Jump to content

Aubs_UK

Member
  • Posts

    37
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United Kingdom

Everything posted by Aubs_UK

  1. phpBB Group announces the release of phpBB 2.0.22. This release addresses several bugfixes and some security issues. Language pack authors may note that one additional language variable had been added. As with all new releases we urge you to update as soon as possible. You can of course find this download available on our downloads page. As per usual four packages are available to simplify your update. Full Package Contains entire phpBB2 source and English language package Changed Files Only Contains only those files changed from previous versions of phpBB. Please note this archive contains changed files for each previous release Patch Files Contains patch compatible patches from the previous versions of phpBB. Code Changes Contains step-by-step instructions in MOD format for updating heavily MODified installs Select whichever package is most suitable for you. Please ensure you read the INSTALL and README documents in docs/ before proceeding with installation or updates!. It is important that you carry out both parts of the update - updating the files and running the database update script - for updates to be complete. What has changed in this release? The changelog (contained within this release) is as follows: [Fix] Check for user's existence prior to showing email form [Fix] New members of moderator groups should always become moderators (Bug #382) [Fix] Proper message when replying to non-existant topics (Bug #459) [Fix] Changed column type of search_array to store more ids (Bug #4058) [Fix] Fixed annoyance with font-size selector (Bug #4612) [Fix] Fix optimize line in database updater (Bug #6186) [sec] Check for the avatar upload directory reinforced [sec] Changes to the criteria for "bad" redirection targets - kellanved [sec] Fixed a non-persistent XSS issue in private messaging [sec] Fixing possible negative start parameter - SpiderZ. [sec] Added session checks to various forms - kellanved
  2. Notepad++ v3.4 Notepad++ is a free source code editor which supports several programming languages running under the MS Windows environment. The supported languages by Notepad++ are: C, C++, Java, C#, XML, HTML, PHP, Javascript, RC file, makefile, nfo, doxygen, ini file, batch file, ASP, VB/VBS, SQL, Objective-C, CSS, Pascal, Perl, Python, Lua, Unix Shell Script, Fortran, NSIS and Flash action script. Notepad++ main features include: Syntax Highlighting and Syntax Folding, User Language Define System, Regular Expression Search, WYSIWYG, Unicode support, Full Drag & Drop supported, Brace and Indent guideline Highlighting, 2 edits and synchronized view of the same document. Notepad++ is based on Scintilla edit component are written in C++ with pure win32 api and STL, is under the GPL Licence. Changes from Notepad++ v3.3 to Notepad++ v3.4 * Auto-detect the UTF-8 files without BOM * Add synchronized (vertical and/or horizontal) scrolling feature in multi-view mode * Add several keys (cut/copy/paste, undo/redo...) in the shortcut mapper * Opening a file with relative path from command line is supported * Fix the clear the "Style found token" problem (Find/Replace Dialog) in normal text mode * Fix UPPERCASE and lowercase bug under Windows 95/98 * Enhance HOME/END key in Wrap text mode * Add Always on top feature >> Links >> http://www.filepedia.com/desktop_software/...padplusplus.cfm http://www.filepedia.com/version_history/notepadplusplus.cfm
  3. Doesn't matter, it's back up again now. Prob a DNS glitch.
  4. Not sure which section this topic goes in... Has NatWest (www.natwest.com) been moved to another domain, or just down at the moment??
  5. Huh?? Where?? Were the posts removed?? Only see mine listed here.
  6. Product: MSN Messenger 7.5 Beta Version number: 7.5.0160 OS: Windows XP (only?) News Story: http://www.mess.be/
  7. The details of that download link are: 6.50 MB (6816904 bytes) Friday, June 24, 2005 23:57:16 Is this the 1.0.614 Build? It has the same MD5 checksum as it.
  8. Thanks for the suggestions. For everyone's attention it's a FAT32 file system, I should have mentioned that at the start - hence I was able to go into DOS mode and run a few progs there. In DOS, the file can be seen, but if u run deltree.exe on the folder, it does nothing and leaves the folder and file in tact. It's not a locked process issue - as that's not the error message, it's a problem reading off the disk. Personally I think it's a cross-linked file issue, although CHKDSK seems to find nothing. I guess a format on that drive would sort it, but that's a bit drastic. I've now moved my temporary internet files folder location to another area and seems to be working fine. The old location just has the single folder in it, with the @ file in it. Just wondered if the file itself was a potential spyware/malware issue? I've ran AVG, MSAS and Ad-aware SE 1.05 and everything is clean. Nothing appears to be abnormal as yet. Maybe just a glitch in the file system.
  9. Hi All, Bit of a strange one this, unless it's a known thing. I've tried searching forums and got nothing on it. Basically I've cleared all my Temporary Internet Files (IE6 SP1) except one file. This file doesn't not want to be moved. Windows says there is a file there, but if you try and delete it, the message says: "Error Deleting File or Folder Cannot delete file: Cannot read from the source file or disk." The file details from windows explorer give these details (see screenshot below): - that's the full filename with extensions viewable I've even gone into Safe Mode & DOS mode to try and remove it, but still get the same error message. Is this just a corrupt file that won't budge or something more evil?? Cheers.
  10. I did try it in IE. I can tell which browser I'm using you doughnut!
  11. 1. For the browser, I'm using Firefox 0.9.2. Seems to be very good so far
  12. Hi, I recommend you use RegLite (available at http://www.resplendence.com/reglite). Goto the same location in the registry, double-click on the AppInit_DLLs value, and it will tell you the location of the file. Next, try and locate the file in Windows Explorer (turning on 'View All Files' - hidden + system). If you can see it, virus scan it - using latest definitions. However, if you can't see the file try the steps on my first post at the top. This makes it visable in a Windows environment, and therefore scannable. Good Luck
  13. Want to be the best FIFA 2004 player in the UK?? Take a look at: http://www.fifa-mra.com/SFTLA/2004002/index.asp
  14. They must spend hours thinking up those program names huh?
  15. Hi, Just to eliminate a few things, run a full virus scan and spyware check.
  16. If people could only spend 5-10 mins going through the help, esp. when it's a new program, to see what functionality it has . I know that's asking a lot!
  17. I just use Lavasoft Ad-aware 6.181. Seems to do the job Looking forward to the new version, Ad-aware SE in August
  18. Seems to be picked up now by Symantec, with updated and easier removal instructions: Classed as = backdoor.agent http://securityresponse.symantec.com/avcen...or.agent.b.html n.b. For those that don't know, CWS stand for CoolWebSearch (very nasty spyware!)
  19. I use Norton Antivirus (NAV) 2003. I tried out NAV 2004, and was shocked at the system processes it uses . Also seen the many unhappy people, from reviews, complaining about it's instability. It uses built spyware detection, but I'd rather use the very satisfactory NAV 2003 version and Ad-aware together .
  20. Errr, I done what you said. When I repeated steps 1 & 2 after creating the folder, the source page opened up in notepad as it should.
  21. To Remove “CWS” Hijacker Adware in Windows 2000 SP4 with Internet Explorer 6.0 SP1 (probably works in NT and XP with some directory name changes only) Programs Needed: 1. Reglite.exe << more powerful than regedit.exe and regedt32.exe (available at “ http://www.resplendence.com/reglite ”) 2. Microsoft Recovery Console (an option available on your Windows CD or root drive) run “X:\i386\winnt32.exe /cmdcons” where “X” is either CD drive letter or is “C” for your root. 3. Ad-aware.exe (available at “http://www.lavasoft.de ") or HiJackThis.exe (available at http://download.com.com/3000-2144-10227352.html ”) Method: There are 2 application extensions (.dll) files that need to be deleted. One is super-hidden, one is detected with the spyware detector progs above. You may find that you just need the super-hidden file to be removed if you've previously cleaned up very recently. Just a quick note about the super-hidden DLL. Why is it super-hidden? - Due to the location of the registry entry it's in, makes it unseen in the Windows environment. Follow the steps below, and you'll see why... Step 1: With “Reglite.exe” find name of hidden file: Double Click on “AppInit_DLLs” located in “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\” The “value” window reveals the hidden file name, (mine was “logao.dll”, yours may be different!). In this example let’s call it “hidden.dll”. n.b. If you try and use regedit.exe or regedt32.exe, and goto the same location, you will not find any value for AppInit_DLLs. Step 2: Rename the hidden file: Close Windows and reboot using “Windows Recovery Console” (this is in your Start-up Options on boot up, e.g. "Microsoft Windows 2000 Professional" /fastdetect "Microsoft Windows 2000 Recovery Console" /cmdcons <<< select this one) Go to “c:\Windows\system32\” and do two things. 1st, change the file from read only by typing “attrib –r hidden.dll” 2nd, rename it by typing “rename hidden.dll nasty.dll” (and remember that “hidden.dll” is for this explanation only use the name you found earlier) Now type “exit” and reboot normally to Windows. Step 3: Edit registry to remove hidden file link: Run “reglite.exe” again. Double Click on “AppInit_DLLs” located in “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\” Delete the file in “value” window (the “size” window changes also automatically). “Apply” changes and exit “reglite.exe” Step 4: Scan registry to remove the second file (if there): Run “Ad-aware or HiJackThis” and scan the registry. Check the boxes to remove the following entries: “R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\System32\jheckb.dll/sp.html (obfuscated) R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\System32\jheckb.dll/sp.html (obfuscated) R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\System32\jheckb.dll/sp.html (obfuscated) R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\System32\jheckb.dll/sp.html (obfuscated) R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\System32\jheckb.dll/sp.html (obfuscated) R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\System32\jheckb.dll/sp.html (obfuscated) R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank” (as you can see my second .dll was called “jheckb.dll” yours may be different) For this example let’s call it “obvious.dll”. Finally delete the two .dlls (“hidden.dll” and “obvious.dll”) You should be running again. n.b. You may find your antivirus program picks up the hidden.dll as a download trojan and it may remove it immediately
  22. They still are good! The record sales proves that, and will still do in years to come.
  23. Keep upto date with those REF files guys.... Latest REF files from Lavasoftusa.com (for build 0181 only)
×
×
  • Create New...