OK David, you are on.  I will try it fully patched and Norton running full 
blast and see what happens.  

So were the CodeRed writers really Chinese?

On Saturday 23 April 2005 02:14 am, David Sommers wrote:
> Well Nancy - you were most likely hit with CodeRed.
>
> [anti-flame war hat on]
>
> I like to think that I'm the ambassador for all OSes - I've used them
> all and my three favorites are Windows, OS X, and Linux right now.
> (Although I'm installing FreeBSD on second box in the background right
> now.)
>
> Back in the early days of both IIS and Apache - it was easy to install
> the system with no patches and get hacked - pure and simple.  Now - we
> know what "least priveledges" means, how to NAT/firewall, etc.
>
> The problem with Windows and IIS is most users install it by default
> (which isn't the case for XP or 2003 anymore).  Your standard Windows
> user is about 5 cans short of a 6 pack and has no idea what IIS even
> stands for.
>
> Many of you are linux geeks and you know how to protect your Apache -
> here are some hints for your IIS on 2000 and XP.  (2003 ships with a
> secure base configuration)
>
> First and foremost, IIS Lockdown.  This one does A LOT - so read the
> instructions carefully.
> http://www.microsoft.com/technet/security/tools/locktool.mspx
>
> URL Scan is an optional component of IIS Lockdown.  It restricts the
> information being posted via IIS.
> http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secmod/
> html/secmod114.asp
>
> Patterns and Practices: Securing your Web Server
> http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secmod/
> html/secmod89.asp
>
> NSA Security Configuration Guides
> http://www.nsa.gov/snac/
> For IIS:
> http://www.nsa.gov/snac/downloads_miis.cfm?MenuID=scg10.3.1.4
>
> And don't knock IIS too much; Apache has its problems too.  Patch it -
> secure it - check it.
>
> There's not that many great single source guidelines for Apache.  You'll
> find some information with the NSA (since they did all the SELinux stuff
> too) and some with Apache.
> http://httpd.apache.org/docs-2.0/misc/security_tips.html
> http://www.nsa.gov/selinux/index.cfm
>
> Put your pitch forks down... I'm just being fair.  If you take a few
> minutes to make sure your setup is solid, you can make it work great
> like eWeek did for their OpenHack competition.  The contest was to hack
> either the Apache/Oracle/Java or IIS/SQL/.NET setup.  They both stood up
> well (the Oracle stack was hacked but it was due to the application
> itself being vulnerable and not the underlying software).  Note - most
> systems are hacked through non-OS software such as Web Apps or simply by
> lack of proper administration (bad setup, not patched, etc).
> http://www.eweek.com/article2/0,1759,741388,00.asp
>
> /David.
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Nancy
> Anthracite
> Sent: Friday, April 22, 2005 5:27 PM
> To: hardhats-members@lists.sourceforge.net
> Subject: Re: [Hardhats-members] VistA Web
>
> Time for a web search for a work-around ... meanwhile, those with XP Pro
> have
> IIS as an option for their installation.  Can they least try it or does
> it
> take something more than that, I wonder?
>
> Anyone who uses IIS, be careful. It is a popular target.  A few years
> back I
> was using it to debug some code for a web site that was going to run on
> an
> IIS server.  I got hit successfully with my first virus when I was using
> it.
> My screen blanked and a message came up, "You have been hacked by
> Chinese."
> I shut it down and reformatted the disk.  After that, I didn't start it
> when
> my machine was connected to the Internet.
>
> On Friday 22 April 2005 04:54 pm, Mark Street wrote:
> > It looks to me like it is pretty much Windoze 2003 specific.  Too
>
> bad....
>
> > Software Requirements.... from the installation document.
> >
> > Windows Server 2003 Enterprise, configured with the role of
>
> Application
>
> > Server Internet Information Services (IIS) 6.0 (installed by default
>
> as
>
> > part of the Application Server role)
> > Microsoft Visual J#.NET 2003 runtime component
> > .NET Framework 1.1 (part of the Windows Server 2003 operating system
> > default installation)
> > FTP services and an FTP folder (to be used as a staging location for
> > updates to VistAWeb)
> > SMTP Virtual Server
> > .NET Framework 1.1 is installed by default on Windows 2003 systems.
> > Services packs and updates to all three components are available
>
> through
>
> > Microsoft Windows update (http://windowsupdate.microsoft.com).
> > Web Extension Services set to allow ASP.NET extensions (see Figure 2)
> >
> > On Friday 22 April 2005 11:49, Nancy Anthracite wrote:
> > > Well, then I guess we will have to just figure out how to do that -
> > > tunnel it or whatever.  We have only begun to fight!
> > >
> > > Actually, since the Hui project folks gave me that nice bound copy
>
> of the
>
> > > documentation, I think they have it going, but I think they said it
>
> uses
>
> > > an IIS server, which means we will have to see about Apache and all
>
> of
>
> > > that, too.  It may be written with VB Script or something.  I really
> > > haven't looked at it at all since I have been working on getting the
> > > CPRS/Wine problem licked - which we are finally making some progress
>
> on,
>
> > > I think/hope.

-- 
Nancy Anthracite


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
Hardhats-members mailing list
Hardhats-members@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/hardhats-members

Reply via email to