• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

oh noes, have I been haxored?

i was getting that same problem til i installed this

HERE

and if youre on a router. i recommend taking yourself off DMZ and disable any ports that are being forwarded.
 
there is a recent RPC vulnerability being taken advantage of across the internet, grab patches just to be safe.
 
Originally posted by: akabanekurodo
i was getting that same problem til i installed this

HERE

and if youre on a router. i recommend taking yourself off DMZ and disable any ports that are being forwarded.

Had similar experience a while back found info on it here that led me to the above link. does not mean youve been hacked but there was a possible attempt.
 
Originally posted by: yoda291
Originally posted by: CheapArse
can anyone explain for the network noobs, such as myself.. 🙂

What do you need explained? How to get updates? WTF is RPC?

i have no clue what RPC is, or what you are talking about here: "recent RPC vulnerability being taken advantage of across the internet"
 
Yes. It means you've been h4x0r3d.

You only get that message/restart after the attacker has done their business and disconnected (the rpc service fails at this point).

If you kept any plain text passwords/credit card numbers/nude pictures of your mum on your hdd, consider yourself fux0r3d.

Later.. :beer:
 
Originally posted by: xcript
Yes. It means you've been h4x0r3d.

You only get that message/restart after the attacker has done their business and disconnected (the rpc service fails at this point).

If you kept any plain text passwords/credit card numbers/nude pictures of your mum on your hdd, consider yourself fux0r3d.

Later.. :beer:

You're kidding?
 
Originally posted by: paruhd0x
Originally posted by: xcript
Yes. It means you've been h4x0r3d.

You only get that message/restart after the attacker has done their business and disconnected (the rpc service fails at this point).

If you kept any plain text passwords/credit card numbers/nude pictures of your mum on your hdd, consider yourself fux0r3d.

Later.. :beer:

You're kidding?

Nope. Sorry. 🙁

Here, you may need this: :beer::beer::beer:
 
Originally posted by: xcript
Originally posted by: paruhd0x
Originally posted by: xcript
Yes. It means you've been h4x0r3d.

You only get that message/restart after the attacker has done their business and disconnected (the rpc service fails at this point).

If you kept any plain text passwords/credit card numbers/nude pictures of your mum on your hdd, consider yourself fux0r3d.

Later.. :beer:

You're kidding?

Nope. Sorry. 🙁

Here, you may need this: :beer::beer::beer:


More like :beer::beer::beer::beer::beer::beer:

Darn hackers!
 
Originally posted by: paruhd0x
Originally posted by: xcript
Originally posted by: paruhd0x
Originally posted by: xcript
Yes. It means you've been h4x0r3d.

You only get that message/restart after the attacker has done their business and disconnected (the rpc service fails at this point).

If you kept any plain text passwords/credit card numbers/nude pictures of your mum on your hdd, consider yourself fux0r3d.

Later.. :beer:

You're kidding?

Nope. Sorry. 🙁

Here, you may need this: :beer::beer::beer:


More like :beer::beer::beer::beer::beer::beer:

Darn hackers!

It wasn't necessarily a leet haxor.

It's far more likely to have been some lame kiddy who downloaded/built the concept code (which is readily available to anyone who wants it).

The group who released the information gave microsoft plenty of time to come up with a patch (which they did, surprisingly enough). But most people don't seem to keep updated.

But yeah, as in any situation, the more beer the better.

Later.. :beer:
 
Not necessarily. I killed an svchost process one time and I got that same message. Double check your internet security and windows patches just to be safe, but I doubt you were hacked if you were messing with running processes.
 
Originally posted by: yoda291
there is a recent RPC vulnerability being taken advantage of across the internet, grab patches just to be safe.

And serious enough for microsoft to go beyond there normal security bulletins with this email:

*** PLEASE NOTE: Due to the critical importance of this message,
this communication is being sent to all of our Microsoft customers
to alert you of this Security Bulletin. ***

It has been widely reported in the press and on Microsoft's own web
site, that on July 16th we released a critical security bulletin
(MS03-026) and a patch regarding a vulnerability in the Windows
operating system. We wanted to make sure that if you were not aware
of this bulletin and corresponding patch that you take a moment to
go to
http://www.microsoft.com/security/ security_bulletins/ ms03-026.asp <http://email.microsoft.com/m/s.asp?HB9706961764X2612303X228387X> to find out if you are running an affected version of
the Windows operating system and get the specific information as to
what you need to do to apply this patch if you have not already.

Although we encourage you to pay attention to all security bulletins
and to deploy patches in a timely manner we wanted to call special
attention to this particular instance as we have become aware of
some activity on the internet that we believe increases the
likelihood of the exploitation of this vulnerability. Specifically,
code has been published on several web sites that would allow
someone to spread a worm/virus that takes advantage of the
vulnerability in question thereby impacting your
computing environment.

Although it is our goal to produce the most secure and dependable
products possible, we do become aware of these types of
vulnerabilities. In order to minimize the risks of such
vulnerabilities to your computing environment, we encourage you to
subscribe to the Windows Update service by going to
http://www.windowsupdate.com <http://email.microsoft.com/m/s.asp?HB9706961764X2612304X228387X> and also subscribe to Microsoft's
security notification service at
http://register.microsoft.com/ subscription/subscribeme.asp?ID=135 <http://email.microsoft.com/m/s.asp?HB9706961764X2612305X228387X> if you have not already. By
subscribing to these two services you will automatically receive
information on the latest software updates and the latest security
notifications thereby improving the likelihood that your computing
environment will be safe from worms and viruses that occur.

We apologize for any inconvenience the implementation of this patch
might cause and appreciate you taking the time to update
your system.

Thank you,
Microsoft Corporation
 
Back
Top