You're warned-vous êtes avertis!

Encore! - Again! If I'm insistent, it's because Windows and all the others are too..! Si j'insiste, c'est parce que Windows et tous les autres le sont également...!
Now I can't do anything more for you...!  Maintenant Je peux plus rien faire pour vous...!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx

EN ANGLAIS - mais vous pouvez changer la langue sur la page...!
(In English but you can change the language on the page.)
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
(To see the full page, click on the title - pour voir la page originale cliquez sur le titre)

Conficker Worm: Help Protect Windows from Conficker

Published: February 6, 2009 | Updated: March 27, 2009

This page is designed to provide IT Pro customers the information they need to help protect their systems from the Conficker Worm, or to recover systems that have been infected.

If you are a consumer, please visit Protect Yourself from the Conficker Computer Worm.

About Conficker

On October 23, 2008, Microsoft released a critical security update, MS08-067, to resolve a vulnerability in the Server service of Windows that, at the time of release, was facing targeted, limited attack. The vulnerability could allow an anonymous attacker to successfully take full control of a vulnerable system through a network-based attack, the sort of vectors typically associated with network "worms." Since the release of MS08-067, the Microsoft Malware Protection Center (MMPC) has identified the following variants of Win32/Conficker:

 *Also known as Conficker B++
 **Also known as Conficker.C and Downadup.C

What Happens on April 1, 2009?

Systems infected with the latest version of Conficker will begin to use a new algorithm to determine what domains to contact. Microsoft has not identified any other actions scheduled to take place on April 1, 2009. It is possible that systems with the latest version of Conficker may be updated with a newer version of Conficker on April 1 by contacting domains on the new domain list. However, these systems could be updated on any date before or after April 1 as well using the "peer-to-peer" updating channel in the latest version of Conficker.

Protecting PCs from Conficker

  1. Apply the security update associated with MS08-067. View the security bulletin for more information about the vulnerability, affected software, detection and deployment tools and guidance, and security update deployment information.
  2. Make sure you are running up-to-date antivirus software from a trusted vendor, such as Microsoft's Forefront Client Security or Windows Live OneCare. Antivirus software may also be obtained from trusted third parties such as the members of the Virus Information Alliance.
  3. Check for updated protections for security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. The Microsoft Active Protection Program (MAPP) provides partners with early access to Microsoft vulnerability information. For a list of partners and links to their active protections, please visit the MAPP Partners page.
  4. Isolate legacy systems using the methods outlined in the Microsoft Windows NT 4.0 and Windows 98 Threat Mitigation Guide.
  5. Implement strong passwords as outlined in the Creating a Strong Password Policy whitepaper.
  6. Disable the AutoPlay feature through the registry or using Group Policies as discussed in Microsoft Knowledge Base Article 967715. Microsoft released Security Advisory 967940 to notify users that the updates to allow users to disable AutoPlay/AutoRun capabilities have been deployed via automatic updating channels.
    NOTE: Windows 2000, Windows XP, and Windows Server 2003 customers must deploy the update associated with Microsoft Knowledge Base Article 967715 to be able to successfully disable the AutoRun feature. Windows Vista and Windows Server 2008 customers must deploy the security update associated with Microsoft Security Bulletin MS08-038 to be able to successfully disable the AutoRun feature.

Cleaning Systems of Conficker

Manually download the Windows Malicious Software Removal Tool (MSRT) onto uninfected PCs and deploy to infected PCs to clean infected systems.


Links/Liens:
http://www.webspawner.com/users/mrlemarquis/index.html

Comments

Popular posts from this blog

last chance for Christmas - today only....!

The Empire is dead...Long live the Empire...?