new virus around
#1
omg peeps i couldnt get on for a day cause of some **** doing a virus[img]images/smilies/mad.gif[/img] basically it effects windows xp when you turn on it tells you your going to restart in 60 secs.if this happens to you dont worry go to scoobycity and someone has done a link to protect you from it i have just done and thank god i did the download takes secs on broadband as well
#6
Goto Start> Control Panel> Performance and maintenannce> Admin tools> Services .....click on messanger and choose the option "stop the service" .
That should stop all the pop ups.
Andy
That should stop all the pop ups.
Andy
#7
Track Day Organiser
Trending Topics
#8
the link on there isnt working
http://microsoft.com/downloads
can anyone post the up to date link please ?
http://microsoft.com/downloads
can anyone post the up to date link please ?
#11
Scooby Regular
Join Date: Apr 2002
Location: Birmingham
Posts: 9,196
Likes: 0
Received 0 Likes
on
0 Posts
#13
cat, same thing happened to me...this is my fujisu and is protected with norton anti-v and seems ok (lucky me)...
...but my wife's new NEC lap top has been hit [img]images/smilies/mad.gif[/img]
...but my wife's new NEC lap top has been hit [img]images/smilies/mad.gif[/img]
#14
Scooby Regular
Join Date: Apr 2002
Location: Birmingham
Posts: 9,196
Likes: 0
Received 0 Likes
on
0 Posts
Distinguishing Characteristics
Blaster is so simple that it doesn't even use e-mail to spread. The worm exploits the DCOM buffer overflow (described by Microsoft and our Information Alert) exclusively over TCP port 135 to gain full control of your Windows machine.
Once the worm has control of your machine, it uses the TFTP protocol to download a file called msblast.exe to your system and adds a registry entry to ensure that this executable starts every time you boot your computer. Msblast.exe, which is the worm itself, then starts scanning random IP addresses on TCP port 135 looking for more vulnerable systems to spread to.
That's it! The worm is very simple yet it still seems to be spreading quickly. At first glance, Blaster didn't seem to contain any malicious payload. However, the latest reports indicate that machines infected by the worm may attempt to syn flood Microsoft's "WindowsUpdate" site on August 16th. Since blaster exploits a buffer overflow flaw it could make an infected machine unstable and cause the machine to reboot.
Blaster is so simple that it doesn't even use e-mail to spread. The worm exploits the DCOM buffer overflow (described by Microsoft and our Information Alert) exclusively over TCP port 135 to gain full control of your Windows machine.
Once the worm has control of your machine, it uses the TFTP protocol to download a file called msblast.exe to your system and adds a registry entry to ensure that this executable starts every time you boot your computer. Msblast.exe, which is the worm itself, then starts scanning random IP addresses on TCP port 135 looking for more vulnerable systems to spread to.
That's it! The worm is very simple yet it still seems to be spreading quickly. At first glance, Blaster didn't seem to contain any malicious payload. However, the latest reports indicate that machines infected by the worm may attempt to syn flood Microsoft's "WindowsUpdate" site on August 16th. Since blaster exploits a buffer overflow flaw it could make an infected machine unstable and cause the machine to reboot.
Thread
Thread Starter
Forum
Replies
Last Post