[34307] in bugtraq
security enforcement - new monitor for winnt
daemon@ATHENA.MIT.EDU (Liu Die Yu)
Tue Mar 30 11:58:58 2004
Date: 30 Mar 2004 04:34:53 -0000
Message-ID: <20040330043453.12403.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Liu Die Yu <liudieyuinchina@yahoo.com.cn>
To: bugtraq@securityfocus.com
i want to stop ie:
writing EXE/CAB/LNK ... files,
calling MSHTA.EXE to parse remote web pages,
accessing files outside "favorites" and cache("content.ie5").
i want to stop WSCRIPT.EXE from parsing files inside TEMP and cache.
i want to stop the system running executable files located in TEMP and cache.
afaik, i can stop ie 0day exploits by doing these things.
so, i made this:
http://umbrella.name/winblox/
of course, free. and you can define your own rules easily(assuming you guys know a bit about regular expression).
it's totally a new idea(afaik). so, not for operational uses.