topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Monday November 10, 2025, 5:22 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 11 12 13 14 15 [16] 17 18 19 20 21 ... 50next
376
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 08, 2009, 10:39 PM »
I'm not sure I understand exactly what kind of "proof" you need that's not already out there. Are you under the impression that the analysis of Conficker linked in the first post was made up?

Ehtyar.
377
General Software Discussion / Re: Name The Best UNZIPPER!
« Last post by Ehtyar on April 08, 2009, 01:59 AM »
7-zip for speed and context menu.

Some heavy interface users might prefer PeaZip.

Ehtyar.
378
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 06, 2009, 07:01 AM »
You mean you're doubting it will be updated...right? Not sure how you could convince yourself it doesn't exist at all...

Ehtyar.
379
General Software Discussion / Re: freeware that checks for XML non-compliance
« Last post by Ehtyar on April 06, 2009, 01:33 AM »
Looks like libexpat contains a tool specifically to check xml well-formed-ness. Get a copy here and try out the xmlwf.exe tool.

Ehtyar.
380
Living Room / Update - Some Highlights
« Last post by Ehtyar on April 05, 2009, 07:55 PM »
Some of the more recent funnies mostly from the IRC channel.

Why Joshua Is Straight
(09:36:27) <Metshrine> Man, this guy has a fantastic ass, sometimes I wish I were bi-sexual.
(09:36:52) <Metshrine> but then i remember i would have to take as opposed to just giving, then i know why I am not
(09:37:25) <Lashiec> lmao
-Joshua

Be Nice to People with Special Needs
<mouser> hahhhaha:
<mouser> <Gothi[c]> you're just mean, aren't you?
<mouser> <Gothi[c]> yes but
<mouser> <Gothi[c]> you're nice to metshrine
<mouser> <Gothi[c]> because of your experience with 'special needs'
<mouser> --
<mouser> hahahaahahahahahahaha
<mouser> josh: pwned
-Gothic

Josh's Baby
(11:51:05) <Dell[a]> Metshrine, hows the baby?
(11:51:15) <Metshrine> baby?
(11:51:25) * Metshrine has no baby
(11:51:44) <Metshrine> Thats like asking mouser "How's the PhD"
(11:51:45) <Metshrine> He has none!
(11:51:46) <scancode> can you get a baby by having gay buttsecks
(11:51:49) <CodeByter> Metshrine is pregnant?
(11:51:58) <CodeByter> wowwwwww, ouch scancode
(11:52:00) <Metshrine> scancode: Let's you and me find out
(11:52:06) <scancode> sure
(11:52:08) <Metshrine> :-D
(11:52:09) * scancode assrapes Metshrine
(11:52:11) <Metshrine> I PITCH!
(11:52:18) <Metshrine> NO!!!!!!!!!!!!!!
(11:52:23) <EhtyarWRK> oh dear god
(11:52:39) <CodeByter> um scancode
(11:53:04) * Metshrine looks at his sore anal cavity
(11:53:05) <y0himba> *PERK* Assrape
(11:53:06) * y0himba goes back to lurking.
(11:53:07) <CodeByter> haha
(11:53:08) <scancode> <3 dc
(11:53:12) <Dell[a]> lol y0himba
-half_the_channel

Della and Gothi[c] Sittin' in a Tree
(14:11:12) <lanux128> hey EhtyarWRK
(14:11:38) <EhtyarWRK> yesh lan man?
(14:13:31) <lanux128> just checking
(14:13:37) <lanux128> awful silence in here
(14:14:05) <EhtyarWRK> i just got back from lunch
(14:14:08) * Della bangs on some pots and pans
(14:14:41) <EhtyarWRK> goth man = pots & pans?
(14:14:54) <Della> im not gothic
(14:14:56) <Della> im della
(14:15:07) <EhtyarWRK> read it again
(14:15:27) <Della> ohhhh
(14:15:31) <EhtyarWRK> lol
(14:15:31) <Della> i get it
(14:15:37) * Della chuckles
(14:15:54) <lanux128> but Ehtyar i don't get it
(14:16:53) <EhtyarWRK> if della bangs on pots and pans
(14:17:01) <EhtyarWRK> and those pots and pans are goth man
(14:17:05) <EhtyarWRK> then what is della doing?
(14:17:32) <lanux128> ah! i geddit
(14:17:40) <lanux128> *bangs*
(14:17:54) * Della blushes
(14:18:01) <Della> i dont do that tho, im a good girl
(14:19:55) <EhtyarWRK> LOL
(14:20:08) <EhtyarWRK> boy goth man is gonna be very impressed you said that :P
(14:20:34) <Della> he is? why?
(14:20:52) <EhtyarWRK> coz you basically just told dc goth man gets no sex0r :P
(14:21:04) <Della> ROFL
(14:21:43) <Della> well, we all know THATS not true.....................
(14:22:14) <Della> completely
(14:22:30) <Della> damnit, ima shut up now
-Della

Mouser's Forgotten Date
<lanux128> anyone seen mouser?
<Deozaan> No.
<Deozaan> He must be on a date or something.
<Deozaan> Gone all day.
<Deozaan> !lastspoke mouser
<@MouserBot> mouser last uttered a word on #donationcoder 5 hours, 44 minutes ago.
<Deozaan> See what I mean?
<lanux128> mouser on a date?
<lanux128> you meant coding, right
<Deozaan> No I think he's on a date with a vegetarian woman.
<Deozaan> They're eating a delicious tofu lobster meal.
<Deozaan> After which they'll enjoy some fine tofu wine.
<lanux128> tofu wine -> sake ?
<lanux128> no, that's rice wine
<lanux128> so he's on a date with a delicious woman
<Deozaan> And then in drunken stupor, get into an argument about which coding language is better, C++ or BASIC.
<lanux128> having vegetarian lobster tofu..
<Deozaan> He'll find out she's an Apple lover.
<Deozaan> And it will be the end of the best relationship he's ever had.
<lanux128> hmm.. sounds too fishy
<Deozaan> Then he'll wake up with a hangover and not remember it even happening.
<Deozaan> And say he was just coding all night long.
<lanux128> then again that is probably what would happen :)
-Deozaan

Mouser Mail
(11:55:22) (@Ehtyar) josh never got your email
(11:55:31) (@Metshrine) liar
(11:55:33) (@Metshrine) i have a read receipt
(11:55:34) (@Metshrine) oh wait
(11:55:36) (@Metshrine) i sent it to mouser
(11:55:37) (@Metshrine) FUCK!
(11:55:41) (@Ehtyar) LOL
-Joshua

Ehtyar.
381
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 05, 2009, 07:02 AM »
I found this just now and thought it might be useful. It is a scanner, written by Team White Hat (Dan Kaminsky's crew) in python that should detect Conficker-infected machines.

The scanner can be downloaded as an independent package that can be run without python:
http://iv.cs.uni-bon...ds/media/scs_exe.zip
Simply extract the package and run 'scs <start-ip> <end-ip>' to scan an entire IP range, or 'scs <ip-list-file>' to scan a text file containing a list of IPs to scan. You can also run 'scanner <ip>' to scan a single IP address.
If you're handy with python you can download the source script (it requires the Impacket lib):
http://iv.cs.uni-bon...ploads/media/scs.zip
More info is available at:
http://iv.cs.uni-bon...ontaining-conficker/

Hope these help out in some way.

Ehtyar.
382
Living Room / Re: Tech News Weekly: Edition 14-09
« Last post by Ehtyar on April 05, 2009, 06:47 AM »
8. so if I had the correct transformer could I simply hook up a 12v battery to my computer :tellme: no, I guess not - you'ld have to have some way of getting it to kick in. I dont understand how that is more efficient energywise than a UPS but probably cheaper?
Re cooling - I dont know where they have their servers but somewhere cold would seem logical (Alaska?!)
I believe the shipping containers that house the servers are of the refrigerated kind, but indeed it would seem to be more environmentally friendly to simply house your servers somewhere in Alaska (still, spare a thought for those of us who need Google on the other side of the planet :P).

10. I thought for a minute that the employee was the serial killer ... seems odd too that one person would be connected to all these cotton buds - but I presume it's those medical ones on a long thin piece of wood, so maybe not quite so odd
Hrm, I shall make that clearer in the post I think. The connection to that many crime scenes doesn't really surprise me, though you'd have to wonder how many other employees have been implicated in how many other crimes due to these circumstances..I'm not one to willy-nilly dispense my DNA to the authorities (quite the opposite in fact), but I think in this case I'd be rather eager to do so.

Ehtyar.
383
General Software Discussion / Re: freeware that checks for XML non-compliance
« Last post by Ehtyar on April 05, 2009, 05:37 AM »
CLI is much better for batch operation, which is what Lan Man asked for. I'm happy to help out with a batch file :P

Ehtyar.
384
Living Room / Re: Most Wiki'd Item? HTTP 404
« Last post by Ehtyar on April 05, 2009, 01:38 AM »
Oh that is definitely hilarious, though I certainly fit your "easily amused" and "geek" criteria.

Ehtyar.
385
General Software Discussion / Re: logitech mouse drivers are pure evil
« Last post by Ehtyar on April 05, 2009, 01:35 AM »
As do their webcam drivers.

Ehtyar.
386
General Software Discussion / Re: freeware that checks for XML non-compliance
« Last post by Ehtyar on April 05, 2009, 01:32 AM »
I think you're looking for xmllint. It comes as a part of libxml2.

Ehtyar.
387
Living Room / Tech News Weekly: Edition 14-09
« Last post by Ehtyar on April 05, 2009, 01:01 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
I hope you all enjoy the clip on No 11, courtesy of app103.
As usual, you can find last week's news here.


1. DNA Database Grows Faster Than Forecast
Spoiler
http://www.theregister.co.uk/2009/03/31/dna_database_grows_faster/
The UK's DNS database is fast approaching five million unique entries much sooner than expected.

Over 5m profiles are now on the national DNA database, significantly above the level forecast two years ago.

Home Office minister Alan Campbell has released the figures in response to a parliamentary question from Sarah Teather MP. They show that on 9 January there were 5.14m profiles on the database, although the estimated number of individuals after duplicates were removed was 4.46m.


2. US Supremes Flatline Virginia's Hardline Anti-spam Law
Spoiler
http://www.theregister.co.uk/2009/03/31/virginia_antispam_law_dead/
Anti-spam laws passed in Virginia in 2003 are now officially dead after the US supreme court rejected an appeal to reinstate a felony conviction made possible by the law.

A tough anti-spam law passed by the state of Virginia has officially been declared dead following the refusal by the US Supreme Court to reinstate a felony conviction prosecuted under the statute.

The high court on Monday declined to review an appeal challenging a lower-court ruling that declared the anti-spam law unconstitutional because it barred all anonymous, unsolicited mass emails, including those with political, religious, or other protected content. The September decision by Virginia's Supreme Court, threw out the nine-year sentence of notorious spammer Jeremy Jaynes, who was convicted under the state statute.


3. New Method for Detecting Conficker Discovered, Debuted
Spoiler
http://arstechnica.com/security/news/2009/03/new-method-for-detecting-conficker-discovered-debuted.ars
http://iv.cs.uni-bonn.de/wg/cs/applications/containing-conficker/
http://www.theregister.co.uk/2009/04/03/conficker_zombie_count/
Team White Hat members Dan Kaminsky, Tillmann Werner and Felix Leder have discovered a technique whereby one can discern remotely whether or not a machine is infected with Conficker.
In other news, Vietnamese antivirus firm Bkis has stated the number of currently infected machines sits at around 3.5 million, with the total number of machines hit with the virus up around original estimates.

The clock is ticking down towards Conficker.C's reported April 1 launch date, but an 11th-hour discovery by Team White Hat may substantially improve an IT shop's chance of catching the bug early and stomping on it. The full technical details on the Conficker scanner are being witheld for roughly 24 hours (we'll link the paper when it arrives). If the scanner works as advertised, the security industry will be able to track the spread of Conficker much more effectively than before and neutralize it that much faster.

Security researcher Dan Kaminsky has written a blog post regarding his collaboration with two members of the Honeynet Project, Tillmann Werner and Felix Leder. Kaminsky's words, I think, serve better than my own in this case: "What we’ve found is pretty cool: Conficker actually changes what Windows looks like on the network, and this change can be detected remotely, anonymously, and very, very quickly. You can literally ask a server if it’s infected with Conficker, and it will tell you...We figured this out on Friday, and got code put together for Monday. It’s been one heck of a weekend."


4. UKBA to Exchange Fingerprints With US
Spoiler
http://www.theregister.co.uk/2009/04/03/ukba_overseas_fingerprint_exchange/
The UK will begin sharing their fingerprint database with the US, AU and NZ in "early 2009" in the hopes of preventing identifying and preventing foreign criminals from entering the country.

The UK Border Agency plans to start exchanging fingerprint data with the US, Canada and Australia in the near future

The organization, which gained full executive agency status on 1 April 2009, says in a business plan issued on the same day that that it plans to work with the USA, Canada and Australia to "introduce a system of appropriate data protection arrangements for fingerprint checks and data sharing". This is intended to help identify and bar foreign criminals from entering the country, and is planned for "early 2009".


5. Unpatched PowerPoint Flaw Spawns Trojan Attacks
Spoiler
http://www.theregister.co.uk/2009/04/03/powerpoint_0day_trojan_menace/
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131040
A 0day flaw in Microsoft Office's Powerpoint application is being exploited in the wild to install Trojan Horses on machines running the vulnerable software. The user has to open an infected document, usually disseminated via email.

Microsoft has confirmed that hackers are using an unpatched flaw in PowerPoint to assault vulnerable systems.

The attacks rely on tricking prospective marks into opening a maliciously crafted PowerPoint file, either hosted on a website or sent via email. In both scenarios users would have to open a booby-trapped PowerPoint designed to exploit the vulnerability.


6. Microsoft and TomTom Settle Patent Dispute
Spoiler
http://arstechnica.com/microsoft/news/2009/03/microsoft-and-tomtom-settle-patent-dispute.ars
Microsoft and TomTom have settled out of court over a patent dispute regarding TomTom's use of Microsoft's FAT32 filesystem, with Microsoft the clear winner.

Navigation device-maker TomTom has settled its patent dispute with Microsoft, putting an end to the current round of litigation between the two companies. The terms of the settlement, which were announced by Microsoft on Monday, are said to be fully compliant with GNU's General Public License (GPL).

The conflict between Microsoft and TomTom, which publicly emerged in February, raised serious concerns within the open source software community. Microsoft alleged that TomTom's navigation products, which use the open source Linux kernel, infringe on a handful of Microsoft's patents. Two of the patents cited by Microsoft cover legacy compatibility features in Microsoft's FAT filesystem, support for which is implemented in Linux. Some feared that the lawsuit was the beginning of a patent litigation campaign by Microsoft against embedded Linux adopters.


7. Chinese Cyberespionage Network Runs Across 103 Nations
Spoiler
http://arstechnica.com/security/news/2009/03/potential-chinese-cyberspy-network-runs-across-103-nations.ars
Canadian researchers believe the Chinese spy network dubbed "GhostNet", has infected machines across 103 countries with the gh0st RAT trojan.

The existence and operation of massive, coordinated, government-affiliated online espionage networks is typically the province of television or the silver screen, rather than the subject of  research. In the real world, even a direct link between online and offline action (Russia's invasion of Georgia and the simultaneous online attacks against that country are a good example) is not enough to automatically prove that the government behind the one is automatically behind the other. We've covered the rise of hacktivism previously on Ars; as more citizens come online, we'll undoubtedly see more of this type of crowdsourced aggression in the future.

Researchers in Toronto, however, may have actually discovered and tracked a hacking effort that can be traced back to a foreign intelligence network—China's, in this case—over the past ten months. The team, which is affiliated with the Munk Centre for International Studies, has published an extensive report on the activities of what they dub GhostNet. Their investigation took place from June 2008 through March of 2009, and focused on allegations that the Chinese had engaged in systemic online espionage activities against the Tibetan community. GhostNet was spread through the use of a wide variety of Trojans, many of which were controlled through a program nicknamed gh0st RAT (Remote Access Tool).


8. The Beast Unveiled: Inside a Google Server
Spoiler
http://arstechnica.com/hardware/news/2009/04/the-beast-unveiled-inside-a-google-server.ars
Google have given the media a look at how they run their data centers for the first time. Highlights include the use of batteries instead of UPSs, 1,160 machines per shipping container (not an original idea), and a custom-made Gigabyte motherboard.

Google doesn't talk about its server operations very often; most of what we know boils down to one word: "big." The company lifted the lid ever-so-slightly yesterday (no April Fool), and gave the world a peek inside a data center that's normally locked up tighter than Fort Knox. The results (and the company's focus) might surprise you.

Each Google server is hooked to an independent 12V battery to keep the units running in the event of a power outage. Data centers themselves are built and housed in shipping containers (we've seen Sun pushing this trend as well), a practice that went into effect after the brownouts of 2005. Each container holds a total of 1,160 servers and can theoretically draw up to 250kW. Those numbers might seem a bit high for a data center optimized for energy efficiency—it breaks down to around 216W per system—but there are added cooling costs to be considered in any type of server deployment. These sorts of units were built for parking under trees (or at sea, per Google's patent application).


9. France Approves Main Section of Tough Anti-P2P Bill
Spoiler
http://arstechnica.com/tech-policy/news/2009/04/france-approves-main-section-of-tough-anti-p2p-bill.ars
France has approved the most important sections of a graduated response plan to internet piracy dubbed the toughest in the world that could see repeat offenders internet-less for up to a year at a time.

While New Zealand has decided to scrap its "graduated response" law and rewrite it from scratch, French legislators are pushing ahead to pass the Création et Internet law that would boot repeat file-sharers from the Internet for up to a year at a time. The Assemblée Nationale has just approved the main bit of the controversial bill, and full passage could come shortly.

The Assemblée is working through the many articles and amendments to the proposed law at the moment, assembling a complete package that will eventually be voted on in its entirety. The key part of the bill is article 2 (Google-translated version), which creates the High Authority (La Haute Autorité) that will administer the rules and pronounce suspensions. Article 2 was today approved for inclusion in the final bill.


10. Police Track DNA of a Cotton Bud Maker for Two Years
Spoiler
http://www.bild.de/BILD/news/bild-english/world-news/2009/03/26/phantom-killer-a-myth/police-track-DNA-of-cotton-bud-maker-for-two-years.html
http://scienceblogs.com/authority/2009/03/the_phantom_of_heilbronn_and_n.php
Definitely the crazy story of the week, German police have spent two years, and more than $14 million tracking a serial killer who turned out to be an employee at the factory manufacturing the articles used in DNA evidence collection (who was, in fact, not the serial killer she'd been made out to be).

Police in Germany hunted a sinister phantom killer for two years after finding the same DNA at 39 different crime scenes - only to discover that the source was a woman who made the cotton buds used to collect the sample!

The case was one of the most puzzling in recent times. Hundreds of detectives in six specialist committees were set to work hunting the ominous female serial killer.


11. Whose Line Is It Anyway - Living Scenery With Richard Simmons (Thanks App)
Spoiler
http://www.eyebeemania.co.uk/whose-line-is-it-anyway
A scene from Whose Line is it Anyway with a guest appearance by Richard Simmons.

wliia.png



Ehtyar.
388
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 03, 2009, 03:00 PM »
Yeah, so true. My boss was on McAfee for whatever reason yesterday, and they were doing exactly the same thing. It's always such a disappointment when companies take advantage of consumers' ignorance like that.

Ehtyar.
389
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 02, 2009, 06:53 PM »
Why is it not foolproof? IMO that's a much easier way for users to detect to Conficker than attempting to download a tool from a site that Conficker blocks.

I nearly hit the roof at work this morning when we got an email from the higher-ups about Conficker, suggesting that if you believe you're infected you download a cleaning utility from Microsoft or Symantec, both of which are blocked by Conficker. Would common sense not tell you to have users check for infection by attemping to access, say, microsoft.com and then if they have issues, provide a URL that Conficker doesn't block from which to download your removal tool. What the hell is wrong with these people?

Ehtyar.

[edit]
Now that my ranting impulse has been satisfied, thanks for the link App :)
[/edit]
390
Living Room / Re: Tech News Weekly: Edition 13-09
« Last post by Ehtyar on April 01, 2009, 08:47 PM »
Another thing I noticed about Google long before the media apparently noticed: Google Showing Local Results On Non-Local Queries. I've always searched directly through google.com using browser keywords (visiting google.com redirects me to google.com.au) because I don't want localized results. It stopped being effective several months ago.

Ehtyar.
391
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 01, 2009, 02:59 PM »
Indeed!! I spent far too much time yesterday watching news updates in case there was news. I'd very much like to know what Conficker will morph into when its authors decide to get their act together, though I'm not surprised nothing happened yet, far too much media attention at the moment.

Ehtyar.
392
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 01, 2009, 02:28 PM »
I'm sure that having a NAT router between you an the 'net would go a long way toward preventing the problem (though does having UPNP enabled on the router change that? - It came enabled by default on my most recent router.)
Disabling UPNP is to prevent Conficker from spreading from your network only.

I'm surprised at the number of people who expected the skies to fall and the seas boil today. Wasn't my original post about that not happening? Anyway, just be sure to keep your current protections in place and be prepared for the update to occur sometime soon. If you ask me, an awful lot of work has gone into Conficker for its authors to forget about it now.

Ehtyar.
393
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 01, 2009, 05:26 AM »
But did I get this right - anyone with a legal copy of windows (and that includes people with a legal copy of windows which they installed on several machines, or multiple times on one machine for testing/development purposes) who runs regular updates, is protected by free software, so the only people not protected are the people with pirate copies who don't also have a paid/pirated/free copy of a virus scanner.
Incorrect. You can still be infected if using an easily guessed password or through using an infected USB memory stick. The update only protects you from infection over the internet.

Ehtyar.
394
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 01, 2009, 01:05 AM »
Going to HTTP://ip.number.here often won't work, since the site won't get the "Host: domain.name.com" HTTP header they expect. You'd have to put the IPs in your hosts files, but that file is probably used by DnsQuery() and thus the method is going to fail because Conficker's patching.
Most of the big sites should work as they're on dedicated/load balanced boxes. For the smaller ones, you can use one of a number of methods to send a fake Host header.

Even with a proxy, you'd still be doing the DNS lookup locally - it's only the HTTP connection to the server that's going through the proxy.
F0d Man, were you thinking of a proper proxy? App Lady is talking about a web proxy.

Ehtyar.
395
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 01, 2009, 12:03 AM »
The primary things you need to concern yourself with for infection prevention are:
-Update your Windows
-Use a strong administrative password
-Disable autorun

You might want to consider getting yourself a real-time virus scanner, ClamAV was originally designed for use on mail servers.

Not sure what you mean by having a computer with DMZ disabled. If you meant your router, then yes I would recommend not having a DMZ at all and using port forwarding where necessary.

Ehtyar.
396
Living Room / Re: Tech News Weekly: Edition 13-09
« Last post by Ehtyar on March 31, 2009, 06:01 AM »
Hmm. Would be interesting to know how much of a difference that makes. Anyone else *cough*kartal*cough* willing to weigh in on this one?

Ehtyar.
397
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on March 31, 2009, 05:50 AM »
How does conficker block those URLs? Simply hooking the winsock DNS resolving functions, or setting the machine's DNS server?
Conflicker patches DnsQuery() in memory.

From the Windows Secrets article linked above by PhilB66

Admins of small and large LANs can use OpenDNS as a Domain Name System server.
The firm introduced on Feb. 9 a new, Conficker-specific feature. If an infected PC on a LAN somehow evaded detection, OpenDNS will prevent it from contacting Conficker's control servers. Best of all, admins can read a report showing which PC tried to connect to a Conficker server.

It's nice to have a proactive DNS provider! :)
It will be interesting to see if that applies to the millions of domains potentially generated by Variant C. It also won't effect the p2p update mechanism...

Ehtyar.
398
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on March 31, 2009, 01:25 AM »
C-R-A-P. Anyone have any suggestions on what to resolve? :S

As a universal solution what we want is a utility that will resolve domain names without using the Windows API. Dig and Host will both do it, but neither are particularly user-friendly.

Thanks J-Mac.

Ehtyar.
399
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on March 30, 2009, 11:18 PM »
The Windows Secrets article that Phil lined to above mentions that most A-V sites and the MS Update site will not be reachable if a machine is infected with Conficker, but you can still get there via the IP addresses for htose same sites. So it would be a good idea to get ahold of those IP addresses sometime ahead of 4/1.

Jim
I'm happy to resolve the entire and post it, but I can't find a complete list of what gets blocked. Anyone have one?

Ehtyar.
400
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on March 30, 2009, 11:14 PM »
Nice links Phil.

i have a log file named "KB958644.log" to show that i had seemed to apply the patch some time back, so do i have to be worried about getting infected by the 'C' variant?
The patch will prevent installation of Conficker from over the internet. However, if you use a weak password you're still at risk of Conficker guessing it from another machine on your LAN.

Ehtyar.
Pages: prev1 ... 11 12 13 14 15 [16] 17 18 19 20 21 ... 50next