OKI Data Company introduces new LED printers that allow you to print with white toner. According to the manufacturer, these devices will help small and medium businesses solve many print jobs quickly and cost-effectively.
The white toner printers are an addition to the range of existing color printing solutions for business. They can also be used for custom T-shirts, as well as ceramics, printing and labels to create original promotional materials. The devices will serve good in for shop windows decoration, car windscreen stickers and in numerous other situations.
The new line of printers includes two devices. C711WT A4 printer offers color printing (CMYW) at a speed of 8 pages / minute when printing on transparencies and 34 pages / min on paper. C920WT A4/A3 format printer is designed for intensive use and high volume printing at 10 pages / minute and 31 pages / min, respectively, yet it has higher capacity toner cartridges.
Symantec has announced the discovery of a new worm, which launches “trash” print jobs. Symantec identifies the worm as W32.Printlove. This malware exploits a vulnerability in Microsoft Windows Print Spooler Service Remote Code Execution (CVE 2010-2729), which was discovered back in 2010.
The worm behave differently on computers with installed update for CVE 2010-2729 vulnerability and on without such update. Symantec Experts have tested this threat in a simple network of two computers and a network printer that is connected through the switch.
- Computer Configuration A: Windows XP Professional. The computer was updated with the CVE 2010-2729 patch and was infected with W32.Printlove. A local or network printer was not connected.
- Computer Configuration B: Windows XP Professional. In the first scenario, the computer runs without update, and in the second, it is updated. A network printer open for public access is connected.
Computer A must have permission to send print jobs to computer B. Guest access to shared printers in Windows XP is enabled by default; in newer operating systems, computer A must be authenticated by the computer B.
There are two scenarios in which the threat may work:
- W32.Printlove running on computer A will look for network print resources. When such discovered, it sends itself to computer B, using the StartDocPrinter query. The vulnerability of the print bufferallows for copying of whatever file a request transmitted to the printer to any folder. The malware successfully runs on your computer, taking advantage of this vulnerability.
- W32.Printlove running on computer A, behaves this way and passes its code to the computer B. Since computer B has the update, the worm can not exploit the vulnerability. The principle of the corrected vulnerability does not allow print queries to transfer files to any folder (that is printing to file). This prevents the worm from copying itself to the system directory and autostarting itself using the exploit. Instead, it is saved in the printer buffer folder on computer B as .spl-file. After that, computer B will start printing the file on a shared printer attached.
W32.Printlove retains the connection to a remote computer, and periodically tries to infect it using the vulnerability of the print buffer. Computers can be infected again, and there may be multiple “trash” printings that are sent from different computers until the worm is fully removed from the network. Tracking the source of unwanted prints can be much more complicated in the case of multiple infections present on the network. Network administrators can identify infected PCs looking for .shd-files in the printer buffer folder on the computer, which provides connection to a public printer.
SHD files are created by the operating system and contain detailed information about the request to the printer. To view them, you can use SPLViewer. Because the data files are used by the print buffer service, the service must be first stopped. Administrators are able to detect the compromised computer by the Computername field, which allows you to identify the source sending the print job. Trash printing is the side effect of eliminating CVE 2010-2729 vulnerabilities on a computers attacked by W32.Printlove.
According to experts, there might be a connection between Trojan.Milicenso and W32.Printlove, but at the moment it is not confirmed. A team of specialists in Symantec continues to investigate to determine the possible relationship of these two threats.
Epson has announced the release of the TM-C3400BK inkjet printer. This compact desktop monochrome device is designed for printing stickers, tags and labels. On the manufacturer’s note, the device is widely suitable for marking in the fields where the durability of printed materials is a key factor. Epson TM-C3400BK prints durable stickers on a variety of media widths from 30 to 112 mm, including plain paper, uncoated and matte coated paper. Epson TM-C3400BK was created to expand the product range, which already includes the Epson TM-S3400 model.
The printer uses Epson’s proprietary pigment inks DURABrite Ultra. Images created with these inks are not affected by smearing, fading and are waterproof. They remain intact even when used outdoors and in poor storage conditions and retain the color even when subjected to direct sunlight. All this makes the Epson TM-C3400BK suited for tasks such as labeling materials in science laboratories and logistics warehouses.
Unlike thermal transfer printers, the Epson TM-C3400BK inkjet does not use ribbons for the mirror image transfer. This reduces the possibility of unauthorized information leakage printed on the device. This is highly important for areas sensitive to privacy security violation, e.g. medicine and public services.
Given the printing speed of 92 mm/sec and a built-in paper tape cutter, printing 100 labels will take about 3 minutes. Incorrect printing and gaps in the images are not possible with automatic printhead testing (AID), which detects clogged nozzles and cleans them before printing.
Designed for simple installation, use and support, Epson TM-C3400BK is serviced from the front, equipped with one high-capacity cartridge to avoid frequent replacement. The printer comes with a special Windows driver software package. The package allows for easy integration into automated printer labeling system in the company and the direct management of the application.
Before delving into the details of the way declared in the title, we want to tell you a short story.
The Urban Fairytale
Once upon a time there was a man who got in charge of a large fleet of printing devices. And he would be happy ever after, unless one day his printers started to run out of toner. At first, the man was able to find cartridges for empty printers as they were easily accessible on the market. However, with more printers coming out of order, it was getting harder and harder to buy necessary replacement cartridge in one place.
Further on, he had to run around all vendors looking for a specific item. As time went by, the man spent more and more time seeking toner since the printers did not get upgraded and old cartridges became harder to find. Not to mention he could not remember vendor he previously purchased from. Finally, the man could not take it anymore and, tearing his hair out, he escaped to a desolate island to be lost for all humanity.
It’s a fairytale, but it could have been a reality.
The Harsh Reality
If you have one printer, you’re just a happy owner. Same is true for 2 or 3 printers. But once you have dozens on printers to take care of, things get out of control easily.
TonerCartridgeDepot.com offers a way that would’ve helped our imaginary man keep his sanity and cope with all the hardships of repeated cartridge replacement. We believe it would also help you.
The Bright Future
The idea is simple. You place a fancy logo on your site in exchange for a personal discount on whole range of our cartridges inventory. The logo is also a reminder of where you previously bought cartridges — you’ll never forget your site’s domain name, right?
So what’s next?
DISCOVER THE ACTION PLAN