Forgot your password?
typodupeerror

Comment: Check before you bash (Score 1) 95

by magnus_1986 (#36447220) Attached to: Google Should Be Logging In To Facebook
Has anyone ever gone to the privacy settings tab and used the "what my profile looks like to X" feature? The author of this piece as well as everyone here should do that. No need to violate TOS etc etc etc. Just go to that page and it shows how your profile is visible to Friends of Friends, etc. You can even type in the name of a person and see how it looks like to them.
Bug

Warhammer Online Users Repeatedly Overbilled 216

Posted by Soulskill
from the greenbacks-for-greenskins dept.
TheSpoom writes "A screw-up in EA's Warhammer Online billing system has resulted in many players being charged upwards of 22 times for a one-month subscription, filling bank accounts with overdraft fees and the Warhammer forums with very angry players, who are discussing the issue quite vocally. EA has said that refunds are in progress and that '[they] anticipate that once the charges have been reversed, any fees that have been incurred should be refunded as well.' They haven't specifically promised to refund overdraft charges, only to ask customers' banks to refund them once the actual charges are refunded. They seem to be assuming banks will have no problem with this."
Security

Oops! Missed One Fix — Windows Attacks Under Way 292

Posted by timothy
from the don't-blame-microsoft-alone dept.
CWmike writes "Microsoft says attackers are now exploiting a critical Windows bug that it didn't get around to fixing in its biggest batch of security patches in more than five years, issued yesterday. Microsoft said that 'limited and targeted' attacks are in progress by hackers exploiting an unpatched vulnerability in the WordPad Text Converter, a tool included with all versions of Windows. If Microsoft patches the WordPad problem on its monthly schedule, the first opportunity for fixing the flaw would be Jan. 9, 2009." Update: 12/10 22:28 GMT by T : OK, there might have been more than one: reader Simon (S2) writes "There is an even more serious flaw ... From SANS: 'There is a 0-day exploit for Internet Explorer circulating in the wild. At this point in time it does not appear to be wildly used, but as the code is publicly available we can expect that this will happen very soon. This is a brand new exploit that is *not* patched with MS08-073 that was released yesterday. I can confirm that the exploit works in a fully patched Windows XP machine. The exploit is a typical heap overflow that appears to be exploiting something in the XML parser.'"

We don't know one millionth of one percent about anything.

Working...