Stella_Omega
No Gentleman
- Joined
- Jul 14, 2005
- Posts
- 39,700
for our windows users, I have copy-and-pasted from a friends blog;
computer security circles are rumbling a bit about a big virus already embedded in millions of machines and set to receive new instructions on April 1. I don't know enough to say whether this is a real issue or just sky-is-falling stuff, but practising good computer hygiene is very important anyway. Read this.
http://unixronin.livejournal.com/651277.html
(Yes, I checked snopes.com before posting this: it pointed to this cnet article.)
http://news.cnet.com/8301-1009_3-10204590-83.html
One reassuring point about is that, if "Eastern bloc country" hackers out to make money are behind this, they don't want the networks to go *down*. They are in it for business purposes. They make the actual money by selling more messages going outward for spammers.
They want the networks working.
They may not want servers already in use to do some of the jobs they're supposed to, however, such as filter your spam.
*eyeroll*
As the cnet article notes:
..The Canadian Internet Registration Authority is taking steps to block domains generated in Conficker code that fall in the .ca top-level domain from being used in the botnet, the nonprofit agency said. "If other domain registries were able to do the same thing it would go a long way toward helping mitigate some of the ability for the botnet to breathe," Ferguson said.
Conficker has proved to be such a nuisance that Microsoft has even offered a $250,000 reward for information leading to an arrest in the Conficker case...
http://news.cnet.com/microsoft-offers-$250000-reward-for-conficker-arrest/
What can I do?
Computer users should apply the Microsoft patch and update their antivirus and other security software.
http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
Windows users should also apply a Microsoft update
http://www.microsoft.com/technet/security/advisory/967940.mspx
for the AutoRun feature in Windows that was released in February. The patch allows people to selectively disable the Autorun functionality for drives on a system or network to provide more security, to ensure that it is truly disabled. In addition to putting USB drive users
http://news.cnet.com/8301-1009_3-10104496-83.html
at risk of Conficker and other viruses, the Autorun functionality has been blamed for infections from digital photo frames and other storage types.
http://news.cnet.com/8301-1009_3-10104496-83.html
Panda also has released a free "vaccine" tool for blocking viruses that spread through USB drives.
http://news.cnet.com/8301-1009_3-10137032-83.html
Microsoft has a Conficker removal tool.
http://support.microsoft.com/kb/962007
More botnet information and removal resources are on the Shadowserver Web site.
http://www.shadowserver.org/wiki/pmwiki.php?n=Main.HomePage
computer security circles are rumbling a bit about a big virus already embedded in millions of machines and set to receive new instructions on April 1. I don't know enough to say whether this is a real issue or just sky-is-falling stuff, but practising good computer hygiene is very important anyway. Read this.
http://unixronin.livejournal.com/651277.html
(Yes, I checked snopes.com before posting this: it pointed to this cnet article.)
http://news.cnet.com/8301-1009_3-10204590-83.html
One reassuring point about is that, if "Eastern bloc country" hackers out to make money are behind this, they don't want the networks to go *down*. They are in it for business purposes. They make the actual money by selling more messages going outward for spammers.
They want the networks working.
They may not want servers already in use to do some of the jobs they're supposed to, however, such as filter your spam.
*eyeroll*
As the cnet article notes:
..The Canadian Internet Registration Authority is taking steps to block domains generated in Conficker code that fall in the .ca top-level domain from being used in the botnet, the nonprofit agency said. "If other domain registries were able to do the same thing it would go a long way toward helping mitigate some of the ability for the botnet to breathe," Ferguson said.
Conficker has proved to be such a nuisance that Microsoft has even offered a $250,000 reward for information leading to an arrest in the Conficker case...
http://news.cnet.com/microsoft-offers-$250000-reward-for-conficker-arrest/
What can I do?
Computer users should apply the Microsoft patch and update their antivirus and other security software.
http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
Windows users should also apply a Microsoft update
http://www.microsoft.com/technet/security/advisory/967940.mspx
for the AutoRun feature in Windows that was released in February. The patch allows people to selectively disable the Autorun functionality for drives on a system or network to provide more security, to ensure that it is truly disabled. In addition to putting USB drive users
http://news.cnet.com/8301-1009_3-10104496-83.html
at risk of Conficker and other viruses, the Autorun functionality has been blamed for infections from digital photo frames and other storage types.
http://news.cnet.com/8301-1009_3-10104496-83.html
Panda also has released a free "vaccine" tool for blocking viruses that spread through USB drives.
http://news.cnet.com/8301-1009_3-10137032-83.html
Microsoft has a Conficker removal tool.
http://support.microsoft.com/kb/962007
More botnet information and removal resources are on the Shadowserver Web site.
http://www.shadowserver.org/wiki/pmwiki.php?n=Main.HomePage