Originally posted by: dm33186
if port 135 is open you can get it
Originally posted by: CraigRT
the patch?
isn't RPC one of those services a lot of stuff depended on (ie: disabling makes the computer as useful as it would be unplugged from the wall). The patch is tiny, might as well do it right.Originally posted by: lowtech
You don't have to download it to get infected. Just disable RPC in services and you are should be okay to go. Also apply NTFS security policy (create & Deny Everyone group to al permission) on tftp.exe under System32 directory, then update & patch your computer as soon as you can.
Remote Procedure Call (RPC) is use for remote access. RPC also use for HTTP (if you are runing IIS server). Disable RPC & audit the tftp.exe (Trivial File Transfer Protocol) should stop the Blaster worm that is currently runing out there & stop any hacker that try to use the trtpd flaw on your computer. Best method is to keep up with the patch, have a firewall & stop/audit services that you are not using, or simply unplug your computer from the internet.Originally posted by: MrBond
isn't RPC one of those services a lot of stuff depended on (ie: disabling makes the computer as useful as it would be unplugged from the wall). The patch is tiny, might as well do it right.Originally posted by: lowtech
You don't have to download it to get infected. Just disable RPC in services and you are should be okay to go. Also apply NTFS security policy (create & Deny Everyone group to al permission) on tftp.exe under System32 directory, then update & patch your computer as soon as you can.
I read this morning any unpatched PC can be expected to be infected within 25 minutes of connecting to the internet.