I DON'T Have RPC Problem...Want To Know Why?

  • Thread starter Thread starter Jacka$$ Joe
  • Start date Start date
J

Jacka$$ Joe

Because I keep my computer up to date and have a good
firewall on my Windows XP Computer!

-Cheers!
 
Roger said:
I agree. The patch that fixes this has been out for almost a month.
If people haven't downloaded it yet than they deserve to have every
virus in the internet. ANy computer with an internet connection
needs a good virus scanner and a firewall (even on a 56k dial-up),
and they need to be updated (once a week, at the very least).

People don't derserve to get viruses just because MS sells swiss cheese
for software!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
kurttrail <[email protected]> opened port 119 and spoke:
: Roger Bryant wrote:
:
: : I agree. The patch that fixes this has been out for almost a month.
: : If people haven't downloaded it yet than they deserve to have every
: : virus in the internet. ANy computer with an internet connection
: : needs a good virus scanner and a firewall (even on a 56k dial-up),
: : and they need to be updated (once a week, at the very least).
:
: People don't derserve to get viruses just because MS sells swiss
: cheese for software!

The patch has been out for quite some time. Yes, windows has more holes than a swiss cheese at a
firing squad, but if people don't have enough sense to keep it up-to-date, the they deserve whatever
security exploit comes there way.
 
I'm right there with you. In todays world, where microsuck sells crappy
software and hackers are constantly inventing newer and better viruses,
anyone who steps out on the info superhighway is asking for infection. If
you are out here, you should have a firewall and AV software. If you don't
have both, you are being foolish. You can blame it on microsuck and they do
deserve blame but buyer beware is the call of the day. You should know what
kind of crap you are using for an OS and take the appropriate measures.
 
Check out nai.com, Linux has viruses ready and waiting too. It's a fact of
life with computers until they design a system that doesn't allow buffer
overruns etc. Even then, so many people will open anything that arrives
attached to an email.

e.g. look at this.. viruses for Win32, Linux, Cisco, IRC . Windows suffers
most but then Microsoft is widely distributed and there's more bang for the
virus buck targeting Windows:

http://vil.nai.com/vil/newly-discovered-viruses.asp

Stephen

--

Drop 123 to email me.


| Roger Bryant wrote:
|
| > I agree. The patch that fixes this has been out for almost a month.
| > If people haven't downloaded it yet than they deserve to have every
| > virus in the internet. ANy computer with an internet connection
| > needs a good virus scanner and a firewall (even on a 56k dial-up),
| > and they need to be updated (once a week, at the very least).
|
| People don't derserve to get viruses just because MS sells swiss cheese
| for software!
|
| --
| Peace!
| Kurt
| Self-anointed Moderator
| microscum.pubic.windowsexp.gonorrhea
| http://microscum.kurttrail.com
| "Trustworthy Computing" is only another example of an Oxymoron!
| "Produkt-Aktivierung macht frei!"
|
|
 
Roger said:
The patch has been out for quite some time. Yes, windows has more
holes than a swiss cheese at a firing squad, but if people don't have
enough sense to keep it up-to-date, the they deserve whatever
security exploit comes there way.

This patch hasn't even been out a month yet. And a lot a people also
got burned downloading flawed MS's patches recently too!

MS doesn't go looking for flaws, just waits till
others find them first, otherwise Windows Server 2003 wouldn't have need
to be patched for this too!

Apologize for MS, if that rocks your boat, but this buffer overrun has
been in Windows since NT4, and was released in MS's first OS that was
released under the banner of "Trustworthy Computing!"

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
x-no-archive: yes

Jacka$$ Joe said:
Because I keep my computer up to date and have a good
firewall on my Windows XP Computer!

And you manage HOW MANY WinNT/2K/XP workstations, idiot?

Have any idea what it's like to deal with one patch right after the
other, on an almost-daily basis?

Any clue what it's like to have to test each patch, to make sure it
won't cause stability or performance issues, like the recent 811493
patch did?

Any idea how you'd roll out all those patches?

I didn't think so. I have your big can of Grade-A STFU waiting for you
here.
 
x-no-archive: yes

kurttrail said:
This patch hasn't even been out a month yet. And a lot a people also
got burned downloading flawed MS's patches recently too!

MS doesn't go looking for flaws, just waits till
others find them first, otherwise Windows Server 2003 wouldn't have
need to be patched for this too!

Apologize for MS, if that rocks your boat, but this buffer overrun has
been in Windows since NT4, and was released in MS's first OS that was
released under the banner of "Trustworthy Computing!"

Kurttrail speaks the truth! Thank you for telling it like it is. YES,
you should keep on top of security updates. YES, you should run AV
utilities and firewalls. But NO, it's not the customer's fault when
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole after
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole after
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole after
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole after
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole after
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole after
hole after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole comes up.
 
And you don't have a firewall between them and the 'net?

As far as "rolling out all those patches," it was mentioned earlier there's
an MS provided update server (service, whatever) for networks.

--
If you have to ask if your copy of XP is 32 or 64 bit, it's 32.
Getting Messenger popups? Turn on your firewall!
Patch from Microsoft:
http://tinyurl.com/h84v
More info from MS:
www.microsoft.com/security/incident/blast.asp

(Stolen with pride from Gary Thorn... thanks!)
 
Mike said:
x-no-archive: yes

Kurttrail speaks the truth! Thank you for telling it like it is.
YES, you should keep on top of security updates. YES, you should run
AV utilities and firewalls. But NO, it's not the customer's fault
when hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
after hole after hole after hole after hole after hole after hole
comes up.

And most software firewalls wouldn't have protected most people that use
FrontPage! I use both hardware & software firewalls, and locked down
the RPC ports in both. Early this morning, I started up FrontPage, and
Norton Internet Security gave me a message telling me it block an
application from listening to ports that I blocked manually to stop any
RPC funny business! If I hadn't made my own firewall rule, Norton
Auto-Config of programs would have let FrontPage listen until it heard
from BLASTER. And I'm sure there are a few other programs that do the
same thing.

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
Jacka$$ Joe said:
What's the matter...get nailed by this virus?...boo hoo
hoo :-(

Don't bitch at me - it's not my problem. If you can't
manage all your workstations, then get someone competent
to take your place!

Well, you've convinced me. You really are a Jackass!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
And you manage HOW MANY WinNT/2K/XP workstations, idiot?

Have any idea what it's like to deal with one patch right after the
other, on an almost-daily basis?

Except in this particular case we're talking about a patch that was
issued almost a month ago.

If you're a month behind in updating the systems you're responsible
for, then you're incompetent, plain and simple. Quite frankly, I'd say
that appears to be the case.

Microsoft issued a patch, that successfully eliminates the
vulnerability, and doesn't break anything else. They provided the
patch, and an advisory, in plenty of time for all this to be easily
avoided. What exactly is it they were supposed to do beyond that?
 
T.G. Reaper said:
Except in this particular case we're talking about a patch that was
issued almost a month ago.

If you're a month behind in updating the systems you're responsible
for, then you're incompetent, plain and simple. Quite frankly, I'd say
that appears to be the case.

Microsoft issued a patch, that successfully eliminates the
vulnerability, and doesn't break anything else. They provided the
patch, and an advisory, in plenty of time for all this to be easily
avoided. What exactly is it they were supposed to do beyond that?

Test their crap more thoroughly to begin with, instead of charging
hundreds of dollars for software that is always a work-in-progress!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
EGMcCann said:
Yeah, everyone should just put out software that's 100% perfect. Then
we'd be running...

um...

Nothing at all.

Nope. Linux! It is by definition always a work-in-progress, and is
priced & licensed according to the level of support you require.

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
So that means that people deserve to get viruses?

Nope.

But what it does mean is that if 50 million or so Windows users were
to suddenly switch to Linux there would be a flood of Linux viruses
and security exploits that would make the current problem look
minuscule by comparision.


Ron Martell Duncan B.C. Canada
--
Microsoft MVP
On-Line Help Computer Service
http://onlinehelp.bc.ca

"The reason computer chips are so small is computers don't eat much."
 
Ron said:
Nope.

But what it does mean is that if 50 million or so Windows users were
to suddenly switch to Linux there would be a flood of Linux viruses
and security exploits that would make the current problem look
minuscule by comparision.

Ron Nostradamus! :)

Yeah, that's because they'd be written and paid for by Microsoft!
Seriously, Linux is priced & licensed a lot better than MS's OSs,
considering the risks involved in using a product that is always a
work-in-progress. MS sends a lot of time, money & energy developing
end-user useless things like PA & DRM, but not enough effort in
releasing software with not-so-many holes in it! Between critical &
recommended updates there must be 50MBs worth released since SP1. 1/10
of the OS has been rewritten in less than a year. Totally unacceptable,
considering XP's price, lack of support, and restrictive licensing!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
kurttrail said:
So that means that people deserve to get viruses?

Where the heck did you get that out of this post?
What a dumb question - seriously, are you still a pre-teen?
 
Don said:
Where the heck did you get that out of this post?
What a dumb question - seriously, are you still a pre-teen?

If I'm a pree-teen, then your mother and father are still pre-pubescent
children too, making you reproductive cells that have yet to have been
produced!

Maybe you should learn how to read and comprehend a thread!

1.) Roger Bryant wrote: "I agree. The patch that fixes this has been
out for almost a month. If people haven't downloaded it yet than they
deserve to have every virus in the internet. ANy computer with an
internet connection needs a good virus scanner and a firewall (even on a
56k dial-up), and they need to be updated (once a week, at the very
least). "

2.) kurttrail wrote in reply to Roger: "People don't derserve to get
viruses just because MS sells swiss cheese for software!"

3.) Stephen wrote in reply to me: "Check out nai.com, Linux has viruses
ready and waiting too. It's a fact of life with computers until they
design a system that doesn't allow buffer overruns etc. Even then, so
many people will open anything that arrives attached to an email. e.g.
look at this.. viruses for Win32, Linux, Cisco, IRC . Windows suffers
most but then Microsoft is widely distributed and there's more bang for
the virus buck targeting Windows:
http://vil.nai.com/vil/newly-discovered-viruses.asp"

4.) kurttrail wrote in reply to Stephen: "So that means that people
deserve to get viruses?"

So did Stephen's reply to me make any sense in light of what I had
written in response to Roger?

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
x-no-archive: yes

No I didn't, jackass. I'm not a system admin. It was a hypothetical
scenario, one based in REALITY. The guys who know their stuff know what
I mean. Guys like Bruce Schneier
(http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030813/ap_on_hi_te/
internet_attack):

"But to expect home users to keep their systems current is unreasonable,
said Bruce Schneier, chief technology officer with Counterpane Internet
Security Inc. He blames software developers for writing bad software
that constantly need 'critical' patches."

Is your opinion more qualified than his? I didn't think so. So, you
can... http://www.ebaumsworld.com/forumfun/stfu1.jpg
 
x-no-archive: yes

T.G. Reaper said:
Except in this particular case we're talking about a patch that was
issued almost a month ago.

If you're a month behind in updating the systems you're responsible
for, then you're incompetent, plain and simple. Quite frankly, I'd say
that appears to be the case.

Microsoft issued a patch, that successfully eliminates the
vulnerability, and doesn't break anything else. They provided the
patch, and an advisory, in plenty of time for all this to be easily
avoided. What exactly is it they were supposed to do beyond that?

How is an admin to know that it "doesn't break anything else"? Wait for
other reports to come back? Test it himself? And with no less than
FIVE vulnerabilities being released in July of this year ALONE,
smartass, how is it admins can keep up? Oh no--did you FORGET about the
other FOUR critical updates?
BWAAAAHAAAAAHAAAHAAAAHAHAHAHAHAHAH!!!!!!!!!

Buffer Overrun In HTML Converter Could Allow Code Execution (823559)
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-023.asp

Buffer Overrun in Windows Could Lead to Data Corruption (817606)
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-024.asp

Buffer Overrun In RPC Interface Could Allow Code Execution (823980)
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp

Unchecked Buffer in Windows Shell Could Enable System Compromise
(821557)
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-027.asp

Unchecked Buffer in DirectX Could Enable System Compromise (819696)
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-030.asp

And, of course, http://www.ebaumsworld.com/forumfun/stfu1.jpg
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads

RPC settings 2
SFC wont check files rpc server running 4
RPC won't start 3
Logon problem 3
RPC server is unavailable 1
O.T. - Temporary firewall problem at boot up: 43
Event ID 861 3
RPC 4

Back
Top