SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : How high will Microsoft fly? -- Ignore unavailable to you. Want to Upgrade?


To: dybdahl who wrote (56855)3/25/2001 8:41:20 PM
From: gao seng  Read Replies (2) | Respond to of 74651
 
Comparing Outlook exploits to a DNS exploit is ridiculous. A company has much more to lose if their domain name can be hijacked than if their average users become infected with a virus.

How do you know you do not have problems with this worm, since the detection program has only recently been made available?

About the fix, and how fast it is to implement, and why it probably hasn't been implemented until the threat has been announced, and it is probably too late.

Installing the patch to BIND versions 4 and 8 probably would require a few hours or more, depending on the number of DNS servers in the network, Magdych said. He advised that ISPs and corporations not jump the gun and shut their DNS servers down cold, unless an exploitation program is found in the wild, he added.

infoworld.com

found in the wild:

tlsecurity.net



To: dybdahl who wrote (56855)3/25/2001 10:20:01 PM
From: DiViT  Read Replies (1) | Respond to of 74651
 
You sound just like a MS virus defender.

Well, if they had just installed the patches. Yadda, yadda, yadda...

Patches? Patches?? We shouldn't need no stinkin' patches...