You can take the 2009 Spring tour, read the Release notes and Errata, and of course, download.
The Mozilla developers have announced the release of version 3.0.10 of their open source Firefox web browser. The security and stability release addresses a critical security vulnerability introduced in Firefox 3.0.9.
The vulnerability is a regression which in some cases caused frequent crashes. Users running the HTML Validator add-on were particularly affected, although other users also experienced the crashes. The problem was due to memory corruption, similar to problems identified as security vulnerabilities in the past.
More details about the release can be found in the release notes. Firefox 3.0.10 is available to download, or Firefox users can use the Firefox update service by selecting Help, then Check For Updates.
Apr 13 17:34:53 webmail postfix/smtpd: warning: connect to mysql server localhost: Can't connect to local MySQL server through socket '/var/lib/mysql/mysql.sock' (2)
Apr 13 17:34:53 webmail postfix/smtpd: NOQUEUE: reject: RCPT from rv-out-0506.google.com[126.96.36.199]: 451 4.3.0
: Temporary lookup failure; from= to= proto=ESMTP helo=
Apr 13 18:03:02 webmail postfix/smtpd: connect from rv-out-0506.google.com[188.8.131.52]
Apr 13 18:03:03 webmail sqlgrey: grey: domain awl match: updating 209.85.198(184.108.40.206), gmail.com
Apr 13 18:03:03 webmail postfix/smtpd: B3246A3075: client=rv-out-0506.google.com[220.127.116.11]
Apr 13 18:03:04 webmail postfix/cleanup: B3246A3075: message-id=<email@example.com>
Apr 13 18:03:04 webmail postfix/qmgr: B3246A3075: from=
, size=2277, nrcpt=1 (queue active)
Apr 13 18:03:05 webmail postfix/smtpd: connect from webmail.myfakedomain.net[127.0.0.1]
Apr 13 18:03:05 webmail postfix/smtpd: 26BBFA3076: client=rv-out-0506.google.com[18.104.22.168]
Apr 13 18:03:05 webmail postfix/cleanup: 26BBFA3076: message-id=<firstname.lastname@example.org>
Apr 13 18:03:05 webmail postfix/qmgr: 26BBFA3076: from=
, size=2751, nrcpt=1 (queue active)
Apr 13 18:03:05 webmail postfix/smtpd: disconnect from webmail.myfakedomain.net[127.0.0.1]
Apr 13 18:03:05 webmail dbmail/lmtpd: Message:[serverchild] serverchild.c,PerformChildTask(+349): incoming connection from [127.0.0.1] by pid 
Apr 13 18:03:05 webmail postfix/lmtp: B3246A3075: to=
, relay=127.0.0.1[127.0.0.1]:10025, delay=2, delays=0.96/0.01/0/1, dsn=2.0.0, status=sent (250 2.0.0 Ok, id=01032-05, from MTA([127.0.0.1]:10026): 250 2.0.0 Ok: queued as 26BBFA3076)
Apr 13 18:03:05 webmail postfix/qmgr: B3246A3075: removed
Taken from http://www.clamav.net/2009/01/29/conficker-aka-downadup/
Some of you may have heard of a current major outbreak of a virus known as Downadup that has been reported at http://news.bbc.co.uk/1/hi/technology/7842013.stm and http://news.bbc.co.uk/1/hi/technology/7832652.stm. It has been estimated that move than 9 million PCs are infected across the world.
ClamAV detects Downadup, also known as Conficker, as Worm.Downadup. Once on a system it downloads components that ClamAV detects as members of the Trojan.Downloader- family of signatures.
The virus primarily exploits MS08-067; it can also spread through USB sticks. Since the virus is not spread by email we don’t expect to see much activity in our core user-base, which tends to use ClamAV to scan emails. We are, nevertheless, keeping an eye out for it through freshclam’s statistics gathering system – we are yet to see any obvious spike of activity from it. If we hear anything we’ll let you know.