hey computer guys: is this ok?

TORONTO-VIGILANTE

ad interim...
Forum Member
Dec 27, 2000
16,122
3
0
51
"...Quo fas et gloria ducunt..."
read this article from toronto's national newspaper, i'd like to know if this guy knows what he's talking about.
__________________________________________

Here's how to deworm your computer:

If you think you've got the lovsan worm on your computer, you can get rid of it with a few basic steps and a little time, says security expert Tom Slodichak.

The worm seems scary because users don't even have to open an e-mail to catch it, but it's relatively simple to take care of, according to Slodichak.

"This isn't really all that sophisticated a worm. It doesn't try to hide itself like some worms do,'' said Slodichak, chief security officer at WhiteHat Inc., a computer security firm. He suggests taking the following steps to clean up your computer. These instructions work for Windows XP, Windows NT and Windows 2000:

? Hit control-alt-delete to call up the task manager;

? In task manager, select the "processes'' tab;

? In processes, look for a file named msblast.exe, then delete it by clicking "end process;''

That will keep the worm from running while you're still signed on. Next, according to Slodichak, comes getting it off your computer, and downloading a security patch from Microsoft to make sure it can't get on again:

? Using the search tool found under the Start button, search for the file "msblast.exe,'' then delete it;

? Right-click on the recycle bin on your desktop, then choose "empty recycle bin;''

? From the Start button, choose the "Run'' option;

? In the white box that comes up when you choose the "Run'' option, type in "regedit,'' then click OK or hit the Enter key;

? Hit the F3 key, which brings up another search window;

? Search for "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows auto update,'' then delete it;

? Go to Microsoft's Web site (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp) where they've provided a security patch;

? Under the "Patch Availability'' section, choose the operating system you use, then download and install the patch..

To remove msblast.exe from your startup menu, click "Start,'' then "Run,'' then type "MSConfig'' into the space provided. Press "Enter'' and the startup box appears. Click on the rightmost tab "startup,'' look for msblast.exe and uncheck the box beside it

For people using Windows XP, the worm has the annoying habit of constantly rebooting the computer. If that's the case for you, you'll have to take an additional step before you start cleaning things up. When the shutdown dialog box appears on your screen, click Start / Run, then type "shutdown ?a'' and hit Enter. That will keep your computer from rebooting again.
_____________________________________________

thanks for your responses in advance.
 

Stuman

Banned
Forum Member
Nov 5, 2002
800
0
0
Memphrica, Tennessee
Here you go...straight from Microsoft's mouth

Here you go...straight from Microsoft's mouth

You are receiving this message because you are a Microsoft newsletter subscriber. Please print this page for your reference.

It is very important that you check the Security site regularly for the most recent news: http://go.microsoft.com/?linkid=221043

In This Newsletter:
--Who Is Vulnerable
--4 Steps for Home Users

At 11:34 A.M. Pacific Time on August 11, Microsoft began investigating a worm reported by Microsoft Product Support Services (PSS). A new worm commonly known as W32.Blaster.Worm has been identified that exploits the vulnerability that was addressed by Microsoft Security Bulletin MS03-026. Who Is Vulnerable? Users of the following products are vulnerable to infection by this worm:
. Microsoft? Windows NT? 4.0
. Microsoft Windows? 2000
. Microsoft Windows XP
. Microsoft Windows Server(TM) 2003

Your computer is not vulnerable to the Blaster worm if either of these conditions apply to you:
. If you are using Microsoft Windows 95; Windows 98; Windows 98 Second Edition (SE); or Windows Millennium (Me).
. If you downloaded and installed security update MS03-026 prior to August 11, the date the worm was discovered.

4 Steps for Home Users
If you are using Windows NT 4.0, Windows 2000, Windows XP, or Windows Server 2003, you should follow the steps in this sequence to help protect your system and to recover if your system has been infected.

1. Enable a Firewall: Make sure you have a firewall activated to help protect your computer against infection before you take other steps. If your computer has been infected, activating firewall software will help limit the effects of the worm on your computer.

The latest Windows operating systems have a firewall built in. Windows XP and Windows Server 2003 users should print or save the following instructions for how to enable their firewall.

If your computer is rebooting repeatedly, disconnect from the Internet before you enable your firewall. To disconnect your computer from the Internet:

. Broadband connection users: Locate the cable that runs from your external DSL or cable modem to the wall and unplug that cable either from the modem or from the telephone jack.
. Dial-up connection users: Locate the telephone cable that runs from the modem inside your computer to your telephone jack and unplug that cable either from the telephone jack or from your computer.

Follow the instructions provided for your operating system, and then reconnect to the Internet.
. Windows XP Professional users: http://go.microsoft.com/?linkid=221044
. Windows XP Home Edition users: http://go.microsoft.com/?linkid=221045
. Windows Server 2003 users: http://go.microsoft.com/?linkid=221046
. Windows NT 4.0 and Windows 2000 users: You will need to install a third-party firewall. Most firewall software for home users is available in free or trial versions. If you are unable to download a firewall product, please check with your local computer retailer. Check the following resources for more information on personal firewalls:
-- ZoneAlarm Pro (Zone Labs): http://go.microsoft.com/?linkid=221047
-- Tiny Personal Firewall (Tiny Software): http://go.microsoft.com/?linkid=221048
-- Outpost Firewall (Agnitum): http://go.microsoft.com/?linkid=221049
-- Kerio Personal Firewall (Kerio Technologies): http://go.microsoft.com/?linkid=221050
-- BlackICE PC Protection (Internet Security Systems): http://go.microsoft.com/?linkid=221051

Windows 2000 users: Alternatively, you can take steps to block the affected ports so that your computer can be patched. Here are some modified instructions from the TechNet article HOW TO: Configure TCP/IP Filtering in Windows 2000: http://go.microsoft.com/?linkid=221052.

2. Update Windows: If you are disconnected from the Internet, remember to reconnect before you take the next steps. Download and install the security update addressed in Security Bulletin MS03-026 for the version of Windows that you are using from the Microsoft Download Center.
-- Windows NT Server 4.0 and Windows NT Workstation 4.0: http://go.microsoft.com/?linkid=221053

-- Windows NT Server 4.0, Terminal Server Edition: http://go.microsoft.com/?linkid=221054

-- Windows 2000:
http://go.microsoft.com/?linkid=221055

-- Windows XP: The vast majority of Windows XP customers use this version. If you are unsure, it is likely that you are using this version. http://go.microsoft.com/?linkid=221056

-- Windows XP (64 bit): The 64-bit version of Windows XP requires special hardware to run. If you are unsure, it is likely that you are not running this version of Windows XP.
http://go.microsoft.com/?linkid=221057

-- Windows Server 2003:
http://go.microsoft.com/?linkid=221058

-- Windows Server 2003 (64 bit): http://go.microsoft.com/?linkid=221059

3. Use Antivirus Software: Make sure you have the latest updates installed.
. If you already have antivirus software installed, go to your antivirus vendor's Web site to get the latest updates, also known as virus definitions.
. If you do not have antivirus software installed, get it. If you are unable to download antivirus software, please check with your local computer retailer. The following vendors participating in the Microsoft Virus Information Alliance (VIA) offer antivirus products for home users:
. Network Associates: http://go.microsoft.com/?linkid=221060
. Trend Micro: http://go.microsoft.com/?linkid=221061
. Symantec: http://go.microsoft.com/?linkid=221062
. Computer Associates : http://go.microsoft.com/?linkid=221063

Learn about Microsoft's Virus Information Alliance: http://go.microsoft.com/?linkid=221064.

4. Remove the Worm: If you think there is even the slightest possibility that your computer might be infected, use the worm removal tool available at your antivirus vendor's Web site. For additional details on this worm from antivirus software vendors participating in the Microsoft Virus Information Alliance (VIA) please visit the following links:
-- Network Associates: http://go.microsoft.com/?linkid=221065
-- Trend Micro: http://go.microsoft.com/?linkid=221066
-- Symantec: http://go.microsoft.com/?linkid=221067
-- Computer Associates: http://go.microsoft.com/?linkid=221068


Microsoft Communities is your launching pad for communicating online with peers and experts about Microsoft products, technologies, and services: http://go.microsoft.com/?linkid=221041
 
Bet on MyBookie
Top