aule // User Search

aule // User Search

1  |  

Re: Auto Build Program Prohibition

Jul 21, 1998, 4:53pm
If any limit is imposed retro-actively, then I would request that all
the property in AW be deleted (Yes, a comet strike). I give just one
example of why: LittleBull. Just one section of his southern forest
covers over 1.5km² that's approximately 22,952 objects (just to cover
the area mind you, not the trees, lakes, bridges, buildings, etc. that
are also there). This is not the only location that LB built, nor is it
even all the area built in and around that forest by LB. Which
properties of his go and which stay? AWHS and friends worked hard to
"save" such properties from the NAC to tourist conversion once already,
must it essentially be done again? Where does one draw this arbitrary
line of 50,000 objects?

[View Quote]

Telegram Rediction To Email Address

Jul 22, 1998, 3:53pm
Now this is not only a great idea but would make it possible to remove
the telegram traffic from the server!

[View Quote]

Security Hole

Jul 29, 1998, 12:15pm
Using Netscape or Outlook for your email? Better have a look at this:

<http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,3441,2123238,00.html>

Security Hole

Jul 29, 1998, 8:26pm
[View Quote] Close but wrong, you're thinking of the privilege elevation attack on
NT. My post is regarding the email clients mentioned further down the
same article. See also <http://www.slaughterhouse.com/pick_072998.html>
for further information on the subject (this article deals with Outlook
only).

Security Hole

Jul 30, 1998, 2:54pm
Correct, if one is using Outlook one has to work at it to allow this to
happen, should a "malicious" email be received in the first place. For
Netscape users, the problem is easier to trigger.

Quote
For Netscape Mail users, malicious code can be launched by simply
highlighting the message -- without launching the attachment or opening
the message -- and then accessing the File menu, Cooper said.
End Quote

Right now it takes a bit of know how to produce a "malicious" message.
However, like Winnuke, how long before a GUI "Nuke your neighbor"
appears allowing anyone to create them in a few short steps?

[View Quote]

Security Hole

Jul 30, 1998, 9:37pm
[View Quote]
Just to help further the paranoia (note, check your harddrive for CIH
using the link at the bottom).

http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,3441,2123156,00.html

http://www.zdnet.com/zdnn/stories/zdnn_smgraph_display/0,3441,2122748,00.html

http://www.antivirus.com/vinfo/alerts.htm

http://housecall.antivirus.com/

Security Hole

Jul 31, 1998, 5:53pm
CIH v1.2- April 26th
CIH v1.3- June 26th
CIH v1.4- 26th of every month

[View Quote]

Disk usage limit

Aug 3, 1998, 4:06pm
It is, just set it to no limit.

[View Quote]

Disk usage limit

Aug 3, 1998, 6:25pm
**Snicker**, I use unlimited and a 15 day limit...never above 75MB and
there is quite a bit of world hoping done from this machine.

[View Quote]

Disk usage limit

Aug 3, 1998, 9:33pm
I am obviously forgetting the difference between connections here (modem
vs T1). With a modem you are much better off with a fixed limit and no
expire...my mistake.

[View Quote]

1  |  
Awportals.com is a privately held community resource website dedicated to Active Worlds.
Copyright (c) Mark Randall 2006 - 2024. All Rights Reserved.
Awportals.com   ·   ProLibraries Live   ·   Twitter   ·   LinkedIn