Tom Lisa wrote:
> Hmmm, are IT Gals also easy to recognize???
> 
> Prof. Tom Lisa, CCAI
> Community College of Southern Nevada
> Cisco ATC/Regional Networking Academy
> "Cunctando restituit rem"
> 
> Priscilla Oppenheimer wrote:
> 
>   Evans, Timothy R (BearingPoint) wrote:
>   >
>   > I know of several organizations in the Washington / NoVa / MD
>   > area that were
>   > effected - the MD Motor Vehicle Administration was offline for
>   > quite some
>   > time, for example.
>   >
>   >
>   > Sadly - too many people, many who should know better, assumed
>   > that as long
>   > as the "edge" was secured than all was good.  Unfortunately it
>   > only takes
>   > one laptop (for ex) to break that theory :).
> 
>   Makes me wonder about people's security policies. Bringing in a
>   laptop that
>   isn't running software approved by IT shouldn't be allowed. This
>   software
>   should include patched OSs, anti-virus, and personal firewall.
> 
>   Of course, enforcing that is difficult.
> 
>   Friday night I was walking by a local bank and noticed that the
>   ligths were
>   still on. I had to chuckle when I looked inside and noticed IT guys
>   hunched
>   over PCs at the tellers' stations. I'm pretty sure I know what they
>   were
>   doing. And yes, IT guys are easy to recognize. You know who you are.
>   :-)
> 
>   Today I went to my favoriate local coffee shop. The public Internet
>   acccess
>   PC was turned off with a sign that said, "Not in service due to
>   virus. Bye,
>   bye Miss American Pie." Ah, the day the music died.
> 
>   This blaster thing is yet another wake-up call. The big one is still
>   coming.
>   We are lucky that so far it's been benign tricksters attacking our
>   networks.
>   Sorry for the dire warning, but I truly predict a huge failure at
>   some
>   point. Argh....
> 
>   >
>   >
>   > Luckily - this was/is a very sloppy worm:
>   >       Noisy enough to easily tracedown
>   >       Poor propogation method
>   >       Limited vectors of attack
>   >       No destructive payload
>   > (don't get me wrong - having a backdoor is bad, but let's say
>   > it wiped data
>   > from hardrives 8 hours after infecting them, or performed some
>   > other
>   > non-randon act of data destruction)
>   > ...   and, to top it all off, its attempted DoS was to the wrong
>   > URL and
>   > was easily sidestepped, although some people caused local RST
>   > floods on
>   > their network by attempting to mitigate it incorrectly :)
> 
>   It's not just Microsoft that has software bugs! Getting the wrong URL
>   was an
>   amazingly stupid bug, but benign. A lot of the infamous worms of the
>   past
>   spread unintentionally like wildfire because of software bugs.
> 
>   Why is software so hard to get right? Well, I know why. But this has
>   gotta
>   change....
> 
>   Priscilla
> 
>   >
>   >
>   >
>   > Thanks!
>   > TJ
>   > ... not all windows admin's are incompetent
>   > ... and some are network admins as well :)
>   >
>   > -----Original Message-----
>   > From: Reimer, Fred [mailto:[EMAIL PROTECTED]
>   > Sent: Saturday, August 16, 2003 4:23 PM
>   > To: [EMAIL PROTECTED]
>   > Subject: RE: OT Microsoft worm [7:74045]
>   >
>   > For reasons of confidentiality I won't and can't name any
>   > names, but I am
>   > aware of several hospitals that were affected pretty
>   > seriously.  Everyone
>   > here knows that Cisco Call Manager runs on Windows, so imagine
>   > what happens
>   > to your entire phone infrastructure if you are running VoIP.
>   > Network grinds
>   > to a halt and admitting can't access the applications to admit
>   > people in the
>   > ER.  Lab orders don't go through, so meds can't be dispersed
>   > based on the
>   > results of tests.  Everything goes back to a paper fall-back
>   > scheme until
>   > the Windows administrators patch the systems like they should
>   > have done
>   > weeks ago.
>   >
>   > So no, don't assume that even large organizations have a handle
>   > on things.
>   > Especially hospitals which are notoriously on the low end as
>   > far as
>   > adequately staffing, at the right levels, their IT staff.
>   >
>   > One thing I sincerely hope is changed in our lexicon is calling
>   > Windows
>   > administrators "network administrators."  It makes me
>   > physically ill,
>   > because those folks don't "administer" the "network," if
>   > anything they
>   > actually do can be classified as competent administration.
>   > They should be
>   > called what they are "systems administrators," or, if you want
>   > to be more
>   > specific, "Windows administrators."  I personally think they
>   > deserve a
>   > classification of their own.
>   >
>   > All I can say is that the Windows systems that our group has to
>   > use and is
>   > responsible for were patched long ago, and did not exhibit any
>   > issues.
>   >
>   > Fred Reimer - CCNA
>   >
>   >
>   > Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA
>   > 30338
>   > Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050
>   >
>   >
>   > NOTICE; This email contains confidential or proprietary
>   > information which
>   > may be legally privileged. It is intended only for the named
>   > recipient(s).
>   > If an addressing or transmission error has misdirected the
>   > email, please
>   > notify the author by replying to this message. If you are not
>   > the named
>   > recipient, you are not authorized to use, disclose, distribute,
>   > copy, print
>   > or rely on this email, and should immediately delete it from
>   > your computer.
>   >
>   >
>   > -----Original Message-----
>   > From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
>   > Sent: Saturday, August 16, 2003 1:22 PM
>   > To: [EMAIL PROTECTED]
>   > Subject: OT Microsoft worm [7:74045]
>   >
>   > Just wondering, is this new LOVSAN msblast worm as big as it
>   > seems to be?
>   > I've been helping lots of Windows users clean up their
>   > machines. They all
>   > had the worm. These are mostly home users. I can't believe they
>   > would use
>   > broadband, "always-on" access and not have a firewall, but they
>   > didn't!
>   >
>   > What are you all seeing? Is this a big one? I suppose
>   > enterprise networks
>   > are much better protected (hopefully) than the home networks
>   > I've been
>   > helping out with.
>   >
>   > One has to wonder if the huge power outage could be related. I
>   > can imagine a
>   > Windows computer somewhere in Ohio that played a surprisingly
>   > important role
>   > in keeping the grid working and had been infected..... But I
>   > read a lot of
>   > science fiction. :-)
>   >
>   > By the way, the stupid worm is attacking the wrong Microsoft
>   > URL! So that
>   > aspect of it isn't going to be as bad as once thought.
>   >
>   > Comments?
>   >
>   > Priscilla
>   > **Please support GroupStudy by purchasing from the GroupStudy
>   > Store:
>   > http://shop.groupstudy.com
>   > FAQ, list archives, and subscription info:
>   > http://www.groupstudy.com/list/cisco.html
>   > **Please support GroupStudy by purchasing from the GroupStudy
>   > Store:
>   > http://shop.groupstudy.com
>   > FAQ, list archives, and subscription info:
>   > http://www.groupstudy.com/list/cisco.html
>   >
>   >
>   >
>  
>
******************************************************************************
>   > The information in this email is confidential and may be
>   > legally
>   > privileged.  Access to this email by anyone other than the
>   > intended addressee is unauthorized.  If you are not the
>   > intended
>   > recipient of this message, any review, disclosure, copying,
>   > distribution, retention, or any action taken or omitted to be
>   > taken
>   > in reliance on it is prohibited and may be unlawful.  If you
>   > are not
>   > the intended recipient, please reply to or forward a copy of
>   > this
>   > message to the sender and delete the message, any attachments,
>   > and any copies thereof from your system.
>   >
>  
>
******************************************************************************
>   **Please support GroupStudy by purchasing from the GroupStudy Store:
>   http://shop.groupstudy.com
>   FAQ, list archives, and subscription info:
>   http://www.groupstudy.com/list/cisco.html
> **Please support GroupStudy by purchasing from the GroupStudy Store:
> http://shop.groupstudy.com
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> 
I don't think I want to know....

Annlee




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74129&t=74045
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to