Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Curing a Corporate Virus Infection 346

museumpeace writes "Over at Internet Storm Center Deb Hale's 'In search of the bot net' entry for September 25 recounts a grueling hunt for all the .exe's, reg entries and sources for a bot infection of a 60 server corporate network. What a nightmare! The story ends with an indictment of careless users and a suspicion that Ares, one of the sloppier Pirate2Pirate filesharing tools was the original souce of the extensive corruption that eventually even crippled the AV tools. How typical is this sort of grief? [More more frequent than reported, I would expect: the corporate victim demanded anonymity for the story to be told]."
This discussion has been archived. No new comments can be posted.

Curing a Corporate Virus Infection

Comments Filter:
  • Pirate to Pirate? (Score:5, Insightful)

    by Anonymous Coward on Sunday September 26, 2004 @11:23AM (#10354824)
    Only slightly biased. I understand the annoyance of the admins over this screwup, but take deep breaths and count to 10 before you badmouth all P2P networks.
    • by Anonymous Coward
      "Only slightly biased. I understand the annoyance of the admins over this screwup, but take deep breaths and count to 10 before you badmouth all P2P networks."

      YEAH! Let's badmouth only the ones used to transport "pirated" material.
    • Re:Pirate to Pirate? (Score:5, Interesting)

      by glockenspieler ( 692846 ) on Sunday September 26, 2004 @12:15PM (#10355128)
      Ok, I'm going to go off on a rant here.

      I'm bloody well sick and tired of the piracy argument. The most succint argument about the permission culture that we are moving towards is put by Lessig in "Free Culture". We have this view that because something has value, that it equates to right. Look, if i bloody well want to share files, it is not obvious that I am "stealing" from anyone.

      Example: When photography first became relatively widespread, it was not clear whether someone was in their right to take pictures of people or buildings without permission. Afterall, the photographer might be getting something of value, so perhaps they should ask permission. Now, ask yourself, what would the culture be like right now if whenever you wanted to take some vacation photos, you need to get permission? Jeez, Kodak would have been just like Napster, just aiding people trying to steal other people's value.

      Remember, treating sharing as stealing someone's property is *one* system for treating intellectual property but it ain't the only one and it sure as hell ain't the one that the US has had for at least its first 180 years.

      Piracy? Bloody well pisses me off whenever someone uses that term!
      • Re:Pirate to Pirate? (Score:3, Interesting)

        by Romeozulu ( 248240 )
        That's because you don't make your living off creating original IP. Music, Movies, Games, Books, Etc.

        Please. Please take the time to understand the issue from the point of view of the artists. And please be mature enough to realize that not all artists are rich spoiled musicians.

        If I create something and people use it without compensating me for my hard work and talent, then that is wrong (assuming I am asking for something in return). Maybe it's not "stealing", but it is not fair and it is wrong.

        Do
        • by glockenspieler ( 692846 ) on Sunday September 26, 2004 @12:46PM (#10355331)
          That's because you don't make your living off creating original IP. Music, Movies, Games, Books, Etc.
          br> I'm a scientist. I create what you refer to as IP every day.

          Please. Please take the time to understand the issue from the point of view of the artists. And please be mature enough to realize that not all artists are rich spoiled musicians.

          I never said nor thought that they were all "rich spoiled musicians". Indeed, I would argue that small indendent creators have more to gain from a system of distribution that bypasses the typical middle men such as publishers and record labels. I have many friends that have had book or recording contracts. I think that I would have a hard time telling these individuals whose market is likely to be small for their output that they are better off with these publishers/labels than developing alternative distribution methods. P2P is one possible distribution method and one that does not obviously equate to taking the food from the mouth of creators children.

          Do you believe that anything that is not a solid object should be freely copied whenever someone wants?

          Nice attempt to distort my original point. No, of course I do not. Do you believe that the only and best way that creators can make a living is by allowing a small number of media companies control distribution and use of media?

          Have you really spent the time to think about what that would really mean?

          Yes. Have you?
        • That's because you don't make your living off creating original IP. Music, Movies, Games, Books, Etc.
          If someone makes their living off of creating creative works copyright has no bearing to them. The ones who make their living off of monopolizing the copying of cretive works on the other hand...
        • by fsck! ( 98098 )
          Find me one architect that objects to people photographing the buildings he or she designed.
        • Originality (Score:3, Insightful)

          by Detritus ( 11846 )
          That's because you don't make your living off creating original IP.

          How much of the work is truly original? Most artists draw heavily upon a shared cultural heritage and public domain to create new works. It's a bit hypocritical to make use of that heritage and then scream "It's mine! All mine! Nobody else can ever look at it or listen to it without paying me for the privilege."

        • by drsmithy ( 35869 )
          If I create something and people use it without compensating me for my hard work and talent, then that is wrong (assuming I am asking for something in return). Maybe it's not "stealing", but it is not fair and it is wrong.

          Why do you think continually receiving remuneration for "hard work" you did once - up to and beyond the end of your life - is "right" ?

          I mean, most people go out, do a days work, and get paid for it - why do you think "artists" should be paid for a days work over and over and over again

        • "If I create something and people use it without compensating me for my hard work and talent, then that is wrong."

          Bullshit.

          There is nothing in the theory of property or the history and evolution of the human species and economic social behavior which supports this notion.

          Nothing.

          Period.

          As for "copying anything not a solid object", what the fuck do you think people are going to do when nanotech allows you to copy ANYTHING - including solid objects?

          There is no such thing as "intellectual property" - exc
  • by Pig Hogger ( 10379 ) <pig.hogger@g[ ]l.com ['mai' in gap]> on Sunday September 26, 2004 @11:23AM (#10354826) Journal
    It's easy to blame the users, but the ultimate responsibility always is the IT department, because it is responsible for security.

    And security always includes usage policies.

    • right.

      that user should not have had the priveledges to install software in the first place.
      • by Misinformed ( 741937 ) on Sunday September 26, 2004 @11:29AM (#10354864)
        Its easy for admins to blame users.

        Users probably broke some internal rule about not installing external software and are certianly not blameless, but the ultimate job and responsibility of admins is to administrate. The admins let them have the right to install programs and seemingly didn't enforce/check logs to see what users had been installing.
      • by SlamMan ( 221834 ) on Sunday September 26, 2004 @11:31AM (#10354874)
        Plenty of don't have that option. When management says "no, of course users should be able to install software on the machines they use," the IT shop has a bit more of an added challenge.
        • #1. Convince management that this is a BAD idea.
          -or-
          #2. Convince managment to give you some funding/equipment to implement network security upstream of those insecure PC's.

          The next question is WHAT you'd implement and HOW you'd do so and HOW you'd monitor it.

          Anyone can throw a bunch of PC's on a hub and claim to have setup a "network". It's the added security and monitoring that differentiates the best from the worst.
        • At which point, management has taken on that responsibility. They've looked at the options and said no, it's not important.

          When something goes wrong, they surely deserve the blame.
          • Of course. And when the machines get pwned, they'll step right up and take that blame, rather than accusing the IT establishment of having failed. Because integrity would require that, even if it mean resigning in disgrace.
      • by superpulpsicle ( 533373 ) on Sunday September 26, 2004 @11:44AM (#10354957)
        Just go back to the classic-server rule of thumb.

        1.) Desktop machines can use windows

        2.) Servers must be unix based.

        The user can corrupt the hell out of their hard disk, and they have only themselves to blame.

          1. Just go back to the classic-server rule of thumb.

            1.) Desktop machines can use windows

            2.) Servers must be unix based.

            The user can corrupt the hell out of their hard disk, and they have only themselves to blame.

          While I agree that this provides a very good level of isolation between clients and servers, it doesn't take care of maintaining the client systems and it doesn't take care of every issue. Maintaining client systems is a PITA. A well run server should be little trouble.

          Isolation between

        • Thats not a bad way to go. This would be more ideal for our needs:

          1) Desktop machines can use Mac OSX (Mail.app, Microsoft Entourage, Lotus Notes [lotus.com])

          2) Servers can be Solaris, OS/400, Linux ( Lotus Domino [lotus.com]) or FreeBSD

          Mac OSX by default is much more locked down than XP. Forget using any version of Windows prior to 2000. I don't like the idea of allowing my users to shoot themselves in the foot. Both servers and client should be locked down, with the server having a few extra levels of protection if its

      • by mrseigen ( 518390 ) on Sunday September 26, 2004 @12:05PM (#10355068) Homepage Journal
        We actually lock down our Windows XP machines pretty hard, yet for some reason a virus is capable of installing DLLs into the system folder on a non-priveleged account.

        We've had a number of keylogger viruses and such pop up on local machines, even from machines with restricted permissions (i.e. can't even write to C:). I don't know what's wrong with XP, but this looks to be a pretty big flaw.
        • upon which all Windows operating systems are based.

          Just out of curiosity, have you had similar problems under Win2K, or are you just seeing this with XP?
          • I only came onboard in the process of converting to XP, so I can't vouch either way for the relative security of 2K, sorry.

            Luckily, we have really good network administrators (Just a grunt tech here) and usually we can track down, isolate and kill infections before they can pose too much of a threat to other machines. We did have a couple copies of the latest Bagle running around, and that was no fun, but at least it didn't install itself into the system's shared-library directory.

            Coming from Linux, t
        • by Spoing ( 152917 ) on Sunday September 26, 2004 @12:34PM (#10355260) Homepage
          1. We've had a number of keylogger viruses and such pop up on local machines, even from machines with restricted permissions (i.e. can't even write to C:). I don't know what's wrong with XP, but this looks to be a pretty big flaw.

          If the service that the viruses are using aren't enabled, they can't be exploited.

          Here's one way to deal with this...

          Isolate the client; vlan/router or yank the system and put it in an isolated environment (test lab, 2 system LAN, ...). Turn off the client XP firewall (if any), run Nessus on another system and point it at the client [nessus.org], go back to the client system and disable all services that Nessus reports -- even the ones that are not considered problems! Do any security hardening Nessus suggests. If you really need the detected services, write down what you would loose by disabling the service, what it would take to secure the service, and if there are any automated tools that can be run client side to clean up or better block hostile attacks.

          Document what you needed to do, do the same to a few more systems, and then automate the process (registry files, boot scripts, policies, ...).

          • So you think it is an exploit in some service that XP is running that allows it to wedge the DLL in there?
            • by Spoing ( 152917 ) on Sunday September 26, 2004 @01:35PM (#10355597) Homepage
              1. So you think it is an exploit in some service that XP is running that allows it to wedge the DLL in there?

              It has to be some service, otherwise there would be no way to have the files inserted on the machine.^ Put it this way; the trojan/malware/virus/... can't inject itself onto another computer. It needs to request that the target machine do something -- allowing the program/library/registry entry/... to be installed.

              (The service being exploited might even be the admin drive share, though it's more likely some of the other less obvious ones.)

              Bring up the services list to get a general idea of what is running or can be run (on demand). Keep in mind that the list is incomplete and disabling a service there might not really turn it off; verify that it is really off by running nmap and nessus against the target system.

              Caution: Disabling a service does not mean your systems are more secure. Many services are only local and are not exposed to the rest of the network at all. While I suggest turning most of these off, the urgency is not as high and some of them are really necessary. Most of them are crap, though. This will be a lot of work, so take notes and look for things that break.

              Another gotcha: When installing updates, the services you turned off before may be turned on again without warning. (Bet on it!)

              1. ^. OK, it could be an application exploit (IE/Outlook/...) though for the the network wide plauges these are not as effective since they nearly always require people to do something to cause the exploit to be active. Only 1 machine with the exploit loaded needs to be on a network with access to others with the service enabled; no human interaction needed.
  • Doesn't happen here (Score:5, Interesting)

    by Gothmolly ( 148874 ) on Sunday September 26, 2004 @11:24AM (#10354835)
    $ su -

    # uname
    Linux

    # iptables -P INPUT -j DENY
    # iptables -A INPUT -m state --state=ESTABLISHED,RELATED -j ACCEPT

    # exit
    $

    • I remember when you could map a drive from Windows to \\ftp.microsoft.com\data

      I like your sig....

      buy now, with a bit more work, it's silly pretty easy to map a drive from Windows to

      \\security-through-obscurity.microsoft.com\os\lo ng horn\.hidden-directory\scource

      It's kinda odd though - there's very little C code, but a lot of .VB files...
  • Protected Ports (Score:5, Informative)

    by Anonymous Coward on Sunday September 26, 2004 @11:25AM (#10354840)
    If you can use the 'protected port' option on e.g. cisco switches, TURN IT ON.

    Essentially, it prevents the indicated ports on the switch from communicating with other ports that also have that protection set. Unless you have sloppy shared directories or some reason for the actual PC's to talk directly to eachother, it won't harm anything and will prevent the viruses from spreading pc-to-pc once (not when) they get in.

    • PVLANs come in more useful when you have it go into an L3 switch so administrative PCs (those needing access to protected port PCs for departmental administrative access) can have their traffic forwarded through that L3 device and gain access.
  • by JasonUCF ( 601670 ) <jason-slashdawt@@@jnlpro...com> on Sunday September 26, 2004 @11:29AM (#10354862) Homepage
    [disclaimer: i work for a major fortune 500 company with a large, 50+ distributed node WAN]

    Everytime there's a big ass Windows vulnerabilty, there are security emails and IT manager emails basically saying "heads up, check your shit." But let's say somebody doesnt check his shit, and a site ends up infected. The WAN group watches the network, especially during times like this, and nodes are just dropped off routing from the rest of the network until they get their act back together.

    I realize the article is talking more about the pains of these nasty new infections that mutilate machines, but the old saying works -- a good offense is a great defense. Assign local managers responsibility for the server boxen at their node, he/she should be keeping the machines patched, but when that fails, close the node off the network before it can damage anywhere else.

    Of course the major server boxen have their own layer of network between them and the rest of the WAN, so they can be isolated if the worm is already rampant on the network. Doesn't hurt to access list transmission ports, either, icmp, tftp, foo...
    • by Anonymous Coward
      Everytime there's a big ass Windows vulnerabilty, there are security emails and IT manager emails basically saying "heads up"...But let's say somebody doesnt check his shit

      I emailed the local IT guy from a state job that will remain anonymous about the recent jpg exploit. Told him we updated to IE6 recently and we may need the patch. 1) he didn't get back to me about it 2)I overheard him asking someone else about it. Chances are high the person had IE 5.5 installed and then he assumed everyone else would
    • Exactly! With viruses rampant as they are, why would users machines have full access to all the ports on the servers. Thats what internal firewalls and vlans are for.

      I would bet (I didn't rtfa yet) its an issues of IT funding. The infrastructure for vlans, internal firewalls, and the appropriate access controls cost money and takes staff to manage.
    • by Anonymous Coward

      While I agree with some of this, it is not always possible to just drop a remote site until they "get their act together".

      In the healthcare industry for instance that would be impossible without impacting patient care. You drop the site and now they can't access master patient registries, run drug interaction routines in the pharmacy systems, lookup medical records etc.

      Granted there are backup procedures in place in case of catastrophies, but you have to weigh your options carefully in those environments
      • True. That applies to a lot of industries, actually. Airline transaction processors can't just be switched out, considering the loss of income that would entail. A number of manufacturing and refining corporations where I've installed custom systems just don't have the option to turn off a node: if that system just happens to be a primary data collection system an entire facility can be brought to a screeching halt. Of course, depending upon the particular infection it may come to a screeching halt anyw
        • yep...that's the REAL WORLD!

          Engineers expect to buy shiny new manufacturing equipment and just plug-n-play with the company network. EVERYTHING runs windows now...and adding security software often is unsupported and voids the warranty of million dollar machinery!!! Heck it's hard enough just keeping vendors of systems compliant with the particulars of YOUR MS licensing agreement.

          the real problem is that MS has sold business managers the promise of "commodity" PCs...they should just run to the store

  • by Anonymous Coward on Sunday September 26, 2004 @11:32AM (#10354876)
    Blame your own policies, not your users. Users are not IT experts and will not be even with extensive training.

    Restrict privileges. Don't allow anything that is not necessary...
    • by Blakey Rat ( 99501 ) on Sunday September 26, 2004 @01:55PM (#10355738)
      Where I work we have 2 employees coping with 180 Windows desktops, 20 IBM Infoprint 21, 5 Infoprint 1120 printers, about 13 servers, and 2 OS/400 running Midranges. Oh yeah, and we're a medical facility so we are subject to HIPAA and our servers must be up 24/7 or it impacts patient-care.

      We don't have the manpower to create policies on all our desktops. I know that everyone on Slashdot is going to declare that I'm incompetent, but I have no training on policies in Active Directory (I came here after managing Novell networks), and every time I start to read up on the subject, there's an emergency... someone's printer died, one of the servers is acting up, etc.

      The place can't afford to hire anyone with sufficient Active Directory experience-- hell, they can barely afford to pay me. The Bonds and Levies run in this district have failed for almost the last decade.

      What is your recommendation? What do I *do*?

      I mean, saying that's the solution is one thing, but implementing it is another. We have some computers that need to be entirely locked-down (patient rooms), some that need to be almost entirely open (marketting and administrative), and tons that are somewhere in the middle.
  • Wrong approach (Score:5, Insightful)

    by cperciva ( 102828 ) on Sunday September 26, 2004 @11:33AM (#10354890) Homepage
    ...a grueling hunt for all the .exe's, reg entries and sources for a bot infection...

    Wrong answer. If you have a compromised system, trying to clean it is (a) likely to be really difficult, and (b) not secure.

    Wipe the system, reinstall, and recover from backups. (You do keep good backups, right?) It sounds pessimistic, but in most cases an attempt to "clean" a system is going to end up with you pulling out the OS reinstall disks anyway.
    • You have no idea what sort of trojan / backdoor / über nasty malware was loaded on each individual machine.

      Your time is much better spent developing a network reimaging system so that your machines can be reverted to a known state relatively quickly.

      -Peter
  • Modding (Score:5, Insightful)

    by StevenHenderson ( 806391 ) <stevehenderson.gmail@com> on Sunday September 26, 2004 @11:34AM (#10354891)
    one of the sloppier Pirate2Pirate

    There are really times when I wish you could mod a submission as "Flamebait."

  • It happened to us. (Score:3, Interesting)

    by Anonymous Coward on Sunday September 26, 2004 @11:38AM (#10354915)
    It took more than a week to fix. Basically IT took everything down and cleansed each individual computer before it was allowed to be back on the network ... except of course for the linux boxen and even they were affected by the lack of servers.
    Since I have great respect for our IT guys (they are really scrupulous about permissions and patches), it was a sobering experience.
  • by Oriumpor ( 446718 ) on Sunday September 26, 2004 @11:42AM (#10354946) Homepage Journal
    You needn't treat them like a threat to their face, that is just rude. Most people are "too busy" or don't care enough to learn about computer security. So nod and just listen to *their* problems and lock down their system against the big threat.

    We had to deal with this more often than not ... so we set out to prevent user folly. In so doing we created the IT tech's dream.

    First off you start at the network layer, and make sure via firewalls that people can't get anywhere or use any application that will cause you grief.(p2p/streaming etc.) Then you transparently proxy all your traffic so that the guy who checks out classic-cars.com all day for backgrounds can do his thing and not screw everyone else.

    Then you take every user system and you lock them down. You start out by moving all their dynamic data (that you wanna keep) to a file server. Mapping the winblows appdata/my documents gives you a wannabe roaming profile without all the garbage.

    After you make all that effort you either impliment a mandatory PXE re-imaging overnight (too much of a headache for us) or you use something like Deep Freeze [faronics.com] and lock down the system entirely. Due to Deep Freeze even the most zealous surfer can only horribly damage their system once a day.

    Now you have an ideal environment. All changes on a system that need a reboot *must* involve a contact to the IT department, and those you think are savvy enough not to need a frozen system can do 90% of their own support.

    Ok sure so your level of responsibility goes up. The pristine environment means you have plenty of opportunity to script away your work. Not to mention silly things like virus outbreaks are really limited because a frozen system need only reboot to remove the virus.

    Think *pro-active.*
    • ugh Faronics main page [faronics.com]

      That's what I get for not hitting preview.
    • Excellent. But don't forget to keep administrative control from the users and limited to the a few users.

      Run security audits to make sure only the chosen few have administrator rights. This is for local PCs. Domain rights should even be more tightly controlled.

      Keep AV defs updated daily. Report the numbers daily to check compliance.

      Remove the ability to disable AV.

      Check AV logs daily. Any report should be dispatched to a tech to "fix" the PC or determine what happened to the AV and take action according
    • You needn't treat them like a threat to their face, that is just rude. Most people are "too busy"

      So business users who are supposed to be working are "too busy" to learn proper computer use but they do have time to install P2P software and dl warez and music (which includes time to search and select)?
      • Yes. The point is that no matter how well you try to train your users, sooner or later one of them will do something stupid and something will try to infect your network. In most cases, all they did was read their mail because management decided that Microsoft Outlook is a fine program. You can't depend upon the user base to keep your network secure: that just won't work, and the more users you have the problem grows exponentially. One mistake and that's all she wrote. If users shouldn't be downloading
    • All good suggestions. I work for a school system in Nevada, and we use Deep Freeze on our machines whenever possible. However, one shouldn't get into the habit of thinking Deep Freeze == secure. Recently we had an outbreak of Sasser at one of our schools. A machine (with Deep Freeze) gets infected, lets it spread to a few more machines and then crashes. It comes back up, clean, and promptly gets reinfected. I'm going to have to go through machine by machine to install the patch. At least when I take them of
  • Blame? (Score:5, Interesting)

    by WindBourne ( 631190 ) on Sunday September 26, 2004 @11:47AM (#10354967) Journal

    • Running Windows
    • Not using total security throughout the network.
    • Allowing Users to download any tool that they want
    • I will bet that they allow CD/floppy downloads.
    • Probably allow Outlook (and in an insecure fashion).
    And the Blame goes to:

    p2p software??????

    Our society really suffers from a lack of taking blame.

    Anybody who runs MS should know that it takes a lot of effort and money to truely lock it down. As such they should do so. It is simply part of the total cost of running a Windows system.

    • Uh, yeah. Blame P2P software. Not because it's peer-to-peer, or because you're using it to download illegal music, but rather because of the fast-and-loose way its users play with the rules.

      There are many valid, legal uses for P2P software. Unfortunately, many (I'd venture to say most) use it illegally. In all likelihood, the user that the poster complains about was using it that way.

      But that's not what concerns me. What concerns me is that users who are willing to illegally download copyrighted musi
    • True, our society suffers from no lack of pointing fingers, but most of them are just pointing in the wrong direction. Might as well blame TCP/IP or fiber optic cable for spreading malware if you're going to throw the book at an entire class of application software. Doesn't mean that specific applications aren't faulty or problematic, but to say that peer-to-peer is conceptually wrong? Sheesh. Good thing these guys weren't around when the screwdriver was being invented: you can stick it in somebody's ba
  • I've never tried this (I don't have a Windows box), but wouldn't a quick way of searching for registry keys that programs touch be to install Cygwin and use the *nix "strings" command? i.e.

    PugsleyButt:~/devstuff/c++ jmzorko$ strings file_to_examine

    It just seems to me that this would be an obvious, but fairly effective way to quickly find all the registry points (as well as DLLs and other files) that a piece off could would touch ... maybe use it in conjunction with nm as well ...

    Regards,

    John

  • Shameless plug (Score:3, Informative)

    by haxor.dk ( 463614 ) on Sunday September 26, 2004 @11:50AM (#10354984) Homepage
    "Over at Internet Storm Center Deb Hale's 'In search of the bot net' entry for September 25 recounts a grueling hunt for all the .exe's, reg entries and sources for a bot infection of a 60 server corporate network. What a nightmare!" ...Apple Macs and Assorted Linucen, curing .exe, registry and bot infections for 5 years and counting!
  • Is it just me... (Score:5, Insightful)

    by DeepHurtn! ( 773713 ) on Sunday September 26, 2004 @11:52AM (#10354991)
    ...or does this guy come across as a total ass? "Pirate2Pirate"? Blaming the users? I mean, isn't *he* paid to enable *them* to do their jobs, not the other way around? (Of course, the actual article is /.ed, so maybe it's just the summary that gives me that impression.)
    • by base3 ( 539820 )
      Just a typical power-tripping Network Nazi given adminstrator access to desktops and a $30K/year salary and thinks he's Jesus Christ reborn.
    • by Dark Lord Seth ( 584963 ) on Sunday September 26, 2004 @12:20PM (#10355157) Journal

      If I drive a car over a bridge, start swerving around for fun, then crash through the side guards and park said car next to a fresh-water lobster, would the goverment be responsible for failing to create a bridge that is capable of withstanding my driving?

      If I install Kazaa, Comet Cursor, Internet Optimizer and surf porn all day long, would the IT department be responsible for the shit I create on the corporate network?

      • Analogies... (Score:5, Insightful)

        by MunchMunch ( 670504 ) on Sunday September 26, 2004 @12:44PM (#10355321) Homepage
        Yeah, except a network admin should be able to set privileges to disallow the installation of 3rd party software, and so on. And also, this is a private entity, so the public good part also fails. So your analogy should be more like:

        "In a world where a private corporation could create a private bridge and set strict rules of usage for that bridge, would that private corporation be responsible for its own damages if its manager of Bridge Upkeep failed to set the readily available measures to prevent paid employees to swerve around for fun, crash through side guards and park said car next to a fresh-water lobster?"

        Sounds more like this guy was just looking for an excuse to submit a story and use the term "pirate2pirate."

  • by Spoing ( 152917 ) on Sunday September 26, 2004 @12:04PM (#10355061) Homepage
    I get very annoyed when hearing about whole networks being knocked out by a virus/trojan. It should never happen; any dammage should be isolated.

    Limit access to the application/web server level at the router. Isolate workstations so that they can each see the file servers but not all other systems. If someone needs direct access to servers, they should have a real good reason (or it should be obvious; admins, developers.).

    Keep in mind that I'm not suggesting that the limits be so strict that people are annoyed and attempt to break or ignore security. They should be well organized, though, and monitored. Reasonable exceptions should be made immediately, and unreasonable exceptions should be granted quickly with an eye to isolating the damage of that exception as much as possible.

  • by Anonymous Coward
    Here is an idea that seems to slip past many...

    C-O-R-P-O-R-A-T-E F-I-R-E-W-A-L-L

    We used to have botnet probs in our corporate network... once we installed a Zonelabs Integrity server and were able to control what programs had access to the internet and which ones did not, it was pretty easy to fix.
  • by AnswerIs42 ( 622520 ) on Sunday September 26, 2004 @12:35PM (#10355271) Homepage
    Come on.. this is an example of a VERY poorly managed network.

    At work we have 20K users in the US alone. We actualy don't have that bad of a time dealing with viruses and worms and the like.

    Why? Because 98% of the users get pushed their virus updates and their OS updates. This includes the clueless people.

    We also run network scans and know WHEN computers were updated. If the computer is connnected to the network, we know what updates it has or doesn't have. The only hard part is FINDING the unpatched computers.

    We also have a firewall that prevets P2P connections, FTP and anything else non web browser related (gets anoying at times).

    In reading this story.. I can only assign 1% of the blame on the users and 99% of the blame on the admins for not doing a proper job.

  • more proof (Score:2, Interesting)

    by scottking ( 674292 )
    yeah, yeah, i'm sorry, you're sorry, everybody's sorry... quit blaming your users. that aside, i think this article is a little more proof that anti-virus programs like norton, are ineffective these days. the way they function needs to be re-thought badly. i hope to see the cost of devices like this one [trendmicro.com] come down to more consumer friendly levels in the future. anyone have any ideas on how anti-virus can be improved?
  • by HermanAB ( 661181 ) on Sunday September 26, 2004 @01:28PM (#10355535)
    Geez, any self respecting switch has some of those features - people should learn to use them to partition the network. On a Windoze office network, very few users need to talk to each other - most only need to talk to a server.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...