question...
Aug. 18th, 2005 04:22 pmam i the ONLY one here who is sitting back, sipping my fifth cup of coffee, and laughing quietly as i read report after report and release after release of the new win2k worms running (apparently, although i doubt it's so) rampant?
Am i the ONLY one sitting on a home Lan of 6 win2000 computers and one win2003 server that were all FULLY PATCHED the DAY the patch came out a couple of weeks ago and thinking that the actual fault of these infections lies purely with the sysadmins and other such people that did NOT patch their win2k computers immediately or as soon as possible, given the increasingly small window of time between an vulnerability and an exploit?
news flash to customers, patch your damned machines, cause you aren't going to get any sympathy from ME when you get hit by an exploit that was patched weeks earlier.
Valis
Am i the ONLY one sitting on a home Lan of 6 win2000 computers and one win2003 server that were all FULLY PATCHED the DAY the patch came out a couple of weeks ago and thinking that the actual fault of these infections lies purely with the sysadmins and other such people that did NOT patch their win2k computers immediately or as soon as possible, given the increasingly small window of time between an vulnerability and an exploit?
news flash to customers, patch your damned machines, cause you aren't going to get any sympathy from ME when you get hit by an exploit that was patched weeks earlier.
Valis
no subject
Date: 2005-08-18 09:25 pm (UTC)It sucks. :(
no subject
Date: 2005-08-18 09:34 pm (UTC)That being said, I agree wholeheartedly with the fact that most in this field don't realize how small that window has become. I hope this was a wake-up call to those organizations.
Incidentally, said worms really aren't having *that* big of an impact. Just just hit a few major organizations - nothing nearly of last years scales.
no subject
Date: 2005-08-18 09:39 pm (UTC)and yes, that window is getting DAMNED small!!
no subject
Date: 2005-08-18 09:42 pm (UTC)*sigh*
Hmmm
Date: 2005-08-18 09:42 pm (UTC)Fault? Well, yeah, I guess you could blame them for that, but its unlikely that the sysadmins chose the wide-open system in the first place, so, fair's fair yeah they shoulda been patched sooner, but lets be sure to provide a balance there; the systems should not need patching to begin with, and ironically its most often non-technical people who choose which systems are to be implemented, we just deal with the fall-out after the fact ... :-/
no subject
Date: 2005-08-18 09:46 pm (UTC)There is a large amount of surprisingly fiddly software that breaks unless you use a certain version of certain DLLs, and if patches to fix services actually break software because they've been written to either use the hole that was patch in a benovlent way or because some ofther fiddly bit got changed.
Since
Date: 2005-08-18 09:46 pm (UTC)no subject
Date: 2005-08-18 09:48 pm (UTC)no subject
Date: 2005-08-18 10:41 pm (UTC)I just sent my second email of the week telling people that if their machine wasn't up to date and got hit by the virus, I was going to wipe their entire hard drive and start over. After that, I suddenly got half my users calling me up to make sure they were properly patched. Guess that finally got their attention.
no subject
Date: 2005-08-18 10:44 pm (UTC)Re: Since
Date: 2005-08-18 11:14 pm (UTC)Large organizations have to approve patches after making sure they don't break anything, and there was simply no time to do it. What is a sysadmin to do: risk downtime from unscheduled emergency patching, risk downtime from getting infected, or risk downtime from a patch blowing up production systems?
Damned if you do and damned if you don't, but from the things I've seen personally, getting infected is a deeper level of hell than the other two alternatives.
no subject
Date: 2005-08-18 11:29 pm (UTC)The reason my labs aren't completely updated (the student one is, the public one isn't) is because it's the start of a new semester and I've been trying to get the student lab software installed on every machine, and patching while I go along. Every time I think I'm done, I find out I have to go back to every single machine and update something else. So I just haven't had the time to hit the public lab yet. Besides the fact that the lab manager gives me grief and only lets me come in during certain times. But it'll end up being his problem when he has to shut the entire lab down to let me clean it.
no subject
Date: 2005-08-19 03:18 am (UTC)no subject
Date: 2005-08-19 03:57 am (UTC)HFNetChk is a wonderful thing
no subject
Date: 2005-08-19 05:11 am (UTC)The network engineers here seem to have a pretty good grasp on keeping the firewall in good order. That saves us from quite a bit of stuff for sure.
no subject
Date: 2005-08-19 12:11 pm (UTC)not really a problem....
Date: 2005-08-19 12:13 pm (UTC):)
no subject
Date: 2005-08-21 06:05 am (UTC)no subject
Date: 2005-08-24 03:34 am (UTC)