KaptCrunch Posted April 12, 2013 Member ID: 389 Group: *** Clan Members Followers: 48 Topic Count: 347 Topics Per Day: 0.06 Content Count: 5145 Content Per Day: 0.89 Reputation: 4387 Achievement Points: 41369 Solved Content: 0 Days Won: 67 Joined: 09/14/09 Status: Offline Last Seen: 51 minutes ago Birthday: 01/01/1970 Device: Windows Posted April 12, 2013 THEY ARE TALKING ABOUT SONY wonder if are doing cod servers for the iw errors that pop up now and again Awards
ugotittoo Posted April 12, 2013 Member ID: 5514 Group: **- Inactive Registered Users Followers: 36 Topic Count: 6 Topics Per Day: 0.00 Content Count: 122 Content Per Day: 0.03 Reputation: 46 Achievement Points: 792 Solved Content: 0 Days Won: 0 Joined: 02/07/13 Status: Offline Last Seen: April 24, 2013 Birthday: 07/20/1914 Posted April 12, 2013 but how can you stop it?
TecHnOBoY Posted April 12, 2013 Member ID: 755 Group: ***- Inactive Clan Members Followers: 21 Topic Count: 120 Topics Per Day: 0.02 Content Count: 2191 Content Per Day: 0.38 Reputation: 961 Achievement Points: 14309 Solved Content: 0 Days Won: 0 Joined: 11/17/09 Status: Offline Last Seen: April 18, 2019 Birthday: 01/14/1982 Posted April 12, 2013 The targets are the big gaming services. I recently had to deal with servers which were used for DNS Reflection / Amplification Attacks against a big online gaming site. The iwmp3 error has nothing to do with malware activity. IMO the only way to get infected is downloading a mod or map from a compromised redirect server. But I am not sure. Awards
KaptCrunch Posted April 12, 2013 Member ID: 389 Group: *** Clan Members Followers: 48 Topic Count: 347 Topics Per Day: 0.06 Content Count: 5145 Content Per Day: 0.89 Reputation: 4387 Achievement Points: 41369 Solved Content: 0 Days Won: 67 Joined: 09/14/09 Status: Offline Last Seen: 51 minutes ago Birthday: 01/01/1970 Device: Windows Author Posted April 12, 2013 (edited) Microsoft withdraws Windows patch over crashing bug Microsoft has withdrawn one of the security updates it released on Tuesday, following reports of crashes on Windows 7 systems. Patch MS13-036/2823324, a fix for a critical-rated security flaw in the Windows file system kernel-mode driver ntfs.sys, was part of a bundle of software updates released by Microsoft earlier this week as part of its regular 'Patch Tuesday' scheduled update cycle. Unfortunately, it seems the cure is worse than the disease: while the hole it patches may or may not ever be exploited on your system, the chances are good installing the patch will crash your computer hard. With the patch installed, affected systems - thus far seemingly limited to Windows 7 machines - will crash on reboot, with some reports claiming that the system will see the hard drives as uncleanly mounted and run CheckDisk on every boot. While this is not thought to put any data at risk, it's certainly annoying - and doubly so when the crashes continue to mount, causing delays as you wait for yet another disk check to complete. Microsoft has confirmed that there is something seriously awry with the update, posting a knowledge base entry claiming it is investigating the issue. 'Systems may not recover from a restart, or applications cannot load, after security update 2823324 is applied,' the company admitted in the posting. 'We recommend that customers uninstall this update.' To prevent any further mishaps, Microsoft has removed the patch from Windows Update until a fixed version can be released - but with most users installing updates as soon as they are released by the company, the damage is likely already done. For those who do uninstall the patch, or who never installed it in the first place, the race is now on for Microsoft to release a fixed version before ne'er-do-wells take advantage of the opportunity to attack systems through the vulnerability. This most recent Patch Tuesday is doubly embarrassing for the software giant: as well as releasing a broken patch, it also failed to fix a major security hole highlighted at the Pwn2Own event earlier this year, leaving its customers vulnerable to attack.. 12th April 2013 by Gareth Halfacree Edited April 12, 2013 by KaptCrunch Astronomer 1 Awards
Astronomer Posted April 12, 2013 Member ID: 2069 Group: ***- Inactive Clan Members Followers: 24 Topic Count: 214 Topics Per Day: 0.04 Content Count: 2411 Content Per Day: 0.45 Reputation: 2409 Achievement Points: 18298 Solved Content: 0 Days Won: 7 Joined: 12/25/10 Status: Offline Last Seen: October 2, 2023 Birthday: 08/08/1966 Posted April 12, 2013 Microsoft withdraws Windows patch over crashing bug Microsoft has withdrawn one of the security updates it released on Tuesday, following reports of crashes on Windows 7 systems. Patch MS13-036/2823324, a fix for a critical-rated security flaw in the Windows file system kernel-mode driver ntfs.sys, was part of a bundle of software updates released by Microsoft earlier this week as part of its regular 'Patch Tuesday' scheduled update cycle. Unfortunately, it seems the cure is worse than the disease: while the hole it patches may or may not ever be exploited on your system, the chances are good installing the patch will crash your computer hard. With the patch installed, affected systems - thus far seemingly limited to Windows 7 machines - will crash on reboot, with some reports claiming that the system will see the hard drives as uncleanly mounted and run CheckDisk on every boot. While this is not thought to put any data at risk, it's certainly annoying - and doubly so when the crashes continue to mount, causing delays as you wait for yet another disk check to complete. Microsoft has confirmed that there is something seriously awry with the update, posting a knowledge base entry claiming it is investigating the issue. 'Systems may not recover from a restart, or applications cannot load, after security update 2823324 is applied,' the company admitted in the posting. 'We recommend that customers uninstall this update.' To prevent any further mishaps, Microsoft has removed the patch from Windows Update until a fixed version can be released - but with most users installing updates as soon as they are released by the company, the damage is likely already done. For those who do uninstall the patch, or who never installed it in the first place, the race is now on for Microsoft to release a fixed version before ne'er-do-wells take advantage of the opportunity to attack systems through the vulnerability. This most recent Patch Tuesday is doubly embarrassing for the software giant: as well as releasing a broken patch, it also failed to fix a major security hole highlighted at the Pwn2Own event earlier this year, leaving its customers vulnerable to attack.. 12th April 2013 by Gareth Halfacree Ah! This explains what happened to me. The update royally pooched my system. I tried a crapload of things to recover and get back up and running. Oddly, a system restrore from an earlier image had the same issues: reboots, checkdisks running every time etc. I suspect part of the issue affected the drive's boot sector. My system needed a refresh anyway, so I wiped the partition and installed Windows 8 with "Classic Shell" to boot into the familiar desktop and add a Start button. So far, so good. Win8 without the new interface is actrually pretty snappy and has a lot of enhancements "under the hood" Awards
Recommended Posts