Date : 12-Aug-2003, 13:15 -0400 (18:15 UK time) From : "Dave Kennedy" <[EMAIL PROTECTED]> Refr : mid:[EMAIL PROTECTED]
>~~~~~~~~~~~~~~~~~~~~~~~~ Original Message ~~~~~~~~~~~~~~~~~ Tuesday, August 12, 2003, 1:05:28 PM, Spike wrote: S> The risk is MINIMAL as long as you have not altered the S> default settings in TB! This is under Options > Preferences S> > Warnings. As long as you don't EXECUTE any questionable S> attachment that comes through, you will probably be OK. I'm a little confused about by what you're saying. My reading of the MS bulletin says Blaster is a worm that propagates via the RPC ports. If you're on-line and nothing is blocking ports 135, 139, & 445 you can get infected even without e-mail. Does Blaster also propagate via e-mail? If so, then TB!'s warnings about executing attachments will make a difference. PS - Thank you to Alexander <[EMAIL PROTECTED]> (neuroWerx) for his pointer to the Symantec Blaster scanner/removal tool. I'm running it now. Here's the link for others who might have missed that post: http://www.sarc.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html Hmmmm. The tool just crashed with a memory error after running for several minutes. Has anyone else run this? -- Dave Kennedy ________________________________________________ Current version is 1.62r | "Using TBUDL" information: http://www.silverstones.com/thebat/TBUDLInfo.html >~~~~~~~~~~~~~~~~~ End of Original Message ~~~~~~~~~~~~~~~~~
________________________________________________ Current version is 1.62r | "Using TBUDL" information: http://www.silverstones.com/thebat/TBUDLInfo.html

