How lucky for you. Heh.

Still on Win2k3 here, and likely to be so for quite a while.

On Tue, Jul 7, 2009 at 12:14, James Rankin<[email protected]> wrote:
> I'm pushing it out via Group Policy Preferences. 2008 rocks
>
> 2009/7/7 Kurt Buff <[email protected]>
>>
>> I'm just pushing out the .reg file in the login script:
>>
>>     regedit /s \\fileserver\public\patches\videokillbits.reg
>>
>> The file was easy to create, in a capable editor (not notepad or
>> wordpad) that allows metacharacter search and replace, such as '\n'
>> for CRLF and '\t' for tab. I used the ancient, no-longer-supported
>> PFE32. I really should switch to VIM, I suppose.
>>
>> On Tue, Jul 7, 2009 at 08:40, Eric
>> Wittersheim<[email protected]> wrote:
>> > I'm pushing out the .reg via GP.  So far so good.
>> >
>> > On Tue, Jul 7, 2009 at 10:38 AM, David Lum <[email protected]> wrote:
>> >>
>> >> The “Microsoft fix-it” is an MSI that I am pushing via SMS and is
>> >> pushing
>> >> fine (so far just a few test cases have it, but no issues). Beats
>> >> trying to
>> >> push out a .REG or something…
>> >>
>> >>
>> >>
>> >> David Lum // SYSTEMS ENGINEER
>> >> NORTHWEST EVALUATION ASSOCIATION
>> >> (Desk) 971.222.1025 // (Cell) 503.267.9764
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >> From: J Kyo [mailto:[email protected]]
>> >> Sent: Tuesday, July 07, 2009 8:18 AM
>> >> To: NT System Admin Issues
>> >> Subject: Re: New IE zero day exploit in the wild
>> >>
>> >>
>> >>
>> >> Curious if anyone has used the "Microsoft Fix It" from:
>> >> http://support.microsoft.com/kb/972890.
>> >>
>> >> On Mon, Jul 6, 2009 at 6:24 PM, Carl Houseman <[email protected]>
>> >> wrote:
>> >>
>> >> Recommendation from MS is to set the killbits everywhere.
>> >>
>> >>
>> >>
>> >> http://www.microsoft.com/technet/security/advisory/972890.mspx
>> >>
>> >>
>> >>
>> >> Carl
>> >>
>> >>
>> >>
>> >> From: Ken Schaefer [mailto:[email protected]]
>> >> Sent: Monday, July 06, 2009 9:06 PM
>> >>
>> >> To: NT System Admin Issues
>> >>
>> >> Subject: RE: New IE zero day exploit in the wild
>> >>
>> >>
>> >>
>> >> Seems to be XP / Windows Server 2003 only?
>> >>
>> >> Cheers
>> >>
>> >> Ken
>> >>
>> >>
>> >>
>> >> ________________________________
>> >>
>> >> From: Alex Eckelberry [[email protected]]
>> >> Sent: Tuesday, 7 July 2009 5:56 AM
>> >> To: NT System Admin Issues
>> >> Subject: New IE zero day exploit in the wild
>> >>
>> >> Our labs have confirmed this and it is quite nasty.  Best bet for now
>> >> is
>> >> to set the killbits. Or don't use IE.
>> >>
>> >>
>> >>
>> >> Some references:
>> >>
>> >>
>> >>
>> >> Microsoft:
>> >>
>> >>
>> >>
>> >> http://www.microsoft.com/technet/security/advisory/972890.mspx
>> >>
>> >>
>> >>
>> >> SANS:
>> >>
>> >>
>> >>
>> >> http://isc.sans.org/diary.html?storyid=6733
>> >>
>> >>
>> >>
>> >> I would take this one quite seriously.
>> >>
>> >>
>> >>
>> >> Alex
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >
>> >
>> >
>> >
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>
>
>
> --
> "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
> the machine wrong figures, will the right answers come out?' I am not able
> rightly to apprehend the kind of confusion of ideas that could provoke such
> a question."
>
> http://raythestray.blogspot.com
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to