Re: FUD (Real or Not real)
Originally Posted by
Brandel Valico
Firestem4: I had all ready switched to Linux at the time so after the initial shock of it actually doing something and my accepting it was a massive virus and the media all saying no PC is safe (I again later found it was only Windows PC's directly affected) I did some research on it and actually had to remove it from my wifes Desktop and Laptop as well as my mom and brothers Desktop PC's. (Wife now uses Ubuntu) As much of a pain as it was for me to do. I don't even want to consider the hours you put in cleaning out a whole company network not just once but 3 times. (Was it people bringing in infected flash drives or other such media that reinfected the systems?) Is it still an issue?
Alright, one of the reasons the Conficker Virus was so well known and credited as being the worst virus in years is because it was 1 parts sensationalistic journalism, and 2 parts marketing scare. (Can't tell you how many AntiVIrus vendors jumped on the scaremongering to sell their products, Norton was the worst culprit of that IMO).
I work at a small company with around 15 employees not including contractors. We have 16 servers and over 20 desktops. We build an embedded computer for Airborne Law Enforcement. The product that we sell runs on Windows XP Embedded. That has been the point of infection/vulnerability each time the Conficker Virus has outbroken in our network since the embedded image we use is quite old, and vulnerable to viruses of all kinds. We've had a few occasions where the Conficker virus would infect these machines and when we connected them to the network they would start distributing it themselves.
The 3 times where we had an infection were resultant due to our extensive use of networking when we repair, update, or do installations to these embedded computers. All of our setups and etc are stored on the network. Plug a vulnerable machine in; if its infected BAM..infected network. Or vice versa if you have an infected network, these machines can be easily infected. Tracking down the infection goes from working with the network monitoring tools, finding out which physical machine is infected, and manually doing a scan of each machine in an attempt to clean it. Its tedious and the first time it happened we didn't have the proper resources in place and were inbetween switching AntiVirus providers.
Last edited by Firestem4; February 28th, 2010 at 04:19 PM.
Happy geeks are effective geeks!
AMD Athlon II X2 250 (3.0ghz), Gigabyte GA-MA770T-UD3P, 3GB Crucial DDR3-1066Mhz RAM, XFX ATI RadeonHD 5750 1GB GDDR5
Bookmarks