I'm under the uneducated assumption that closing explorer.exe through the Task Manager whenever I leave the computer for a substantial amount of time aids the performance of running file transfer apps by clearing up some memory...(I leave the pc on at all times.)
Is this true? Please shed...
How to remove MSBlast
The first step should be to try automated removal tools:
Symantec W32.Blaster.Worm Removal Tool
Download the removal Tool
With both methods of removal prepare and then perform the removal offline.
Manual Removal (from Symantec's Write Up)
Steps...
How to Check Which Version You Have
If you are unsure whether a product you are running is affected by this issue, check the version.
To determine which version of Microsoft Windows you are running:
On the taskbar at the bottom of your screen, click Start, and then click Run...
How to prevent being exploited and getting this worm
Waaaay back in July Microsoft released a patch to this exploit. If you want to avoid being hacked keep your software updated!
To update Windows:
http://windowsupdate.microsoft.com/
The worm was identified on the same day by...
Vulnerable Systems
In MSB MS03-026 Microsoft detailed this exploit and after their extensive tests determined that it affects the following operating systems:
How MSBlast ( W32.Blaster.Worm ) Works:
After using the above exploit, MSBlast installs the Trivial File Transfer Protocol (TFTP) server and then uses it to download its code to the computer. It adds a registry key to reboot with the machine. It is often noticed by a message telling the...
How the exploit works:
Sending malicious data to TCP port 135 on an unpatched machine grants SYSTEM privileges. Most firewalls would protact against this exploit. From reports (I have not yet run the code) this could be specially formatted data or simply a brute attack on the RPC (remote...
History of this exploit/worm:
Around July 16th the Last Stage of Delirium (Polish 'White Hat' hackers) created 'proof of concept' (i.e. they actually executed a theoretical exploit) code to exploit a stack buffer overflow vulnerability in "Windows 2000 (sp 1-4), Windows XP (sp 1) and...
I have a fast computer with 500+ megs Ram and Windows XP Home. Protection is McAfee firewall and McAfee virus protection; AOL spyware scan and blocker. I run virtually all standard programs: Word, Word Perfect, Excel, Quicken etc.
I have repeatedly been getting "Virtual memory too low"...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.