Jump to content
MrsSurvival Discussion Forums

display issues


Recommended Posts

Has the site been redesigned? I am having some 'display' issues. The forums column is about 1/3 the widthe that is used to be, and the text is twice as big (at least). The information column (on the right) has a BIG gap between it and the forum column. The whole deop doen list for my 'notifications' is also displayed, instead of there being an arrow for seeing the list.

 

Anybody else having these issues???

Link to comment

I've got Internet Explorer.... sometimes known to cause difficulities but, it's been my friend.

 

 

Yeah, Midnight, it started for me last nite too. Locked me up and I just quit for the night, hoping it would restore today...didn't. :(

 

 

Several of us reporting it now - in Shout Box. As I said there, Annarchy has a lot going on with her dear MIL and cancer treatments but she'll be getting to this when she can. :thumbs: (((Ann))) :hug3:

 

MtRider :grinning-smiley-044:

Link to comment

Mt.Rider, I sent you a PM earlier in the day to communicate my issues as I couldn't post in the Shout Box. Just ignore it as I'm able to post in a thread now. Just wanted you to know it wasn't only you.

 

Annarchy, you will get to it when you get to it. It isn't as important as your MIL! Please don't stress over a website getting wonky. No one is going anywhere. (big hug)

Link to comment

I thought maybe it was related to Internet Explorer, but this morning my FireFox is showing it as goofy, too. :(/>

 

But still able to post, and everything shows up.

Link to comment

Ooopppsssss.......... :ashamed0002: Sorry I did not see this. Yesterday we had company and then I made home made pizza... couldn't check the site with dough on my fingers... lol. I am trying to learn as fast a possible how to delegate my time with MIL. I promise not to let it happen again..... or the "Boss" will get me..... :baseballbat:

 

I am using an apple... No problems with Safari, Firefox, or Google Chrome. I have to wait for DH to get up to turn on my WinXP and WinVista to see if they do it.

 

Here is what I suspect is happening. Microsoft has launched Windows 8, they are pushing it really hard. :tinfoilhatsmile:

 

 

However, I found this and many more like it:

 

http://blog.chron.com/techblog/2012/09/best-defense-against-latest-unpatched-internet-explorer-flaw-use-another-browser/

Best defense against latest, unpatched Internet Explorer flaw: Use another browser

A vulnerability has been discovered in Microsoft’s Web browser that cyberscum are already exploiting through malware, and at this point there’s no patch for the bug. The problem affects IE 6, 7, 8 and 9 on Windows XP, Vista and Windows 7. Internet Explorer 10 on Windows 8 is not affected.

 

You can find the details in Security Advisory 2757760. The flaw allows an attacker to put malware on a user’s system that would give complete access to the computer, and this could be accomplished by tricking the user into visiting a poisoned website.

 

Here are the details:

 

A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

 

This type of attack is typically begun with a phishing email, or by tricking users into clicking links in social media. The security advisory notes that mainstream websites that have ads placed on the site via third-party ad servers could also be vulnerable if the ad servers are compromised. In other words, any site could be used to take advantage of the IE flaw.

 

It’s a serious flaw. In fact, it’s serious enough that the German government has told its citizens to quit using Internet Explorer, according to Reuters. Particularly alarming: exploits in the wild appear to be targeting defense contractors. The malware may be linked to an ongoing attack on companies that has been dubbed “Nitro”, and was first discovered in October by Symantec.

 

Microsoft promises a patch in the next few days, but offers some ways to protect yourself if you want to keep using IE in the interim. One of them, the Enhanced Mitigation Experience Toolkit (EMET), is primarily aimed at systems administrators and only works with Windows Vista and Windows 7. For mere mortals, Microsoft recommends:

 

Set Internet and local intranet security zone settings to “High” to block ActiveX Controls and Active Scripting in these zones

This will help prevent exploitation but may affect usability; therefore, trusted sites should be added to the Internet Explorer Trusted Sites zone to minimize disruption.

Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and local intranet security zones

This will help prevent exploitation but can affect usability, so trusted sites should be added to the Internet Explorer Trusted Sites zone to minimize disruption.

 

 

Your best bet until a fix is available is to use another browser, such as Chrome or Firefox.

 

 

 

 

(Crud.... mine just did some weird things.... :scratchhead: I do not like hackers. :shakinghead: Beware of the >/ >/ >/ after the smile codes (but only when previewed or edited) Grrrrrrr.... Going to go check it out.........)

Link to comment

Microsoft's Info:

 

http://technet.microsoft.com/en-us/security/bulletin/ms12-063

 

Microsoft Security Bulletin MS12-063 - Critical

Cumulative Security Update for Internet Explorer (2744842)

 

Published: Friday, September 21, 2012

 

Version: 1.0

General Information

Executive Summary

 

This security update resolves one publicly disclosed and four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows clients and Moderate for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9 on Windows servers. Internet Explorer 10 is not affected. For more information, see the subsection, Affected and Non-Affected Software, in this section.

 

The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

 

This security update also addresses the vulnerability first described in Microsoft Security Advisory 2757760.

 

Recommendation. Most customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.

 

For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.

 

See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.

 

Known Issues. None

 

Affected and Non-Affected Software: http://technet.microsoft.com/en-us/security/bulletin/ms12-063

 

Also see:

http://technet.microsoft.com/en-us/security/bulletin/ms12-064

Microsoft Security Bulletin MS12-064 - Critical

Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)

 

Published: Tuesday, October 09, 2012

 

Version: 1.0

 

 

(Still looking into it...)

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.