Date : 12-Aug-2003, 13:15 -0400 (18:15 UK time)
From : "Dave Kennedy" <[EMAIL PROTECTED]>
Refr : mid:[EMAIL PROTECTED]

>~~~~~~~~~~~~~~~~~~~~~~~~ Original Message ~~~~~~~~~~~~~~~~~
Tuesday, August 12, 2003, 1:05:28 PM, Spike wrote:
S> The risk is MINIMAL as long as you have not altered the
S> default settings in TB!   This is under Options > Preferences
S> > Warnings. As long as you don't EXECUTE any questionable
S> attachment that comes through, you will probably be OK.

I'm a little confused about by what you're saying. My reading of
the MS bulletin says Blaster is a worm that propagates via the
RPC ports. If you're on-line and nothing is blocking ports 135,
139, & 445 you can get infected even without e-mail.

Does Blaster also propagate via e-mail?  If so, then TB!'s
warnings about executing attachments will make a difference.

PS - Thank you to Alexander <[EMAIL PROTECTED]> (neuroWerx) for
his pointer to the Symantec Blaster scanner/removal tool. I'm
running it now. Here's the link for others who might have missed
that post:
http://www.sarc.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html

Hmmmm. The tool just crashed with a memory error after running
for several minutes.

Has anyone else run this?

--
Dave Kennedy


________________________________________________
Current version is 1.62r | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html


>~~~~~~~~~~~~~~~~~ End of Original Message ~~~~~~~~~~~~~~~~~
________________________________________________
Current version is 1.62r | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to