Yes, it's off-topic so I shouldn't reply, but as the (3 year old) link has been posted, just a note from that article that:
“The security updates that could be installed are intended for Windows Embedded and Windows Server 2003 customers and *do not fully protect Windows XP customers*,” the company said in a statement to ZDNet. “Windows XP customers also run a significant risk of functionality issues with their machines if they install these updates". Not going to engage in OT debate, but as I'm here now... I'd be looking for some pretty high level sackings from whichever company provides IT to the NHS. ANY IT manager who insists on using a 16 year old operating system which has been on a worldwide "DO NOT USE" list for 2 years is not fit to sweep the floor in the server room as far as I am concerned! XP is fun for home hobby use maybe, but absolutely lethal for anything business or security critical. People were warned for years an attack like this would hit XP - now it has, they have no excuse! Any IT director who allows an XP machine with ANY kind of personal data connected to the internet might as well leave the front door unlocked, shout their pin number from the rooftops and hand out copies of their email and address book! Except, it won't even be their own data - it'll be customers or patient data. And don't tell me "but no data was stolen" - if they can get malware in, they can get data out. Running XP is a bit like not wearing a seat belt because you're "going to drive carefully" and then being surprised when the fire service are scraping you off the dashboard. "But it never happened before - sure, they warned me, but I thought it would be fine". (Sorry, rant over - don't reply, you won't change my mind on this. Mind you, people who run obsolete OS or turn off Windows updates provide an excellent and reliable source of income for both Russian hacking gangs AND computer repair people ;) ) On 14 May 2017 at 15:33, Dave Widgery <[email protected]> wrote: > Hi a bit off topic but in view of the recent malware attack and some > of us still using windows XP I thought I would share this tip if > anyone was not previously aware. > > An addition of a registry key that enables a continuation of security > updates on XP see pcworld article below. I did this a year or so ago > and regularly receive updates. > > But if you haven't already done this I would ensure that you have a > good backup as you are likely to receive a large number of updates > with the potential of causing a few problems depending on your system > configuration, I also haven't checked if there is a security update > for this particular malware, so I would also recommend a good > antivirus. > > > Dave > > http://www.pcworld.com/article/2310301/windows-xp-registry-hack-keeps-the-security-updates-rolling.html > <div id="DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2"><br /> > <table style="border-top: 1px solid #D3D4DE;"> > <tr> > <td style="width: 55px; padding-top: 13px;"><a > href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail" > target="_blank"><img > src="https://ipmcdn.avast.com/images/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif" > alt="" width="46" height="29" style="width: 46px; height: 29px;" > /></a></td> > <td style="width: 470px; padding-top: 12px; color: #41424e; > font-size: 13px; font-family: Arial, Helvetica, sans-serif; > line-height: 18px;">Virus-free. <a > href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail" > target="_blank" style="color: #4453ea;">www.avast.com</a> > </td> > </tr> > </table><a href="#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2" width="1" > height="1"></a></div> > > _______________________________________________ > get_iplayer mailing list > [email protected] > http://lists.infradead.org/mailman/listinfo/get_iplayer _______________________________________________ get_iplayer mailing list [email protected] http://lists.infradead.org/mailman/listinfo/get_iplayer

