even if you already have an up-to-date anti-virus scanner installed on your computer already.

Why? Simple. No single anti-virus vendor can detect 100% of the existing threats to your computer security 100% of the time. It is possible something evaded your current protection and even worse </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/1238525832770681660'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/1238525832770681660'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/online-malware-scanners.html' title='Online Malware Scanners'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-3281182051388994320</id><published>2008-11-11T16:04:00.000-08:00</published><updated>2008-12-19T00:00:13.628-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Choosing Anti-Virus Software"/><title type='text'>Choosing Anti-Virus Software</title><summary type="text">Owning a computer and having it connected to the Internet requires each of us to choose a security software product or a variety of products for protection against Internet threats, this simply cannot be avoided, especially now that most malware threats have evolved from little more than nuisances to increasingly malicious and financially-motivated. Thankfully there are several security products </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3281182051388994320'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3281182051388994320'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/choosing-anti-virus-software.html' title='Choosing Anti-Virus Software'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-351320298870153126</id><published>2008-11-10T15:58:00.000-08:00</published><updated>2008-12-10T15:59:52.572-08:00</updated><title type='text'>Free Anti-Virus Software</title><summary type="text">AVG Technologies
Protection against viruses, spyware, adware, identity-theft and e-mail scanning. Also includes Safe Search: safely click search results. Manual updates or user-created update schedule. Access to AVG Free forums and FAQ.

Compatible with Windows XP, Windows XP Pro and Windows Vista.

AVG Free
avast
Virus protection, anti-spyware and anti-rootkit software. Strong self-protection to</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/351320298870153126'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/351320298870153126'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/free-anti-virus-software.html' title='Free Anti-Virus Software'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-3168498146791401648</id><published>2008-11-09T15:33:00.000-08:00</published><updated>2008-12-16T18:09:40.313-08:00</updated><title type='text'>Creating a Limited User Account - Step 1</title><summary type="text">Understanding Windows XP Accounts:
Windows XP offers three different types of accounts:

Administrator
Limited
Guest

The Administrator Account has complete and unrestricted access to the system. Administrators have the ability to add/remove programs or hardware, modify the registry and add/modify/delete files from anywhere on the hard drive.
A Limited User Account on the other hand is as the </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3168498146791401648'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3168498146791401648'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/creating-limited-user-account-step-1.html' title='Creating a Limited User Account - Step 1'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc3c_nRGZuYR0_DODhq4Z8iPnRPc4vOk35Q3LDixH9PMqbH1riY4Nra6A3AHE7QyX0vk6mIiXYquJso-ZYFfjjbrmypLiklOBJMEZqGS6Bxc1e_dj3oNOTsRhemMRO8Z9czCODSOFnO7g/s72-c/SP32-20081110-020709.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-715732723029620473</id><published>2008-11-08T14:06:00.000-08:00</published><updated>2008-12-16T23:38:48.445-08:00</updated><title type='text'>Security in Layers</title><summary type="text">Security in Layers

The most common method used by most people for securing their computer against Internet threats, is to install some sort of Anti-Virus software or even a complete Internet security package, call it a day and feel protected. While this is a good starting point, and is also popular conventional wisdom, the, &#39;install Brand X security software package and forget it about it&#39; </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/715732723029620473'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/715732723029620473'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/security-in-layers.html' title='Security in Layers'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-3023246815167121162</id><published>2008-11-07T13:28:00.000-08:00</published><updated>2008-12-26T14:32:12.170-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Adobe"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Threats"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Vulnerabilities"/><title type='text'>Adobe exploit now &quot;In the Wild&quot;</title><summary type="text">Just a few days ago Adobe released security updates to Acrobat 8 and Adobe Reader 8 to address a vulnerability.
Today, over at the Sans Internet Storm Center it was revealed that the Proof of Concept of the Adobe vulnerability has been made public and that attacks are happening in the wild.
Furthermore, and most disturbing is that according to VirusTotal no Anti-Virus products are detecting the </summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/3023246815167121162/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/12/adobe-exploit-now-in-wild.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3023246815167121162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3023246815167121162'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/12/adobe-exploit-now-in-wild.html' title='Adobe exploit now &quot;In the Wild&quot;'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-2533072361390530899</id><published>2008-11-06T13:38:00.000-08:00</published><updated>2008-12-26T14:15:51.905-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Threats"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Spam"/><title type='text'>Spam alert: Barack Obama video</title><summary type="text">Beware of an email that may find it&#39;s way into your inbox.
The subject line may include:
A new president, a new congress ...
Barack Obama wins
Can Obama win popular vote but lose election?
Did Obama Win Yet?
Election 2008: Time lapse of U.S. counties
Election Center 2008 - Election Results
Election Night Results
Fear of a Black President
New president&#39;s
Obama win an Electoral College majority
</summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/2533072361390530899/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/spam-alert-barack-obama-video.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2533072361390530899'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2533072361390530899'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/spam-alert-barack-obama-video.html' title='Spam alert: Barack Obama video'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-3444767271185856594</id><published>2008-11-06T13:31:00.000-08:00</published><updated>2008-12-16T18:11:41.204-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Humor"/><title type='text'>Beware of Mailware</title><summary type="text">Computer viruses, trojans, rootkits and other malware are of a constant concern to all of us however we now have a new concern to worry about.
It&#39;s Mailware.
Oh great, what is Mailware and what do I need to do to protect myself from it?
The good folks over at the F-Secure Antivirus Research Weblog has discovered that Windefender 2009, a spyware removal tool can &quot;Get rid of Mailware Now!&quot;.




</summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/3444767271185856594/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/beware-of-mailware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3444767271185856594'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/3444767271185856594'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/beware-of-mailware.html' title='Beware of Mailware'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfl9vIwK64c-JBzB79SWHTMhemy7zTnpt3fqZxfO0_UmD-2bW80wQy5m63U61b7ddbkp0aLyOCfhS6ffT0K5Fg30d9CAMDwgDhAqyLXIIkege1CDwcVXnrp75DBMIRp0rkml0X3IpTwEs/s72-c/windefender2009.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-8431705107599846727</id><published>2008-11-04T13:40:00.000-08:00</published><updated>2008-12-26T14:14:11.199-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Adobe"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Updates"/><title type='text'>Acrobat 8 and Adobe Reader 8 Patch Available</title><summary type="text">Vulnerabilities have been discovered in Adobe Acrobat Professional, 3D and Standard 8.1.2 and earlier versions and also Adobe Reader 8.1.2 and earlier versions.
&amp;nbsp;

From Core Security Technologies:
Adobe Reader suffers from a stack buffer overflow when parsing specially crafted (invalid) PDF files. The vulnerability is caused due to a boundary error when parsing format strings containing a </summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/8431705107599846727/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/acrobat-8-and-adobe-reader-8-patch.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/8431705107599846727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/8431705107599846727'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/11/acrobat-8-and-adobe-reader-8-patch.html' title='Acrobat 8 and Adobe Reader 8 Patch Available'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-4719878609056677038</id><published>2008-10-27T13:42:00.000-07:00</published><updated>2008-12-26T14:14:11.199-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software Updates"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Updates"/><title type='text'>Now is the time, if you haven&#39;t already done so</title><summary type="text">If you have not updated your computer recently, now would be a good time to do it. It is quite common for the bad guys to ramp up their efforts of exploiting machines during the few days following an update being published; don&#39;t get caught with your pants down.
&amp;nbsp;
Microsoft Security Advisory (958963)Exploit Code Published Affecting the Server ServicePublished: October 27, 2008Microsoft is </summary><link rel='replies' type='application/atom+xml' href='http://pc-threatlevelorange.blogspot.com/feeds/4719878609056677038/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/10/now-is-time-if-you-havent-already-done.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/4719878609056677038'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/4719878609056677038'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/10/now-is-time-if-you-havent-already-done.html' title='Now is the time, if you haven&#39;t already done so'/><author><name>A guy named James</name><uri>http://www.blogger.com/profile/13347823343640135768</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-4053975711145981597</id><published>2008-10-16T19:34:00.000-07:00</published><updated>2008-12-15T16:33:14.748-08:00</updated><title type='text'>My Security Configuration</title><summary type="text">My approach to PC security first and foremost is to exercise good judgment and safe practices when online or checking my e-mail. My second line of defense is that I do not browse the Internet or check e-mail logged on as a Computer Administrator, both of those activities I only perform while logged on as a Limited User.

I believe these two approaches alone will keep my PC and myself protected to</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/4053975711145981597'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/4053975711145981597'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/10/my-security-configuration.html' title='My Security Configuration'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-2888608264611670496</id><published>2008-10-16T02:40:00.000-07:00</published><updated>2008-12-07T16:10:46.744-08:00</updated><title type='text'>About Threat Level: Orange</title><summary type="text">PC and Internet Security

The Internet is actually a dangerous place and the security of your PC is constantly at risk. Drive-by Downloads, Botnets, browser exploits, software exploits and spam are some of the tools that malicious attacker use to take over our computers and even our own identity.
You are at risk even if you feel that you are just a common person accessing the Internet for simple </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2888608264611670496'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2888608264611670496'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/10/about-threat-level-orange_16.html' title='About Threat Level: Orange'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-8757996761362941173</id><published>2008-10-15T13:37:00.000-07:00</published><updated>2008-12-09T23:09:26.814-08:00</updated><title type='text'>Contact</title><summary type="text">




 Have a question or comment about something you&#39;ve seen here at Threat Level: Orange? Just fill in the form below and hit the &quot;Send email&quot; button and you will receive a quick response to your question or comment.Feedback and suggestions are encouraged.










 Name:
 
 
      






 Email:
 
 
      
      






 Subject:
 
 
      






 Message:
 
 web forms
      
      






 


</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/8757996761362941173'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/8757996761362941173'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/10/contact.html' title='Contact'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-9159641333787395011.post-2706915336391898294</id><published>2008-10-14T15:42:00.000-07:00</published><updated>2008-12-09T18:32:16.843-08:00</updated><title type='text'>Threat Level: Orange</title><summary type="text">Subscribe By RSS or Atom Feed

Subscribe in a readerKeep up to date with today&#39;s Internet threats and other updates that could effect you and your computer&#39;s security by subscribing to Threat Level: Orange.
It&#39;s easy, just click on the link to the left ( powered by Feedburner ) and then you will be able to select the feed reader of your choice.

&amp;nbsp;
Subscribe by E-Mail

Enter your email </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2706915336391898294'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9159641333787395011/posts/default/2706915336391898294'/><link rel='alternate' type='text/html' href='http://pc-threatlevelorange.blogspot.com/2008/10/subscribe.html' title='Threat Level: Orange'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_KvE8N-G5tsj0_q2mOpUg4PbtuqduxpxOEUzSkpmT95UCYs-i_voGa9ApRFdSqS0Q6RxpWoe6uS_cl7_vF6inJ9TXRvtpySVIMPAIQU95IokB16u5zdVtFVxplKGOFvg8EwLOg9Nke64/s72-c/rss.gif" height="72" width="72"/></entry></feed>