Look in Add/Remove Programs for Q823980, this is the Q article associated with the patch. Also check out this page, lot of info and patches: http://www.microsoft.com/security/incident/blaster.asp
Allow me to apologize. I misunderstood your point.
I agree that by itself, Windows can be extremely vulnerable to attack, however, to properly lock the OS down, IMHO, would require the usability factor to plummet to the point that most users would move to another OS.
My point, in fact is this...
Remember, the reason that the system reboots is that the exploit will overrun the local buffer too. Blocking at the firewall, even inbound on port 135, can slow or eliminate the probem long enough to get it fixed.
If you want a good A/V that updates on a DAILY basis, then you should look into...
The fact is that code for these exploits is posted freely on the internet. Just go to .Xfocus and you will find that they posted 'proof of concept' code, which in fact, is primarily the body of the code that is causing the exploit.
If you never connect to the internet, you will find that...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.