Tuesday, July 03, 2007

Garage Band Instrument Library

[Error Message]
Instrument Library is Invalid!
The Instrument Library is invalid. GarageBand expects a valid Instrument Library folder in /Library/Application Support/GarageBand.
Please choose a valid Instrument Library folder or quit and re-install GarageBand.

Copy the existing Library Folder and all contents. This Folder size is around
1.52GB. Its located inside: Library,Applications Support, GarageBand,Instrument Library: 3 Files (Plugin Settings, Sampler and Track Settings)

If you are installing Garageband from an iLife disk, open up the .dmg or .pkg only for garageband and copy the previously mentioned files.
Paste these files into the proper folder. (see above)
Restart and click on Instrument Library after clicking the Garageband icon and starting the program. This process has worked on G4s and G5s. Good Luck

Sophos Reveals Top 10 Web Threats

July 02, 2007

Sophos reveals top ten Web threats for June 2007.

Sophos has revealed the most prevalent malware threats causing problems for computer users around the world during June 2007. The figures show a further sharp rise in Web−based threats. Sophos uncovered an average of 29,700 new infected Web pages every day −− around 80 percent of which were located on hacked legitimate sites. The top ten list of Web−based malware threats in June 2007 reads as follows:
1) Mal/Iframe;

2) Mal/ObfJS;

3) Troj/Fujif;

4) Troj/Decdec;

5) VBS/Redlof;

6) Troj/Psyme;

7) Mal/Packer;

8) Troj/Ifradv;

9) VBS/Haptime;

10) Mal/Zlob.

Iframe, which works by injecting malicious code onto Web pages, has again topped the chart, accounting for nearly two thirds of the world's infected Web pages. Earlier this month, an Iframe attack on multiple Italian Websites occurred, making headlines around the world.
Source: http://www.sophos.com/pressoffice/news/articles/2007/07/toptenjun07.html

DHS Host Closed-Door Forum????Hmmmm

June 29, 2007

Department of Homeland Security to host closed−door security forum.

The Department of Homeland Security will host an invite−only conference two months from now that will bring together security experts from law enforcement, Internet service providers, and the technology industry. The Internet Security Operations and Intelligence (ISOI) workshop will be held on August 27 and 28 at the Academy for Educational Development in Washington, DC. It is expected to draw about 240 participants who will engage in a frank discussion of the latest trends in cybercrime, said Gadi Evron, a security evangelist with Beyond Security who is one of the event's planners.
Source: http://news.yahoo.com/s/infoworld/20070629/tc_infoworld/89786

iPhone frenzy + Hackers = Apple Security Problems

June 21,2007

iPhone frenzy will tempt hackers to break Apple's security.

With so many people anxiously holding their breath while simultaneously counting their pennies till Apple's iPhone ships this week, some researchers −− and probably many IT managers −− are wondering how secure this latest smart phone is going to be. Well, according to IBM's security division, Internet Security Systems, the iPhone will have one thing going for it, at the same time it has one thing going against it, making for what should be an interesting product to track. The plus side is that it should take a pretty sophisticated hacker to break into the phone's system, but the negative is that all the frenzy that has been building up around the iPhone's release means many hackers will be inspired to try.
Source: http://www.informationweek.com/security/showArticle.jhtml

Porn sites serve up Mpack attacks

June 22, 2007

Porn sites serve up Mpack attacks.

Several hundred pornography sites are surprising unwitting users with a smorgasbord of exploits via Mpack, the already notorious hacker tool kit that launched massive attacks earlier last week from a network of more than 10,000 compromised domains. Trend Micro Inc. has spotted nearly 200 porn domains −− most dealing in incestuous content −− that have either been hacked or are purposefully redirecting users to servers hosting Mpack, a professional, Russian−made collection of exploits that comes complete with a management console. Even though there are far fewer porn sites in this newly discovered infection chain than in last Monday's "Italian Job" attack −− called that because most of the 10,000+ hijacked sites were legitimate Italian domains −− they've managed to infect twice as many end users' PCs, said Trend Micro, in a posting to its malware blog. "Right now, we are not sure whether the porn sites are compromised to host the IFRAMES, are created to do so or are being paid to host the IFRAMES," acknowledged Trend Micro. The attack probably began June 17, the company said.
Trend Micro Malware Blog: http://blog.trendmicro.com/pornography−is−bad−for−you21/
Source: http://www.computerworld.com/

RealPlayer, Helix Player vulnerable to attack

June 28, 2007

RealPlayer, Helix Player vulnerable to attack.

Users are being advised to upgrade to newer versions of the RealPlayer and Helix Player multimedia products because of a critical security flaw. The flaw could allow an attacker to gain control over a user's PC using a buffer overflow vulnerability, a memory problem that can allow unauthorized code to run on a machine, according to iDefense Inc. The vulnerability was discovered last October but publicly disclosed Tuesday, June 26, on iDefense's Website. Affected versions of the software include the 10.5 "gold" RealPlayer and any 1.x version of Helix Player, according to the French Security Incident Response Team (FrSIRT). iDefense advisory: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=547
Source: http://www.infoworld.com/article/07/06/28/RealPlayer−Helix−Player−vulnerable_1.html