Jump to content

dauerpraktikant

Members
  • Gesamte Inhalte

    180
  • Registriert seit

  • Letzter Besuch

Alle erstellten Inhalte von dauerpraktikant

  1. Hey, DomRep will ich schon lange, Wo genau gehts denn hin? Machst Du mehr bade-Urlaub oder mehr Sport-Aktiv-Urlaub? Welcher Preis bei welchen Anbieter?
  2. Wie geht denn RAID 10 mit 6 Platten? Braucht RAID10 nicht 4 oder 8 oder 12 Platten? Ist es überhaupt ein Windows-RAID oder ein echtes Hardware-RAID? Das wäre mir neu. Wie soll das gehen?
  3. an welchen Tag wirst Du den Bericht abgeben?
  4. 1.) start --> ausführen --> regedit HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet>Services>ILT suchen und löschen 2.) neu starten 3.) virus entfernen 4.) daten sichern 5.) windows von vertrauenswürdigen medien neu installieren 6.) daten zurücksichern
  5. 1. Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter. 2. Still in the left panel, locate and delete the key: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>ILT
  6. 15. Right-click on this registry entry and choose Modify. Change the value of this entry to: Start = "dword:00000002" 16. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>RemoteRegistry 17. In the right panel, locate the entry: Start = "dword:00000004" 18. Right-click on this registry entry and choose Modify. Change the value of this entry to: Start = "dword:00000002" 19. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>TlntSvr 20. In the right panel, locate and set the following entry: Start = "dword:00000004" 21. Right-click on this registry entry and choose Modify. Change the value of this entry to: Start = "dword:00000003" 22. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet>Services>wscsvc 23. In the right panel, locate the entry: Start = "dword:00000004" 24. Right-click on this registry entry and choose Modify. Change the value of this entry to: Start = "dword:00000002" Restoring EnableDCOM and RestrictAnonymous Registry Entries This malware modifies EnableDCOM and RestrictAnonymous registry entries to a certain value. To know more about restoring these registries to their original values, please refer to these articles: 1. COM security frequently asked questions 2. How to disable DCOM support in Windows 3. How to Use the RestrictAnonymous Registry Value in Windows 2000 4. The "RestrictAnonymous" Registry Value May Break the Trust to a Windows 2000 Domain To restore this entry to its default value, please perform the following instructions: 1. Still in the Registry Editor, in the left panel, double-click the following: HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Ole 2. In the right panel, locate the entry: EnableDCOM = "N" 3. Right-click on this registry entry and choose Modify. Change the value of this entry to: EnableDCOM = "Y" 4. Close Registry Editor. Important Windows XP Cleaning Instructions Users running Windows XP must disable System Restore to allow full scanning of infected systems. Users running other Windows versions can proceed with the succeeding procedure set(s). Running Trend Micro Antivirus If you are currently running in safe mode, please restart your system normally before performing the following solution. Scan your system with Trend Micro antivirus and delete files detected as WORM_SDBOT.COH. To do this, Trend Micro customers must download the latest virus pattern file and scan their system. Other Internet users can use HouseCall, the Trend Micro online virus scanner. Applying Patches This malware exploits known vulnerabilities in Windows. Download and install the fix patch supplied by Microsoft. Refrain from using this product until the appropriate patch has been installed. Trend Micro advises users to download critical patches upon release by vendors. Weitere Informationen zu dieser Bedrohung finden Sie unter Überblick Technische Details Statistiken
  7. 1.) http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx installieren, wenn Du Win2000 hast 2.) Zitat von http://de.trendmicro-europe.com/enterprise/vinfo/encyclopedia.php?LYstr=VMAINDATA&vNav=2&VName=WORM_SDBOT.COH Lösung: Restarting in Safe Mode • On Windows 2000 1. Restart your computer. 2. Press the F8 key, when you see the Starting Windows bar at the bottom of the screen. 3. Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter. • On Windows XP 1. Restart your computer. 2. Press F8 after the Power-On Self Test (POST) is done. If the Windows Advanced Options Menu does not appear, try restarting and then pressing F8 several times after the POST screen. 3. Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter. Editing the Registry This malware modifies the system's registry. Users affected by this malware may need to modify or delete specific registry keys or entries. For detailed information regarding registry editing, please refer to the following articles from Microsoft: 1. HOW TO: Backup, Edit, and Restore the Registry in Windows 2000 2. HOW TO: Back Up, Edit, and Restore the Registry in Windows XP and Server 2003 Removing Autostart Key from the Registry Removing autostart key from the registry prevents the malware from executing at startup. If the registry key below is not found, the malware may not have executed as of detection. If so, proceed to the succeeding solution set. 1. Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter. 2. Still in the left panel, locate and delete the key: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>ILT Restoring Modified Entries from the Registry 1. Still in the Registry Editor, in the left panel, double-click the following: HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft> Security Center 2. In the right panel, locate and delete the following entries: * UpdatesDisableNotify = "dword:00000001" * AntiVirusDisableNotify = "dword:00000001" * FirewallDisableNotify = "dword:00000001" * AntiVirusOverride = "dword:00000001" * FirewallOverride = "dword:00000001" 3. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SOFTWARE>Policies>Microsoft> WindowsFirewall>StandardProfile 4. In the right panel, locate and delete the following entry: EnableFirewall = "dword:00000000" 5. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SOFTWARE>Policies>Microsoft> WindowsFirewall>DomainProfile 6. In the right panel, locate and delete the following entry: EnableFirewall = "dword:00000000" 7. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>Lanmanserver>parameters 8. In the right panel, locate the delete the following entries: * AutoShareWks = "dword:00000000" * AutoShareServer = "dword:00000000" 9. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>Lanmanworkstation>parameters 10. In the right panel, locate and delete the following entries: * AutoShareWks = "dword:00000000" * AutoShareServer = "dword:00000000" 11. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SOFTWARE>Policies>Microsoft> Windows>WindowsUpdate 12. In the right panel, locate and delete the entry: DoNotAllowXPSP2 = "dword:00000001" 13. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet> Services>Messenger 14. In the right panel, locate the entry: Start = "dword:00000004" ,,, ...
  8. dauerpraktikant

    Sommerurlaub 2006?

    Hallo. Wo gehts bei euch im Sommer in'n Urlaub? *winke*
  9. FULL ACK Und die Leute, die bereits vom eigenen Geld bezahlt haben? Die fühlen sich betrogen, ungefähr so, als würde man im Supermarkt zu ein einem gewissen Zeitpunkt das zweite Dutzend Eier gratis bekommen. Was wäre da wohl im Supermarkt los?
  10. Herr Board-veteran, welches Betriebssystem? Welche Version von Veritas? :rolleyes: :shock:
  11. Wenn nun Banner kommen, wo vorher keine waren, wird sich die Anzahl der helfenden nicht direkt erhöhen. :rolleyes: Die Anzahl der Leute, die sich schnell registrieren, um hier ihre Probleme abzuladen, wird sich zunächst mal nicht verändern, denke ich. Zumindest solange, wie die Microsoft-Zertifizierung noch "MCSE" heisst und nicht "Microsoft Certified Technology Spezialist". Das sehe ich nicht als Problem. Wissen bleibt Wissen, ob nun oben MCSEboard.de oder XYZ.de steht, ist da egal. Vielleicht ist das sogar ein "nicht völlig unerwünschter" Effekt?
  12. Hallo. Es gab ja hier im Board schon mal das Gerücht "dass MS vorhat im Zeitraum vom 15. Februar bis 30. Juni 2006 erneut die 2nd Shot Aktion durchzuführen." Wärt ihr dafür oder dagegen? ja,ja, ich weiß, ich bin nicht Microsoft. Bis dann.
×
×
  • Neu erstellen...