Code Red Reporting That Doesn't Suck 191
marvin tph writes "The results are in: Time.com is the first mainstream news source to write an intelligent article on story Code Red. With all the big guys telling people that we've only seen the eye of the storm its nice to see someone get it right."
I don't have time to patch my servers against it! (Score:5, Funny)
I'm too damned busy reply to all of my email. You'd never believe how many people have been sending me files asking for my advise!
I'm sending them a penguin (Score:2)
Ok, I know that doesn't accomplish anything useful, but it does cut down on the 404's in the logfile at Librenix!
The Silly Season (Score:4, Informative)
All the poloticians are away on summer holidays.... most of the decent journalists take a break aswell. This leaves the papers a little thin on decent news (er, like, theres nothing happening in the world at all. honest guv. No civil war in sri lanka. No erupting volcano on sicily. No siree). Basically, its the time of year when two-bit journalists regurgitate 2-week old stories, and the papers are full of "and-finally" articles....
Re:The Silly Season (Score:1)
Re:The Silly Season (Score:1)
The NSPCC even had the gall to _complain_ that it might make celebs more wary of publicising campaigns without paying any attention to what they are saying! The fact that these people fell for the nonsense says a few rather depressing things about the quality of the real charities campaigning as well.
Net slowdown now blamed on a train crash (Score:1)
Microsoft the good guy? (Score:1)
1. Instead of looking foolish because they have a bug in their software, they look like the hero who fights off an internet threatening hacker. (cough, cough)
2. Microsoft gets a lot of visibility with the government.
I'm sure there are more, and it's probably a stretch, but makes a good conspiracy theory.
Perfect Timing (Score:1)
The Time guy is a moron. (Score:4, Flamebait)
Gee, just a massive DDoS against the US Government. Yeah, not malicious at all. I mean, even if you think this is a worthy social goal, you'd have to honestly believe your audience is a bunch of morons (ok, we are talking about Time magazine here, but still) to say that with a straight face.
Re:The Time guy is a moron. (Score:1)
you sure it doesn't come under 'public service'?
whitehouse.gov *isn't* the US Gov't (Score:1)
The machine in question [whitehouse.gov] is merely a poor attempt to replicate the Marketing Department of a certain monopoly to make people think Bushie is a smart cookie. Marketing attempting to make people think this company's sotware is the only smart way to do business. If you hadn't noticed he similarites think about it, it's frightening.
However, just because the pages imply that it is the Government doesn't mean it actually *is* the government.
If We the people would wake up & read the foundations of our government we would realize *WE* are the government & if we don't like what's going on we are obligated to *change* what we don't like.
Too many laws are on the books, so it's back to basics for me.
But I digress...
Re:The Time guy is a moron. (Score:2)
And while we're at it, where did he get the idea that "the owners were never aware that Microsoft software had turned their computer into a server in the first place"? Win2k installs IIS by default, it's true, but the majority of the IIS servers out there are NT4, and the Option Pack must be explicitly installed.
And this is terrific logic: "We welcome their presence, in fact, because they keep our immune system constantly on its toes, ready for any real invaders." Yeah, if it weren't for thieves testing our locks, we wouldn't have locks good enough to protect us from thieves. I think I'll do him a favour and drive by his house every day and break a window, thereby encouraging him to get better windows -- just 'cause I'm such a nice guy.
Re:The Time guy is a moron. (Score:2)
Yeah, that still has me scratching my head.
I liked the story on saw yesterday on the BBC Sci-Tech web site (which I can't find today) which said that because Code Red goes away if you reboot, and because IIS is so much more unstable than other web servers, the spread has been slowed because of how often people have to reboot their servers anyway.
Would you believe a massive, inept attack? (Score:2)
Yes, it tends to show that the author was just a script kiddie, but authors of worms and virii still do lots of damage.
The real scary part of the story, which no news media have touched upon, is the swiss-cheese nature of M$ security that makes these problems a part of our daily lives.
Jon Acheson
Re:Would you believe a massive, inept attack? (Score:2)
It was obviously a warning. It was not a perlscript that did some silly exploit, it was a hand crafted and well designed virus that did what it was supposed to do, scare the shit out of us.
We need to properly inform the tabloid media (Score:5, Interesting)
What they need is a source that dumbs things down enough to be broadcast on your local Fox afilliate while still keeping it accurate. Soundbite-friendly, not very technical, clear about the details. Most people don't know what you're talking about if you say "IIS vulnerability", but if you say "The Code Red Virus will hack the internet" then most people can get a handle on that.
It's not just about hype - it's lack of understanding. Anchors aren't good at telling people something when they don't understand it themselves, so it needs to be explained to them.
I, unfortunately, already have hardly any free time to start up a site providing a service like this, but I'd be willing to contribute to someone else's - anyone up for it?
Re:We need to properly inform the tabloid media (Score:1)
Include something about aliens and/or Hollywood sex scandles.
Re:We need to properly inform the tabloid media (Score:2)
red rum red rum (Score:2, Interesting)
What? Still no SirCam Story? (Score:1)
Hype? Maybe but.. (Score:4, Insightful)
Was the story hyped by newsmakers and others who would benefit from such an event? Probably. Was anyone harmed by the hype? No (unless you count late-night patching). If anything, it got sysadmins everywhere into action to fix a hole that could have resulted in a real problem
Re:Hype? Maybe but.. (Score:2)
As a tech-savvy guy, I often get asked, "Why do people do this?"
I realise that this is not the motivation for every virus or worm, but generally, each one raises some awareness in the consumer. The popular viruses get around and a lot of people see it. Every time, they "update" their virus scanner and feel safe until the next one. What I tell people is that it shows the inherent security problems in Windows. I chase that with, "What if a your company's competitor writes a virus targetted at your's and nobody else's? They have the power to grab all of your intellectual property and no virus scanner out there will save you because they only deal with 'popular' viruses. Once the damage is done, it's done. Virus scanners only superficially 'fix' the problem. The *real* threat is the inherent insecurity in Windows/Outlook that Microsoft seems unwilling to fix. These viruses you see are warnings and nobody is realising that. Few people are aware of the real problem."
This usually enlightens them. The big problem, as I see it, is that the popular media isn't saying it. As long as they aren't, the problem will continue to exist... *sigh*
Then again, I *am* known as the second most paranoid person at my place of work (the biggest paranoiac doesn't trust the use of kernel modules, and that is probably the only difference). I may be totally off base, but if you think I'm not, then, by all means, answer the inevitable question appropriately.
** I apologise for any incoherence in this post. I drank more than usual today as we were let out early to "enjoy" the day
The excuse for government regulation (Score:5, Interesting)
"Our economy DEPENDS on the internet!" they'll cry. "We can't let our country be reduced to rubble by some malicious hacker!"
And of course the press buys right into it. The DMCA, bills to punish users of school networks and computers, laws with stricter penalties for hackers than murderers... expect it to accelerate. Worms like Code Red just give the feds the ammunition they need in the court of public opinion.
-S
Re:The excuse for government regulation (Score:3, Interesting)
i don't buy it (Score:2, Insightful)
For my money (or lackthereof), and i hate to jump on the bandwagon and mention linux in every /. story, the real living, breathing OS is not windoze...I'll go for an OS that is constantly improving itself.
Anyway, i dont really buy the point because it's like finding somebody with no white-blood cells and sending them out to get a cold, and afterwards saying that it was a good thing for them to go to the hospital.
My two sense(s).
Has anybody thought about this? (Score:5, Insightful)
Consider the following scenario: a new worn, let's call it Code Blue, exploits the same security hole as Code Red. However, rather than attacking randomly any IP address, it would first just sit there and wait. As soon as it got a probe from the original Code Red (which statistically happens about 3 times per hour), it would "fight back" by infecting the attacking machine and replacing Red with Blue. The newly infected machine would behave similarly.
After about 11 hours of propagation, the new worm would have infected a significant percentage of the vulnerable machines, without revealing its presence in an obvious way. It would only attack machines which are known vulnerable (and hence probably badly maintained), and probability of anybody noticing would be incredibly small. Then after, some twenty hours, it would start to do some fun stuff...
Re:Has anybody thought about this? (Score:2)
Re:Has anybody thought about this? (Score:5, Interesting)
There were no more posts about the telnetd vulnerability for a few days as the bugtraq list was saturated with Code Red information. I'm paranoid as fuck and assumed that Code Red was a cover up for the telnetd exploit which we'd later find out affected every single version of telnetd out there (including on routers and the like).
But it didn't happen that way.
It is a lesson in distraction, though: when a true hacker wants to really take over the net, a Sircam virus or Code Red worm will make a great cover for the true exploit. I'm sure Sun Tzu wrote something witty about this, as it is the same technique used by countless military tacticians (at least the ones who "won") - c.f. the amphibious build-up prior to the land invasion during the Gulf War, or Patton's fake army prior to Normandy Invasion during WWII.
Re:Has anybody thought about this? (Score:2, Insightful)
Worms like this propogate because people aren't prepared for them. Why alert everyone to the existence very security hole you plan to exploit?
Re:Has anybody thought about this? (Score:4, Interesting)
Code Red could be a good launch platform for some other nastyness. Make it multiple phase. First propagate under cover of Code Red. Then, after a set time (say, 24 hours) change phase, and use a different propagation medium (email, another exploit, whatever) and toss away Phase I code. The benefit: a much larger launching platform for the actual virus! And if Phase I code is cleaned away well enough, nobody will be able to understand where the virus suddenly came from, out of nowhere.
Re:Has anybody thought about this? (Score:5, Informative)
There are still about 100.000 vulnerable (and by now... infected) machines out there.
As of the time of my posting this, there are about 130,000 infected hosts. Go to:
to see the "Dynamic Graphs of Code Red Worm" page from CAIDA [caida.org] (Cooperative Association of Internet Data Analysis).Funny BBC quote (Score:2, Funny)
"What might also hamper the ability of the virus to spread is the relative unreliability of Microsoft web servers.
The Code Red virus lurks in the memory of a web server and is cleared when the computer is rebooted.
As Microsoft servers crash more often than many of their counterparts, this might limit the spread of the malicious code. "
Hysteria is the Amphetamine of Ignorance (Score:1, Interesting)
Root DOWN
grep what -i sed?
its expected... (Score:2, Interesting)
Re:its expected... (Score:1, Insightful)
An observation... (Score:5, Interesting)
A machine at a research lab at school runs apache. In the access_log, from July 18-20, it had 18 attempts from a Code Red infected machine to spread the worm. (Naturally the attempt fails, cuz it's apache) But from August 1st through 'til about 9pm (EDT) last night (Aug 2), 36 attempts. So the question is - If the worm is spreading slower, why is it this one system has had more attempts of spreading this time around than the first?
Re:An observation... (Score:2, Interesting)
Over the last 2 days 90% of the attempted accesses to my machine are to the HTTP port, whereas a month a go I can't remember see these type of alerts.
Something surely is brewing
Re:An observation... (Score:4, Informative)
From http://dshield.org/codered.html [dshield.org]:
As you have probably heard, the Code Red worm has infected over 100,000 machines running Microsoft IIS, and the total is rising. We need to identify the infected machines so that the owners of these machines can be notified so that they can be fixed. We are appealing to DShield submitters to do a special one time only submission for log entries that contains this information.
Linux and other *NIX users Can do this by changing to the directory where your web server logs are located and executing a script like this:
grep 'default.ida?NNNNN' access_log | mail -s 'APACHE' redalert@dshield.org
Re:An observation... (Score:2, Informative)
CodeRedII uses default.ida?XXXXX so one should use:
grep 'default.ida?' access_log | mail -s 'APACHE' redalert@dshield.org
Re:An observation... (Score:2)
Re:An observation... (Score:2)
I just checked the log again, as of 9:35am EDT august 3, there have been 40 attempts. A closer look at the log shows as little as 10 minutes to as much as 5 hours between attempts.
Check your own logs:
cd <your-apache-install-dir>/logs
grep NNNNN access_log
The NNNN is part of the HTTP request issued by the worm itself, as you will see.
Re:An observation... (Score:2)
The hit you saw on the 20th might also be from someone in a different time zone - you're in EDT? Was the hit before 6am on the 20th? I got one hit on the 20th but it was before 6am so i figured it was someone in different timezone.
As far as the amount of hits that you're getting now, it is most likely due to the time the worm has to be in infect mode coupled with any random deviation (since the spread is random you might see 10 hits one day, 50 the next - i don't know the statistical term for this).
My logs [blackant.net] thus far show about an average of 21 hits per day this time around versus 24 hits on the 19th, so i don't see that much change.
oh yeah, here you go: :-)
grep default.ida?NNNNN access_log | cut -f2 -d[ | cut -f1 -d/ | sort | uniq -c
for default apache logs
Code Deep Purple (Score:2, Funny)
Hacked by Metal Heads.
Re:Code Deep Purple (Score:1)
Because what we're preparing for is not the Code Reds of today, but the Code Deep Purples of tomorrow. Not half-assed worms cobbled together by so-called "script kiddies" who merely download the right pieces of code and whose intentions are basically benign. I'm talking about vast and malicious super worms. If you could create something that attacked Cisco router software, for example, you really would cause a global Internet meltdown.
just a note (Score:1, Offtopic)
Re:just a note (Score:2)
The article says it all (Score:1)
Virus alerts (Score:1)
Hehe (Score:1)
The word 'columnist' (communist) on a red background only enhanced the illusion.
Finally. (Score:1)
Re:Finally. (Score:1)
BBC News | SCI-TECH | Code Red 'was never a threat' [bbc.co.uk]
At long last, people actually see that Code Red is just an IIS worm exploiting an IIS bug that was fixed two months ago! It quotes Graham Cluley of Sophos, one of the most clued in people in the antivirus companies.
Unpatched systems are not just a problem in the Microsoft world, of course: remember all the Sendmail 8.6 and SMI-SVR4 and 8.8 (nasty buffer overflow/relaying/take your pick) installations or old versions of BIND or Apache that litter the Net, and sigh. Microsoft had a patch out within days of the vulnerability getting posted to bugtraq, and all the open source products would do the same - or release a new version.
Admins that don't keep up with patches or new versions are the real problem here - that's why we have so many open relays, or rooted RedHat 6.x machines. Does linuxconf still make open relays by default? It did for a long time.
The ineffable rubbishness of IIS does need to be taken into account here - I'd rather use Apache. However, admins that don't keep up with the security patches mailing list (or bugtraq) for NT or Linux or xBSD or anything is in serious danger of being rooted whenever anything like Code Red or the Morris worm or just your neighbourhood script kiddie comes along. And that is a seriously bad thing.
Interesting Point: (Score:3, Interesting)
This is quite an interesting point that Taylor makes. The FUD-monster in the back of my mind is thinking up future scenarios where Microsoft could privately release worms/virii to rally support from the public.
I'm just waiting for the next major worm to have pop-up ads.
Map of geographical spread of the Worm (Score:1)
It's at http://www.security.nl/misc/codered-stats/kaart.jp g [security.nl].
Re:Map of geographical spread of the Worm (Score:1)
There's an interactive version [security.nl] of the map too !
Attacks stiil comming (Score:1)
Did I miss something? (Score:1)
Are you serious? This was the computing equivelant of Jon Katz covering, uhmmm, Cats. Sure, it made the Feds look like the miserable, inept, slugs that they've made themselves out to be, but it didn't offer any answers. Anyone can go on a tyrade making a mockery of any suit and pseudo-suit, I do it all the time, as a matter of fact. . .
Whoa, uhmmm, scratch everything after the start of the little gray box up there.
I don't see the big deal... (Score:2, Interesting)
Code Red only affects windows 2k... and only windows 2k thats running IIS. Thats not a very sizable market.
Sircam affects anyone too stupid to be careful (which is pretty sizable... just think about how dumb the average person is and remember that 50% of the population is stupider than that).
Ironically has anyone noticed that its the the virus,worms,etc that are aimed at people that cause more damage than those aimed at the technology (if you call windows that). Kinda makes me wonder why we're pushing for AI when we're having enough trouble finding NI. Just a thought...
Amen! (Score:2)
I don't think it's over... (Score:2)
It would be nice if the press could get some real experts in security and the Internet to talk about this thing, not press-seeking wannabes.
Re:I don't think it's over... (Score:1)
Agreed. I have 71 hits over the last 3 days, many more than the first outbreak. 19 on wednesday, 33 yesterday and 19 so far today (10:40 Eastern).
Maybe the thing is getting through its random IP generation faster??
Not even close (Score:2)
On Aug. 2, there were 32 hits.
As of 8:37 AM EDT on Aug. 3, there have been 19 hits - more than half of yesterday's total in just over 1/3 of the time.
Average time between hits (eyeball guess) is 0.5 hours, and will probably decrease by the day.
I'm going away for the weekend. I wonder what those hit totals will look like come Monday night.
Code Red may not cause any trouble to the White House, but I don't think many people will be laughing in, say, 1.5 weeks if hit counts (and, by extension, infections) continue to increase at their current rate, or on the 21st when it tries launching another DDoS.
Code Red - How it works (Score:1)
Concur (Score:2, Interesting)
(Quoting ) [time.com]
'Apart from that, the whole red-alert reaction only demonstrated that there's seemingly infinite space on the Feds' faces for more egg.'
Do they Feds have egg on thier face?
I'm not so sure, real egg would be getting infected whilst giving the dire warnings of what would happen, but in this case I think they are only slightly blushing.
Dynamic graphs at Caida (Score:2, Informative)
http://www.caida.org/dynamic/analysis/security/cod e-red/index.html [caida.org]
Biohazard designations for the net - NetHazards (Score:5, Insightful)
Viruses can either stealthily infect every computer available to it then after a gestation period, attack and destroy the computer in some way (NetHazard level 1) or as soon as it infects a computer it can simply wipe the drive and be done with it (NetHazard level 5) but this doesn't give it any time to infect other systems. As such a NetHazard 5 virus would (in virology lingo) 'burn itself out' in a short period of time.
We've seen our first highly infectious virus recently, in Code Red, but we havn't seen one so highly infectious that also causes the patient to bleed out and die. In short, we ain't seen nothn' yet.
I'm waiting for a patient virus writer to perfect his software first, before releasing it, because so far, although Microsoft software is a favorite virus target, virus writer seem to employ the same software development model as Microsoft, in that they just let their code loose on the net without debugging or optimizing it. Imagine what email (read: Outlook) viruses could do if the writers stopped to use proper grammer in their messages, or taylored the attachment type to the domain from which the infected computer is sending the message (office docs for
--CTH
Quasi-biological viruses (Score:2, Interesting)
I'm waiting for the first worm to appear that has a quasi-genetic structure.
Create a population of worms, and give each worm a few chromosomes, and some code that allows it to propagate using strategies determined by its genetic material. Give the worms an initial state that allow it to exploit some basic M$ vulnerabilities, and release a few hundred.
Every time a worm infects a new system, it looks for any other genetic-based worms. They've also been successful in infecting the system, so get the worms to mate and produce a new generation of a few tens of individuals from their genes (plus a few modifications).
Rinse and repeat.
Re:Quasi-biological viruses (Score:2)
Re:Quasi-biological viruses (Score:2)
Re:Quasi-biological viruses (Score:2)
Good ol' evolution. Once such Virii become frequent, the anti-virii people will need to code intelligent agents that can recognize a virus based upon its components. Instead of exact signatures we need intelligent pattern matching. For these kinds of virii, a signature might be
if it has 6 or more of the following components, then it might be a virus.
Also, frequency counts (and the like) on structures in the code might come in handy. Has anyone ever done freq counts on code structures and come up with general templates for network apps vs word processors, spreadsheets vs video games, virii vs non-virii ? I think i know what i'm going to do for the rest of the day instead of working...
No gene needed, the worm is its own DNA (Score:2, Interesting)
Give it a year to run, and who knows what could happen? [amazon.com]
Re:Biohazard designations for the net - NetHazards (Score:2)
Chris Daylor in TIme, makes a few good points. IF you look at biological virology, and compare it to computer viruses, the similarities are striking.
I agree, it's a very good point. A thought that occured to me after I read the article was comparing innoculation methods of the biological world against those in the computer.
One way the human body can be made ready to deal with some strain of virus is to inject a dead of version of the virus into the blood stream, the body produces white blood cells to fight off the attack. In essence you're priming the body against a possible future attack.
The computer equivalent would be to release a virus into the world that makes use of a given exploit but isn't actually harmful. For example, it infects a machine, attacks other machines for an hour, then pops up a message on the user's screen telling them what to do to fix it. It'd be a downright illegal thing to do, but it would effectively strengthen the Internet against some form of attack.
The Internet was built with our best understanding of organized systems, it's ironic that it winds up resembling an untidy organtic entity. I suspect we'll have to crack open books on biology more than once to successfully tame this thing, this is only the beginning after all.
46 attacks and counting.. (Score:2)
Sensationalized news? NEVER! (Score:3, Insightful)
Re:Sensationalized news? NEVER! (Score:2, Insightful)
b.
Re:Sensationalized news? NEVER! (Score:2)
Not by a worm, maybe... (Score:1, Insightful)
Re:Not by a worm, maybe... (Score:2, Interesting)
Re:Sensationalized news? NEVER! (Score:1)
Of course, with our luck, they'd hire some photogenic smooth-talker to spin the corporate line - "Open source is communism! Napster is theft! Buy Microsoft or you're going to go to hell when you die!" etc.
Re:Sensationalized news? NEVER! (Score:2)
I think the media need it pointed out to them that the net was designed by DARPA to withstand NUCLEAR WAR. I reckons it will take a little more than a slightly original-thinking s'kiddie (yes, that is an oxymoron) to bring it down!
...Then again, lets hope someone didnt go and assign a port number for the Big Red Button...
For everyone who didn't pay attention in History (Score:5, Informative)
Stolen from the article:
"For Microsoft, this was the kind of publicity you just can't buy. Not only did Redmond get to share a dais with the Justice Department --which is rather like Stalin vowing eternal friendship with Roosevelt to counter the Nazi menace -- but they also had their name inextricably linked with the well-being of the Internet itself."
Which is *exactly* what it is, except that in this case there isn't any Nazi menace to stand up to. My bet is that this will be seen as a way to soften the DOJ/Microsoft schism in the public's eye and make all those pesky state lawsuits go away that much quicker.
History is *filled* with bait-n-switches like this, which most people pick up on about as frequently as they do retail prices going up two weeks before a big sale. Study the past. Without it, you'll never see the future.
Good quote about now knowing its there... (Score:4, Informative)
It could replicate itself across thousands of servers ? usually because the owners were never aware that Microsoft software had turned their computer into a server in the first place.
We set up a simple win2k file server and specifically did not want IIS installed. There are a LOT of things on 2000 server that depends on it and if you check them on during the install, it will silently recheck IIS again. Want to just run an ftp server? It installs IIS.
We had to go back and uncheck IIS three separate times during the install. Another server done by another tech had IIS after I specifically put in a work order NOT to install it. He swears he didn't. I believe him.
It's as bad as the original various linux distro installs enabling every damn service under the sun (no pun intended) during an install.
Don't believe me? Just watch your code red hits on your web server and go to the sites that nail you. Most of them have either the default page or "directory listing denied" message. They are not big corporate servers for the most part that I've seen... That leads me to believe that a lot of these people don't even know IIS is running on their server...
Re:Good quote about now knowing its there... (Score:3, Informative)
IIS stands for Internet Information Services - that includes FTP and HTTP. IIS is usually used as a webserver, but you can also use it as a FTP server and various other servers, all through the same "friendly" interface. You can install IIS without the webserver and with various other interfaces.
My install of Win2K (hey, I'm at work, writing ASPs - it's a paycheck, layoff) has the following IIS options:
IIS is just Microsofts server platform, it isn't just a webserver - that's why you have to install it with a FTP server - it contains some core files along with pretty graphical management software. If it helps, think of it like inetd - it also does configuration and other management "stuff." (I'm not sure exactly what the "Common Files" are and what they do - I think they're mainly the configuration/management utilities though.)
Re:Good quote about now knowing its there... (Score:2)
You can install the FTP Service without the WWW Service, however.
These are important distinctions that it doesn't seem you grok.
Re:Good quote about now knowing its there... (Score:2, Insightful)
The problem as I see it is that Microsoft has put a pretty front-end GUI on everything and thereby allowed idiots to believe they can be a sysadmin. If you want to set up a Unix server, you need to have a certain amount of knowledge before you can even get the thing up and running to serve web pages. But a Windows web server, on the other hand, is so simple to get up and running in a basic configuration that it doesn't take much to struggle through and get a web page presenting. Unfortunately, that's the point at which the average Joe will congratulate himself on his system engineering skills and move on.
Completely forgetting to do any administration, such as disabling the web service if it's unneeded.
For better or worse, Microsoft's integration of internet-serving features into IIS means that IIS is the base platform for both WWW and FTP services. But the people to blame here are the people who don't know enough to take a minute after installation to go in and diable the default and administration web sites (or even just not install those features in the first place -- guess what? You can actually choose to not accept defaults! and go in and uncheck the little box next to web services, and IIS will happily install the basic IIS snap-in and FTP services and you'll have an FTP server without a Web server).
Along with power comes responsibility; and if someone gets seduced by the pretty pictures into believing they can run something without having to check the manual or investigate beyond the defaults, then that's irresponsibility. Like it or not, Britney Spears is not sufficient reason to boycott Shure. Well, probably not...
Re:Good quote about now knowing its there... (Score:2)
Agreed. But Microsoft throws out marketing crap saying that it is so much easier to administer than Unix servers and will save your company tons of administrative costs, but then turns around and claims a sys admin needs to have several thousand dollars in training to administer one. Which is it?
And getting back to my original note, saying FTP service was probably a bad example. I'm not an idiot, we are trained mainly on the UNIX side of the house and our main web server is Apache. When it came to set up a file and print server, THAT is what was studied up on and that is all we wanted on that server. I swear the most innocent things turned on IIS and I did not want it installed without knowing how to administer it correctly.
So just because one doesn't know the Microsoft server world inside out doesn't make them any more of an idiot than an MCSE or whatever not knowing squat about UNIX. The idiot is one who sets up services like IIS without knowing how to administer it correctly and the point of my exercise was NOT to install the damn thing cause of it...
Sigh...
File and Print service. Remember that? I didn't want all the other damn bloat in this particular case.. (Wishing I had just set up a Samba server for that particular project. Would have been a lot easier....)
Microsoft Flooded w/ Requests For 'Desktop Patch' (Score:2)
How can we expect good tech reporting when the whole of the news business is going down the pooper? Look at what CNN is about to do to Headline News. They have hired an actor to anchor the news. [ridiculopathy.com] Now some news organizations would have played it safe by hiring someone with more than two years of reporting unde their belt. But CNN knows that outdated concepts like "experience," "journalistic integrity," and "fact checking" no longer apply in the 21st century's news entertainment business.
And people will watch, no doubt. And these people will get the kind of crappy, poorly-researched, panick-stricken news that they deserve.
Re:Microsoft Flooded w/ Requests For 'Desktop Patc (Score:2)
So why not hire somebody that has alot of on-camera experience, all they're doing is reading..
Overreaction to overreaction (Score:5, Insightful)
There was no malicious intent.
Except to trash whitehouse.gov, using servers and networks all over the world to do so.
In the vast world of potential Internet viruses and worms, Code Red is a grade Z microbe.
If people hadn't woken up and smelled the patch, it would have been a grade B (if not A) pain in the butt. Like Y2K, there was too much hype, but the hype helped; a self-defeating prophecy.
It would have to go through a significant amount of mutation before it became any sort of serious threat to the Internet's health.
Significant, but not huge. There's been lots of discussion about how bad the next generation may be.
At its broadest definition, all hacking is white-hat hacking.
This statement is nonsense. There is certainly such a thing as white-hat hacking, and certainly too much hacking is portrayed as far darker than it really is, but there's a huge difference between the white hats and the jerks behind Code Red.
At most, Code Red proved you should always be wary about what Microsoft software does to your machine, like turning it into a server without your implicit knowledge.
Um, these machines were supposed to be servers.-)
We should be wary about what any software does to our machines. Point well taken, though.
Voice of Reason (Score:2, Insightful)
Re:Voice of Reason (Score:1)
You know that and I know that, but what Joe Newspapereader knows is that an "Internet virus" was stopped by "Microsoft security." Joe N. doesn't know that a relatively small portion of the Net is run by Microsoft servers, and that only those servers are affected, and that the total effect on the Net even if every M$ server in the world stopped working at once would be minimal. Joe N. knows "Virus bad, Microsoft good."
network trouble due to train crash (Score:2)
The BBC [bbc.co.uk] is running a story [bbc.co.uk] about how the bandwidth loss during the first Code Red attack was actually due to a train crash.
I haven't seen this anywhere else, can anyone corroborate?
Re:network trouble due to train crash (Score:1)
It's true.
Re:network trouble due to train crash (Score:2)
At last!! (Score:2, Interesting)
Anyway. The weird thing about the Media is that it has concentrated on the malicious people who created the virus. I have not seen anyone comment on why it is always Microsoft servers that seem to appear in the news; only a few months ago there was the great MS Administrator Password fiasco. Then there was I Love You and so on.
It'd be nice if someone created some software to check for dDoS worms on servers. All you need is a packet sniffer to track incoming and outgoing packets and hunt for millions of outgoing packets that werent originally to an IP that hasn't requested anything.
The idea of an 'immune system' mentioned at the start of that article intrigued me. It would be very nice if someone like McAfee created a system that automatically pushes upgrades to registered antivirus software running on servers as soon as an outbreak is detected, so that the software could instantly do a quick search for that one virus and deal with the problem each hour for several days or something (although several days is a bit of a wishfull uptime for microsoft servers, Ho Ho Ho Ho etc
Re:At last!! (Score:2)
My favorite quote (Score:2)
I just read this one here [globetechnology.com]:
Re:You gotta love that article (Score:1)
Microsoft will SAVE us?!? (Score:1)
Re:Ive suspected Pepsi Co. for some time (Score:2)
All you cpus are beloning to Pepsi
CNN news August 1, 2003:
The information technology word is still recovering from PepsiCo's suprise take over of the operating system market. In other news, PepsiCo is increasing the number of cans of soda bundled with each new pc. Consumers are expected to make up the difference in price. AOLTimeWarnerCoke is qouted as saying,"those bastards".
Re:Great Article (Score:2)