Posted: Tue Mar 31, 2009 11:04 pm
My computer refused to start up,and I found a worm on it in safe mode so I guess I caught it beat it.
Your Spud Cannon Community
https://www.spudfiles.com/
just a coupl a cold 1s...Gippeto wrote:Your computer is using a comb? REALLY?combusing
Been into the bitters have you.
I have no firewall on, no antivirus and no antispyware. The only protection is that I am behind a router.inonickname wrote:Computer is only used by me plus I do nothing that malicious. Have the best security software and firewall available, plus a fully updated coputer..
i noticed that oh about 23 hours ago lol google has a new product too...psycix wrote: EDIT:
LOL youtube turns video's upside down today! (Just like one april 1st virus)
They say its a new layout.
You can get back to the normal layout in a click or you can get tips to get used with the new layout.
Their tips:
-Turn monitor upside down
-Turn head upside down
-Go live in austrailia
Kinda awesome that youtube did that.
The University of New Haven wrote:The Office of Information Technology requests ALL students with a Windows based machine please read this document and follow the links provided to protect yourself from the pending Conflickr Worm. If a system connected to the university network is detected with this behavior it will be disconnected from the network and you will need to bring your computer to the Student Support Office in Echlin Hall for cleaning. We continue to encourage all students to maintain antivirus protection on your computer.
Thank you
To download the patch: http://www.microsoft.com/technet/securi ... 8-067.mspx
To remove the possible infection: http://www.microsoft.com/security/malwa ... fault.mspx
** Critical Notice **
April 1st Confickr Worm Threat
Over 3 million unpatched machines have been infected with malicious software as a result of the Confickr worm. Next Wednesday – April Fools' Day – millions of computers that have already been infected by the Confickr worm, also known as "bots", will be used to receive orders from controlling machines and possibly leveraged in malicious activity. Once these orders are received, the infected computers may be used to send out malware, e–mail scams/spam, viruses, or may even be used to steal information from the affected host. The computer must already be infected by the Confickr worm in order for it to be used in this potential threat that is to occur on April 1st.
If you are unsure if your Windows machine is infected by the Confickr worm, please use an anti–virus to scan your machine. Anti–virus signatures to detect Confickr worm activity are available.
** Please note, Windows machines that are patched with the MS08–067 update are not affected by this threat. This patch was released October 2008**
The Confickr worm (aka DownAdUp/DownUp/Kido) spreads itself primarily via a buffer overflow vulnerability in the Server Service on Windows based computers. The worm uses a specially crafted RPC request to execute its coding on the target computer. Once the worm is executed on the system, it disables a number of system services such as Windows Automatic Updates, Windows Security Center, Windows Defender, Windows Error Reporting, or possibly other anti–malware/virus protection programs. The worm also receives orders from a main server that can tell the worm to download more malware, steal information, or spread to other systems. Some of the system services/processes to which Confickr worm is known to attach are svchost.exe, explorer.exe, and services.exe.
** If you do not have the MS08–067 patch installed, it can be downloaded from Microsoft via the link below or by using Windows Update. If your Windows machine is infected by the Confickr worm you can download the Microsoft Removal tool below the Security Bulletin link. **
http://www.microsoft.com/technet/securi ... 8–067.mspx
http://www.microsoft.com/security/malwa ... fault.mspx
It is important to note that propagation methods for this worm have been detectable on the network since October 2008, when the patch was released. Other potentially undetectable propagation methods include any writable media plugged into an infected system such as a USB drive.
Greg Bartholomew
Director of Networking/Systems Operations
Office of Information Technology
University of New Haven
300 Boston Post Rd
West Haven, CT 06516
(203)932-7059
(203) 932-7075 fax
UNH - A leader in Experiential Education
Yeah, I rolled out of bed late and decided that since the day's already half over, why bother...brogdenlaxmiddie wrote:...Perhaps we won't launch it.
lol obama wouldnt pay for crap unless its for himTHUNDERLORD wrote:I just go to the library and open e-mail etc. if I'm worried.
Obama can pay for fixing it.![]()
People who generate computer viruses are like people who mess up public bathrooms IMO...
I wish there was a way to Kill 'em all!