Our customers say...

" there are real people to speak to at Virtual who, are always helpful even when dealing with "technically challenged" "

C.T.


MS Blast Worm Print

13/8/03

 

By now I expect that you've heard about the latest worm roaming the Internet. It's already known by many names, but we'll call it "MS Blaster". We first heard about it on Tuesday morning, and it has spread very rapidly by all accounts.

 

While it's arrival date and time weren't announced in advance, the fact that it came was no surprise. The worm exploits a security flaw in a component of Microsoft's Windows NT, 2000 and XP. This flaw was patched during July, and those of you who regularly check the Windows Update site (http://windowsupdate.microsoft.com) or use the "Automatic Update" feature in Windows are probably safe from it's invasive travels of the Internet.

 

The primary effect of this worm that you will notice is undesired rebooting of your PC. There are also reports that security information could become compromised, and your PC could form part of a "Distributed Denial of Service" (DDoS) attack on Microsoft's Windows Update web site. It could be much worse, but then again it's hard to get work done on a PC that's always rebooting. Prevention is always better than cure.

 

Rather than re-hash other people's work, we recommend checking these web sites for more details:

 

 


 

 

1. http://woodyswatch.com/windows/archtemplate.asp?6-14

 

Woody Leonhard is a well-known author of many books. His writing style is not only easy to read, but is easily understood by most computer users. Woody has presented the important facts about MS Blaster and key links to other web sites in a brief, straightforward issue of Woody's Windows Watch.

 

While you're there check out the instructions for subscribing to Woody's Windows Watch and Woody's Office Watch. We find them to be of great value, and they're FREE!

 

2. http://www.f-secure.com/v-descs/msblast.shtml and/or http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html

 

These documents contain detailed technical information about the worm, it's detection and it's removal, including links to removal tools.

 

 



Ultimately, if you have this worm, (or think that you do) and you don't understand the removal instructions, the best advice is to seek help from a local computer store or consultant.

 

Please note that while we always seek to be helpful and accommodating, this isn't a matter that can or should be addressed by our help desk. We provide the help desk as a service to you in support of your use of our Internet services. That obviously doesn't include assistance with virus removal. Such help should be sought elsewhere, from specialists in the field. While our consultants know a thing or two about viruses and the like, their specialty is Internet support. Please help to keep our costs to a minimum by directing your questions to more appropriate organisations.

 

Virtual Access customers who also subscribe to the Command AntiVirus service (not the free online version, the paid service) can seek any assistance required directly from Command Software. See your CAV subscription email for contact details.

 

 
RECENT ADDITIONS
POPULAR PAGES
CURRENT NEWS