TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Rich
date: 2006-04-18 16:59:28
subject: Re: HP software conflicts

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0284_01C66309.7427F8F0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   It has nothing to do with Trojans and there is nothing to be fixed in =
Explorer so take off your tin foil hat.  The problem described by the =
support article is that the HP shell extension behaves badly.  You can =
uninstall the HP component or you can get past the issue using the =
instructions described here.

   You should also some demonstrating you are an idiot and a whiner.  =
You would look less like an idiot if you read the articles about which =
you are commenting.

Rich

  "Geo"  wrote in message news:444532ec$1{at}w3....


  Instead of fixing the exploit (if you ask me the web client service =
should
  just be removed as a bad idea in an untrusted environment), they added =
yet
  another program, this one scans shell extensions and it has a =
whitelist that
  is stored in the registry so simply adding a registry entry will make =
this
  new security shell extension scanner skip scanning your trojan shell
  extension? I wonder if it works based simply on the file name so using =
an
  existing whitelisted name exposes you again.

  Is this "fix", and I use that term loosly,  from Microsoft or Cheech =
and
  Chong?

  Geo.


  "Rich Gauszka"  wrote in message =
news:4444ee0a$1{at}w3....
  >
  > http://support.microsoft.com/default.aspx/kb/918165?
  >
  >


------=_NextPart_000_0284_01C66309.7427F8F0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   It has
nothing to do with =
Trojans and=20
there is nothing to be fixed in Explorer so take off your tin foil =
hat. =20
The problem described by the support article is that the HP shell = extension=20
behaves badly.  You can uninstall the HP component or you can get
= past the=20
issue using the instructions described here.
 
   You
should also some =
demonstrating you=20
are an idiot and a whiner.  You would look less like an idiot if =
you read=20
the articles about which you are commenting.
 
Rich
 

  "Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net>
wrote=20
  in message news:444532ec$1{at}w3....Inste=
ad of=20
  fixing the exploit (if you ask me the web client service =
shouldjust be=20
  removed as a bad idea in an untrusted environment), they added =
yetanother=20
  program, this one scans shell extensions and it has a whitelist =
thatis=20
  stored in the registry so simply adding a registry entry will make =
thisnew=20
  security shell extension scanner skip scanning your trojan =
shellextension?=20
  I wonder if it works based simply on the file name so using =
anexisting=20
  whitelisted name exposes you again.Is this
"fix", and I use =
that term=20
  loosly,  from Microsoft or Cheech=20
 
andChong?Geo."Rich
Gauszka" <gauszka{at}hotmail.com>">mailto:gauszka{at}hotmail.com">gauszka{at}hotmail.com>
wrote =
in message=20
  news:4444ee0a$1{at}w3....>>
=
http://suppo" target="new">http://suppo=">http://support.microsoft.com/default.aspx/kb/918165">http://suppo=
rt.microsoft.com/default.aspx/kb/918165?>>

------=_NextPart_000_0284_01C66309.7427F8F0--

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.