I'll also point out that a nice helpful "scanner" from a relatively obscure source where you are volunteering your source IP, and suspect you are vulnerable, might be worth a second thought...
I dunno who that guy is... maybe he's legit... but I'd trust something from your bigger AV/IDS/known_whitehat partners... before some dude's project blog. -sc From: [email protected] [mailto:[email protected]] On Behalf Of Dave Hardyman Sent: Tuesday, April 08, 2014 6:01 PM To: [email protected] Subject: RE: [NTSysADM] Panic time for some folks... dead link... ________________________________ From: [email protected] [[email protected]] On Behalf Of Andrew S. Baker [[email protected]] Sent: Tuesday, April 08, 2014 4:17 PM To: ntsysadm Subject: Re: [NTSysADM] Panic time for some folks... Here's a second scan tool: http://rehmann.co/projects/heartbeat/ <http://it.toolbox.com/blogs/virtual-cio/rehmann.co/projects/heartbeat/> ASB http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker> Providing Virtual CIO Services (IT Operations & Information Security) for the SMB market... On Tue, Apr 8, 2014 at 4:08 PM, Kurt Buff <[email protected]> wrote: Sorry - forgot to include the URL: http://filippo.io/Heartbleed/ On Tue, Apr 8, 2014 at 12:59 PM, Kurt Buff <[email protected]> wrote: And, don't forget to scan your SSL VPN units for this... Kurt On Tue, Apr 8, 2014 at 11:45 AM, Andrew S. Baker <[email protected]> wrote: It's bigger than that... ASB http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker> Providing Virtual CIO Services (IT Operations & Information Security) for the SMB market... On Mon, Apr 7, 2014 at 8:51 PM, Kurt Buff <[email protected]> wrote: Leaking SSL data 64k at a time - because who needs more than 64k at a time, right? http://www.heartbleed.com Kurt

