Thanks so much.
java.bytver.a,b,g & watson debugger [RESOLVED]
Posted 09 June 2005 - 09:06 AM
One last question if you dont mind, did your firewall alert say whether the alert was for an incoming intrusion attempt or an outgoing connection attempt?
Posted 09 June 2005 - 09:12 AM
Also, I am (was) completely up-to-date on patches/updates. And exploit warning is still coming full speed. I've tried doing some searching and lots of people are getting this problem, apparently. The Trend Micro site has its own page for the warning and it says this:
"This detection is not a detection for the vulnerability of your machine. If you got this warning, it is an indication that a malicious piece of code passed through your network or your machine, but was detected by Trend Micro as MS04-011_LSASS_EXPLOIT.
If you have patched your system against the LSASS Vulnerability, then your system should be safe from the damage that may be brought about by this exploit code. "
So, if I'm patched against I should be fine, right? I think I'm patched.
Posted 09 June 2005 - 09:23 AM
Microsoft patched this vulnerability a while ago, but it is worthwhile checking that you are fully patched anyway. As long as you cleaned out the java cache and all your temps etc as i described before, then purged the system restore by switching it off, rebooting and switching restore back on again tocreate a new, clean restore point you are probably OK. An infected system restore point was probably why you were getting detections from the AV applications but they were unable to fix the problem.
Make sure that you get the applications I suggested, especially ApywareBlaster and Spywareguard, they will give you a good multilayered defence against all the nasties out there.
have a good look around the site here, there is a lot of interesting stuff. Any questions, feel free to PM me.
Posted 16 June 2005 - 11:28 AM
If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.
Everyone else please begin a New Topic.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users