• Welcome to all New Sikh Philosophy Network Forums!
    Explore Sikh Sikhi Sikhism...
    Sign up Log in

Recent content by foxfire

  1. F

    Does Closing Explorer.exe When Not In Use Save Memory?

    I'm under the uneducated assumption that closing explorer.exe through the Task Manager whenever I leave the computer for a substantial amount of time aids the performance of running file transfer apps by clearing up some memory...(I leave the pc on at all times.) Is this true? Please shed...
  2. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    How to remove MSBlast The first step should be to try automated removal tools: Symantec W32.Blaster.Worm Removal Tool Download the removal Tool With both methods of removal prepare and then perform the removal offline. Manual Removal (from Symantec's Write Up) Steps...
  3. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    How to Check Which Version You Have If you are unsure whether a product you are running is affected by this issue, check the version. To determine which version of Microsoft Windows you are running: On the taskbar at the bottom of your screen, click Start, and then click Run...
  4. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    How to prevent being exploited and getting this worm Waaaay back in July Microsoft released a patch to this exploit. If you want to avoid being hacked keep your software updated! To update Windows: http://windowsupdate.microsoft.com/ The worm was identified on the same day by...
  5. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    Vulnerable Systems In MSB MS03-026 Microsoft detailed this exploit and after their extensive tests determined that it affects the following operating systems:
  6. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    How MSBlast ( W32.Blaster.Worm ) Works: After using the above exploit, MSBlast installs the Trivial File Transfer Protocol (TFTP) server and then uses it to download its code to the computer. It adds a registry key to reboot with the machine. It is often noticed by a message telling the...
  7. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    How the exploit works: Sending malicious data to TCP port 135 on an unpatched machine grants SYSTEM privileges. Most firewalls would protact against this exploit. From reports (I have not yet run the code) this could be specially formatted data or simply a brute attack on the RPC (remote...
  8. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    History of this exploit/worm: Around July 16th the Last Stage of Delirium (Polish 'White Hat' hackers) created 'proof of concept' (i.e. they actually executed a theoretical exploit) code to exploit a stack buffer overflow vulnerability in "Windows 2000 (sp 1-4), Windows XP (sp 1) and...
  9. F

    MSBlast W32.Blaster.Worm / LovSan : Removal Instructions

    'MSBlast' / LovSan Write up Also Known As: W32/Lovsan.worm [McAfee], Win32.Poza [CA], Lovsan [F-Secure], WORM_MSBLAST.A [Trend], W32/Blaster-A [Sophos], W32/Blaster [Panda]
  10. F

    Can Somebody Explain 'virtual Memory' To Me?

    I have a fast computer with 500+ megs Ram and Windows XP Home. Protection is McAfee firewall and McAfee virus protection; AOL spyware scan and blocker. I run virtually all standard programs: Word, Word Perfect, Excel, Quicken etc. I have repeatedly been getting "Virtual memory too low"...
Top