+++ Cypress Solutions [28/08/03 21:47 -0700]: > * Attempts to download the DCOM RPC patch from > Microsoft's Windows Update Web site, install it, and > then reboot the computer. > * Checks for active machines to infect by sending an > ICMP echo request, or PING, which will result in > increased ICMP traffic. > * Attempts to remove W32.Blaster.Worm.
Sorry. I read this reply only now. Thanks for the information. But I wonder if there is a different way to solve this problem. Fromt he description of the virus, it only attacks the class B address of the network that it is in. So it is possible that the router for the cable network: 1. Doesn't itself respond to pings. 2. Lets through ICMP pings to IP addresses outside its class B & C addresses? I have seen a copy of this virus in action in the LAN and I have seen the havoc it causes. However, putting blanket bans on ICMP makes life real difficult. Also, I have no clue why traceroute is not working either? I thought traceroute only uses UDP probes to a very high (generally unused port) by default. How has it been affected by these? - Sandip -- Sandip Bhattacharya http://www.sandipb.net sandip at puroga.com Puroga Technologies Pvt. Ltd. http://www.puroga.com _______________________________________________ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
