Feeds

Guardian lauds our skeptical Code-Red coverage

One good plug deserves another

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Guardian Unlimited columnist Neil McIntosh shares our view that the Code Red worm will have little effect on the cyber-comings and goings of the average Netizen this month, despite dire warnings promulgated through much of the mainstream press.

Indeed, CNN was reporting hysterically yesterday that all users of Microsoft operating systems are in danger, which is ludicrously false; and we've heard that the venerable BBC picked that error up and ran for their lives with it. (The worm affects IIS, so unless you're running default installations of Win-NT server or Win-2K server, or IIS over W2K Pro, you can just forget about it.)

McIntosh isn't about to quiver in fear among the clueless wire drones. "I remain confident we can sleep soundly. Things might slow down a bit, some Web sites will be knocked out, but the on-line world will not end in the way some are saying it will," he writes sensibly.

"As the IT Web site The Register [awww...shucks *blush*] has reported in credible coverage of the worm, the Internet met Code Red for the first time in the middle of this month. The result? There was increased traffic on the Internet and on their networks, and if you'd been sharp you would have seen the Net slow down just a little. But the predicted Network Armageddon due Friday July 20 did not happen."

It seems he's been reading our friend Rob Rosenberger at Vmyths, too.

"Indeed, there was greater havoc created by fear of the worm than by the worm itself. The US Air Force's network administrators showed rather less bravery than their airborne colleagues when they whipped all their Internet servers off-line in a precautionary move, according to Vmyths, a long-standing virus myth-busting site."

We must say we admire his taste in Net security literature. ®

Related Stories

Washington mobilizes against Code Red resurgence
Code Red Tribulation is nigh, Steve Gibson warns
Internet survives Code Red
IIS worm made to packet Whitehouse.gov

Related Links

The relevant MS security bulletin
The Win-NT 4.0 patch
The Win-2K Pro and Advanced Server patch

Note: the worm is memory-resident. You must re-boot after installing the hotfix.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Desperate VXers enslave FREEZERS in DDoS bot
Updated Spike malware targets Asia
Heatmiser digital thermostat users: For pity's sake, DON'T SWITCH ON the WI-FI
A stranger turns up YOUR heat with default password 1234
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.