[40008] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Code Red round two

daemon@ATHENA.MIT.EDU (Stephen J. Wilcox)
Tue Jul 31 09:57:23 2001

Date: Tue, 31 Jul 2001 14:55:47 +0100 (BST)
From: "Stephen J. Wilcox" <steve@opaltelecom.co.uk>
To: Jeff Ogden <jogden@merit.edu>
Cc: nanog@merit.edu
In-Reply-To: <v04210107b78c66f330ac@[198.108.90.150]>
Message-ID: <Pine.LNX.4.21.0107311453020.23776-100000@staff.opaltelecom.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu



as a non-iis user i will probably watch the graphs of infected hosts
whilst chuckling to myself

but i've already sent security bulletins to all customers when the worm
was disassembled and its potential known.. hasnt everyone??? (duh if not!)

Steve

PS Do people write vulnerabilities into servers in order to justify the
jobs of security people or are they just bad at what they do?

On Tue, 31 Jul 2001, Jeff Ogden wrote:

> 
> So what, if anything, are people planning to do differently as 8 pm 
> EDT today and the possibility of a new round of Code Red Worm 
> activity approaches? Are there things that we as network operators 
> can and should be doing beyond encouraging end users to patch their 
> vulnerable systems?
> 
>     -Jeff
> 



home help back first fref pref prev next nref lref last post