How lucky for you. Heh. Still on Win2k3 here, and likely to be so for quite a while.
On Tue, Jul 7, 2009 at 12:14, James Rankin<[email protected]> wrote: > I'm pushing it out via Group Policy Preferences. 2008 rocks > > 2009/7/7 Kurt Buff <[email protected]> >> >> I'm just pushing out the .reg file in the login script: >> >> regedit /s \\fileserver\public\patches\videokillbits.reg >> >> The file was easy to create, in a capable editor (not notepad or >> wordpad) that allows metacharacter search and replace, such as '\n' >> for CRLF and '\t' for tab. I used the ancient, no-longer-supported >> PFE32. I really should switch to VIM, I suppose. >> >> On Tue, Jul 7, 2009 at 08:40, Eric >> Wittersheim<[email protected]> wrote: >> > I'm pushing out the .reg via GP. So far so good. >> > >> > On Tue, Jul 7, 2009 at 10:38 AM, David Lum <[email protected]> wrote: >> >> >> >> The “Microsoft fix-it” is an MSI that I am pushing via SMS and is >> >> pushing >> >> fine (so far just a few test cases have it, but no issues). Beats >> >> trying to >> >> push out a .REG or something… >> >> >> >> >> >> >> >> David Lum // SYSTEMS ENGINEER >> >> NORTHWEST EVALUATION ASSOCIATION >> >> (Desk) 971.222.1025 // (Cell) 503.267.9764 >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> From: J Kyo [mailto:[email protected]] >> >> Sent: Tuesday, July 07, 2009 8:18 AM >> >> To: NT System Admin Issues >> >> Subject: Re: New IE zero day exploit in the wild >> >> >> >> >> >> >> >> Curious if anyone has used the "Microsoft Fix It" from: >> >> http://support.microsoft.com/kb/972890. >> >> >> >> On Mon, Jul 6, 2009 at 6:24 PM, Carl Houseman <[email protected]> >> >> wrote: >> >> >> >> Recommendation from MS is to set the killbits everywhere. >> >> >> >> >> >> >> >> http://www.microsoft.com/technet/security/advisory/972890.mspx >> >> >> >> >> >> >> >> Carl >> >> >> >> >> >> >> >> From: Ken Schaefer [mailto:[email protected]] >> >> Sent: Monday, July 06, 2009 9:06 PM >> >> >> >> To: NT System Admin Issues >> >> >> >> Subject: RE: New IE zero day exploit in the wild >> >> >> >> >> >> >> >> Seems to be XP / Windows Server 2003 only? >> >> >> >> Cheers >> >> >> >> Ken >> >> >> >> >> >> >> >> ________________________________ >> >> >> >> From: Alex Eckelberry [[email protected]] >> >> Sent: Tuesday, 7 July 2009 5:56 AM >> >> To: NT System Admin Issues >> >> Subject: New IE zero day exploit in the wild >> >> >> >> Our labs have confirmed this and it is quite nasty. Best bet for now >> >> is >> >> to set the killbits. Or don't use IE. >> >> >> >> >> >> >> >> Some references: >> >> >> >> >> >> >> >> Microsoft: >> >> >> >> >> >> >> >> http://www.microsoft.com/technet/security/advisory/972890.mspx >> >> >> >> >> >> >> >> SANS: >> >> >> >> >> >> >> >> http://isc.sans.org/diary.html?storyid=6733 >> >> >> >> >> >> >> >> I would take this one quite seriously. >> >> >> >> >> >> >> >> Alex >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> > >> > >> > >> > >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> > > > > -- > "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into > the machine wrong figures, will the right answers come out?' I am not able > rightly to apprehend the kind of confusion of ideas that could provoke such > a question." > > http://raythestray.blogspot.com > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
