heh
Ot: lunarvalleys
Na: 13-03-2012@9:32 GMT+2
Otsenka: 1/Neutralenheh
za tiia pari mozheha da sponsorirat suzdavaneto na bulgarska distributsiia s vklyucheno vsiko neobhodimo
debili
[Otgovori na tozi komentar]
Pulen t@shak
Ot: Steve-O <a__dot__zarkov__at__gmail__dot__com>
Na: 16-03-2012@11:38 GMT+2
Otsenka: 1/NeutralenProsto porednata prostotiia, niamam dumi, no haide da go ostavim tova na strana, no kakvo beshe tova izkazvane:
"Vie chuvali li ste durzhavna administratsiia koiato ne e na Windows?"
Aloooo chakai malko be! Germaniia, Ispaniia, Litva(za tiah ne sum siguren), Frantsiia, da ne govorim za Rusiia kudeto po-golemite strukturi sa iztsialo pod Linuks.
Abe idva mu na chovek da pie edna studena bira, na bez tova priiatnoto vreme.
Redaktiran na: 16-03-2012@11:39
[Otgovori na tozi komentar]
Kum: Pulen t@shak
Ot: Georgi <admin __@__ pernik__dot__org>
Na: 16-03-2012@16:07 GMT+2
Otsenka: 1/NeutralenNe samo... v SASHT, Braziliia, Rusiia, Kitai, Frantsiia, chast ot Germaniia i t.n. durzhavnata administratsiia e zadulzhena sus zakoni, da polzva samo open sors softuer!
[Otgovori na tozi komentar]
Predstaviam si !!!
Ot: KL <act (a) act __tochka__ com>
Na: 13-03-2012@9:57 GMT+2
Otsenka: 1/NeutralenPredstaviam si kak shte raboti vsichko !!! Vizhdal sum s ochite si BG Administrativna sgrada s 60 komp. v neia i s platenata versiia na Microsoft Security Essentials i kompyutri pulni s virusi !!!
[Otgovori na tozi komentar]
Kum: Predstaviam si !!!
Ot: anthany
Na: 13-03-2012@12:08 GMT+2
Otsenka: 1/NeutralenSumata e 150 000 000 lv.
Novinata e ot saita na MS -
http://www.government.bg/cgi-bin/e-
cms/vis/vis.pl?
s=001&p=0212&n=1715&g=&vis=000168
Niamam dumi!
Redaktiran na: 13-03-2012@12:41
[Otgovori na tozi komentar]
60 miliona ot Bratko za Bratko
Ot: trankata
Na: 13-03-2012@12:15 GMT+2
Otsenka: 1/Neutralen
http://bivol.bg/masoni-microsoft.html
[Otgovori na tozi komentar]
???!!!
Ot: ggin
Na: 13-03-2012@12:24 GMT+2
Otsenka: 1/NeutralenI otnovo dokazahme che sme si e .. mamata.Nalivat se edni greshni pari za neshto koeto go ima hem s otvoren kod hem i po-dobro
ne moga da gi razbera
[Otgovori na tozi komentar]
Kum: ???!!!
Ot: lunarvalleys
Na: 13-03-2012@13:07 GMT+2
Otsenka: 1/Neutralenkakvo ne mozhesh da razberesh?!
niama da ima komisionna i niama da mogat "nashi hora" da se oblazhat
[Otgovori na tozi komentar]
Kum: ???!!!
Ot: vlady
Na: 13-03-2012@14:10 GMT+2
Otsenka: 1/NeutralenMozhe da se izgotvi oferta s vnedriavane na svoboden softuer, migratsiia na sushtestvuvashtiia spetsializiran takuv, obuchenie i poddruzhka 24h7 i da se dade komisionna.
[Otgovori na tozi komentar]
Kude sa sega protestirashtite?
Ot: toni
Na: 13-03-2012@16:05 GMT+2
Otsenka: 1/NeutralenKude sa sega protestirashtite?
Kogato stavashe vupros za ASTA, se digna goliam
voi. Sega, kogato se davat 60 miliona (az puk za
tolkoz chetoh) za oshte ne sushtestvuvashta OS i pri
polozhenie, che ima oshte neusvoeni litsenzi za
Uindous 7, i pri polozhenie, che v neta izteche
informatsiia za predvaritelno spechelen turg za
vuprosnata nesushtestvuvashta OS ot hora, svurzani
sus zakonnata mafiia - "masoni"?
[Otgovori na tozi komentar]
Kum: Kude sa sega protestirashtite?
Ot: big-marvel <gurzov __@__ mail__dot__bg>
Na: 13-03-2012@22:21 GMT+2
Otsenka: 1/Neutralen ...eeee ne prosto sega triabva da se vklyuchat anonimnite, to biva biva no tiahnoto se ne trae.Mafiotski um mafiotska durzhava..
[Otgovori na tozi komentar]
Nie voobshte ne izpolzvame deputati te si
Ot: bobo
Na: 13-03-2012@20:11 GMT+2
Otsenka: 2/Informirasht
Ako poznavate deputata, za koito ste glasuvali mozhe da mu kazhete, che ne ste suglasni s razdavaneto na tiia "tsifri"!
ako ne go poznavate za kuv chep glasuvhate za nego!
[Otgovori na tozi komentar]
Kum: Kum: Kude sa sega protestirashtite?
Ot: zetxx <opensuser< at >gmail__dot__com>
Na: 14-03-2012@2:35 GMT+2
Otsenka: 1/Neutralenddos? to nie sme si anonimnite
[Otgovori na tozi komentar]
50 miliona za Microsoft bez obshtestvena por
Ot: trankata
Na: 14-03-2012@13:56 GMT+2
Otsenka: 1/Neutralen50 miliona za Microsoft bez obshtestvena poruchka
http://www.bivol.bg/microsoft50m.html
[Otgovori na tozi komentar]
Kum: 50 miliona za Microsoft bez obshtestvena por
Ot: .
Na: 28-03-2012@20:16 GMT+2
Otsenka: 1/Neutralenmaikrosoft veche e putnik ... horata veche dori
smiatat za bezperespektivno igri da pishat za
windows :) a nashata nekompetentna administratsiia
naliva pari zashoto gi ima v izlishuk
http://www.dnevnik.bg/tehnologii/2012/0...
4375_novata_versiia_na_angry_birds_podminava_no
kia_niama_da/
[Otgovori na tozi komentar]
Prosta smetka
Ot: DF <ererwgf (a) abv< dot >bg>
Na: 14-03-2012@18:20 GMT+2
Otsenka: 1/NeutralenCHetoh, che triabvalo da platiat za UPDEITITE na
blizo 100000 mashini za tri godini. Ne znaia
kolko ot tiah sa desktopi i kolko sa survuri.
Suglasen sum, che updeitite sa vazhni.
No, kakto pisah drugade, poddruzhkata na
Ubuntu vurhu 100000 desktop mashini za 3
godini struva mezhdu 31,5 i 49,5 miliona
dolara. TSenata vklyuchva dosta poveche ot
operatsionna sistema.
No, dori i da ne bude platen i 1 tsent,
softuerut SHTE bude zakonno izpolzvan i SHTE mozhe
da se obnoviava.
[Otgovori na tozi komentar]
Kum: Prosta smetka
Ot: vlady
Na: 15-03-2012@4:55 GMT+2
Otsenka: 1/NeutralenVse pak ne mozhe da se ochakva sluzhitelite v administratsiiata sami da si obnoviavat mashinite, za tova shte triabvat kvalifitsirani administratori ili dogovor s vunshna firma, niama kak da e bezplatno. Ima realen risk kvalifitsiran administrator da poiska po-visoka zaplata ot chinovnitsite, dori i ot d-r. Borisov koeto e absolyutno nedopustimo.
[Otgovori na tozi komentar]
Kum: Kum: Prosta smetka
Ot: ico
Na: 15-03-2012@7:31 GMT+2
Otsenka: 1/NeutralenTo i v momenta ima "administratori" iz raznite
durzhavni institutsii, koito se vodiat
kvalifitsirani restartirovachi na kompyutri s
windows... Taka ili inache ima takava dluzhnost,
obuchenie triabva.
[Otgovori na tozi komentar]
Kum: Kum: Prosta smetka
Ot: DF
Na: 15-03-2012@13:10 GMT+2
Otsenka: 1/NeutralenV DA, ili izobshto v koiato i da e durzhavna ili
obshtinska institutsiia zaplata ne se ISKA, a se
DAVA. V smisul, che ima tablitsi - na dluzhnost
X suotvetstva zaplata Y. Ako shtesh.
NO ... kandidati VINAGI ima. V TSB Plovdiv
tozi dekemvri imashe tri svobodni mesta. Da ne
razkazvam kolko unizitelni biaha (pone)
srokovete. Dokumenti podadoha 90 choveka. Do
posledniia tur stignaha i se iaviha okolo 49-
50. Viarno, ne za IT dluzhnosti, no i za tiah shte
se nameriat pone 2-3 kandidati za miasto.
Nekadurnitsi? Ne znaia, no SHTE gi IMA.
[Otgovori na tozi komentar]
Greshni pari
Ot: Lyubomir Angelov <glubox[ tochka ]ko __@__ gmail[ tochka ]com>
Na: 16-03-2012@22:06 GMT+2
Otsenka: 1/NeutralenSamo se davat greshni pari na greshnite hora,
ima malka analogiia s t.n. lord Samursbi li
kakuv beshe, uzh iabulki i krushi ama si
plashtash kato pop, taka i nashte balami
plashtat uzh za skupi krushi ama im prbutvat
star ushav, no koi da razbere kato tuk u nas
osven gnili iabulki nishto po hubavo ne sme
vizhdali.
Nai golemiia nomer na Diavola beshe da ubedi
horata che ne sushtestvuva, a nai golemiia udar
na M$ beshe da ubedi Durzhavite da plashtat
za neshto koeto ne samo ne sushtestvuva no i
ne sa videli i niama realno da vidiat.
[Otgovori na tozi komentar]
A eto vi edna M$ novina - priasna priasna
Ot: Embar
Na: 17-03-2012@18:27 GMT+2
Otsenka: 1/Neutralenhe Threat Analysis and Response Team has issued an UPDATED Security Alert:
HP-1582 : Vulnerabilities in Microsoft Remote Desktop Could Allow Remote Code Execution (MS12-020 / 2671387)
Please distribute this alert throughout your organizations as appropriate.
Additional technical information about this alert is available at the link above.
ALERT INFORMATION
HP ID:
HP-1582
Title:
Vulnerabilities in Microsoft Remote Desktop Could Allow Remote Code Execution (MS12-020 / 2671387)
Date Published:
March 13, 2012
Date of Last Revision:
March 16, 2012
External Threat Assessment:
CRITICAL - Action Required by 2012-03-20
Internal Threat Assessment:
CRITICAL - Action Required by 2012-03-20
Client Threat Assessment:
CRITICAL - Action Required by 2012-03-20
Threat Supersedes:
This threat supersedes the following threats:
HP-1377 (Vulnerability in Microsoft Remote Desktop Protocol Could Allow Denial of Service (MS11-065 / 2570222) )
*
Target Audience:
Administrators who manage any systems running any of the following:
Windows XP Service Pack 3
* Windows XP Professional x64 Edition Service Pack 2
* Windows Server 2003 Service Pack 2
* Windows Server 2003 x64 Edition Service Pack 2
* Windows Server 2003 with SP2 for Itanium-based Systems
* Windows Vista Service Pack 2
* Windows Vista x64 Edition Service Pack 2
* Windows Server 2008 for 32-bit Systems Service Pack 2
* Windows Server 2008 for x64-based Systems Service Pack 2
* Windows Server 2008 for Itanium-based Systems Service Pack 2
* Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
* Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
* Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
* Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
*
For information and bulletins to service customer-facing (trade) systems, please refer to the EDS Threat and Vulnerability Management Service ( http://esis.corp.hp.com/ ).
OPERATING SYSTEMS AFFECTED
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows XP
See the Online Alert for details.
PROBLEM SUMMARY
There are two vulnerabilities in the Remote Desktop Protocol. The more severe of these vulnerabilities could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.
ADDITIONAL ISSUES
Remote Attack Possible:
Yes
Administrative Privilege Gained:
No
Attack Scripts Available:
No
CORRECTIVE ACTION
If your system/device is managed per a service in which automated patches are deployed or distributed (i.e. PCCOE/AIM, SEPS, log-in scripts, etc.), then updates should be handled through your normal upgrade process when available. Note that it is your responsibility to ensure that your systems are kept up to date. Please refer to http://threat.itsecurity.hp.com/patchin... for instructions.
If you manage your own machines, apply the appropriate fix from Microsoft via Windows Update ( http://update.microsoft.com/ ) or from:
· Windows XP Service Pack 3
http://www.microsoft.com/downloads/deta...
· Windows XP Professional x64 Edition Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Server 2003 Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Server 2003 x64 Edition Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Server 2003 with SP2 for Itanium-based Systems
http://www.microsoft.com/downloads/deta...
· Windows Vista Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Vista x64 Edition Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Server 2008 for 32-bit Systems Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Server 2008 for x64-based Systems Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows Server 2008 for Itanium-based Systems Service Pack 2
http://www.microsoft.com/downloads/deta...
· Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
http://www.microsoft.com/downloads/deta... (KB2621440)
http://www.microsoft.com/downloads/deta... (KB2667402)
· Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
http://www.microsoft.com/downloads/deta... (KB2621440)
http://www.microsoft.com/downloads/deta... (KB2667402)
· Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
http://www.microsoft.com/downloads/deta... (KB2621440)
http://www.microsoft.com/downloads/deta... (KB2667402)
· Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
http://www.microsoft.com/downloads/deta... (KB2621440)
http://www.microsoft.com/downloads/deta... (KB2667402)
REFERENCES
Microsoft Security Bulletin ID:
MS12-020
Microsoft KnowledgeBase ("Q") number:
2671387
CVE Number:
CVE-2012-0002, CVE-2012-0152
Bugtraq ID:
52353, 52354
REVISIONS
2012-03-16 (v.2.0)
Upgraded Risk Level due to changes in the threat landscape.
2012-03-13 (v.1.0)
Initial Publication
CONTACT
Hewlett Packard IT Security
Threat Analysis and Response Team
it-threat@hp.com
http://threat.itsecurity.hp.com
[Otgovori na tozi komentar]
ot administratsiiata
Ot: Krasen <makkasi< at >abv[ tochka ]bg>
Na: 12-05-2012@18:33 GMT+2
Otsenka: 1/NeutralenAbe bachkam v administratsiiata ... sram ne sram , da vi kazha, che polozhenieto e mnogo zle.
1.Vie i sami go znaete de, no da mu smeniash 8 godishnoto XP na edin durzhaven sluzhitel e kato da mu dadesh tehnologiia s 30 godini napred. Nai-umnite i erodirani ne znaian kak se bachka s kompyutur do dobra stepen, kato kum 90% niamat i sredno nivo.
2.Na kakvi kompyutri shte se slaga tazi novozakupena shitnia sled kato tam sa oshte na pentium 4 s 512 ram. Ima i dvupotopna tehnika, koiato oshte se polzva. Kompyutri koito zarezhdat Windows XP po 6 minuti. Kazhete mi kak mozhe da sa tolkova prosti teia hora i ne moga i ne moga da razbera.
[Otgovori na tozi komentar]