Jump to content

How to Protect Yourself from the Blaster Worm and


MSNwar

Recommended Posts

Microsoft has provided users of Microsoft Operating Systems, where applicable, with an update that scans your PC for the Blaster Worm. Simply surf to the Windows Update Site and you will be presented with this nice service that might be the easiest method for some users to start protecting their PCs from the worm and other forms of so-called attacks.

If your computer is running one of the following, you can help protect it from the Blaster Worm and its variants by installing Security Update for Windows (KB824146):

Microsoft® Windows® 2000 Service Pack 2 or greater

Microsoft Windows XP

Microsoft Windows Server 2003

When you click Scan for updates, Windows Update will determine whether you need Security Update for Windows (KB824146); if needed, the update will appear on the Critical Updates and Service Packs page. We also recommend that you check Windows Update regularly for new critical updates and security patches.

For more information (or if you are running Windows NT® version 4, Windows 2000, or Windows 2000 Service Pack 1), click the Read more link. Note that this link will take you to the "Microsoft Protect Your PC" web page that explains three steps to help ensure your PC is protected in an easy to understand method if all of this is new to you. Read more ...

Note: Security Update for Windows (KB824146), discussed in Microsoft Security Bulletin MS03-039, includes the fixes in Update MS03-026, in addition to fixes for other security issues Microsoft has found.

Microsoft Windows Update

Link to comment
Share on other sites


These patches are useful, but if a user has a well configured firewall and/or NAT router, he is safe (he's safer if he applies both solutions, I admit...)

MSBLast worm (and probably some worms to come) do attack computers by generating a (semi)random IP address that is pinged. If the address answers, the worm scans some ports in order to enter the system (ports TCP 135, TCP 139 and 2 others for MSBlast). If these ports are open, the worm tries to duplicate itself overthere after having detected if the OS is Windows NT4, Windows 2k, XP or 2k3.

A good security with latest patches is the best way not to be annoyed with worms.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...