Forgot your password?
Cluttermagnet, April 12, 2006 in Security & Networking
OK, two threads going here. Regarding IE, Bambi- it's 5.0.2614.3500, that comes stock with 98SE, and despite trying all the little tricks you mention, I have failed to make the (new) active x warning windows go away. Also I get a redirect and get shunted to some stupid page telling me about needing an admin, etc. *Yes, I had been to the update site with it recently and downloaded patches.* Now I've screwed it up. As I said, it's not the end of the world as I can use any of several other machines to run IE5 and download patches. But I'd like to repair this copy of IE if I can. No, I'm not 'trying' to upgrade to IE6 per se, I'm looking prospectively at whether I'd ever want to or not- whether it's worth it or not. At this point I have no intention of doing so. I do have on hand all the downloaded IE6 install files from Microsoft, plus all but the most recent IE6 patches, which include the latest IE6 cumulative patch, among others.BTW I suppose I could fix it by refreshing my 98SE install over itself. That is kind of a blunt instrument, but probably would work. I'm just trying to finesse it a little. Seems a waste of time, but I probably should learn what I've screwed up and fix it myself. Would appreciate a little help, however. Heh!Regarding the state of the art in infections, that is chilling but not altogether unexpected news. I don't know near enough about how such beasties would work. Usually any executable requires some sort of human intervention at some point, even if it is simply to initially download the thing from a remote server to set things in motion. But have they reached the point that they have become 'self-executing'? I'm not sure I even understand what I'm asking. Can your data files become contaminated such that just by copying those files or folders, you cause the execution of malicious code? Because obviously if that is so, the entire concept of 'computer security' becomes pretty much moot- and obsolete. It wouldn't matter one whit which particular platform and software you're running, at that point.Last thought- it is obvious that *if one imaged an infected hard drive, one would reinstall an infected copy of an OS + utilities + files.* My assumption is that it is still possible to build a non-contaminated fresh installation in the first place. Assuming one can still do that (and I figure you still can), then the question is whether imaging is truly enough 'security' in the present threat environment. And of course that question definitely "depends" on your platform and OS and such, obviously- but it *also* depends greatly on one's habits so far as internet use. So, getting back to the imaging question, my inquiry remains mostly unanswered- can any present known threat survive imaging if the image restored is truly clean- known clean, not infected? Can it hide in the boot sector and re-emerge? Can it burrow down into ordinary text or graphics files and then somehow self-execute? Without any operator intervention? If so, especially if it can hide in and strike from our data files, then we're all cooked.If you get rootkitted, and you wipe that OS and reinstall a fresh, clean image, you don't have that rootkit any more. Just so long as your image truly *is* clean! *And* if there is no way for the infection to then reinstall itself. Which goes to the heart of my question.
So, getting back to the imaging question, my inquiry remains mostly unanswered- can any present known threat survive imaging if the image restored is truly clean- known clean, not infected? Can it hide in the boot sector and re-emerge? Can it burrow down into ordinary text or graphics files and then somehow self-execute? Without any operator intervention?
Clutter, you might want to check this Microsoft page:http://support.microsoft.com/default.aspx?...kb;en-us;249191Don't let the title throw you, it's the forcing of the repair command itself that I am hoping you can do.
Click Run on the File menu in File Manager, and then type the following command:rundll32 setupwbv.dll,IE5Maintenance "C:\Program Files\Internet Explorer\Setup\SETUP.EXE" /g "C:\WINDOWS\IE Uninstall Log.Txt"
But some of the other info might come in handy for anyone using an older version of IE at some point.
1. Yes. (Remember a drive image is a snapshot of every bit. Imaging software does not remove bad bits).
More FUD!!! ****** near all malicious code is written in assemlby and always has been. You still need to have it execute in order to do any damage. That was the problem with ansi.sys clear back in the DOS era.
There are various web sites that describe restoring the default settings of IE5, such as this one which I found with this Google search. Dan
It depends... Who is to say if the 3rd party utility companies will will continue support for 98 and for how long?Your plan may work until 3rd party support dries up.As to files that auto execute- typically one must open the file
Talk about your FUD...So there is no such thing as Script Viruses? Like those written in VBS, PHP, INF, JS, HLP.VBS
should i keep an old os?i wanted to preserve my knowledge of dos & win 3.1, and the os's themselves, as i figured others would need help with those os's.so, years ago, i had ftp-downloaded probably 2/3 of the ms kb articles for dos before circumstances caused a long break in that project. after that break, i thought about it, win 95 had been out for a year, dos and win 3.11 was probably soon to become not only obsolete, but unused by the majority.i could've resumed the ftp kb project, kept the 8086 & 80286 machines. but it would have been for museum pieces, not for something exposed to real world threats. i abandoned the project and got rid of several old pc's and an old mac too.======if the only hardware i had ran only win 98 and couldn't run xp, or i couldn't get a copy of xp, then of course i'd run with what i had. (i had a pentium pro 200mhz w/128mb of ram running win 2k for the longest time.)======not everybody wishes to spend their money on current hardware & os's. circumstances may prevent others.
not everybody wishes to spend their money on current hardware & os's. circumstances may prevent others.
You need to be a member in order to leave a comment
Sign up for a new account in our community. It's easy!
Already have an account? Sign in here.