A PREMIUM TANDOORI PIZZA, PLEASE
Check out this TIME cover story article on how not only software jobs pay high but also jobs in Call Center, BPOs and other MNCs. Say all you want bad about globalization, but you can’t deny that it has improved the general living standards of current working-class generation in India. This article confirms just that:
TIME Global Business Cover Story
Comments
Thursday, August 21, 2003
Tuesday, August 12, 2003
MSBLAST WORM - ISNT THE NAME IRONIC?
You know you've got it when a 60 second shutdown timer pops up on your screen. The virus uses the RPC vulnerability. It looks like it's reaching critical mass today.
Here how to prevent it and remove it:
http://reviews.cnet.com/4520-6600_7-5062389.html
You dont have to open an email or go to a webpage to get this worm. Here's an excerpt from the article on how it spreads:
"MSBlast does not spread via e-mail. Instead, it scans the Internet on port 135 looking for vulnerable computers. When it finds one, it attempts to exploit the DCOM RPC buffer overflow, create a remote root shell on TCP port 4444, then use FTP to download a file called msblast.exe onto the infected computer.
MSBlast contains a denial-of-service (DoS) attack aimed at Microsoft's windowsupdate.com. The attack will start on August 15 and continues throughout the end of the year. MSBlast updates the system Registry with the following line so that it will run each time the computer is rebooted.
Hkey_local_machine\software\Microsoft\Windows\CurrentVersion\ Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! Bill "
If you had already applied a MS patch issued on July 17, 2003 (MS03-026), you are safe.
[Sorry, for the lack of updates for a while!]
You know you've got it when a 60 second shutdown timer pops up on your screen. The virus uses the RPC vulnerability. It looks like it's reaching critical mass today.
Here how to prevent it and remove it:
http://reviews.cnet.com/4520-6600_7-5062389.html
You dont have to open an email or go to a webpage to get this worm. Here's an excerpt from the article on how it spreads:
"MSBlast does not spread via e-mail. Instead, it scans the Internet on port 135 looking for vulnerable computers. When it finds one, it attempts to exploit the DCOM RPC buffer overflow, create a remote root shell on TCP port 4444, then use FTP to download a file called msblast.exe onto the infected computer.
MSBlast contains a denial-of-service (DoS) attack aimed at Microsoft's windowsupdate.com. The attack will start on August 15 and continues throughout the end of the year. MSBlast updates the system Registry with the following line so that it will run each time the computer is rebooted.
Hkey_local_machine\software\Microsoft\Windows\CurrentVersion\ Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! Bill "
If you had already applied a MS patch issued on July 17, 2003 (MS03-026), you are safe.
[Sorry, for the lack of updates for a while!]
Subscribe to:
Posts (Atom)