Problem with MS blast? 2nd round comming up NOW
Posted: 2003-09-10 03:19pm
Get your fill of sci-fi, science, and mockery of stupid ideas
http://stardestroyer.dyndns-home.com/
http://stardestroyer.dyndns-home.com/viewtopic.php?f=24&t=29812
HOW TO KILL MSBLAST:
1. Click start, select Run and type in CMD and hit the enter key. You only have 60 seconds to do this. When the command prompt comes up, type in "shutdown -a" (without quotes) to abort the shutdown.
2. Hit CTRL ALT DEL and kill the MSBLAST.exe process. You can end the process by right-clicking on MSBLAST.exe and select "End Process'.
3. Click start, click on search and select "Files or Folders". Run a search for any copies of MSBLAST on your hard drive and delete them. Empty your recycle bin.
4. Goto Windows Update and download all the critical updates.
5. Kick yourself in the balls for being a dumbfuck by not keeping your operating system up-to-date like any responsible user would.
Microsoft Admits New Windows Problem
1 hour, 26 minutes ago
Add Technology - AP to My Yahoo!
By TED BRIDIS, AP Technology Writer
WASHINGTON - Just moments before a top Microsoft executive told Congress about efforts to improve security, the company warned customers Wednesday of serious new flaws that leave its flagship Windows software vulnerable to Internet attacks remarkably similar to the Blaster virus that infected hundreds of millions of computers last month.
Missed Tech Tuesday?
Become a Wireless Whiz -- get connected in every room and secure your wireless network in six steps
Microsoft urged customers to immediately apply a free repairing patch from its Web site, www.microsoft.com. It cautioned that hackers could seize complete control over a victim's computer by attacking these flaws, which affects Windows technology that allows computers to communicate with others across a network.
Outside experts said the new flaws were nearly identical to problems that were exploited by the so-called Blaster infection, which spread last month with devastating damage. Computer users who applied an earlier patch in July to protect themselves still must install the new patch from Microsoft.
"They're as close as you can be without being the same," said Marc Maiffret, an executive at eEye Digital Security Inc. of Aliso Viejo, Calif., one of three research groups credited with discovering the new problems. "It's definitely a big oversight on Microsoft's part that they missed these."
The embarrassing disclosure by Microsoft came just moments before its senior security strategist, Phil Reitinger, told lawmakers on the House Government Reform technology subcommittee about the company's efforts to help consumers defend themselves against viruses and other Internet attacks.
"Microsoft is committed to continuing to strengthen our software to make it less vulnerable to attack," said Reitinger, a former deputy chief in the Justice Department (news - web sites)'s cybercrime division. Still, he acknowledged, "There is no such thing as completely secure software."
The July announcement from Microsoft about the earlier software flaw in the same Windows technology was deemed so serious it prompted separate warnings from the FBI (news - web sites) and Department of Homeland Security. Roughly three weeks later, unidentified hackers unleashed the earliest version of the Blaster infection.
So do I.EmperorMing wrote:Jesus fucking christ!!!
Here we go again.
Since I work on a helpdesk, you can imagine why I am sooooooo upset at this.
I do corporate helpdesk and have seen *several* networks trashed because of this shit. Accordingly, my stress level has gone up...Vendetta wrote:So do I.EmperorMing wrote:Jesus fucking christ!!!
Here we go again.
Since I work on a helpdesk, you can imagine why I am sooooooo upset at this.
For the Public.
All of them.
(at least those in the UK who bought a PC from the largest electrical chain in the country).
Man the trenches!
Got any links for SUS? Id like to automate anything I can. Although if it costs money, the business climate is such out here that no spending is approved.phongn wrote:Hrm. Well, today we have tools like SUS which greatly speed up deployment of patches.
It is a part of SMS server 2.0TrailerParkJawa wrote:Got any links for SUS? Id like to automate anything I can. Although if it costs money, the business climate is such out here that no spending is approved.
Pennywise and pound foolish is quite common when it comes to IT budgets.
Thanks guys. SUS also looks like it can be downloaded by itself from the Microsoft website. Although it will not work with NT. The OS distribution at my last company was 25% Win98, 50% NT, 25% 2000, and no XP, So while it would have helped a bit, manual intervention would still be required. Or a purchase of a more complete system ( SMS ) would have been required.Faram wrote: It is a part of SMS server 2.0
Id need to know how to do that! Seriously though, I know how to setup login scripts from the NT server, forgive me isnt a Group Policy login part of an AD domain? Or does that opiton exist in an NT domain as well.phongn wrote:You could deploy a Group Policy login script that automatically runs patches in 'quiet mode' in the background.
I dont have a regular job anymore. I was laid off last October. I just use my previous regular job as an example. No, they would not go for a Ghost Enterprise license. Especially after I found a closet full of Ghost Personal Edition CD's. I built a .gho library for all our Dell's but had to ghost machines 1 at a time. Enterprise edition just rocks, doesnt it?phongn wrote:IIRC, NT has group policies as well? I seem to remember that you could set security policies and login scripts via NT Server. There's also the AD client that you can install on NT4, IIRC.
Would it be possible for your team to get a license for Ghost Enterprise and push images out over the network?
From what I hear, Ghost EE is quite good, but I've never used it. However, I know a bunch of universities and schools use it to deploy images to fix computers - hell, some do it nightly or weekly to make sure that nothing's messed up on it.TrailerParkJawa wrote:I dont have a regular job anymore. I was laid off last October. I just use my previous regular job as an example. No, they would not go for a Ghost Enterprise license. Especially after I found a closet full of Ghost Personal Edition CD's. I built a .gho library for all our Dell's but had to ghost machines 1 at a time. Enterprise edition just rocks, doesnt it?
What? No offense, but shouldn't the workplace have as much of a homogeneous setup as possible?Even if we had a license for Enterprise, pushing out images would only be usefull if the user wanted their machine done clean. Far too many of them had lots of files or custom installs.
I've used EE to help somone roll out 200 new computers with XP. It was great, we could image 16 machines at time in 3-4 minutes.phongn wrote: From what I hear, Ghost EE is quite good, but I've never used it. However, I know a bunch of universities and schools use it to deploy images to fix computers - hell, some do it nightly or weekly to make sure that nothing's messed up on it.
I totally agree. The computer fleet should be homogeneous as possible. However, it is not uncommon in many companies for the IT dept to be underfunded and unsupported. Underfunded was not the issue for the first year in my last job. The issue then was growth problems related to being a small company and a CEO would wanted us to focus on customer service and not the integrity of the network.What? No offense, but shouldn't the workplace have as much of a homogeneous setup as possible?
Also...De-Announcing thread