Work at home Finance Hotels Travel Telecom Webhosting Business Shopping Webmaster

Keyword links
Business
Buy leads
Contacts
Company profiles
Find supplier
Importers
Link partners
Made in EU
Made in USA
Portals
Product news
Tradefairs
What's new

Countries
Africa
Americas
Asia
Europe
Other


Computer
Computer
Downloads
Flightsimulator
Games
Memory
Monitors
Motherboards
Notebooks
Pda
Printers
Processors
Scanners

Security
Software
Toner

Finance
Commodities
Day trading
Debt
Ecommerce
Insurance
Loans
Mortgage
Offshore bank
Venture capital

Hotelguide
Amsterdam
Antwerp
Athens
Barcelona
Berlin
Bern
Budapest
Copenhagen
Frankfurt
Helsinki
Istanbul
London
Los Angeles
Madrid
Miami
Milan
Monaco
Nice
Rome
San Diego
San Francisco
More...

Travel
Airlines
Airports
Cruises
Hotels
Restaurants
Scuba diving

Travel dest.
Asia

Africa
Caribbean
Central America
Europe
Middle East
North America
South America
Oceania

Various
Dating
Diets
Digital camera
Divx movies
Education
Fishing
Fonts
Health
Jobs
Kids
Movies

Real estate
Shopping
Skiing
Sports
Supplements
Telecom
Translators

Webmaster
Domain names
Ecommerce
Free resources
Shoppingcarts
Webdesign
Webhosting

zzz

More topics.....

 

--logo.jpg (13382 bytes)

Google Web Bizeurope.com
 

Want to stay up to date?

Discover our free PC magazine PC newsflash now


Latest update: 19-8-2003: W32/Nachi.A virus


URGENT ALERT - MSblaster.exe virus

There is a new trojan virus around spreading around quite fast. If your Windows
XP is closing down all the time without a reason you can have this virus
on your pc.

When the virus is active and you go online you will get this message:

virus.gif (17964 bytes)

To check press control+alt+del button to see the tasks operating on your
machine, if msblaster.exe is active you are infected.

Also check Windows/System32 directory for a file called msblaster.exe

W32.Blaster.Worm is a worm that exploits the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135. This worm attempts to download the msblast.exe file to the %WinDir%\system32 directory and then execute it. The worm has no mass-mailing functionality.

The worm also attempts to perform a Denial of Service (DoS) on the Microsoft Windows Update Web server (www.windowsupdate.com). This is an attempt to prevent you from applying a patch on your computer against the DCOM RPC vulnerability.

To remove the virus download this tool now

More info on this tool here


To be sure your windows is clean check this:

- Reboot your system
- Press ctrl+alt+del button to see tasks which are active (look for msblaster)
- Check windows / system32 directory for msblaster.exe file

- Start windows/regedit.exe utilty and look for registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

See if it contains: windows auto update"="msblast.exe"

if so remove that entry and close regedit

 

 

 

 

 

 

 

 

 

 

 

 

 

Site navigation
 

 

Click here for information