New Massive Botnet Building On Windows Hole 223
CWmike writes "The worm exploiting a critical Windows bug that Microsoft patched with an emergency fix in late October is now being used to build a fast-growing botnet, said Ivan Macalintal, a senior research engineer with Trend Micro. Dubbed 'Downad.a' by Trend (and 'Conficker.a' by Microsoft and 'Downadup' by Symantec), the worm is a key component in a massive new botnet that a new criminal element, not associated with McColo, is creating. 'We think 500,000 is a ballpark figure,' said Macalintal when asked the size of the new botnet. 'That's not as large as some, such as [the] Kraken [botnet], or Storm earlier, but it's... starting to grow.'"
Go vigilante (Score:2, Insightful)
It's time MS write botnets to exploit their own holes as means for patching said hole. Who gives a shit about the ethics of it, we are losing.
ISPs need to be more vigilant as well. Cut off subscribers ASAP when they're machine begins sending botnet traffic.
Re:Go vigilante (Score:5, Insightful)
ISP action is definitely appropriate. If they can tell who is using torrent software, they should be able to tell who is sending spam and which machines are part of a botnet.
Filtering/quarantine at this level is like shooting down a scud missile on the way up instead of on the way down.
Re: (Score:2)
The biggest ISP at the college I used to go to (not the univeristy itself) used to do this. They'd profile traffic and shut down machines that were spamming or otherwise behaving badly.
The way I see it, it's good for everyone, including the ISP. The only downside was when your roommate had something and your internet got shut off before a paper was due. :)
Re: (Score:2, Informative)
Take a look at Schneier's arguments against this: http://www.schneier.com/blog/archives/2008/02/benevolent_worm_1.html [schneier.com]. One additional point is that stack/heap overflows and other memory-corrupting vulnerabilities often can't be made to be 100% reliable, and can be difficult to code for different service packs and such. This can be, and is, coded around as a matter of course, but a bug in the exploitation process can have disastrous and unpredictable results (in this case, interruption of a large swath of c
Re: (Score:2, Informative)
It would be so easy. (Score:5, Interesting)
Every time i see one of these high-yield Windows remote execution holes, I'm tempted to couple a timed network-stack-erasing payload to it (24 hours should be enough for it to be able to infect through vpn-connected laptops and such) and send it cracking. Then i always begin to wonder why this hasn't been done already; is the combination of narcissistic recklessness and technical competence really that rare? It could be argued that it's more fun to play pranks and infiltrate corporate and government networks, but we don't even see things like that (I know it was more common up to the early 90s, when the "criminal prankster hacker scene" still existed outside of small tight groups...)? Or do people just cover it up? You sysadmins out there, have you ever had anything like that happen to you, or anyone you know?
There's no profit it in. (Score:5, Interesting)
Pretty much. The closest was the "I Luv U" email which overwrote media files.
Since then, it's all about profit. Why destroy a computer when you can use it to send spam?
If you want to be really cruel, your "virus" would randomly alter a few numbers on any Excel spreadsheet it could access.
Re: (Score:2)
If you want to be really cruel, your "virus" would randomly alter a few numbers on any Excel spreadsheet it could access.
Fortunately Microsoft cleverly protect their users against this by using closed file formats. Thank God for Microsoft!
Re: (Score:2)
It seems to me that if you had a 100K CPUs at your control, you could find something to do with those compute cycles that would be more profitable than SPAM, especially if you weren't restrained by what was legal. Like breaking encryption keys.
Isn't there a more imaginative/profitable use of a botnet than to send spam?
Re:It would be so easy. (Score:5, Interesting)
Welcome to the 21st century.
Unlike the 90's, viruses aren't typically coded for the purpose of doing as much damage as possible. Between eBay, Paypal, Amazon, and the other major e-commerce sites, the internet is now worth hundreds of billions - even trillions - of dollars every year. Dollars that would be lost if it went down or that can be stolen by the boatload. By and large, the motive for hacking - including the use of botnets - is all money driven these days. The two most common attack vectors are to either hold a site for ransom, threatening to take it offline via a Denial of Service attack if a certain mount is not paid or to simply use the masses of drones to slow down anti-phishing efforts by distributing the fake page across hundreds of bots (after all, you can run a web server using 500k of RAM and 200k of disk space, plus space for the pages, i.e. a Paypal clone takes up about 5MB on a drone.)
Judging by the size of this one, I'm going to guess its use will be the former rather than the later. 500,000 bots, all launched, say, the week of Christmas, would do a LOT of damage. Many of those systems will be corporate boxes and nobody will be sitting at them to monitor or notice anything, meanwhile a site that offers "last minute" shipping could be taken offline at the...well...last minute, costing them billions in lost sales. $10 mil would be a small price to pay to avoid that.
So yeah, it was more common in the 90's, but hacking solely to cause damage isn't something done any more. At all. The only people doing that would be, for example, if the Chinese were trying to crack a US State Department or Pentagon system (using the drones for brute force remote login attacks). That happens, but even there, the intent isn't to harm the systems, but merely to gain a valid login so you can steal information. This goes on in the corporate world too. After all, don't you think Ford would be willing to cough up $2 mil if someone could hand them a copy of Toyota's future business plan right now?
It's not so much that there aren't people who want to "just cause damage" but rather that those people grew up and realized they could make a lot of money by NOT damaging the systems. They needed jobs and there aren't a lot of positions available for someone with a skill set that includes brute forcing SSH logins. The generation that has come since them, mine (I'm 21, but I have friends who are 18 and 19, and we see each other as about the same) doesn't generally posses the level of skill of those who came before us. Sure, I can crack SSH and brute force NT Hashes with the best of them, but if you sit me and my 60 year old uncle both in front of a binary disassembler only he will know what he's doing, and finding the kind of flaw needed to make this massive botnet will require a very intimate knowledge of one.
Sorry, the script kiddies that bring the world to its knees have grown up and they refuse to work without pay.
Re: (Score:2)
Interesting... if I wanted to host a web page on my computer, I'd have to log into my ISP to unblock port 80, direct port 80 on my router to my computer, and turn on web sharing on my computer. But I guess a lot of people stil
Re: (Score:3, Insightful)
For starters it is trivial to embed an HTTP or mail server in a worm and is done all the time. They don't need to be full featured, simply functional enough to get their intended job done. As for the NAT issues the default usernames and passwords for popular routers is common knowledge. Given the number of LINKSYS and 2WIRE WiFi networks I can see from my apartment it's safe to say at least some of those people are still using those defaults. From there it's simply building the appropriate POST or GET reque
Re: (Score:2)
Re: (Score:3, Interesting)
Many of those systems will be corporate boxes and nobody will be sitting at them to monitor or notice anything, meanwhile a site that offers "last minute" shipping could be taken offline at the...well...last minute, costing them billions in lost sales. $10 mil would be a small price to pay to avoid that.
Question: I'm not too savvy with the intricacies of DNS, but - could an organisation that was threatened with such a blackmail attempt do something like this:
1) duplicate your web infrastructure on a number of different networks /if/ you are attacked, update DNS records to point to your alternate hosting (..repeat as necessary until you run out of sites or they give up)
2) lower the TTL on your DNS records to something more responsive
3)
This is under the assumption that such an attack once launched would be
Re: (Score:2)
People worried all the time about viruses back in the 90's, because they wiped away important data and because it affected the end user. These days, the virus writers are so clever you can't tell there's a bot running on the computer at all, and so end users don't care anymore.
It may not be a bad idea to start spreading time bombs via these security holes, to bring back user awareness of viruses and the damage they can cause. And, it would probably reduce the ability for such massive botnets to be created,
Re: (Score:2)
There was a fork of Blaster that installed the patch for the hole it used to spread, then deleted itself. Unfortunately, like Blaster, it had a tendency to crash the Messenger service, which causes Windows to reboot without letting the user interrupt the reboot. The anti-Blaster didn't get very far.
ancient joke (Score:5, Funny)
Windows is same as whores: They both have massive hole and full of viruses.
Botnet, starting to grow (Score:5, Funny)
Do you want a larger, firmer botnet? One that all the ladies will love and other guys will envy? Here's how to enlarge your botnet quickly and easily.
If your botnet stays up for 6 hours or longer, please seek the help of a physician.
Re: (Score:2)
How does one get other guys to envy the size of his botnet? Bust it out during parties and on dance floors? Join a botnet ring? Or just hope that girls will tell other guys about your size? I mean, of your botnet?
Re: (Score:2)
Easy: DDOS competition.
If you can slashdot /., you obviously have a large botnet.
Re:Botnet, starting to grow (Score:5, Funny)
Analogy (Score:4, Insightful)
If you buy a gun, and leave it sitting in your front garden, then some criminals come along, take control of it, and kill everyone in your street, you're kind of responsible for that.
Apart from the obvious killing != spam and/or fraud, how is leaving an unprotected OS with known problems available to be hijacked by anyone who wants to do damage with it any different? You should still be responsible (although the punishment might be different). Suppliers should be forced to make this obvious to people buying this stuff.
Re:Analogy (Score:5, Insightful)
Is a computer more like a gun or a rosebush? I guess that depends on whether it is running Windows or Linux.
Re: (Score:2, Funny)
Wait... which is which?
Re: (Score:2)
Your analogy is more apt than the OP's. A loaded gun's uses are more singularly designed compared to that of say a crow bar, baseball bat, chainsaw, rosebush, unkempt PC, or unconscious syph infected hooker. All of the latter have designed uses other than causing harm whereas the gun is more or less useless other than as a weapon.
You cannot blindly blame the owners of certain tools if the tools are covertly used by another party. If someone sneaks into my house, steals my carving knife, stabs someone with i
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I'll go with the third option, thank you. The last computer I bought works fine with the Ubuntu it came with. Even then, I'll keep a NAT router between me and the Internet because I know I don't always install the security updates as soon as they're available.
Re: (Score:2)
Re: (Score:2)
Did you know in Windows Vista it takes 5+ clicks just to connect to a network? XP takes about 3, Linux takes one right-click on the NetworkManager icon (which shows found networks), Mac OS X takes one click on the wifi icon (which also shows found networks). Windows always lags.
Re: (Score:2)
And, at least in XP, you need admin privs to change network settings, and make those 3 clicks.
That's nice, eh?
Re: (Score:2)
If you buy a gun, and leave it sitting in your front garden, then some criminals come along, take control of it, and kill everyone in your street, you're kind of responsible for that.
Gun? Are you mad? Slashdot is about car analogies only.
how is leaving an unprotected OS with known problems available to be hijacked by anyone who wants to do damage with it any different?
One buys a car, forgets to lock it at night & it's used for a ram raid. Is the car owner responsible for the ram raid or a victim?
Re:Analogy (Score:5, Insightful)
Computer to 'Some simple concept' analogies are stupid as hell. Get over your elitism. Most people don't understand the first thing about computers, and they don't have to. Just like most people use a TV, VCR, whatever, without any clue how it works, they just use it to play movies. Blinking 12:00.
Your analogy fails because leaving a gun out is gross negligence. It's a dangerous thing, and that's fairly obvious. A computer isn't. I suppose an argument could be made that computers are dangerous. It would be quite a stretch though. In that case there should be mandatory licensing to operate one, you know... like a car. But there isn't. So, either make the argument that computers are dangerous and should be controlled (and make sure you understand the actual ramifications of that argument), or stfu and realize that no, most people don't understand Computer Security or why it's important, and they never will.
And then, as an expert in the field, learn that you aren't smarter than mom and dad using their computer, you just have a specialized skill set. Most nerd kids like prolly half the slashdot crowd are or were.. started out with computers coming naturally to them. It's easy to assume then that it shoudl come naturally to everyone. And when you see it doesn't, your first reaction is that something is broken in them. After that nerd grows up a bit in the world, that person learns that no... they aren't idiots. We just have an aptitude for something that others don't. And that doesn't make them dumb. They probably have skills we don't. Say... socializing for example. So my guess is your (and all those who always come to slashdot posting the same song and dance) maturity level hasn't quite evolved yet.
And to not be elitist myself... I can admit I was once the same way. I grew out of it, as will you. :)
Re: (Score:2)
It's a dangerous thing, and that's fairly obvious. A computer isn't. I suppose an argument could be made that computers are dangerous.
are you mad? look at HAL, Colossus or Skynet. pretty dangerous computers there.
Re: (Score:2)
In that case there should be mandatory licensing to operate one, you know... like a car.
Given that pretty much anybody can get a license (including some idiots that should never be a passenger in a car, much less the driver), I'm not entirely certain that this is the best analogy.
The rest of your post is excellent, though.
use norton (Score:2, Funny)
Wouldn't it be nice (Score:2, Interesting)
if the people writing exploits for these security holes wrote a worm that once it had got onto a computer patched the exploit and then detached?
You could call it Good Samaritan Computing or something ;)
Re: (Score:2)
Everybody, SING ALONG! (Score:4, Funny)
"Botnets, spammer's botnets!
What kind of boxes are on botnets?
Compaq, HP, Dell and Sony, true!
Gateway, Packard Bell, maybe even Asus, too!
Are boxes, found on botnets.
All running Windows, FOO!"
I'm running Mac OS X 10.5.5, here.
Why, yes. I AM a smug bastard!
Thanks for asking.
How Do They Survive? (Score:4, Interesting)
I'm curious - how do infected computers survive on the Internet?
We have legions of honeypots for the detection of infected hosts (not to mention the likes of GMail). ISPs have been qqing about bandwidth - surely bandwidth consumed by infection is the most loathsome waste.
Why don't ISPs have a takedown system? They could restrict who they trust - perhaps only Symantec and McAffee, maybe hotmail, yahoo, and GMail as well. The could do a limited takedown of outbound email only, adding a message to the customer's email account. Perhaps have an HTTP interceptor display a page with links to tools for system cleaning, maybe commercial products if they feel the defense of their corner of the net is not sufficient recompense.
OK, I can dig the risk of inappropriate takedowns - but we run that risk non-stop with the DMCA for a heckuva lot less tangible benefit.
Expense? I'm sure we could get a few dozen folks together to write the software.
Customer experience? Really now - if my Mom's computer was infected and her ISP told her, and gave her links to fix it, she'd love it.
Inability to trust the router droppings? Half the Internet connections in the world are probably covered by a couple dozen ISPs - start with trusting only those router entries.
So - what am I missing?
Re: (Score:2, Funny)
Bob,
I agree 100% and that is exactly why I started WIPOC (World Internet Providers Organization Counsel) back in the early 90's. had a few ISP's/Hosting Companies interested.
However, a majority of them were like "why? this will all be gone by the beginning of 2000 anyway. They will get it all under control".
Well, hate to say it but "I F*CKIN TOLD YA!"
You CANNOT always push responsibility for your problems onto others. and believe me. it's your networks so it IS your problem.
rant done. nothing left to see he
Re: (Score:2)
hehe - damn - you were way ahead of me. :)
However, a majority of them were like "why? this will all be gone by the beginning of 2000 anyway. They will get it all under control".
So sad. How could they not understand? Ummm, "they"?!? Who is "they"? Hey, ISP - you are "they". Now let's get to work.
Alas. Thanks for trying!
Re: (Score:2, Interesting)
My ISP does. It took me down within hours when I let a friend connect his laptop to my network. He had a problem with his computer he told me. That proved correct - it was spamming like mad. But his own - cheapish - ISP did not take him down. So perhaps only solid and more expensive ISP have a take down system.
Re: (Score:2)
It's not always easy to clean up an infection. You can clean it up once, and then get infected again the next day because the cleanup didn't catch something. And having to clean up the same infection every day will hurt customer experience.
And Microsoft's need to validate Windows before allowing access to patches doesn't help anything all. People who run illegal copies of Windows just won't update. It's not like being a part of a botnet has any effect on them.
The ISPs could solve this quickly (Score:2)
Just block excessive web-requests or mails coming from a regular home connection and you have defanged whatever bot or zombie that might be lurking there. Without the ability to send spam or to participate in DDoS blackmail attacks, the machine is essentially worthless to the cyber-criminals. Sure, it might provide a password to some online backing and maybe a credit card number, but that's about it.
Windows antivirus process illustrated (Score:2)
Re: (Score:2, Troll)
Wow. Good troll (Score:2)
Flaming sentiment: check.
Questionable grammar: check.
DRM + Vista mention: check.
Zero citations: check.
Please feel free to comment similar sentiment when non-Microsoft OS's get patched up quickly.
In other news, Apple is now recommending Anti-Virus for Mac OSX [bbc.co.uk]. Now that is a curious turn of events, don't you think?
Re:Idiots (Score:5, Funny)
Re:Idiots (Score:5, Funny)
Re: (Score:2, Insightful)
wait, wait, but then you do complain when a patch does not get installed and your system is compromized and it's all MSFT's fault... right, right? Am I right?
What did I win?
Re:Idiots (Score:5, Insightful)
Re: (Score:2)
Nope,
I run XP in parallels on a mac. Same way. After I installed and configured my machine, I backed up the image, and said "lets see how long this takes" and one year later, its still going strong.
No Spybot, No antivirus, and I surf and do lots of stuff on that Vmachine.
Re: (Score:2)
Re: (Score:2)
So the question is, what would the minimum be for a person with some sense?
To be specific, if my router has a built in NAT firewall and I have the brains to not open dodgy email attachments et al, will it matter if I let the updates sit for a while without rebooting or don't have an AV running?
Re: (Score:3, Insightful)
I see that you have already been (correctly) moderated as troll.
But anyway, for your information those systems isn't without exploitable bugs either. I would assume that OS X is especially risky since it might have a more standard collection of software and Apple bundles a bunch of security upgrades at the same time instead of sending them out as soon as there is an issue.
I won't say that I'd rather trust Microsoft getting updates out in time than Apple because then I to will be moderated troll but well, le
Re: (Score:2)
It's attitudes like that that make the botnet world go 'round.
Re:Idiots (Score:5, Insightful)
I dont get viruses because I'm not a wintard who opens any FREEREGISTRYSCANNER add they see.
I've been running windows xp without firewalls/AV for like four years now. Every 6 months or so I scan for viruses, rootkits, trojans, and adware, and i've yet to come up with anything.
Well of course if you have a rootkit, scanning for rootkits will show clean. Thats how they work.
A rootkit modifies the kernel so that it intercepts all API calls, including the read() functions your scanner is using, and the rootkit feeds back false info such as directory listings omitting the rootkits files, and if one tries to open one of its files by name, the open() call now controlled by the rootkit returns a no such file error.
You no doubt have a home router that does a form of NAT, which acts as a firewall for all intents and purposes for incoming connections, so your statement about not running a firewall is false.
At least I hope so, else you have been rooted 10 minutes after connecting your computer to the internet. Sadly, your description fits the profile of someone who is infected and doesn't even know it because it has been that way since day one it went online.
Re: (Score:3, Funny)
Yeah, he would have to patch everything within 4 minutes [slashdot.org] to not have an infection.
Re: (Score:2, Insightful)
not at all: - install XP with network unplugged - turn on firewall - plug in network
XP didn't come with a firewall. You had to upgrade to SP2 (IIRC) to get the Windows firewall. Granted, if you bought XP after SP2 was released you'd have the firewall, otherwise you can potentially get infected very quickly... way before you get the chance to download SP2 and enable the firewall.
Re: (Score:2)
How do you manage to find an image without SP2?!! :D
http://thepiratebay.org/search/xp%20sp2%20integrated/0/99/300 [thepiratebay.org]
Anyway, I guess there are both good and bad things with XP including a firewall now. It's good that it protects somewhat after installation, it's bad because many people probably keep that inferior firewall instead of replacing it with something decent.
For instance:
http://www.personalfirewall.comodo.com/download_firewall.html [comodo.com] (Bundled with antivirus, bad choice imho, for the user that is, nothing
Re: (Score:2)
Was this the same XP that would brick laptops by downing a firmware update while the mains was unplugged, forcing a reboot when the power was about to fail, which tried to update the firmware with 0.5% battery? Or was that Vista? I don't remember - I have a Mac. Not that I'm smug about it.
Re: (Score:2)
Step 1: Download a decent firewall/antivirus/any other security software you like from another PC.
Step 2: Install XP without the network connected, install previously mentioned software from a USB key
Step 3: Plug in the cable.
(Step 4: ???, Step 5: Profit)
Then your risk should be fairly minimal while you download and install all the updates. If you felt like being even cleverer then Step 1 would be to copy the updates from another XP PC to a USB key, but it's somewhat easier to let the update website han
Re: (Score:2)
Well of course if you have a rootkit, scanning for rootkits will show clean. Thats how they work.
A rootkit modifies the kernel so that it intercepts all API calls, including the read() functions your scanner is using, and the rootkit feeds back false info such as directory listings omitting the rootkits files, and if one tries to open one of its files by name, the open() call now controlled by the rootkit returns a no such file error.
Rootkits can be scanned for. See Rootkit Revealer [microsoft.com]. If you don't trust the kernel to accurately report the contents of the HD, just don't use it.
Re: (Score:2)
So, what are the rootkit scanners for? Or are there only rootkit guards?
And I'm serious with this question, I'm not stating anything.
Re: (Score:3, Informative)
Rootkits are not undetectable. Though in theory they can be, in practice fully scrubbing the files from all file request APIs can be difficult. Most scanners will use the high-level APIs (which are most likely to be manipulated by rootkits) as well as a low-level API (such as undocumented kernel functions or even direct hard drive access) which is far more difficult for the rootkit to manipulate... then they compare the results of the two scans. Any discrepancies are reported to the user as possible root
Re: (Score:3, Funny)
Find out if your credit card number has been stolen on the Internet!
CC # __________________ Expiration date __/__
Re: (Score:2)
Should I just e-mail you my info so you can check it for me?
Re: (Score:2)
Nah just write it here.
Please fill in your last three numbers on the backside of the card to in case you mess some of the other numbers up.
Re:Idiots : more with less (Score:2)
I concure: I believe I get some security with less - no, lesser than that - instead of more protections. :
I run a win XP SP1 at home. Behind a NAT rejecting non solicited traffic.
Apart of that
- no soft firewall
- no real time virus scanner
- no OS updates ever
but even less than that:
- disabled about 90% of startup process
- disabled about 70% of all startup services
- disabled all automatic updates
- uninstall un-needed stuff
- no toolbar-crapware-[younameit]ware
- aggressively remove crap ( CrapCleaner helps ) Th
Apple Quietly Recommends Antivirus Software ... (Score:2)
Dial up users. (Score:5, Interesting)
Indeed, my father in law is stuck on dialup, and wondered why his computer was so slow. (I hadn't been supporting him previously so I didn't look at his patch status) A quick speedtest (20 minutes later) showed he was downloading at less than a kilobyte per second.
Thats when I noticed it was downloading SP2 every single time he connected to check his mail. It has probably been downloading SP2 since it came out, years prior.
I think he was almost 70% complete with sp2 it probably would have been done in another year of intermittent use, but not before sp3 came out ;)
I now give him service packs on CDs
Re:Dial up users. (Score:4, Insightful)
Re:Idiots (Score:5, Insightful)
Auto-update is really annoying, especially if you don't have a very good connection. Its one of the first things I disable when I do a fresh install of XP.
Not sure why this was modded funny, as this seems to be far and away the predominant mentality of windows users...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If you are willing to dance to microsofts tune then carry on. Doesn't make you clever in any way. Or maybe you misunderstood the "auto" part of auto update.
Re: (Score:2)
lets see, coz in Vista I get asked aLOT for UAC approval. On Macs, much much less.
all overusing the approval feature does is condition the user to clicking "go right ahead and ram that big cylindrical object up my arse."
Re: (Score:2)
Keep in mind that the object in question is only cylindrical in the best case scenario. The truth is not suitable to air in this time slot (kids might be watching). Let's just say that corners are uncomfortable.
Re:Idiots (Score:4, Interesting)
Except in OS X it downloads the updates and tell you that they are updated, inform you if any of them will require a reboot and let you check the ones not requiring it, all of them and reboot, or not care at all and it won't bother you until next week or something such. (Of if you decide to do it manually)
In XP however it will tell you that they are downloaded and ask you if you want to reboot to install them EVERY FIFTH MINUTE. Even if you tell the OS you don't give a shit and don't want to reboot.
I don't like that OS X installers requiring a reboot remains running until you press reboot in them however. I'd rather just choose "I don't want to reboot now" and have them do their thing the next time I choose to reboot.
Re: (Score:2)
Re: (Score:2)
Stupid question eventually but will it also remove them if you choose to manually download them thru automatic update? =P
Seems kind of obvious that it will but who knows with Microsoft.
I think I tried following some guides for registry fixes for it but it never worked afair, and in any case you couldn't set it to infinite, and that tips above isn't something average joe will find in the settings of windows update anyway.
Re: (Score:3, Informative)
Re:Idiots (Score:4, Insightful)
Re:Idiots (Score:5, Funny)
I don't know why people complain about Genuine Advantage. If you buy the software it is unlocked. If you pirate it it will still work, even though it knows it is pirated, but it won't work 100%. I.e. pirate copies are partially locked.
Genuine Advantage would be better if they had a sense of humour about it. Like instead of black screening pirate copies [newsfactor.com] they could shrink the desktop slowly surrounded it by a dirty border and have photorealistic DirectX 10 cockroaches in the border. When you unlocked the workstation they'd scatter, but you still see the odd leg or antenna poking out from the edge of the monitor. Every so often one would run across the screen when you were hard at work. Hell, maybe you'd let people crush them with the mouse pointer but it would leave a nasty yellow blob on the screen. The longer you held out against buying a license, the more bold the roaches would become, and the more hit points they would have.
Essentially Microsoft discovered a way to make people RAGE! [imageshack.us] by accident with Clippy [wikipedia.org]. They should put that knowledge to use annoying pirates and making everyone else laugh at them. Most people have a fear of being mocked for being cheap, they should put that fear to use.
Re:Idiots (Score:5, Interesting)
Fully registered and licensed domain of XP machines (~60 or so). Update Windows Genuine Advantage. 58 of them claim to be pirated and cease to work at any level that can be considered acceptable for a corporation.
Stories like that are why people complain about GA.
Re:Idiots (Score:5, Interesting)
Re: (Score:3, Funny)
Re: (Score:2)
"large corporate site-license "
not
"Small corporate site-license "
You can have a small to medium buisness and still get fucked.
Re: (Score:3, Insightful)
On machines that fail WGA, Auto-update functions fine; manually updating from the Microsoft website is disabled.
However, XP's autoupdate is not particularly reliable with service packs. It's more likely to sit in the tray saying "click here to install SP2" than actually install itself, even if the machine is set to "Automatically download and install updates". And users always ignore tray warnings; it's just another bubble between Weatherbug and VirusProtectPro.
Re: (Score:2)
Niche markets have problems getting specialty software updated in a timely manner.
A client in the Veterinary field is still unable to update to XP SP3 because their medical office management software provider told me their product absolutely could not run on SP3.
I thought that the provider was thinking I was trying to upgrade to Vista, but no, SP3 apparently kills their server product.
Re: (Score:2)
If I used Windows I would never have it turned on due to those retarded nag windows showing up and stealing focus the whole fucking time in XP until you accidently happen to be pressing enter since you was writing when one pops up.
I hate them, how the fuck can they used such a retarded system? Why nag at all? Just tell me that the updates has been downloaded and eventually have a small reboot-button show up in the same ballon tip in the systray in case I really want to reboot now but in all other occasions
Re: (Score:2)
Actually I have auto-update running on my XP Home and XP Pro systems at home.
When SP3 installed on my wife's XP Home system, wireless failed and she couldn't connect to the internet. I had to back it out and turn off auto-updates.
When SP3 installed on my desktop's XP Home system, wireless failed and I couldn't connect to the internet. I left it installed and just plugged a network cable into the box.
When XP Pro is updated on my new system (I bought XP Pro SP3 with my new home built gaming rig), it occasiona
Re: (Score:3, Informative)
Re:Idiots (Score:4, Informative)
Re:Idiots (Score:5, Informative)
Which this particular patch qualifies as.
Re: (Score:2, Informative)
That's not true, systems will still get access to the "recommended" updates as well if Auto-Update is set. I don't understand it myself as the same updates can't be accessed without validating, but they appear fine if you have it set to automatic (and don't use the windows update website).
Re:Idiots (Score:5, Informative)
Auto-update works if you have a legitimate copy of Windows, and there are plenty of people using pirated copies of Windows which do not qualify for the "genuine advantage" required by Windows Update.
If someone is already using a pirated copy of Windows as their desktop OS, then they probably wouldn't have a problem running a pirated copy of Windows 2003, either.
In which case, they can then download Windows Server Update Services [microsoft.com] which doesn't require WGA to download. After installing WSUS on Win2K3, they can configure it to only download updates matching the pirated MS software they have, and then individually approve or reject updates. They would then configure all the systems to retrieve the approved updates from the WSUS server.
By doing this, every update is available, and WGA is never installed on any of the systems.
Re:Idiots (Score:5, Insightful)
"Some think they know better what updates to install than Microsoft suggests."
When updates stop breaking other software, and Microsoft stop bundling DRM as 'critical updates', then I suspect people will start trusting Microsoft to tell them what updates to install.
Personally I like to see what Microsoft are doing to my computer before I install it.
Re: (Score:3, Insightful)
Three words:
Incompetent IT Department.