Tuesday, August 12, 2003, 1:05:28 PM, Spike wrote:
S The risk is MINIMAL as long as you have not altered the
S default settings in TB! This is under Options Preferences
S Warnings. As long as you don't EXECUTE any questionable
S attachment that comes through, you will probably be OK.
I'm a
Hello tbudlers,
Further to this, you MUST make sure that your Windows installation has
been FULLY patched with all the latest updates. This vulnerability
has been addressed, but ONLY if you have regularly and RELIGIOUSLY
executed all the updates. If you fail to do this, you are vulnerable.
12-Aug-2003 19:05, [EMAIL PROTECTED] wrote:
The risk is MINIMAL as long as you have not altered the default
settings in TB! This is under Options Preferences Warnings. As
long as you don't EXECUTE any questionable attachment that comes
through, you will probably be OK.
Sorry for
12-Aug-2003 19:15, [EMAIL PROTECTED] wrote:
H. The tool just crashed with a memory error after running for
several minutes.
Has anyone else run this?
If ran it on various WinXP systems today without problems.
--
Best regards,
Alexander (http://www.neurowerx.de)
Almost anything you do
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
@13-Aug-2003, 16:13 Marck [MDP] in
mid:[EMAIL PROTECTED] said to Dave:
MDP Date : 12-Aug-2003, 13:15 -0400 (18:15 UK time)
MDP From : Dave Kennedy [EMAIL PROTECTED]
MDP Refr : mid:[EMAIL PROTECTED]
More apologies. I was trying to forward this
Hello All,
moderator
While the moderators certainly wish to foster a community within the
TB users so that we can all help each other, this thread would be more
suitable for discussion on the TBOT lists.
1. This is not an e-mail centric worm.
2. It has nothing to do with TB even remotely.
3.
Date : 12-Aug-2003, 13:15 -0400 (18:15 UK time)
From : Dave Kennedy [EMAIL PROTECTED]
Refr : mid:[EMAIL PROTECTED]
Original Message ~
Tuesday, August 12, 2003, 1:05:28 PM, Spike wrote:
S The risk is MINIMAL as long as you have not altered the
S default
Hello Spike,
On Tue, 12 Aug 2003 12:23:46 -0500 GMT your local time,
which was Wednesday, August 13, 2003, 12:23:46 AM (GMT+0700) my local time,
Spike wrote:
There is a tool available to check for (and remove) BLASTER at:
Ah, yes... the layman's article. I love the fact that the web link
for MS is http://cgi.money.cnn.com/mgi/mgi_search?QUERY=MSFT and
there's no link for downloading the patches to fix things up.
-Mark Wieder
Using The Bat! v1.63 Beta/7 on Windows 2000 5.0 Build 2195 Service Pack 2
--
Hello Spike,
On Tue, 12 Aug 2003 12:23:46 -0500 GMT (13/08/2003, 00:23 +0700 GMT),
Spike wrote:
Further to this, you MUST make sure that your Windows installation has
been FULLY patched with all the latest updates. This vulnerability
has been addressed, but ONLY if you have regularly and
Hello Alexander,
On or about Tuesday, August 12, 2003 at 19:23:08GMT +0200 (which was
12:23 PM in the tropics where I live) Alexander posted:
A Sorry for continuing this OT thread, but I find it highly
A important.
A Spike, what you write is just plain wrong. Blaster is not dependant
A on email
11 matches
Mail list logo