IT-DISCUSS Archives

January 2006

IT-DISCUSS@LIST.UVM.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Nick Ogrizovich <[log in to unmask]>
Reply To:
Technology Discussion at UVM <[log in to unmask]>
Date:
Fri, 6 Jan 2006 14:17:40 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (78 lines)
More to the point? How about we just say it like it is.

__________

M$ has embarrassed itself. again. Its really, really bad this time. A 
patch will prevent your computer from foaming up and dissolving into a 
pool of acid.

Auto-update should be turned on and receiving updates. If not, or 
because you are one of those smertypants leet speakers who like to 
manually do updates, go to windowsupdate.microsoft.com with IE. (if you 
use firefox, it will download viruses and viagra ads)

Reboot computer.
_______

in all seriousness, i am getting alot of eye-rolls when i tell people 
how important it is to make sure X new patch has been carried out. MS 
needs to come up with a patch/update vulnerability warning system, based 
on the homeland security color system. I guess this patch would be orange?

nick

Jonathan L. Trigaux wrote:
> On Fri, 6 Jan 2006, Stefanie Ploof wrote:
> 
> 
>>Please see wording below and make any comments to the wording or to the
>>extended information web page (http://www.uvm.edu/cit/wmf-hole).
>>Please send all comments to the list so that all of us involved with the
>>wording will see your responses.
> 
> 
> I feel it's too long for basic directions.  I even found myself spacing
> out a bit while reading, and was skimming parts just to get to the
> directions on what to do.  The whats and whys are interesting to some, and
> I think should still be included on the web page under a "More
> Information" header, but I think the e-mail itself and the top of the web
> page should get more to the point.
> 
> A possible revision:
> <BEGIN>
> On December 27, 2005, Microsoft acknowledged that reports of a
> vulnerability in the Windows operating system had become public knowledge
> and might result in Windows PCs becoming compromised for malicious
> purposes.  All versions of Windows are affected.
> 
> Microsoft announced that they have developed a patch to correct the flaw.
> Following Microsoft's recommendations (in the security announcement
> as well as in the patch release), we recommend the following:
> 
> 1.    Ensure that your system's antivirus/antispyware services are up to
> date (check this UVM page).
> 
> 2.    Ensure that Windows auto-update feature is enabled (Windows 2000 and
> Windows XP) and make sure that your Windows system is up to date with
> respect to patches.
> 
> 3.    If auto-update was not enabled or it hasn't installed yet, obtain
> the Microsoft patch from their web site and click on the appropriate link
> to install the necessary patch.
> 
> Microsoft rates this as a critical security issue.  If you use a Windows
> workstation, please install the Microsoft patch or seek assistance (Help
> Line, 656-2604) to have it installed.
> <END>
> 
> My $0.02.
> 
> -JLT
> 
> --------------------------------------------------------------------------
> Jonathan L. Trigaux
> CIT Client Services | Rubenstein School of Environment & Natural Resources
> 111 Waterman | 342 Aiken
> University of Vermont
> Burlington, VT 05405

ATOM RSS1 RSS2