duminică, 14 mai 2017

virusul WannaCrypt

am luat cu copy/paste ca imi era lene sa mai scriu... va prindeti voi ce si cum...  

o sa revin cu amanunte in editiile viitoare. (eu am simtit ca ma tot cauta la "coada' zilele trecute ceva ip-uri din Rusia... sper sa nu ma fi "gaurit"...) deocamdata pare ok. dar am dat drumu' la "protocolul intern" de urgenta la backup. :))

 



aici postam zilele trecute, cand am vazut ca "vedeti doamna ca insista cineva la usa..." :) 

 
radio fara filtru
Published by Dragos Ionut Ivan · 7 hrs ·
Așa după cum unii dintre voi deja știu, prima variantă WannaCrypt a fost oprită temporar, din greșeală. Azi e sâmbătă; până luni aproape sigur va apărea o nouă variantă care nu va mai putea fi oprită așa ușor – dacă administrați vreo mașină Windows care s-ar putea să nu fie patched, rezolvați ACUM, nu așteptați până luni. Atentie la neatentie... Vedetz ca e foarte nasoala treaba. (Eu am serverele oprite, pana trece chestia asta)
«One thing that is very important to note is our sinkholing only stops this sample and there is nothing stopping them removing the domain check and trying again, so it’s incredibly importiant that any unpatched systems are patched as quickly as possible.»

 https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/

https://www.malwaretech.com/…/how-to-accidentally-stop-a-gl…

So finally I’ve found enough time between emails and Skype calls to write up on the crazy events which occurred over Friday, which was supposed to be…
malwaretech.com

Get More Likes, Comments and Shares
This post is performing better than 95% of other posts on your Page. Boost it to get more great results.
Comments
Cancel
radio fara filtru
radio fara filtru cautati-va in aceasta lista sistemul de operare pe care il aveti, si instalati-va patch-ul corespunzator. https://technet.microsoft.com/.../security/ms17-010.aspx

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server.
technet.microsoft.com

· Reply · Remove Preview · Commented on by Dragos Ionut Ivan · 6 hrs
radio fara filtru
radio fara filtru https://blogs.technet.microsoft.com/.../customer.../

Microsoft solution available to protect additional…
blogs.technet.microsoft.com

· Reply · Remove Preview · Commented on by Dragos Ionut Ivan · 6 hrs
radio fara filtru
radio fara filtru pentru win7 pe 64bit este al 3-lea din acesta lista de sus in jos http://www.catalog.update.microsoft.com/Search.aspx...

catalog.update.microsoft.com

· Reply · Remove Preview · Commented on by Dragos Ionut Ivan · 6 hrs
radio fara filtru
Adi Tanasescu
Adi Tanasescu toate pe portul 445 .

· Reply · Message ·
1
· 7 hrs
radio fara filtru de aia eu deschid numai porturi "cretine" 8069 , 8076 etc :D

· Reply · Commented on by Dragos Ionut Ivan · 7 hrs
radio fara filtru
radio fara filtru https://technet.microsoft.com/.../security/ms17-010.aspx

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server.
technet.microsoft.com

· Reply · Remove Preview · Commented on by Dragos Ionut Ivan · 6 hrs

Niciun comentariu:

Trimiteți un comentariu