This is what we practise, regarding Windows XP updates.

-- OS patches (like Service Packs) and security patches= go for them.
Download from Microsoft.
-- Hardware-related drivers (like motherboard chipset drivers/utilities,
BIOS updates, video card drivers, etc.) = obtain them from the hardware
vendors directly.  Make sure the driver you select is for Windows XP.
Upgrade when you need to, not routinely.
-- Turn off Autoupgrade in Windows XP.

Stan Loo

----- Original Message -----
From: "David M. Blocker" <[EMAIL PROTECTED]>
To: "RBASE-L Mailing List" <[EMAIL PROTECTED]>
Sent: Wednesday, August 13, 2003 8:08 PM
Subject: [RBASE-L] - Re: New Worm


> May I get some clarification here?
>
> Several months ago there were many  many warnings on this site that it was
> NOT a good idea to automatically use all the updates Microsoft sent out
for
> XP computers. This advice was emphatic and came from MANY of you.  As a
> result I have NOT EVER gone to MS site to get updates.
>
> NOW I'm hearing - keep current! Get all the updates!!
>
> Can someone please tell me:
>
> 1. In plain english, yes or no: the updates are a good idea? Or is it not
> that simple? And if not, what to do?
>
> 2.  The specific steps - website address / options on that screen to pick,
> steps to follow - to protect against this worm.
>
> The Norton site on this stinks - it gives highly technical steps to follow
> to block the invasion (e.g. "Block these ports") without any specific
> directions on how to do it.
>
> I've yet to see a straightforward, Razzak style
>
> Step 1
> Step 2
>
> etc. description of what to do!
>
> Any help out there?
>
> David Blocker
>
> ----- Original Message -----
> From: "Ben Johansen" <[EMAIL PROTECTED]>
> To: "RBASE-L Mailing List" <[EMAIL PROTECTED]>
> Sent: Wednesday, August 13, 2003 2:24 PM
> Subject: [RBASE-L] - Re: New Worm
>
>
> > I agree,
> >
> > MS had a patch out for this worm 3 weeks ago. Just once a week go to
> > windows update.
> >
> > I would do it before August 16th because this worm is set to launch a
> > DDOS attack on the windows update site then ;-)
> >
> > Ben Johansen - http://www.pcforge.com
> > Authorized Witango Reseller http://www.pcforge.com/WitangoGoodies.htm
> > Authorized MDaemon Mail Server Reseller
> > http://www.pcforge.com/AltN.htm
> >
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of J.
> > Stephen Wills
> > Sent: Wednesday, August 13, 2003 11:09 AM
> > To: RBASE-L Mailing List
> > Subject: [RBASE-L] - Re: New Worm
> >
> > As some have said, and I would re-iterate, everyone please apply ALL the
> > necessary patches/updates fm Microsoft as it appears, TTBOMK, that
> > simply
> > removing the offending virus is not (necessarily) a preventive measure.
> > That is, a system will still be vulnerable, anti-virus code
> > notwithstanding,
> > to such attacks if its O/S is not also made current.
> >
> > My $0.02,
> > Steve in Memphis
> >
> > ----- Original Message -----
> > From: "Ben Johansen" <[EMAIL PROTECTED]>
> > To: "RBASE-L Mailing List" <[EMAIL PROTECTED]>
> > Sent: Wednesday, August 13, 2003 12:33 PM
> > Subject: [RBASE-L] - Re: New Worm
> >
> >
> > > Hi,
> > >
> > > The people that fight these viruses are like bloodhounds. Once one of
> > > the big virus fighting labs catches wind of the virus, all of the
> > major
> > > players are notified.
> > >
> > > They go so far as to take a computer reformat it to a generic/standard
> > > setup un-infected and then infect it with the one virus and then the
> > go
> > > in and log all the changes (registry, new files, check sum on existing
> > > files)
> > >
> > > With the number of Eye looking, it is practically impossible for any
> > > remnants of the virus or another virus to be left once you have run
> > one
> > > of the cleaners from the various labs.
> > >
> > > So, once it is clean, it is Clean
> > >
> > > Ben Johansen - http://www.pcforge.com
> > > Authorized Witango Reseller http://www.pcforge.com/WitangoGoodies.htm
> > > Authorized MDaemon Mail Server Reseller
> > > http://www.pcforge.com/AltN.htm
> > >
> > >
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dennis
> > > Fleming
> > > Sent: Wednesday, August 13, 2003 6:38 AM
> > > To: RBASE-L Mailing List
> > > Subject: [RBASE-L] - Re: New Worm
> > >
> > > Thanks Ben,
> > >
> > > Some of my customers have asked if after they have loaded the Windows
> > > patch, and virus updates, and their PC is "OK", if there could still
> > be
> > > any
> > > residual damage, time released viruses, etc.
> > >
> > > I said probably not, but once a virus has invaded your PC, you really
> > > don't
> > > know.
> > >
> > > Dennis
> > > *****
> > >
> > >
> > > At 12:43 AM 8/13/2003 -0700, you wrote:
> > > >Hi,
> > > >
> > > >>(I'm convinced my ISP wasn't clean.)
> > > >I don't think this is the case, upon reading about the worm, you will
> > > find
> > > >out that the worm takes an infected system and starts looking for ip
> > > address
> > > >with the ports open and not patched with the MS patch.
> > > >So it could have been any of the hijacked computers just coming at
> > you
> > > over
> > > >the internet. Now it still could be you ISP but you would have to
> > look
> > > in
> > > >log files (if on a server) to see.
> > > >
> > > >Workstations can be infected by this also
> > > >
> > > >
> > > >Details of this virus can be found here:
> > > >http://www.viruslist.com/eng/viruslist.html?id=61577
> > > >
> > > >Summary of what it does:
> > > >http://www.kaspersky.com/news.html?id=985139
> > > >
> > > >Ben Johansen - http://www.pcforge.com
> > > >-Authorized WiTango Reseller
> > > > http://www.pcforge.com/WitangoGoodies.htm
> > > >-Authorized Alt-N Reseller
> > > > http://www.pcforge.com/AltN.htm
> > > >
> > > >-----Original Message-----
> > > >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Dennis
> > > >Fleming
> > > >Sent: Tuesday, August 12, 2003 6:38 PM
> > > >To: RBASE-L Mailing List
> > > >Subject: [RBASE-L] - Re: New Worm
> > > >
> > > >
> > > >For anyone else experiencing the joys of the world of computing...
> > > >
> > > >The problem I had was Norton removed W32.Blaster.worm, but then it
> > kept
> > > >coming back until I finally loaded the Windows XP patch. (I'm
> > convinced
> > > my
> > > >ISP wasn't clean.)
> > > >
> > > >The MS download for XP is: WindowsXP-KB823980-x86-ENU.EXE
> > > >
> > > >My lesson today: It's not enough just keeping your virus definitions
> > up
> > > to
> > > >date. You need to check on the critical Windows updates too.
> > > >
> > > >Dennis
> > > >*****
> > > >
> > > >
> > > >At 12:46 PM 8/1/2003 -0700, you wrote:
> > > >>I had it on four of my computers here. I do not know how it came in
> > > yet.
> > > >>
> > > >>I went to the symantec website. They have a removal tool for it.
> > > Really
> > > >easy
> > > >>to remove.
> > > >>
> > > >>Dan
> > > >>
> > > >>-----Original Message-----
> > > >>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> > Dennis
> > > >>Fleming
> > > >>Sent: Tuesday, August 12, 2003 10:42 AM
> > > >>To: RBASE-L Mailing List
> > > >>Subject: [RBASE-L] - Re: New Worm
> > > >>
> > > >>
> > > >>What was the probable source of this worm? (i.e., why didn't my ISP
> > > pick it
> > > >>up?)
> > > >>
> > > >>What a pain! I would love to be in a locked room with all the worms
> > > who
> > > >>write worms and viruses for just a day.
> > > >>
> > > >>Thanks for the heads-up,
> > > >>
> > > >>Dennis
> > > >>
> > > >>
> > > >>At 11:00 PM 8/11/2003 -0400, you wrote:
> > > >>>Buddy,
> > > >>>It's called  W32.Blaster.worm
> > > >>>The symptom is, it will perform a shutdown as soon as you boot up,
> > it
> > > >>>generously gives you a minute to close any open processes.
> > > >>>You have to reboot in safe mode with networking to do the
> > following.
> > > >>>
> > > >>>I got it.  Now it's gone, took me several hours.
> > > >>>
> > > >>>If using NAV goto www.sarc.com for instructions
> > > >>>Basically do regedit, find msblast.exe and delete it.
> > > >>>In XP Pro run task mgr and if  cmd.exe is running, highlight it and
> > > click
> > > >>>end process
> > > >>>
> > > >>>Before doing all this you should set system restore off, so what U
> > R
> > > doing
> > > >>>doesn't get registered in case you have to roll back.
> > > >>>Then go to
> > > >http://securityresponse.symantec.com/avcenter/defs.download.html
> > > >>>This will download the urgent visrus defs. The live update is only
> > > updated
> > > >>>each Wednesday, this site has the downloads for virus's found
> > > immediately.
> > > >>>
> > > >>>Good Luck
> > > >>>----- Original Message -----
> > > >>>From: "Walker, Buddy" <[EMAIL PROTECTED]>
> > > >>>To: "RBASE-L Mailing List" <[EMAIL PROTECTED]>
> > > >>>Sent: Monday, August 11, 2003 7:12 PM
> > > >>>Subject: [RBASE-L] - New Worm
> > > >>>
> > > >>>
> > > >>>
> > > >>>
> > > >>>You may want to take a look at this URL:
> > > >>>http://isc.sans.org/diary.html?date=2003-08-11
> > > >>>
> > > >>>It's a new RPC worm that is going around.  If one of your client
> > > machines
> > > >>>has it, it may be spread it to the server.
> > > >>>
> > > >>>Buddy
> > > >>>
> > > >>>
> > > >>>
> > > >>Dennis Fleming
> > > >>IISCO
> > > >>http://www.TheBestCMMS.com
> > > >>Phone: 570 775-7593
> > > >>Fax:   570 775-9797
> > > >>
> > > >>
> > > >>
> > > >Dennis Fleming
> > > >IISCO
> > > >http://www.TheBestCMMS.com
> > > >Phone: 570 775-7593
> > > >Fax:   570 775-9797
> > > >
> > > >
> > > >
> > > Dennis Fleming
> > > IISCO
> > > http://www.TheBestCMMS.com
> > > Phone: 570 775-7593
> > > Fax:   570 775-9797
> > >
> >
> >
>

Reply via email to