Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: dfrussell
And if you are a network administrator and you let this worm get through, you should start looking for another job.
4 posted on 08/12/2003 11:40:09 AM PDT by dfwgator
[ Post Reply | Private Reply | To 1 | View Replies ]


To: dfwgator
The wonderful little bastard also seems to like the tftp service as a weak port.

We're covered at our location, but our morthship just got nailed with this thing a few hours ago. Thank God for firewalls.

-Proud firewall admin watching the lava break against my defenses.

7 posted on 08/12/2003 11:43:22 AM PDT by Centurion2000 (We are crushing our enemies, seeing him driven before us and hearing the lamentations of the liberal)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: dfwgator
Maybe, maybe not. It's possible that it's being introduced from laptops that have been used offsite and then brought back to docking stations.

It's easy to tell folks to makes sure they load updates of virus scan programs, getting them to comply is another story.
8 posted on 08/12/2003 11:45:17 AM PDT by Bikers4Bush
[ Post Reply | Private Reply | To 4 | View Replies ]

To: dfwgator
And if you are a network administrator and you let this worm get through, you should start looking for another job.

Hey, it's not that easy. One guy has over 100 Windows servers. He's installed the patch on all of them already buy not rebooted them all to have it take effect. Rebooting things ends services that may be mission critical. He's had about 2 weeks to take care of 100 servers and maybe 1000 workstations. Having done all that the network is still somewhat vulnerable to people docking inside the firewall who are infected. Really bad virus's are not simple to defeat. I therefore disagree with you assertion that the mere infection of a computer is a reasonable cause for termination of the sysadmin responsible for it.

45 posted on 08/12/2003 12:52:08 PM PDT by Jack Black
[ Post Reply | Private Reply | To 4 | View Replies ]

To: dfwgator
And if you are a network administrator and you let this worm get through, you should start looking for another job.

Hey, it's not that easy. One guy has over 100 Windows servers. He's installed the patch on all of them already buy not rebooted them all to have it take effect. Rebooting things ends services that may be mission critical. He's had about 2 weeks to take care of 100 servers and maybe 1000 workstations. Having done all that the network is still somewhat vulnerable to people docking inside the firewall who are infected. Really bad virus's are not simple to defeat. I therefore disagree with you assertion that the mere infection of a computer is a reasonable cause for termination of the sysadmin responsible for it.

46 posted on 08/12/2003 12:52:08 PM PDT by Jack Black
[ Post Reply | Private Reply | To 4 | View Replies ]

To: dfwgator
That's a bit harsh. All it takes is for an employee to take their laptop home, connect it to the net, get the virus and then bring the virus in-house.

Mr. FourPeas is in IT security for a Fortune 500 company. Hubby is now trying to cleanse a network at a remote location where no one seems to take it seriously. He actually is having to run a script to shut down various computers every ten minutes because the yahoos at the remote keep turning them back on even through they're known to be infected.

57 posted on 08/12/2003 1:29:21 PM PDT by FourPeas
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson