SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Patricia Meaney who wrote (40677)4/16/2004 9:06:34 AM
From: Elsewhere  Read Replies (3) of 110652
 
I still haven't downloaded the newest updates - is this true?

I don't have a high opinion of Microsoft but I strongly doubt that MS distributes virus-infected software. Here's the Symantec worm description:

W32.Welchia.B.Worm
securityresponse.symantec.com
(Nachi.B is one of the aliases)

Welchia exploits the XP RPC vulnerability on TCP port 135. This means that if somebody goes online with a XP PC which is not patched against this vulnerability it can be infected without the usual way of infected emails or downloads. Instead the transmission occurs by a direct connection from an already infected system to the XP operating system. A friend of mine recently had a similar experience: he went online with a brand new PC, didn't patch it - and was Blaster-infected within two hours. Blaster exploits the RPC vulnerability as well.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext