Inside The NIPC
from the protecting-the-world-from-viruses-or-hyping-them? dept
There have been a bunch of articles lately criticizing people for overhyping the whole Code Red thing, but here's an article that looks at the other side. It looks behind the scenes at the US's National Infrastructure Protection Center (NIPC). They're the group who is supposed to "detect, deter, assess and warn" everyone of significant threats to Internet security. They've been criticized on all fronts for lots of things (not being technically savvy enough, not doing enough, etc.), but at least it sounds like they're trying to fix things up.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
Code Red
They informed me that this is the first client/server virus and it has been upgraded to code yellow (very destructive). Code Red 1 opened up a hole on servers running Windows NT and Windows 2000. Code Red 2 took advantage of those hole and infitrated the servers. It pings and pings and pings servers slowing down the internet. It has the potential of shutting down the backbones.
Symantec's www.sarc.com page has upgraded it to code (4) with stats of running wild, damage- medium and distribution-high.
The worm propagates by installing itself into a random Web server using a known buffer overflow exploit, contained in the file Idq.dll. Only systems that have not been patched with the latest Microsoft IIS service packs can be affected.
We do NOT think this has been over hyped, in fact quite the opposite. So bravo for the reporters who DID actively report this virus.
[ link to this | view in chronology ]
Re: Code Red
What a tool.
[ link to this | view in chronology ]