A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows XP » Security and Administration with Windows XP
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Virus or from Microsoft?



 
 
Thread Tools Display Modes
  #1  
Old December 14th 03, 01:59 PM
external usenet poster
 
Posts: n/a
Default Virus or from Microsoft?

This looks true. Check outthe solution to fixing your
machine if its infected:
Wazzup, here is the solution to your problem:

You have probably received the following error messages
when using your computer:

"This system is shutting down. Please save all work in
progress and log off. This shutdown was initiated by NT
Authority/System."

"Windows must restart because the Remote Procedure Call
(RPC) service terminated unexpectedly."

This is a known security issue which was first found on
July 15. There is currently an Internet Worm that is
taking advantage of this security issue. Microsoft
published the patch to fix this issue on July 16 for all
of the affected systems on our web site. For more
information, please refer to the following page:

Microsoft's latest Information on the Blaster Worm
including links for other Windows Operating Systems
http://www.microsoft.com/security/incident/blast.asp

For the latest information on this security bulletin
http://www.microsoft.com/security/se...ulletins/ms03-
026.asp

__________________________________________________ ____

The resolution to this issue is to clean the worm from
your system and install the patch mentioned above.

Do this In Order:
1) Turn on your Internet Connection Firewall (Windows XP)
2) Install the patch from Microsoft to remove the
vulnerability
3) Run a removal Tool from an Anti-Virus company to
remove all traces of the virus from your system
4) Go to Windows Update and get all other needed Critical
Updates
Alternate Download Sites are located at:
http://www.microsoft.com/downloads/details.aspx?
FamilyID=2354406c-c5b6-44ac-9532-
3de40f69c074&displaylang=en

http://download.windowsupdate.com/msdownload/updat
e/v3-19990518/cabpool/WindowsXP-KB823980-x86-
ENU_1d296adab6699e66210e5a350236381.exe



IMPORTANT
__________

Whenever your computer attempts to shutdown or reboot,
quickly:
Click the Start Button and then click RUN and type in
shutdown -a
and hit enter.
This should halt the rebooting problem temporarily.

You can also disconnect your computer from the internet
while you do the first step of turning on the Internet
Connection Firewall.


----------------------------------------------------

1)
Turn on the Internet Connection Firewall (Windows XP)
For XP Pro Users
http://www.microsoft.com/windowsxp/p.../howto/network
ing/icf.asp

For XP Home Users
http://www.microsoft.com/WindowsXP/h...g/howto/homene
t/icf.asp

Generic Instructions for XP Users:
1. In Control Panel, double-click "Networking and
Internet Connections", and then click Network Connections.
2. Right-click the connection (your internet connection)
on which you would like to enable ICF, and then click
Properties.
3. On the Advanced tab, click the box to select the
option to "Protect my computer or network".
4. If you want to enable the use of some applications and
services through the firewall, you need to enable them by
clicking the Settings button, and then selecting the
programs, protocols, and services to be enabled for the
ICF configuration.



2)
Install the Patch from Microsoft for your Operating System
Windows XP (32-bit)
http://download.microsoft.com/download/9/8/b/98bcfad8-
afbc-458f-aaee-b7a52a983f01/WindowsXP-KB823980-x86-ENU.exe


3)
Run a removal Tool from an Anti-Virus Company to get the
Virus off your system
Network Associates
http://vil.nai.com/vil/stinger/

Trend Micro
http://housecall.trendmicro.com/

Symantec
http://securityresponse.symantec.com...r/venc/data/w3
2.blaster.worm.removal.tool.html

Computer Associates
http://www3.ca.com/virusinfo/virus.aspx?ID=36265


4)
When you get a chance after everything calms down, with
Internet Explorer up and running, go to the top menu and
click Tools and click Windows Update and install all the
latest Critical Updates.
http://v4.windowsupdate.microsoft.com/en/default.asp

You can also configure Automatic Updates to automatically
download updates for you. How to Configure and Use
Automatic Updates in Windows XP:
http://support.microsoft.com/default.aspx?scid=kb;en-
us;306525


Please note I cannot respond to e-mailed questions.
Please use respond to this thread to let me know if the
steps and suggestions helped you to resolve the issue.

Disclaimer:
This posting is provided "AS IS" with no warranties, and
confers no
rights.


-----Original Message-----

I received the following e-mail. Is this a true e-mail
from Microsoft or is this a virus waiting to happen?




*** PLEASE NOTE: Due to the critical importance of this
message,
this communication is being sent to all of our Microsoft
customers
to alert you of this Security Bulletin. ***

It has been widely reported in the press and on
Microsoft's own web
site, that on July 16th we released a critical security
bulletin
(MS03-026) and a patch regarding a vulnerability in the
Windows
operating system. We wanted to make sure that if you

were
not aware
of this bulletin and corresponding patch that you take a
moment to
go to http://www.microsoft.com/security/
security_bulletins/
ms03-026.asp to find out if you are running an affected
version of
the Windows operating system and get the specific
information as to
what you need to do to apply this patch if you have not
already.

Although we encourage you to pay attention to all
security bulletins
and to deploy patches in a timely manner we wanted to
call special
attention to this particular instance as we have become
aware of
some activity on the internet that we believe increases
the
likelihood of the exploitation of this vulnerability.
Specifically,
code has been published on several web sites that would
allow
someone to spread a worm/virus that takes advantage of
the
vulnerability in question thereby impacting your
computing environment.

Although it is our goal to produce the most secure and
dependable
products possible, we do become aware of these types of
vulnerabilities. In order to minimize the risks of such
vulnerabilities to your computing environment, we
encourage you to
subscribe to the Windows Update service by going to
http://www.windowsupdate.com and also subscribe to
Microsoft's
security notification service at
http://register.microsoft.com/
subscription/subscribeme.asp?ID=135 if you have not
already. By
subscribing to these two services you will automatically
receive
information on the latest software updates and the

latest
security
notifications thereby improving the likelihood that your
computing
environment will be safe from worms and viruses that
occur.

We apologize for any inconvenience the implementation of
this patch
might cause and appreciate you taking the time to update
your system.

Thank you,
Microsoft Corporation






.

Ads
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is Off
HTML code is Off






All times are GMT +1. The time now is 10:09 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.