• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Quick w32.blaster question

Fiveohhh

Diamond Member
Just wondering if you need to open an attachment to get it, or if it works on its own somehow. I reada a few descriptions, and it sounded like something needed to be executed, but not for sure.
Thanks
 
You don't have to download it to get infected. Just disable RPC in services and you should be okay to go. Also apply NTFS security policy (create & Deny Everyone group to al permission) on tftp.exe under System32 directory, then update & patch your computer as soon as you can.
 
Originally posted by: lowtech
You don't have to download it to get infected. Just disable RPC in services and you are should be okay to go. Also apply NTFS security policy (create & Deny Everyone group to al permission) on tftp.exe under System32 directory, then update & patch your computer as soon as you can.
isn't RPC one of those services a lot of stuff depended on (ie: disabling makes the computer as useful as it would be unplugged from the wall). The patch is tiny, might as well do it right.

I read this morning any unpatched PC can be expected to be infected within 25 minutes of connecting to the internet.
 
heh, someone on campus for the summer got it in 5 minutes.

i'm really glad school hasn't started yet here... it'd be hell on campus for the internet.
 
Originally posted by: MrBond
Originally posted by: lowtech
You don't have to download it to get infected. Just disable RPC in services and you are should be okay to go. Also apply NTFS security policy (create & Deny Everyone group to al permission) on tftp.exe under System32 directory, then update & patch your computer as soon as you can.
isn't RPC one of those services a lot of stuff depended on (ie: disabling makes the computer as useful as it would be unplugged from the wall). The patch is tiny, might as well do it right.

I read this morning any unpatched PC can be expected to be infected within 25 minutes of connecting to the internet.
Remote Procedure Call (RPC) is use for remote access. RPC also use for HTTP (if you are runing IIS server). Disable RPC & audit the tftp.exe (Trivial File Transfer Protocol) should stop the Blaster worm that is currently runing out there & stop any hacker that try to use the trtpd flaw on your computer. Best method is to keep up with the patch, have a firewall & stop/audit services that you are not using, or simply unplug your computer from the internet.
 
Back
Top