From: Digest To: "OS/2GenAu Digest" Date: Sat, 16 Aug 2003 00:03:57 EST-10EDT,10,-1,0,7200,3,-1,0,7200,3600 Subject: [os2genau_digest] No. 681 Reply-To: X-List-Unsubscribe: www.os2site.com/list/ ************************************************** Friday 15 August 2003 Number 681 ************************************************** Subjects for today 1 Warm, fuzzy feelings : Ian Manners" 2 Re: Warm, fuzzy feelings : Voytek Eymont 3 Re: Warm, fuzzy feelings : bob 4 Re: Warm, fuzzy feelings : John Angelico" 5 Re: Warm, fuzzy feelings : bob **= Email 1 ==========================** Date: Fri, 15 Aug 2003 01:37:55 +1000 (EST) From: "Ian Manners" Subject: Warm, fuzzy feelings Blaster rewrites Windows worm rules. It leaves a nice, warm, fuzzy feeling to see eCS & OS/2 mentioned. http://www.theregister.co.uk/content/56/32327.html Cheers Ian Manners http://www.os2site dot com/ All of life's problems can be solved with the proper caliber. ---------------------------------------------------------------------------------- **= Email 2 ==========================** Date: Fri, 15 Aug 2003 15:27:48 From: Voytek Eymont Subject: Re: Warm, fuzzy feelings ** Reply to note from "Ian Manners" Fri, 15 Aug 2003 01:37:55 +1000 (EST) > Blaster rewrites Windows worm rules. > > It leaves a nice, warm, fuzzy feeling to see eCS & OS/2 mentioned. > > http://www.theregister.co.uk/content/56/32327.html -------------------------------------- From: "Kerstin Baxter" <0_51110_346ED564-A400-4E27-ADA2-60E29E1403AD_AU at Newsletters.Microsoft dot com> Subject: =?iso-8859-1?Q?Actions_for_the_Blaster_Worm_-_Special_Edition=2C_Microsof?= Date: Thu, 14 Aug 2003 21:53:52 -0700 Dear Microsoft Partner, As you would be aware, on 11 August, 2003 Microsoft began investigating a report of a worm, known as W32.Blaster.Worm that exploits the vulnerability addressed by Microsoft Security Bulletin MS03-026. Microsoft originally released this critical security bulletin and corresponding patch for Windows operating systems on 16 July, 2003. While you may not notice the presence of the worm infection at all on your computer systems or your customers' computer systems, typical symptoms may include Windows XP and Windows Server 2003 systems rebooting every few minutes without user input or Windows NT 4.0 and Windows 2000 systems becoming unresponsive. If you or your customers applied security patch MS03-026 prior to the discovery of the Blaster worm, your system is secure from the vulnerability that W32.Blaster.Worm is using. For the most current information on determining if your systems are infected and how to recover from the infection, please visit the following local Web site and perform the prescribed steps: http://go.microsoft dot com/?linkid=221102 This site will be updated as more information regarding the W32.Blaster.Worm becomes available. Our goal is to provide you with the information and tools you need to help run your business and that of your customers safely and reliably. When we become aware of these types of vulnerabilities, it is our goal to share protection and remediation information with you as quickly as is possible. -------------------------------------- Voytek Eymont ---------------------------------------------------------------------------------- **= Email 3 ==========================** Date: Fri, 15 Aug 2003 13:47:56 +0800 From: bob Subject: Re: Warm, fuzzy feelings Speaking of blaster... Looks like the DoS payload has hit... microsoft dot com is no longer accessible (at least from here in Perth) -- Stult's Report: Our problems are mostly behind us. What we have to do now is fight the solutions. ---------------------------------------------------------------------------------- **= Email 4 ==========================** Date: Fri, 15 Aug 2003 18:59:42 +1000 (AEST) From: "John Angelico" Subject: Re: Warm, fuzzy feelings On Fri, 15 Aug 2003 13:47:56 +0800, bob wrote: > >Speaking of blaster... Looks like the DoS payload has hit... microsoft dot com >is no longer accessible (at least from here in Perth) That's interesting/odd/curious! Most pundits were predicting that MS could easily circumvent the DoS because the hardcoded name windowsupdate dot com was incorrect - the correct address is windowsupdate.microsoft dot com. Best regards John Angelico OS/2 SIG os2 at melbpc dot org dot au or talldad at kepl dot com dot au ___________________ PMTagline v1.50 - Copyright, 1996-1997, Stephen Berg and John Angelico .... Making predictions is very difficult - especially about the future! ---------------------------------------------------------------------------------- **= Email 5 ==========================** Date: Fri, 15 Aug 2003 17:45:46 +0800 From: bob Subject: Re: Warm, fuzzy feelings On Fri, 15 Aug 2003 04:59 pm, you wrote: > On Fri, 15 Aug 2003 13:47:56 +0800, bob wrote: > >Speaking of blaster... Looks like the DoS payload has hit... > > microsoft dot com is no longer accessible (at least from here in Perth) > > That's interesting/odd/curious! > > Most pundits were predicting that MS could easily circumvent the DoS > because the hardcoded name windowsupdate dot com was incorrect - the correct > address is windowsupdate.microsoft dot com. May have been something transitory, microsoft dot com is now visible again here (though is was out for at least a couple of hours... maybe routing problems, given the blackouts on the US east coast) > Best regards > John Angelico -- All things that are, are with more spirit chased than enjoyed. -- Shakespeare, "Merchant of Venice" ----------------------------------------------------------------------------------