News:

Wieners, Brats, Franks, we've got 'em all.

Main Menu

Windows Worm knocks down corporations

Started by iago, August 17, 2005, 09:13:46 AM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Quik

Software companies are corperations, too. The second one was meant at all companies, as an alternative to Windows. First one was specifically from the business point-of-view: Would it make sense to use Linux? If your business is based around Windows programs, that's most likely not a path for you.
Quote[20:21:13] xar: i was just thinking about the time iago came over here and we made this huge bomb and light up the sky for 6 min
[20:21:15] xar: that was funny

Blaze

Your crazy Newby if you think someone actually installs all the security updates and jazz by hand for companys.  You do it once, make an image of that harddrive, and then just use that image on all the other ones.
And like a fool I believed myself, and thought I was somebody else...

iago

Quote from: Blaze on August 23, 2005, 02:45:26 AM
Your crazy Newby if you think someone actually installs all the security updates and jazz by hand for companys.  You do it once, make an image of that harddrive, and then just use that image on all the other ones.

Or you use tools like CA Unicenter or WSUS or others. 

For patching corporations, the problem isn't actually rolling out the patches, it's compatibility issues.  Windows patches tend to do things that Microsoft doesn't tell us, and occasionally it conflicts with installed software.  So before patches are rolled out, they have to be tested.  That leaves a window for worms.  As soon as we see an exploit, we tell them to hurry up and get the patch out.  If we see a worm, like last Monday, we tell them to put on the patch _NOW_. 

Screenor

Quote from: iago on August 23, 2005, 07:47:39 AM
Quote from: Blaze on August 23, 2005, 02:45:26 AM
Your crazy Newby if you think someone actually installs all the security updates and jazz by hand for companys.  You do it once, make an image of that harddrive, and then just use that image on all the other ones.

Or you use tools like CA Unicenter or WSUS or others. 

For patching corporations, the problem isn't actually rolling out the patches, it's compatibility issues.  Windows patches tend to do things that Microsoft doesn't tell us, and occasionally it conflicts with installed software.  So before patches are rolled out, they have to be tested.  That leaves a window for worms.  As soon as we see an exploit, we tell them to hurry up and get the patch out.  If we see a worm, like last Monday, we tell them to put on the patch _NOW_. 
Yeah, which they do neither of. :(

iago

Quote from: Scr33n0r on August 25, 2005, 06:19:28 AM
Quote from: iago on August 23, 2005, 07:47:39 AM
Quote from: Blaze on August 23, 2005, 02:45:26 AM
Your crazy Newby if you think someone actually installs all the security updates and jazz by hand for companys.  You do it once, make an image of that harddrive, and then just use that image on all the other ones.

Or you use tools like CA Unicenter or WSUS or others. 

For patching corporations, the problem isn't actually rolling out the patches, it's compatibility issues.  Windows patches tend to do things that Microsoft doesn't tell us, and occasionally it conflicts with installed software.  So before patches are rolled out, they have to be tested.  That leaves a window for worms.  As soon as we see an exploit, we tell them to hurry up and get the patch out.  If we see a worm, like last Monday, we tell them to put on the patch _NOW_. 
Yeah, which they do neither of. :(

Which "they" are you talking about?

If you mean the people we tell to patch, then yes, it gets done.  Being in a security department, we have some level of influence.

Screenor

Quote from: iago on August 25, 2005, 08:51:50 AM
Quote from: Scr33n0r on August 25, 2005, 06:19:28 AM
Quote from: iago on August 23, 2005, 07:47:39 AM
Quote from: Blaze on August 23, 2005, 02:45:26 AM
Your crazy Newby if you think someone actually installs all the security updates and jazz by hand for companys.  You do it once, make an image of that harddrive, and then just use that image on all the other ones.

Or you use tools like CA Unicenter or WSUS or others. 

For patching corporations, the problem isn't actually rolling out the patches, it's compatibility issues.  Windows patches tend to do things that Microsoft doesn't tell us, and occasionally it conflicts with installed software.  So before patches are rolled out, they have to be tested.  That leaves a window for worms.  As soon as we see an exploit, we tell them to hurry up and get the patch out.  If we see a worm, like last Monday, we tell them to put on the patch _NOW_. 
Yeah, which they do neither of. :(

Which "they" are you talking about?

If you mean the people we tell to patch, then yes, it gets done.  Being in a security department, we have some level of influence.
I was talking about Microsoft, and their updates.