Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - Zhen-Xjell

Pages: [1]
1
Security - General / New Website: Computer Cops
« on: March 06, 2002, 11:51:10 PM »
http://www.computercops.biz/

I've been working on it for a couple weeks now, and feel it is ready to go live.  There are a couple GUI enhancements which are "in the bin" that will be taking place over the next month or two.  Most important is a new logo to replace the current site logo.

But, the site I feel is ready to go.  Otherwise, I would fall into the trap of.. "but there is still more to do".

Thanks all.


3
Community Discussions (Non-Forum Related) / Been Busy
« on: February 10, 2002, 03:29:31 AM »
This week I've been really tied up, but I'm back.  I just finished installing a new BBS for wilders.org over at http://www.wilders.org/forums.htm .


4
Community Discussions (Non-Forum Related) / Microsoft Says RTFM!!!
« on: February 06, 2002, 11:05:03 PM »
Live at the MS site:

http://www.microsoft.com[email protected]/nyheter/feb01/Q209354%20-%20HOWTO.htm

(clearly the URL shows someone is illegally making use of M$'s site.. oh how nice for M$!!)


5
Community Discussions (Non-Forum Related) / NIST prepping security guides
« on: January 29, 2002, 03:45:46 AM »
<a href="http://www.fcw.com/fcw/articles/2002/0128/web-nist-01-28-02.asp">FCW Article:</a> <I>The National Institute of Standards and Technology's security team will be releasing more than 30 guides over the coming year to help agencies with many crucial technical and policy security concerns.</i>


6
http://news.zdnet.co.uk/story/0,,t269-s2103029,00.html

"Phil Zimmermann, the creator of the Pretty Good Privacy encryption tool,
says that widespread surveillance is leading us into an Orwellian future."

Pretty interesting insight into Phil's mind.


7
Community Discussions (Non-Forum Related) / One OS to rule them All
« on: January 23, 2002, 03:45:15 AM »
Recently one of my friends, a computer wizard, paid me a visit. As we were
talking I mentioned that I had recently installed Windows XP on my PC. I
told him how happy I was with this operating system and showed him the
Windows XP CD. To my surprise he threw it into my microwave oven and turned
it on. Instantly I got very upset, because the CD had become precious to me,
but he said: "Do not worry, it is unharmed".

After a few minutes he took the CD out, gave it to me and said: "Take a
close look at it." To my surprise the CD was quite cold to hold and it
seemed to be heavier than before. At first I could not see anything, but on
the inner edge of the central hole I saw an inscription, an inscription
finer than anything I had ever seen before. The inscription shone piercingly
bright and yet remote, as if out of a great depth:

12413AEB2ED4FA5E6F7D78E78BEDE820945092OF923A40EElOE5IOCC98D44AA08E324

"I cannot understand the fiery letters", I said in a timid voice. "No but I
can", he said. "The letters are Hex, of an ancient mode, but the language is
that of Microsoft, which I shall not utter here. But in common English this
is what it says:

One OS to rule them all,
One OS to find them,
One OS to bring them all
And in the darkness bind them.

It is only two lines from a verse long known in System lore:
"Three OS's from corporate kings in their towers of glass, Seven from valley
lords where orchards used to grow, Nine from dotcoms doomed to die, One from
the Dark Lord Gates on his dark throne In the Land of Redmond where the
Shadows lie. One OS to rule them all, one OS to find them, One OS to bring
them all and in the darkness bind them, In the Land of Redmond where the
Shadows lie."
____________________________________________________________________________
______________    _______________________________
It WANTS to be installed



8
-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Alert Summary AS02-03
January 21, 2002

X-Force Vulnerability and Threat Database: http://xforce.iss.net

To receive these Alert Summaries, as well as other Alerts and
Advisories, subscribe to the Internet Security Systems Alert
mailing list at: http://xforce.iss.net/maillists/index.php

This summary is available at the following address:
http://xforce.iss.net/alerts/AS02-03.php
_____
Contents:
* 40 Reported Vulnerabilities
* Risk Factor Key
_____


Date Reported:          01/09/2002
Brief Description:      Dino Webserver "dot dot" directory traversal
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     Dino's Webserver 1.x
Vulnerability:          dinos-webserver-directory-traversal
X-Force URL:            http://xforce.iss.net/static/7853.php

Date Reported:          01/09/2002
Brief Description:      MiraMail stores authentication information in
                        plaintext in .ini file
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     MiraMail 1.04
Vulnerability:          miramail-plaintext-auth-info
X-Force URL:            http://xforce.iss.net/static/7855.php

Date Reported:          01/09/2002
Brief Description:      X-Chat CTCP ping request allows users to execute
                        IRC commands
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Red Hat Linux 6.2, Red Hat Linux 7.0, Red Hat
                        Linux 7.1, Red Hat Linux 7.2, X-Chat 1.4.2, X-
                        Chat 1.4.3
Vulnerability:          xchat-ctcp-ping-command
X-Force URL:            http://xforce.iss.net/static/7856.php

Date Reported:          01/10/2002
Brief Description:      Slashcode allows any logged in user to access
                        arbitrary accounts
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Slashcode 2.1.x, Slashcode 2.2, Slashcode 2.2.1,
                        Slashcode 2.2.2
Vulnerability:          slashcode-account-access
X-Force URL:            http://xforce.iss.net/static/7863.php

Date Reported:          01/08/2002
Brief Description:      Caldera UnixWare CDE dtlogin error log directory
                        /var/dt/ symlink
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     Caldera UnixWare 7.1.0
Vulnerability:          unixware-dtlogin-log-symlink
X-Force URL:            http://xforce.iss.net/static/7864.php

Date Reported:          01/10/2002
Brief Description:      Palm OS nmap scan denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Palm OS 3.5h
Vulnerability:          palmos-nmap-dos
X-Force URL:            http://xforce.iss.net/static/7865.php

Date Reported:          01/09/2002
Brief Description:      Multiple VPN daemons allow remote attackers to
                        modify packets
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     tinc 1.0pre3, tinc 1.0pre4, Vtun 2.5b1
Vulnerability:          vpn-modify-packets
X-Force URL:            http://xforce.iss.net/static/7868.php

Date Reported:          01/10/2002
Brief Description:      Geeklog could allow an attacker to modify UID of
                        authentication cookie to gain unauthorized
                        access
Risk Factor:            Medium
Attack Type:            Host Based / Network Based
Platforms Affected:     Geeklog 1.3
Vulnerability:          geeklog-modify-auth-cookie
X-Force URL:            http://xforce.iss.net/static/7869.php

Date Reported:          01/09/2002
Brief Description:      Multiple VPN daemons vulnerable to replay attack
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     tinc 1.0pre3, tinc 1.0pre4, Vtun 2.5b1
Vulnerability:          vpn-replay-attack
X-Force URL:            http://xforce.iss.net/static/7870.php

Date Reported:          01/09/2002
Brief Description:      tinc IV is a weak salt
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     tinc 1.0pre3, tinc 1.0pre4
Vulnerability:          tinc-weak-salt
X-Force URL:            http://xforce.iss.net/static/7871.php

Date Reported:          01/10/2002
Brief Description:      Snort specially-crafted ICMP packet denial of
                        service
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     Snort 1.8.3
Vulnerability:          snort-icmp-dos
X-Force URL:            http://xforce.iss.net/static/7874.php

Date Reported:          01/14/2002
Brief Description:      Web Server 4D/eCommerce "dot dot" directory
                        traversal
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     Web Server 4D/eCommerce 3.5.3
Vulnerability:          ws4d-dot-directory-traversal
X-Force URL:            http://xforce.iss.net/static/7878.php

Date Reported:          01/14/2002
Brief Description:      Web Server 4D/eCommerce long URL denial of
                        service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Web Server 4D/eCommerce 3.5.3
Vulnerability:          ws4d-long-url-dos
X-Force URL:            http://xforce.iss.net/static/7879.php

Date Reported:          01/14/2002
Brief Description:      Pi3Web HTTP Server long CGI parameter buffer
                        overflow
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Pi3Web HTTP Server 2.0
Vulnerability:          pi3web-long-parameter-bo
X-Force URL:            http://xforce.iss.net/static/7880.php

Date Reported:          01/07/2002
Brief Description:      Linux groff preprocessor buffer overflow
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Red Hat Linux 7.0, Red Hat Linux 7.1, Red Hat
                        Linux 7.2
Vulnerability:          linux-groff-preprocessor-bo
X-Force URL:            http://xforce.iss.net/static/7881.php

Date Reported:          01/07/2002
Brief Description:      CIPE packet handling denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     CIPE 1.5.2 and earlier, Debian Linux 2.2
Vulnerability:          cipe-packet-handling-dos
X-Force URL:            http://xforce.iss.net/static/7883.php

Date Reported:          01/14/2002
Brief Description:      Sudo fails to clean environment variable prior
                        to invoking a MTA allowing an attacker to gain
                        root privileges
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Conectiva Linux 5.0, Conectiva Linux 5.1,
                        Conectiva Linux 6.0, Conectiva Linux 7.0,
                        Conectiva Linux ecommerce, Conectiva Linux prg
                        graficos, Debian Linux 2.2, Engarde Secure Linux
                        1.0.1, Mandrake Linux 7.1, Mandrake Linux 7.2,
                        Mandrake Linux 8.0, Mandrake Linux 8.1, Mandrake
                        Linux Corporate Server 1.0.1, Mandrake Single
Vulnerability:          sudo-unclean-env-root
X-Force URL:            http://xforce.iss.net/static/7891.php

Date Reported:          01/12/2002
Brief Description:      Microsoft Windows 95 Backup long file extension
                        buffer overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Windows 95 All versions
Vulnerability:          win95-backup-bo
X-Force URL:            http://xforce.iss.net/static/7892.php

Date Reported:          01/11/2002
Brief Description:      Alcatel Speed Touch Home ADSL modems nmap OS
                        detection scan denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Alcatel Speed Touch ADSL modem Home
Vulnerability:          alcatel-speedtouch-nmap-dos
X-Force URL:            http://xforce.iss.net/static/7893.php

Date Reported:          01/16/2002
Brief Description:      Sambar Server cgitest.exe example script denial
                        of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Sambar Server 5.1
Vulnerability:          sambar-cgitest-dos
X-Force URL:            http://xforce.iss.net/static/7894.php

Date Reported:          01/15/2002
Brief Description:      BlackMoon FTP Server static buffer overflow
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     BlackMoon FTP Server 1.5 R1 Build 1547
Vulnerability:          blackmoon-ftpd-static-bo
X-Force URL:            http://xforce.iss.net/static/7895.php

Date Reported:          01/13/2002
Brief Description:      Eterm $HOME environment variable buffer overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Eterm 0.9.1
Vulnerability:          eterm-home-bo
X-Force URL:            http://xforce.iss.net/static/7896.php

Date Reported:          01/10/2002
Brief Description:      Legato nsrd daemon creates "logs" directory with
                        insecure permissions
Risk Factor:            Low
Attack Type:            Host Based
Platforms Affected:     Legato NetWorker 6.1
Vulnerability:          legato-nsrd-log-permissions
X-Force URL:            http://xforce.iss.net/static/7897.php

Date Reported:          01/10/2002
Brief Description:      Legato nsrd daemon creates log file in plaintext
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     Legato NetWorker 6.1
Vulnerability:          legato-nsrd-log-plaintext
X-Force URL:            http://xforce.iss.net/static/7898.php

Date Reported:          01/08/2002
Brief Description:      Mandrake Linux BIND implementation uses insecure
                        permissions
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     Mandrake Linux 8.0, Mandrake Linux 8.1
Vulnerability:          mandrake-bind-insecure-permissions
X-Force URL:            http://xforce.iss.net/static/7899.php

Date Reported:          01/08/2002
Brief Description:      PGP Outlook plug-in saves a decrpted copy of
                        encrypted emails
Risk Factor:            Low
Attack Type:            Host Based
Platforms Affected:     Microsoft Outlook 98, PGP 7.0
Vulnerability:          pgp-outlook-decrypted-copy
X-Force URL:            http://xforce.iss.net/static/7900.php

Date Reported:          01/14/2002
Brief Description:      Siemens wireless invalid SMS denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Siemens 3568i WAP
Vulnerability:          siemens-invalid-sms-dos
X-Force URL:            http://xforce.iss.net/static/7902.php

Date Reported:          01/15/2002
Brief Description:      NetGear Cable/DSL router WAN port scan denial of
                        service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     NetGear RP114 Cable/DSL Web Safe Router Firmware
                        3.26
Vulnerability:          netgear-wan-scan-dos
X-Force URL:            http://xforce.iss.net/static/7903.php

Date Reported:          01/09/2002
Brief Description:      VTun ECB mode uses weak encryption
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Vtun 2.5b1
Vulnerability:          vtun-ecb-weak-encryption
X-Force URL:            http://xforce.iss.net/static/7904.php

Date Reported:          01/14/2002
Brief Description:      ClanLib long environment variable buffer
                        overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     ClanLib 5.0
Vulnerability:          clanlib-long-env-bo
X-Force URL:            http://xforce.iss.net/static/7905.php

Date Reported:          01/12/2002
Brief Description:      Internet Explorer clipboardData object allows a
                        remote attacker to view clipboard information
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Microsoft Internet Explorer 5.0, Microsoft
                        Internet Explorer 5.01, Microsoft Internet
                        Explorer 5.5
Vulnerability:          ie-clipboarddata-view-clipboard
X-Force URL:            http://xforce.iss.net/static/7906.php

Date Reported:          01/15/2002
Brief Description:      SGI IRIX nsd cache size denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     IRIX 6.5.10, IRIX 6.5.11, IRIX 6.5.4, IRIX
                        6.5.5, IRIX 6.5.6, IRIX 6.5.7, IRIX 6.5.8, IRIX
                        6.5.9
Vulnerability:          irix-nsd-cache-dos
X-Force URL:            http://xforce.iss.net/static/7907.php

Date Reported:          01/13/2002
Brief Description:      PHP creates insecure temporary session ID files
Risk Factor:            Low
Attack Type:            Host Based
Platforms Affected:     PHP 4.1.1, PHP4 All versions
Vulnerability:          php-session-temp-disclosure
X-Force URL:            http://xforce.iss.net/static/7908.php

Date Reported:          01/16/2002
Brief Description:      Linux /usr/bin/at command invalid execution time
                        heap corruption
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Debian Linux 2.2, SuSE Linux 6.4, SuSE Linux
                        7.0, SuSE Linux 7.1, SuSE Linux 7.2, SuSE Linux
                        7.3
Vulnerability:          linux-at-exetime-heap-corruption
X-Force URL:            http://xforce.iss.net/static/7909.php

Date Reported:          01/15/2002
Brief Description:      ActivePython ActiveX control could allow a
                        remote attacker to read arbitrary files
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     ActivePython 2.1, Microsoft Internet Explorer
                        All versions, Windows All versions
Vulnerability:          activepython-activex-read-files
X-Force URL:            http://xforce.iss.net/static/7910.php

Date Reported:          01/16/2002
Brief Description:      Chinput long environment variable buffer
                        overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Chinput 3.0
Vulnerability:          chinput-long-env-bo
X-Force URL:            http://xforce.iss.net/static/7911.php

Date Reported:          01/16/2002
Brief Description:      Cisco MGC (Media Gateway Controller) Solaris 2.6
                        exposure
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Cisco BAMS running Solaris 2.6, Cisco PGW 2200
                        9.1(x) and earlier, Cisco SC2200 7.4(x) and
                        earlier, Cisco VSC3000 9.1(x) and earlier, Cisco
                        VSPT running Solaris 2.6
Vulnerability:          cisco-mgc-exposure
X-Force URL:            http://xforce.iss.net/static/7912.php

Date Reported:          01/17/2002
Brief Description:      PHP-Nuke index.php allows remote attackers to
                        execute arbitrary commands from an included file
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     PHP-Nuke 5.3.1 and earlier
Vulnerability:          phpnuke-index-command-execution
X-Force URL:            http://xforce.iss.net/static/7914.php

Date Reported:          01/17/2002
Brief Description:      Avirt Gateway Suite telnet proxy could allow
                        unauthorized access
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Avirt Gateway Suite 4.2
Vulnerability:          avirt-gateway-telnet-access
X-Force URL:            http://xforce.iss.net/static/7915.php

Date Reported:          01/17/2002
Brief Description:      Avirt SOHO, Gateway, and Gateway Suite HTTP
                        proxy buffer overflow
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Avirt Gateway 4.2, Avirt Gateway Suite 4.2,
                        Avirt SOHO 4.2
Vulnerability:          avirt-http-proxy-bo
X-Force URL:            http://xforce.iss.net/static/7916.php

_____

Risk Factor Key:

     High     Any vulnerability that provides an attacker with immediate
              access into a machine, gains superuser access, or bypasses
              a firewall. Example: A vulnerable Sendmail 8.6.5 version
              that allows an intruder to execute commands on mail server.
     Medium   Any vulnerability that provides information that has a high
              potential of giving system access to an intruder. Example:
              A misconfigured TFTP or vulnerable NIS server that allows
              an intruder to get the password file that could contain an
              account with a guessable password.
     Low      Any vulnerability that provides information that could
              potentially lead to a compromise. Example: A finger that
              allows an intruder to find out who is online and potential
              accounts to attempt to crack passwords via brute force
              methods.

______

About Internet Security Systems (ISS)
Internet Security Systems is a leading global provider of security
management solutions for the Internet, protecting digital assets and
ensuring safe and uninterrupted e-business. With its industry-leading
intrusion detection and vulnerability assessment, remote managed
security services, and strategic consulting and education offerings, ISS
is a trusted security provider to more than 8,000 customers worldwide
including 21 of the 25 largest U.S. commercial banks and the top 10 U.S.
telecommunications companies. Founded in 1994, ISS is headquartered in
Atlanta, GA, with additional offices throughout North America and
international operations in Asia, Australia, Europe, Latin America and
the Middle East. For more information, visit the Internet Security
Systems web site at www.iss.net or call 888-901-7477.

Copyright (c) 2002 Internet Security Systems, Inc. All rights reserved
worldwide.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent of
the X-Force. If you wish to reprint the whole or any part of this Alert in
any other medium excluding electronic medium, please e-mail [email protected]
for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php
as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force
[email protected] of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBPE17AjRfJiV99eG9AQHuWQP/eC/ARz76eXEj8D/CH4LNx0cjaD6fOryu
qJ0H1tZWB4NqQqifYYRISWadqAL0vS2caG1a8tp1BTq1G98IBcUagI0We1NMEgw3
Ih4jn4LcNb+jr3sLaEwWaoXxvyb+Stdzmo9D3UCyoFQtFX57SbqPBB74I+qKB0PZ
LmBaBhTOTF4=
=Eeya
-----END PGP SIGNATURE-----


9
Configuration Files / ZXList Beta 2.50 Now Out - For Naoko 4.1
« on: January 06, 2002, 06:40:06 AM »
http://laudanski.com/#PROXO

This release works for the new Proxomitron Naoko 4.1.  Please don't use previous versions with this new Naoko release.



10
Configuration Files / Beta 2.00 Released
« on: December 27, 2001, 04:02:30 PM »
http://laudanski.com/#PROXO

Zhen-Xjell Configuration Files Changelog for use by Scott R. Lemmon's Proxomitron.


[2001.12.26] - Release 2.00 Beta

- Added "www.codeproject.com/script/admentor/images/" to ZXList.txt.


[2001.12.23]

- Added Tame Javascript from: http://www.geocities.com/u82011729/prox/filter.html#tamescripts.  This consists of two filters "Tame Javascript" parts 1 and 2.  Enabling both of these will break the full functionality of the "Smart pop-up windows killer" filter. Enable these only if you do not care about opening pop-up links via "Smart pop-up windows killer".  TWo js files come with the filters, start and end, both of which are found in the html subdir.

- Added "Allow Right Click" web filter from this link: http://groups.yahoo.com/group/prox-list/message/8428.


[2001.12.22]

- Added new header filter: "Location: Yahoo relocator (in)" from http://groups.yahoo.com/group/prox-list/message/8383.  This works great for the "interrupt" pages.

- Added new filter from http://groups.yahoo.com/group/prox-list/message/8345 titled: "Yahoo interrupt automatifier".  I use this tweaked up version to handle pages that come up after posting via the web interface.  Changes shown here: http://groups.yahoo.com/group/prox-list/message/8396 .


[2001.12.21]

- User-Agent for Hotmail Header Filter needed updating.  I found that "hotmail.com" needed to be entered for Outlook Express to properly connect to the Hotmail server.  

- Added "*.virtualratings.com/ads/" to ZXList.

- Removed the web bug code from "hotmail.htm".  This file was obtained from Greg's kitchen sink originally.


[2001.12.20]

- Added hotmail.htm to the html subdir in the zxlist, which will allow the hotmail filters to work properly.  The file was taken from Greg's kitchen sink filter set.

- Added two more filters to the hotmail set from Jor in this post: http://asp.flaaten.dk/pforum/topic.asp?ARCHIVE=&TOPIC_ID=37.

- Changed the location of the hotmail.htm file in the web filter set Hotmail Login.  It pointed to dhtml/html/HotMail/HotMail.htm, but now points to dhtml/html/hotmail.htm.  Also added a "logo.gif" in the html subdir which is used by hotmail.htm.


[2001.12.18]

- Added " align="absmiddle"" to the "Bypass redirects in links" web filter inside the Replacement field to align the image in absolute middle.  Thanks go to this suggestion from Aleks.

- Disabled the header filter: "User-Agent: (random)", where "User-Agent: (out) Rotate" does the job perfectly.  Thanks to RLD, I replaced a single quotation with a carriage return for the web filter: "Kill IFRAME popups".


[2001.12.16]

- Added "am7.netfirms.com/nf-images/" to ZXList.txt.



11
Configuration Files / Beta 1.99 Now Available
« on: December 16, 2001, 06:13:36 PM »
Available now from http://laudanski.com/#PROXO .

CHANGELOG.TXT

[2001.12.16] - Release 1.99 Beta

- Found that the following group of filters: 1) kill pop up windows, 2) Stop Javascript Redirects, 3) Kill Nosey Javascripts and 4) Block scripts (not .js files) [Caution: Site may not function] when enabled do not allow the following single filter to work properly: Smart pop-up windows killer.  Ran some prelimary tests of some notorious sites and disabling those four filters do not cause any ill effects.  They will be disabled now so the single one can fully function.

- The following header filters were removed due to duplication: 1) Key = "Content-Type: Text/Plain - *.EML", 2) Key = "Content-Type: Text/Plain - *.XML", 3) Key = "Content-Type: Text/Plain - *.XSL", 4) Key = "URL: Enable
local file shortcut -CIV (OUT) [x.D../PATH/FILENAME]", 5) Key = "User-Agent: Lynx 2.8 (out) ", 6) Key = "User-Agent: Netscape BEOS (out) ", 7) Key = "User-Agent: Netscape Linux (out) ", 8) Key = "User-Agent: Netscape Mac 68k (out) ", and 9) Key = "User-Agent: Opera 5.02 (out) ".

- The complete header filter online documentation is up and running at http://laudanski.com/proxomitron.  Next phase it to get the massive web filter set online, while cleaning house as I did for the header filter set.

- Added "www.tvguide.com/rbitmaps/" to ZXList.txt.

- Added "htmlpageedit.js" for "just in case", as well as "htmlviewsrc.css".

- As of this release, there exist two package distributions... a full package release keeping the same title convention and a minimal package release that will be have the same naming convention as the full release except "m" will be added to "zx".  Hence, this particular release will have two files:

Full Release: zx_20011216.zip
Minimal Release: zxm_20011216.zip

The inner zx.zip file will also have a counterpart:

Full Release: zx.zip
Minimal Release: zxm.zip

- "htmlWindowOpen.js" was updated.


[2001.12.14]

- Added two new header filters from:

http://groups.yahoo.com/group/prox-list/message/8077.

- Header Filter "Content-Type: Filter .eml/.xml/.xsl will be activated, and the corresponding duped "Content-Type: Text/Plain - *.EML, *.XML, and *.XSL" (three header filters) will be removed.


[2001.12.11]

- New online help files are work in progress for the header and web filters found http://laudanski.com/proxomitron.



[2001.12.10]

- Removed "*.dslreports.com/" and "*.teamhelix.net/" from the Bypass list.txt file.  Since more people are using these files now, they may not necessarily be using those sites.



[2001.12.09]

- Apparently not many use Windowsupdate from Microsoft, but Al from this post quoted: http://groups.yahoo.com/group/prox-list/message/7944 does.  I found the problem, a new URL needed to be placed in the bypass list: www.download.windowsupdate.com, so now it is in there and ready for the next release.


MD5.TXT

[2001.12.16] - Release 1.99 Beta
MD5 (zx.zip) = 5c1759a606c33a61733e6c11ceede4c9
MD5 (zxm.zip) = 10cdda7825fee28b2e8a4a0ad3fc8288


12
Configuration Files / Arne: Proxomitron Zhen-Xjell Default.CFG 1.96 Beta
« on: November 30, 2001, 11:17:23 PM »
Zhen-Xjell Configuration Files Changelog for use by Scott R. Lemmon's Proxomitron.

[2001.11.30] - Release 1.96 Beta

- Finished testing the new filters.  Please note the filter set for "Pre-Super-Opener" is still in beta by the author.  However, this filter set seems to be quite stable.



[2001.11.29]

- Removed Web Filter: Open IE Links in Same Browser, same as Pop-Ups target="blank" filter.

- Added new filter set: 1) Head ~ Style - Pre-Super-Opener - Create id style (B), 2) Links - BETA 34i - SUPER-OPENER, and 3) Tags ~ Remove temporary proxomitron comment tags from this link: http://groups.yahoo.com/group/prox-list/message/7751.  Currently, the Pop-ups target="blank" filter needs to be disabled for this new filter set to work right.  Perhaps it is simply a positioning of the filters, which I haven't tried yet.  This filter set uses CSS to create a dotted box around the right edge of any link.  Clicking in that dotted red box over the hyperlink causes the link to open in a new browser window.  This filter set is in "beta" right now by the author.

- Updated "Convert Relative Path to Full URL" filter based on this post: http://groups.yahoo.com/group/prox-list/message/7616.

- Added another new filter set: 1)"Opt 1) TITLE - Snip Excess" and 2)"Opt 2) TITLE - Add Indicator, Snip Excess" from this post: http://groups.yahoo.com/group/prox-list/message/7616.

- Added another new filter from this post: http://groups.yahoo.com/group/prox-list/message/7585, called "ECTaco On-line word translator".  The filter writes itself at the bottom of the web page.

- Added web filter: BASE16 to ASCII, from this post: http://groups.yahoo.com/group/prox-list/message/6666.  ListsNoCon.txt file and listname have been added.

- Un-Prefix filters (two of them) have been de-activated and are candidates for removal thanks to the following set of filter add-ins: http://groups.yahoo.com/group/prox-list/message/6653 - 1) "Multi URL Untangler" and 2) "Bypass redirects in links".  HTMLDirect.gif and HTMLDirect2.gif have been added.

- Removed all remote proxies that are not working properly.

Download: http://laudanski.com/zx_20011130.zip


13
Community Discussions (Non-Forum Related) / Hey
« on: November 29, 2001, 01:40:36 AM »
Forums looking great Arne...




Pages: [1]