This is what we practise, regarding Windows XP updates. -- OS patches (like Service Packs) and security patches= go for them. Download from Microsoft. -- Hardware-related drivers (like motherboard chipset drivers/utilities, BIOS updates, video card drivers, etc.) = obtain them from the hardware vendors directly. Make sure the driver you select is for Windows XP. Upgrade when you need to, not routinely. -- Turn off Autoupgrade in Windows XP.
Stan Loo ----- Original Message ----- From: "David M. Blocker" <[EMAIL PROTECTED]> To: "RBASE-L Mailing List" <[EMAIL PROTECTED]> Sent: Wednesday, August 13, 2003 8:08 PM Subject: [RBASE-L] - Re: New Worm > May I get some clarification here? > > Several months ago there were many many warnings on this site that it was > NOT a good idea to automatically use all the updates Microsoft sent out for > XP computers. This advice was emphatic and came from MANY of you. As a > result I have NOT EVER gone to MS site to get updates. > > NOW I'm hearing - keep current! Get all the updates!! > > Can someone please tell me: > > 1. In plain english, yes or no: the updates are a good idea? Or is it not > that simple? And if not, what to do? > > 2. The specific steps - website address / options on that screen to pick, > steps to follow - to protect against this worm. > > The Norton site on this stinks - it gives highly technical steps to follow > to block the invasion (e.g. "Block these ports") without any specific > directions on how to do it. > > I've yet to see a straightforward, Razzak style > > Step 1 > Step 2 > > etc. description of what to do! > > Any help out there? > > David Blocker > > ----- Original Message ----- > From: "Ben Johansen" <[EMAIL PROTECTED]> > To: "RBASE-L Mailing List" <[EMAIL PROTECTED]> > Sent: Wednesday, August 13, 2003 2:24 PM > Subject: [RBASE-L] - Re: New Worm > > > > I agree, > > > > MS had a patch out for this worm 3 weeks ago. Just once a week go to > > windows update. > > > > I would do it before August 16th because this worm is set to launch a > > DDOS attack on the windows update site then ;-) > > > > Ben Johansen - http://www.pcforge.com > > Authorized Witango Reseller http://www.pcforge.com/WitangoGoodies.htm > > Authorized MDaemon Mail Server Reseller > > http://www.pcforge.com/AltN.htm > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of J. > > Stephen Wills > > Sent: Wednesday, August 13, 2003 11:09 AM > > To: RBASE-L Mailing List > > Subject: [RBASE-L] - Re: New Worm > > > > As some have said, and I would re-iterate, everyone please apply ALL the > > necessary patches/updates fm Microsoft as it appears, TTBOMK, that > > simply > > removing the offending virus is not (necessarily) a preventive measure. > > That is, a system will still be vulnerable, anti-virus code > > notwithstanding, > > to such attacks if its O/S is not also made current. > > > > My $0.02, > > Steve in Memphis > > > > ----- Original Message ----- > > From: "Ben Johansen" <[EMAIL PROTECTED]> > > To: "RBASE-L Mailing List" <[EMAIL PROTECTED]> > > Sent: Wednesday, August 13, 2003 12:33 PM > > Subject: [RBASE-L] - Re: New Worm > > > > > > > Hi, > > > > > > The people that fight these viruses are like bloodhounds. Once one of > > > the big virus fighting labs catches wind of the virus, all of the > > major > > > players are notified. > > > > > > They go so far as to take a computer reformat it to a generic/standard > > > setup un-infected and then infect it with the one virus and then the > > go > > > in and log all the changes (registry, new files, check sum on existing > > > files) > > > > > > With the number of Eye looking, it is practically impossible for any > > > remnants of the virus or another virus to be left once you have run > > one > > > of the cleaners from the various labs. > > > > > > So, once it is clean, it is Clean > > > > > > Ben Johansen - http://www.pcforge.com > > > Authorized Witango Reseller http://www.pcforge.com/WitangoGoodies.htm > > > Authorized MDaemon Mail Server Reseller > > > http://www.pcforge.com/AltN.htm > > > > > > > > > -----Original Message----- > > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dennis > > > Fleming > > > Sent: Wednesday, August 13, 2003 6:38 AM > > > To: RBASE-L Mailing List > > > Subject: [RBASE-L] - Re: New Worm > > > > > > Thanks Ben, > > > > > > Some of my customers have asked if after they have loaded the Windows > > > patch, and virus updates, and their PC is "OK", if there could still > > be > > > any > > > residual damage, time released viruses, etc. > > > > > > I said probably not, but once a virus has invaded your PC, you really > > > don't > > > know. > > > > > > Dennis > > > ***** > > > > > > > > > At 12:43 AM 8/13/2003 -0700, you wrote: > > > >Hi, > > > > > > > >>(I'm convinced my ISP wasn't clean.) > > > >I don't think this is the case, upon reading about the worm, you will > > > find > > > >out that the worm takes an infected system and starts looking for ip > > > address > > > >with the ports open and not patched with the MS patch. > > > >So it could have been any of the hijacked computers just coming at > > you > > > over > > > >the internet. Now it still could be you ISP but you would have to > > look > > > in > > > >log files (if on a server) to see. > > > > > > > >Workstations can be infected by this also > > > > > > > > > > > >Details of this virus can be found here: > > > >http://www.viruslist.com/eng/viruslist.html?id=61577 > > > > > > > >Summary of what it does: > > > >http://www.kaspersky.com/news.html?id=985139 > > > > > > > >Ben Johansen - http://www.pcforge.com > > > >-Authorized WiTango Reseller > > > > http://www.pcforge.com/WitangoGoodies.htm > > > >-Authorized Alt-N Reseller > > > > http://www.pcforge.com/AltN.htm > > > > > > > >-----Original Message----- > > > >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Dennis > > > >Fleming > > > >Sent: Tuesday, August 12, 2003 6:38 PM > > > >To: RBASE-L Mailing List > > > >Subject: [RBASE-L] - Re: New Worm > > > > > > > > > > > >For anyone else experiencing the joys of the world of computing... > > > > > > > >The problem I had was Norton removed W32.Blaster.worm, but then it > > kept > > > >coming back until I finally loaded the Windows XP patch. (I'm > > convinced > > > my > > > >ISP wasn't clean.) > > > > > > > >The MS download for XP is: WindowsXP-KB823980-x86-ENU.EXE > > > > > > > >My lesson today: It's not enough just keeping your virus definitions > > up > > > to > > > >date. You need to check on the critical Windows updates too. > > > > > > > >Dennis > > > >***** > > > > > > > > > > > >At 12:46 PM 8/1/2003 -0700, you wrote: > > > >>I had it on four of my computers here. I do not know how it came in > > > yet. > > > >> > > > >>I went to the symantec website. They have a removal tool for it. > > > Really > > > >easy > > > >>to remove. > > > >> > > > >>Dan > > > >> > > > >>-----Original Message----- > > > >>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of > > Dennis > > > >>Fleming > > > >>Sent: Tuesday, August 12, 2003 10:42 AM > > > >>To: RBASE-L Mailing List > > > >>Subject: [RBASE-L] - Re: New Worm > > > >> > > > >> > > > >>What was the probable source of this worm? (i.e., why didn't my ISP > > > pick it > > > >>up?) > > > >> > > > >>What a pain! I would love to be in a locked room with all the worms > > > who > > > >>write worms and viruses for just a day. > > > >> > > > >>Thanks for the heads-up, > > > >> > > > >>Dennis > > > >> > > > >> > > > >>At 11:00 PM 8/11/2003 -0400, you wrote: > > > >>>Buddy, > > > >>>It's called W32.Blaster.worm > > > >>>The symptom is, it will perform a shutdown as soon as you boot up, > > it > > > >>>generously gives you a minute to close any open processes. > > > >>>You have to reboot in safe mode with networking to do the > > following. > > > >>> > > > >>>I got it. Now it's gone, took me several hours. > > > >>> > > > >>>If using NAV goto www.sarc.com for instructions > > > >>>Basically do regedit, find msblast.exe and delete it. > > > >>>In XP Pro run task mgr and if cmd.exe is running, highlight it and > > > click > > > >>>end process > > > >>> > > > >>>Before doing all this you should set system restore off, so what U > > R > > > doing > > > >>>doesn't get registered in case you have to roll back. > > > >>>Then go to > > > >http://securityresponse.symantec.com/avcenter/defs.download.html > > > >>>This will download the urgent visrus defs. The live update is only > > > updated > > > >>>each Wednesday, this site has the downloads for virus's found > > > immediately. > > > >>> > > > >>>Good Luck > > > >>>----- Original Message ----- > > > >>>From: "Walker, Buddy" <[EMAIL PROTECTED]> > > > >>>To: "RBASE-L Mailing List" <[EMAIL PROTECTED]> > > > >>>Sent: Monday, August 11, 2003 7:12 PM > > > >>>Subject: [RBASE-L] - New Worm > > > >>> > > > >>> > > > >>> > > > >>> > > > >>>You may want to take a look at this URL: > > > >>>http://isc.sans.org/diary.html?date=2003-08-11 > > > >>> > > > >>>It's a new RPC worm that is going around. If one of your client > > > machines > > > >>>has it, it may be spread it to the server. > > > >>> > > > >>>Buddy > > > >>> > > > >>> > > > >>> > > > >>Dennis Fleming > > > >>IISCO > > > >>http://www.TheBestCMMS.com > > > >>Phone: 570 775-7593 > > > >>Fax: 570 775-9797 > > > >> > > > >> > > > >> > > > >Dennis Fleming > > > >IISCO > > > >http://www.TheBestCMMS.com > > > >Phone: 570 775-7593 > > > >Fax: 570 775-9797 > > > > > > > > > > > > > > > Dennis Fleming > > > IISCO > > > http://www.TheBestCMMS.com > > > Phone: 570 775-7593 > > > Fax: 570 775-9797 > > > > > > > >

