Friday, April 28, 2006

Browser/E-mail Exploits and Vulnerabilities

Both Web Browsers and E-mail Programs monitor constant connections to the Internet, typically on ports 80 and 25 respectively. And both firewalls and computer information security systems often grant them trusted zone status. This is due to the nature of their port monitoring connections and their degree of commonality on most computers. As such, a Web Browser or E-mail Program exploitable vulnerability can have serious or dire consequences for the security of a computer system due to their implied trusted state, and their constant connection through port monitoring to the Internet. Since both of these types of programs are constantly uploading and downloading packet streams from the Internet, rogue code can be quite easily transmitted and disseminated through an exploitable hole or vulnerability leaving the entire system at risk.

Wednesday, April 26, 2006

Operating System Exploits and Vulnerabilities

An Operating System is a set of programs that launch at boot-up to control what loads on start-up. These core system files control everything from mounting a drive to accepting input from the mouse and keyboard. An exploitable vulnerability in one of these low-level system processes can be extremely critical because they reside deep within the core of the trusted computer model and can easily bypass anything installed later on in the boot-order. If you can remote code execute an Operating System exploitable vulnerability in a low-level core system file, you can bypass the outer security shell and strike directly at the heart of the computer.

Tuesday, April 25, 2006

Software/Hardware Exploits and Vulnerabilities

Software is any computer program designed and coded to optimize or accessorize the core Operating System and kernel by adding functions not originally foreseen or intended. It may range from trivial gimmicks to distracting entertainment to full-fledged mission critical system security components.

Since both Computer Software and Hardware may have direct access to system memory or file directories depending on their purpose and function, and since either the Hardware or Software may have a direct connection to the Internet through port monitoring. A Computer Hardware or Software exploitable vulnerability can have serious consequences to the security of a computer system.

Monday, April 17, 2006

Alphabetical Exploits and Vulnerabilities

In order to find specific information on any operating system, browser or e-mail, or software or hardware exploit or vulnerability previously analyzed by you could simply click on the first letter of the product’s name or the first letter of the product’s manufacturer for the exploit or vulnerability on our Alphabetical Exploits List. Or in order to browse current vulnerabilities and exploits, you could simply visit the A to I Exploits List, the J to R Exploits List, or the S to * Exploits List.

Tuesday, April 04, 2006

Sequential Numerical Chronological

If you happen to still be awake later on tonight, look at your watch around 1 am. Specifically, shortly after 1:02 am. At that time, it will be 01:02:03 on 04/05/06! This hasn't happened since 1906, and won't happen again until 2106. Then, when you are done doing that, get back to bed, it's the middle of the night, and only crazy computer writers like myself should still be up!