Lessons Learned From Blaster 312
CowboyRobot writes "It's been nearly a year since Blaster struck, causing hundreds of millions of dollars in fixes and lost revenue.
Jim Morrison of Symantec goes step-by-step in looking at how the Blaster worm got out of control so quickly, and what lessons can be learned from that event, by studying how one utility company dealt with it." The story is written as a fun, technothriller narrative; here's an snippet: "The laptops, usually out in the field, were always a hit-and-miss proposition to find on the network and deliver a patch or to have the user take the machine to a field office. That meant that on the 16th they could see a flood of traffic launched against Microsoft. The second phase of Blaster, launching a DoS (denial of service) attack against windowsupdate.com, was imminent."
Lesson Learned... (Score:4, Insightful)
Re:Lesson Learned... (Score:5, Interesting)
First off... I personally agree with that statement.
Second... I was working a dead end call center job for an ISP when Blaster was running rampant.
Even though this was a Windows problem (and should have been sent to Microsoft), we trouble shooted it since it did technically stop a customer from getting online.
I think after that, nearly every Joe 6-pack finally realized that the thing in his "Start Menu" called "Windows Update" was something to use often.
Re:Lesson Learned... (Score:5, Insightful)
Re:Lesson Learned... (Score:3, Funny)
But how many millions of dollars saved, when people
Re:Lesson Learned... (Score:3, Insightful)
I know what your saying. But it is like gas prices. i was planning on spending 100 dollars to fill up the SUV but i wasn't expecting to spend it all this week. Usually i can make it go a month or so. It throws the budget for other areas out of wack and causes other problems too. I'm sure other people benefited from it. Just let me spend it when i want to spend it, not when someone decided to impress his girlfriend that
Re:Lesson Learned... (Score:3, Interesting)
I had to tell him how to hook up his speakers to his computer. He had a simple 3 speaker system. He never owned a non USB keyboard so when he saw the PS/2 looking connector that was s
Jim has left the building (Score:5, Funny)
Re:Jim has left the building (Score:5, Funny)
'If you build it- they will come....'
Re:AHA so the lizzard king lives... (Score:2)
VPN's aren't perfect pipes (Score:5, Insightful)
A basic firewall on the deployed machine to drop any packet not from the VPN could have stopped this before it started...
Re:VPN's aren't perfect pipes (Score:5, Interesting)
There are some tricky things out there that will take advantage of "internal trust" so my new rule is no PC talks to anything else but its samba, proxy or email server. Windows PC's can't talk to any other Windows PC.
Re:VPN's aren't perfect pipes (Score:5, Interesting)
Good quality routers, eg. HP2524 can be configured for 'port to port security'. So it is actually very easy to configure a system to prevent PCs from blabbing to each other.
If the PCs can only see the servers and the servers are all Linux or Mac boxen, then the system is remarkably robust.
Re:VPN's aren't perfect pipes (Score:2)
I learned from Blaster six months before the fact. (Score:5, Interesting)
When Blaster hit I was sitting pretty and so was every client that took my advice.
*yawn*
Re:I learned from Blaster six months before the fa (Score:4, Insightful)
Re:I learned from Blaster six months before the fa (Score:3, Interesting)
One day, in a galaxy...never mind...One day, internet connections won't even be possible with an exposed PC address. DSL/cable won't even be permitted to conn
Re:I learned from Blaster six months before the fa (Score:3, Insightful)
I'm suprised ISPs aren't taking proactive steps and setting up firewalls in front of their DSL/cable/dialup users. Even a Cisco CBAC firewall or simple router access-lists would be better than nothing. I know some of them block NetBIOS ports, but they should really just block anything incomin
A new best-selling author? (Score:2)
Or a rock star? (Score:2)
Sadly OSX is Next (Score:2, Interesting)
I guess the only thing to learn from the blaster worm is to switch to OSX.
GroupShares Inc. [groupshares.com] - A Free Stock Trading Community. Over a 100 active members daily!
Re:Sadly OSX is Next (Score:5, Informative)
Don't open attachments that you weren't expecting. Get a firewall. A REAL firewall, a HARDWARE firewall. It doesn't have to be expensive, just a little Linksys box or something else designed to act as a router between your PCs and your cable/xDSL modem. Keep your systems patched. Do these things and you'll be just fine.
But, it's the lowest hanging fruit that get eaten first. As long Windows is popular and there are people running the systems unpatched and doing stupid stuff like executing the newest screensaver they got in an e-mail, Windows will be THE target for viruses. OS X and Linux won't become popular targets for viruses untill they are more common, Microsoft does a better job, and the people who use them are less technical (this applies to Linux more than OS X). This paragraph is my speculation, of course.
Re:Sadly OSX is Next (Score:2)
A HARDWARE firewall? Do such things exist? And no.. don't tell me about the one that NVIDIA makes that claims to be hardware-accelerated, as that's all hype. It's actually just a software firewall. All firewalls are software firewalls. It just may happen that the software might be running on a dedicated system (like a Cisco Router) which does nothing but act like a firewall.
Re:Sadly OSX is Next (Score:2, Informative)
They mean a device intended to be a firewall first and foremost, where some other bit of software, like the operating system, can't end up with it's ass hanging out because it runs before/beside/around the firewall. That's all.
Re:Sadly OSX is Next (Score:4, Insightful)
I do have a NAT box, but the problem is that it doesn't solve the problem for everyone - I don't use my laptop only at home; I use it on my school's network too... so if you're anything like me, you need firewall software on the individual computers as well.
Side note - I don't know any good firewall (or antivirus, for that matter) software for OS X; anybody want to suggest some?
Re:Sadly OSX is Next (Score:3, Informative)
Type "man ipfw" in the Terminal, or get Brickhouse and use its wizard.
Re:Sadly OSX is Next (Score:2)
trust me, as a mac user (and i am too) you'
Re:Mac complaints (Score:2)
[offtopic]My pet peeve, for example, is the Finder: it's 2004, why can't they make Finder windows update immediately when a new file is created, and why can't icons stay in the same place when files are modified?! I mean, if Windows has been able to do it for 10 years, it shouldn't be that hard![/offtopic]
That said, it's still much better than Windows ever was (for my use, at least)
Re:Mac complaints (Score:2)
The real irony here being that back in the days of MacOS Classic vs Windows, one of the superiororities touted by Mac Advocates was the way Finder immediately "saw" updated and/or new files while Explorer
Contractor Laptop (Score:5, Insightful)
The first thing you learn in ANY security job is that most breaches are from the inside.
As someone standing right behind the front lines, I will tell you that employees with laptops are the worst. Most end up with administrator access (not that hard to crack if you don't have it). And the fact that they bring their computers home and on the road makes them feel a certain entitlement to install whatever they feel like. Contractors are even worse, since most of the time these laptops ARE their personal PCs. Desktops and servers inside the DMZ are the least likely originators of malware. (Not to say you couldn't surf pr0n on the company mail server as an admin. But then you deserve what you get.)
Network admins need to lock down MAC addresses and start treating their network like the PBX folks. Nothing gets wired except approved company equipment.
Re:Contractor Laptop (Score:2)
On the other hand, I'm probab
Re:Contractor Laptop (Score:4, Informative)
Re:Contractor Laptop (Score:3, Insightful)
Not really. They can just put their NIC into promiscuous mode and watch the traffic on their segment.
Trusted Computing is the answer. (Score:5, Interesting)
If it gets really high, eg 50 or so (your average AOL user) automatically turn on the Windows Firewall, and include a flag on every outgoing packet indicating that the user cannot be trusted to operate their computer in a safe fashion. Webmasters can then block traffic from these PC's at their discretion - Problem solved.
Re:Trusted Computing is the answer. (Score:5, Interesting)
How would having Webmasters looking for a 'trusted' flag solve anything? Users don't infect websites. Webmasters from 'bad sites'(porn, warez, etc) would also have a flag telling them that they have a prime target currently browsing their site. Grab the ip and launch other more nefarious processes against the sitting ducks thus furthering the mayhem.
Re:Trusted Computing is the answer. (Score:2)
If the system allows an ordinary mortal to fsck his computer in the normal line of duty, then the bloody system is broken.
My users do not pick up viruses and shit - they are behind a Linux firewall and e-mail filter and they use Mozilla for browsing and e-mail. They are running anything from Win98 to WinXP and most of those are tota
Re:Trusted Computing is the answer. (Score:2)
Hard exterior, soft gooey interior. One infected laptop gets connected, and it's a field day.
Re:Trusted Computing is the answer. (Score:2)
Hard on top.
Green and chewy and succulent underneath.
Re:Trusted Computing is the answer. (Score:2)
how about a system shouldn't by default run anything not part of the base install and require direct user intervention to run anything else as a start.
It should not be possible (idealy, in reality a few mistakes are inevitable, heck bsd has even had root exploit once!) for a system be compromised in anyway without root access.
Joe sixpack doing everyday normal things and not digging into things he doesn't trully understand(even though he may think he understands them) sh
Re:Trusted Computing is the answer. (Score:3, Insightful)
Re:Trusted Computing is the answer. (Score:2)
Basic employee education is a good start (Score:4, Insightful)
For large corporations, I always quite liked the idea of sending occasional spoofed e-mails with dodgy attachments, similar to your average e-mail virus. If a user opens the attachment, MIS gets notified, and a "three strikes" rule applies.
The first time, they get a polite warning about their behaviour and how damaging it could be if that had been a real virus, and a friendly reminder to read the corporate IT policy. You're not trying to piss these people off and alienate them, you're trying to educate them.
The second time, they get another warning, and all non-essential access revoked for a week: no personal mail, no web browsing, nothing. You might mention that this is the sort of thing that viruses try to do to everyone in the company, which is why it's so important not to run attachments carelessly.
The third time, they get the book thrown at them: automatic formal disciplinary procedures, loss of all personal usage privileges and direct monitoring of their usage by MIS, etc.
Of course, you need some very senior people on your side to make this work, particularly because managers are often the most incompetent in this respect. However, if your CIO has any clout at all, a quick explanation about the impacts of a real virus on the company and the most likely way to get one should get the CFO and CEO on-side.
The nice thing about this approach is that it's fair. No-one who's not a liability will be affected. Anyone who's simply naive will be given a friendly reminder of the danger, and how to avoid it. You have to screw up spectacularly several times before really bad stuff happens. And if you really are that stupid, inconsiderate or incompetent, the rest of the organisation doesn't have to suffer the risk you bring to their livelihoods.
Getting hit by Blaster is like being.... (Score:2, Funny)
Wilderness of Pain
And all the Children
Are insane!
This is the end... (Score:2)
No safety or surprise, the end.
Was Jim singing about Microsoft or SCO?
(Visions of slow-mo helicopter fly-bys and napalm exploding.)
A little too secure for our own good... (Score:5, Insightful)
"We had to do some research, but we found out that the way we locked down the users prevented the patch from running properly," lamented one of the policy admins. "What we discovered was that the software restriction policy for the local computer allowed only local computer administrators to select trusted publishers. Because our patch agent ran as a pseudo user, the agent did not have the necessary rights. This was causing the failure. We changed the group policy for the HR systems so that we can patch remotely from now on."
Sometimes, locking your system too tightly ends up locking the keys in the car. When you really need something to run, it doesn't...
Re:A little too secure for our own good... (Score:2)
However, you have to wonder about the technician, who, after discovering that he has metaphorically locked his keys in his car (cannot patch the system he is being paid to patch), doesn't tell his boss.
You also have to wonder about the company that would keep said people on the payroll after said incident is discovered.
Automatic Updates (Score:3, Interesting)
Included in TCO? (Score:5, Insightful)
On the one hand, virus writers are aggressively pursued and prosecuted with claimed damages of billions of dollars [com.com]; on the other hand, these losses are not included in the TCO of Windows! What gives?
Re:Included in TCO? (Score:3, Interesting)
Re:Included in TCO? (Score:3, Insightful)
all on company time.
Today's Tank McNamara says it all (Score:4, Funny)
NCC 1701-D on Blaster (Score:5, Funny)
Red Alert! All senior officers to the battle bridge. Prepare for saucer seperation in T minus 3 minutes and counting.
Picard: Data, can you locate the origin of infection?
Data: It will take aproximatly 10 minutes to scan each subnet.
Picard: We don't have that kind of time. Number One, options?
Riker: Disconnect the OC3 and raise the firewall, leave no ports open.
Captain: That should buy us some time but we need a better solution than that.
Diana: I am sensing something captain, it feels as if the SUS server has fallen offline, we may have missed the latest patches
Data: Her hypothesis could be correct
We are the Borg, We will assimilate you!
Captain: Damn, and here I was thinking it was The Boy and his nanites again
No offense Wil
Jim Morrison (Score:5, Funny)
He put his boots on.
Inflexable payment policy comes back to bite... (Score:5, Insightful)
Wait a second. Blaster didn't directly cut off any customers. How could the virus cost revenue?
Well, in the case of this story's Mona, it was because her power was cut off despite the fact she had the money to pay her bill through the last-minute pay system. That means a few days that she didn't use power, plus the cost of a needless disconnect that they couldn't charge for.
If the power company had a brain or heart, they would have not done any disconnects due to non-payment during this time frame. Sure, some deadbeats would get 3 days of free power, but the majority of people who missed their payment deadline would happily pay if just given the chance.
In short, they could have saved time and money if the bill collectors would have been told to take some time off...
Re:Inflexable payment policy comes back to bite... (Score:2)
In this case, I bet that some automated software shut the power off because the payment wasn't received. If it had been humans, they could easily be told to wait or contact the customer, but a machine will just do what it was programmed to do.
Re:Inflexable payment policy comes back to bite... (Score:2)
In this case, I'm betting either (1) it didn't occur to the IT people that customers were being shut off, or (2) the slow-moving bureaucratic nature of the utility took over and by the time anybody decided to do anything, the damage was done.
Re:Inflexable payment policy comes back to bite... (Score:2)
Exactly. If they wanted to avoid helping out deadbeats, all they had to do was give the extension only to people who called in to report that they'd been unable to pay. Deadbeats wouldn't bother, because they're probably hop
Re:Inflexable payment policy comes back to bite... (Score:2)
Re:Inflexable payment policy comes back to bite... (Score:2)
Fee's my good man! You think you can just pay your bill at a convience store and not pay an extra fee? You did RTFA right?
DCOMbobulator (Score:4, Informative)
Re:DCOMbobulator (Score:2)
In short, these are three rarely-useful-to-home-users services that were turned on by default in XP Home that shouldn't have been. Microsoft has since reversed their policy and now start only essential services on default installs, but Windows XP Home and Pr
Isn't the lesson simpler than that? (Score:2, Redundant)
Re:Isn't the lesson simpler than that? (Score:2)
I know what I've learned. (Score:2)
2nd article today, and is just M$ bashing (Score:3, Informative)
Simple rules:
1. firewall software (eg. Norton) before connecting
2. You don't use Outlook/Outlook Express and preferably not MSN
3. Preferably don't use IE
4. windowsupdates
5. update your norton firewall/antivirus
Don't get me wrong I'm a OS X, and Debian user, but come one, all I can say is if it wasn't for all the dumb people out there who don't get what I call the essentials I would be unemployed.
Oh crap, I just spilled the beans.
Warren Peace
What about Mona? (Score:3, Interesting)
They didn't include the cost of alienating customers or destroying their own brand image in the post mortem. But then again it would be a breath of fresh air to find a utility company that shows compassion or cares about its own image.
Blasters effect on Cisco (Score:5, Informative)
I was doing some security work for an ISP at the time of blaster. They have a number of Cisco 12000 series GSR routers as well as Foundry Big Iron Switches. For those who are not familiar with the Cisco 12000 series routers, let it be sufficed to say that it is Cisco's biggest, baddest router that stands up to 6 feet tall and comes from the factory with a 4 barrel carburetor, dual testosterone modules and a custom paint job with flames painted on the side (pin stripes are optional). These switches are designed to handle hundreds of gigs of traffic across their backplane and through their interfaces. If the ISP were forewarned that they would be seeing 300 mbps of traffic coming from the MS Blaster worm, they would have said "Bring it on!"
For those of us that aren't CCIE's, Cisco routers and Layer 3 switches have a function called CEF, or Cisco Express Forwarding. CEF is a technology that by its simplest definition caches routes.
If a packet from my computer is destined for yahoo.com, it will first hit the DNS server to resolve the host name to its IP address. My computer will then send packets to my ISP with the destination IP of yahoo.com (66.218.71.198). My ISP's router, presuming it's a Cisco router with CEF enabled, will look at its internet BGP tables and determine the optimal route my packet should take on the internet to arrive at that destination. Once the router has processed the route, it caches it so that all future packets coming from my home IP address, destined for yahoo.com will automatically be routed using the cached route. This takes a tremendous load off the router CPU as each packet no longer needs to be processed by the CPU, hence the term "Express Forwarding".
What the blaster worm did was send out hundreds of thousands of ICMP pings per second. This usually wouldn't be a problem for the router, except for each packet was destined for a unique IP address. What started happening is that each route was looked up, routed, and stored in its cache for future packets - only there weren't any future packets. What happened next was the memory space allocated for caching CEF routes filled up, and once full, the router simply purged its cache so that every packet had to then go to the CPU to be routed. Once this happened, all hell broke loose.
CPU utilization on the routers jumped to 100%, which should never happen under normal conditions, but this was clearly not a normal condition, and the internet came to a crawl.
There we were, with a router that should handle hundreds of gigs across the backplane without breaking a sweat being brought to its knees by 100mb of traffic... it was incredible.
Re:Blasters effect on Cisco (Score:4, Interesting)
I guess it's an example of the kind of attack suggested in http://www.securiteam.com/securityreviews/5AP0V0A
The general idea is that you attack an application by exploiting differences between its average performance and its worst-case performance.
Re:Blasters effect on Cisco (Score:3, Informative)
Part of the process for implementing each router was to configure, and test each unit before we sent shipped them to site. Bad thing about this was the way that did it left the default route out the WAN interface, and not to the next-hop IP.
Once blaster hit it took down more routers than I wa
Why were they running kiosk systems on XP? (Score:3, Informative)
They're lucky that Blaster was removable by remote control. A more effective virus would lock out any attempt to change system files.
Re:Why were they running kiosk systems on XP? (Score:3, Interesting)
Suggestions for Microsoft and other OS vendors (Score:4, Informative)
2) On buisness workstations, all network accessible services should also default off, but the administrator should be able to provide a configuration to enable services needed for remote management.
3) Unneeded use of privledged accounts should be actively discouraged. M$ - consider defaulting to popping up "don't do anything stupid" reminders to users running with administrator rights under "end-user" versions of windows. Make it easier to obtain administrator rights when needed without having to log off and log back on. Educate users about the "Run As User" facility.
4) Operating systems designed for end users should have a facility to lock down the system temporarily while doing emergency maintainance, a "No services" mode if you will, which allows the user to obtain updates without being exposed while doing so.
5) While it can be argued that automatic updates are themselves a security risk, in practice, lack of updates are a far bigger risk. Anything thats remotely exploitable should be updated frequently and automatically by default.
6) Reboots are absolutely unacceptable to many users. Microsoft needs to work harder to eliminate unneeded reboots, *including* making changes to the way file locking works so that a reboot isn't needed to replace a file that's in use, or so that the affected subsystems can be stopped and restarted without restarting the entire system.
7) While blaster didn't use ActiveX, quite a bit of spyware and other ratware does. Fully executable web pages without any kind of sandboxing is a bad idea. Please, Microsoft, *disable* ActiveX out of the box, or require controls to be manually authorized by the administator by adding them to an "Allowed controls" list in the Tools -> Internet Options dialog - NOT as a pop up "Do you want to install and run" box.
8) Expand user education campaigns. Encourage users to obtain basic computer training, and a basic understanding of computer security.
9) Provide readily accessable documentation that adresses security concerns. Warning labels get old, but perhaps a big red "STOP: Please review this security information" is appropriate.
10) Discourage software developers from enabling network-accessible services automatically. (Hopefully the "new" Windows Firewall in SP2 will go a long ways towards making users aware of what they are running, but time will tell.)
Lost in the shuffle (Score:2)
Monopoly power companies (Score:2)
How were they stupid? Lots of ways, including poor security and using Windows for critical systems.
What we do (Score:3, Informative)
1. DHCP access listing. (Indexed systems get ips, others don't)
2. Router Access lists (in non-cisco language port filtering)
3. Heavily restricted nat firewalls (ipcop+snort)
4. NAV/Deep Freeze (www.faronics.com... if you can use it, do... no spyware, no viruses, no deliberate destruction of the local system, reboot and it's all fixed.)
5. Software Update Services (Deepfreeze plays nice if you schedule it right)
So obviously we use windows... and obviously we have a relatively secure (at least from the current and past virus/worm attacks.)
About 95-99% of the systems on a campus are frozen. In the case of an outbreak we can shutdown all systems (removing the obviously infected systems from the DHCP access list) and booting the frozen systems back up. This is assuming the virus is 0 day, and it hits us before the SUS updates...
Still there are horrible gaping holes... for instance, a virus that spreads quickly, before a patch is released, and happens to still be spreading during the SUS thaw could result in a complete infection... but the odds there are pretty slim. And really, it puts us in a better position for 23 hours a day... and on par with most companies for 1 hour a day.
Lesson NOT learned.... (Score:2)
I learned my lesson... (Score:2, Funny)
"Lessons Learned" == SHUDDER (Score:4, Insightful)
Second, they vow to not let contractor notebooks on their network without a thorough security vetting. Great, more IT-fascism, and totally impractical. IT needs to support the organization's business objectives, not obstruct them. If you have an attorney who bills $400/hour coming in to meet with the Chief Counsel, and he's got one hour before he has to drive to the airport, who is going to hold him up and scan his notebook? What if you screw it up in the process? There are lots of more practical solutions to this problem, once you accept the basic fact that IT is not an end in itself but just a business enabler.
Also, did you notice how Windows' overly complicated permission system caused a disaster? The machines were locked down to prevent tampering, which prevented the patch scripts from running. In the end, they had to send people out to each location to fix the machines. I've never had this problem with Unix, because Unix permissions are simple and logical; therefore a sysadmin can easily understand the implications of any permission setting.
I particularly liked the phrase (quoting from memory) "one of the policy admins". One? Not only do they seem to have a full time employee maintaining these tragic "policies", but they have a team? And still caused a train wreck? Windows is close to being a job-creation program for mediocre technical types.
Massive distributed computing (Score:4, Interesting)
It did nothing to the files, just rebooted the computer, and waited for a precise date to attack Microsoft site. I wanted to participate to this huge distributed computing effort.
To do this, no patch was required: just open the control panel, clic on ugly icons, and go to the RPC panel. Here, I was surprised to see that the main annoying comportment of this worm was due to a default windows setting!
The default option on RPC failure is to "restart computer"! So I chose the "restart service" option for every failure and that worked fine! All my friends could now live with this worm and contribute to this distributed computing effort!
Default options in Windows are users' worst choices: restart the computer on every failure!! The most funny, an stupid, one is the default restart computer on... boot failure!
To Fix every virus under Windows, put a Knoppix CD in your box and then restart your computer for the last time.
Missing the point (Score:3, Interesting)
Patching is dead. In a world where worms can spread faster than patches, patching is by definition a failed paradigm.
Of course, too much so-called security business depends on the model of adding layer after layer after layer (each layer another product that can be sold) to achieve "security". Whereas security (without quotation marks) is often reached by reducing rather than increasing complexity.
My bet is 18 months or less before a worm uses some exploit in an anti-virus or anti-worm software to propagate.
Re:Missing the point (Score:3, Insightful)
There has already been a worm that disabled a software firewall. It was a 3rd party one, I believe the name was BlackIce.
Re:Missing the point (Score:5, Interesting)
1. Microsoft's update system has been less than simple to date. Ex:
Update 00dflkjsd_9 - fixes a flaw in some obscure dll which you have no idea if you use or even have installed. Only install this update if you are having problems with some arbitrary function after installing update fskjsdf_3. ( I have no idea what update fskjsdf_3 IS, never mind if I've had trouble with it. If I install this anyway, will it cause me trouble that it was trying to fix?)
Yea, I made it up, but that's my impression of some items I've seen the few times I've had to update a windows machine. (I run OS X myself). This is compounded by MS's apparent refusal or inability to "roll up" updates in to "service packs" on a regular basis.
2. You have, until recently, been forced to launch MSIE and specifically visit WindowsUpdate to check for updates, Only MSIE works and there was no automated checking feature. To my knowledge auto-check is only available in XP. The large number of users in corporations don't have any need to upgrade from 2000, or 98/95 and don't have the auto-check feature.
3. Once you are at the site and see there are updates to install, you might have to reboot the system several times. MS is quite fond of "exclusive installers" where you can only choose the one update to install, then reboot and move on to others. From a clean install, this will usually require at least three reboots on an XP box. For a small home machine this may only take two minutes per reboot, but for self monitoring servers a reboot can take up to 10 minutes what with memory tests, system checks, RAID startup, clock syncing, etc.
The questions I have for Microsoft are:
Why can't you issue a service pack for XP already? All the patches are verified, just apply them cumulatively in a single unified installer.
Why aren't the existing patches on the new CDs and systems that people are purchasing? Surely MS has the clout to force the integrators to apply existing patches before shipping a system. There's absolutely no reasonable excuse for a brand new system from HP, Dell, or Gateway to arrive with security holes that were identified and patched two years ago.
Re:Missing the point (Score:3, Interesting)
Re:How many times do people have to be told (Score:5, Insightful)
Re:How many times do people have to be told (Score:5, Informative)
Re:How many times do people have to be told (Score:3, Funny)
Re:How many times do people have to be told (Score:5, Insightful)
Re:How many times do people have to be told (Score:3, Interesting)
First off, blaster wasn't spread through email attachments. But for the helluvit, here's my corresponding question: when will mail server admins learn to stop allowing attachments with .scr, .com, .exe, etc extensions?
Re:How many times do people have to be told (Score:3, Insightful)
Seriously though, it's a good idea to auto-flag such emails and make the recieving user jump through a simple hoop or two to recieve those, but you can't just auto-delete such in many environments, there can be legitimate reasons for sending such things.
But for one thing, e-mail clients should at least pop up a warning bo
URL for GCIH analysis of Blaster (Score:4, Interesting)
Re:URL for GCIH analysis of Blaster (Score:2)
Re:Transactions? (Score:5, Informative)
Re:Transactions? (Score:2)
Re:Auto Patching Worms (Score:2, Informative)
Re:Auto Patching Worms (Score:2)
It'd be great, but it would have too much liability for anyone to actually do it. Maybe there should be a "white hat good samaritan law" or something.
I thought he was with The Doors. (Score:4, Funny)
Re:Strange... [slightly OT] (Score:3, Informative)
Re:Strange... [slightly OT] (Score:2)
Re:Out of control? (Score:3, Funny)
MCSE-minesweeper consutant and solitare expert.
Re:Out of control? (Score:5, Funny)
Re:Well... (Score:2)