[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Please run windows update now
- Subject: Please run windows update now
- From: keiths at neilltech.com (Keith Stokes)
- Date: Mon, 15 May 2017 15:48:37 +0000
- In-reply-to: <[email protected]>
- References: <[email protected]>
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
Look near the bottom under Further Resources.
On May 15, 2017, at 10:44 AM, Keith Medcalf <kmedcalf at dessus.com<mailto:kmedcalf at dessus.com>> wrote:
I do not see any links to actually download the actual patches. Just a bunch of text drivel.
--
?u?op-?p?sdn s? ?o??uo? ?no? 's??? p??? u?? no? ??
-----Original Message-----
From: NANOG [mailto:nanog-bounces at nanog.org] On Behalf Of
timrutherford at c4.net<mailto:timrutherford at c4.net>
Sent: Monday, 15 May, 2017 09:23
To: 'Josh Luthman'; 'Nathan Fink'
Cc: nanog at nanog.org
Subject: RE: Please run windows update now
I should clarify, the link in my email below is only for windows versions
that are considered unsupported.
This one has links for the currently supported versions of windows
https://support.microsoft.com/en-us/help/4013389/title
-----Original Message-----
From: timrutherford at c4.net [mailto:timrutherford at c4.net]
Sent: Monday, May 15, 2017 11:12 AM
To: 'Josh Luthman' <josh at imaginenetworksllc.com>; 'Nathan Fink'
<nefink at gmail.com>
Cc: 'nanog at nanog.org' <nanog at nanog.org>
Subject: RE: Please run windows update now
They even released updates for XP & 2003
http://www.catalog.update.microsoft.com/search.aspx?q=4012598
-----Original Message-----
From: NANOG [mailto:nanog-bounces at nanog.org] On Behalf Of Josh Luthman
Sent: Monday, May 15, 2017 10:45 AM
To: Nathan Fink <nefink at gmail.com>
Cc: nanog at nanog.org
Subject: Re: Please run windows update now
Link?
I only posted it as reference to the vulnerability.
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Sat, May 13, 2017 at 2:07 AM, Nathan Fink <nefink at gmail.com> wrote:
I show MS17-010 as already superseded in SCCM
On Fri, May 12, 2017 at 1:44 PM, Josh Luthman
<josh at imaginenetworksllc.com
wrote:
MS17-010
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Fri, May 12, 2017 at 2:35 PM, JoeSox <joesox at gmail.com> wrote:
Thanks for the headsup but I would expect to see some references
to the patches that need to be installed to block the
vulnerability (Sorry for sounding like a jerk).
We all know to update systems ASAP.
--
Later, Joe
On Fri, May 12, 2017 at 10:35 AM, Ca By <cb.list6 at gmail.com> wrote:
This looks like a major worm that is going global
Please run windows update as soon as possible and spread the
word
It may be worth also closing down ports 445 / 139 / 3389
http://www.npr.org/sections/thetwo-way/2017/05/12/
528119808/large-cyber-attack-hits-englands-nhs-hospital-
system-ransoms-demanded
---
Keith Stokes