• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

WORM - MS rpc bug -- See the OT and Operating Systems Stickies. AT Moderator

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
I just got a call from my dad having the affects of this worm. He said he never updated windows, didn't know he had. His words were " I bought a DELL, they did it for me". lol
 
Spidey07,

Alright smarty pants. I run a network of over 500 client PCs and 20 servers by myself. Patching doesn't get done without testing being done. Blind roll-outs are the bain of a Systems Administrator's job. Always, always, always test before roll-out. That's rule #1 of software updates, especially Windows updates. Granted, on a very large network, the scale of yours, it can be a pain to test, especially if you have various types of machines and various types of installs, but you still test, test, test prior to roll-out. I've spent 8 hours testing patches that I thought might be problematic or that did present problems to other users. Research prior to roll-out is the #2 step in the process.

Do you know that the feds are considering or at least have considered fining Sys. Admins and corporations for leaving exploits unpatched? That lit a fire under my behind and I've been more vigilant ever since, just in case it does happen.
 
one more reason to go with unix,
i dont have problesm on my macs and my firewall blocks the crap.

How do you get infected though? Just from the malformed RPC call?
 
Back
Top