Jump to content
Come try out the Arcade, Link at the top of the website ×

Recommended Posts


  • Member ID:  389
  • Group:  *** Clan Members
  • Followers:  48
  • Topic Count:  347
  • Topics Per Day:  0.06
  • Content Count:  5145
  • Content Per Day:  0.89
  • Reputation:   4387
  • Achievement Points:  41369
  • Solved Content:  0
  • Days Won:  67
  • Joined:  09/14/09
  • Status:  Offline
  • Last Seen:  
  • Birthday:  01/01/1970
  • Device:  Windows

Posted

THEY ARE TALKING ABOUT SONY   wonder if are doing cod servers for the iw errors that pop up now and  again



  • Member ID:  5514
  • Group:  **- Inactive Registered Users
  • Followers:  36
  • Topic Count:  6
  • Topics Per Day:  0.00
  • Content Count:  122
  • Content Per Day:  0.03
  • Reputation:   46
  • Achievement Points:  792
  • Solved Content:  0
  • Days Won:  0
  • Joined:  02/07/13
  • Status:  Offline
  • Last Seen:  
  • Birthday:  07/20/1914

Posted

but how can you stop it?



  • Member ID:  755
  • Group:  ***- Inactive Clan Members
  • Followers:  21
  • Topic Count:  120
  • Topics Per Day:  0.02
  • Content Count:  2191
  • Content Per Day:  0.38
  • Reputation:   961
  • Achievement Points:  14309
  • Solved Content:  0
  • Days Won:  0
  • Joined:  11/17/09
  • Status:  Offline
  • Last Seen:  
  • Birthday:  01/14/1982

Posted

The targets are the big gaming services. I recently had to deal with servers which were used for DNS Reflection / Amplification Attacks against a big online gaming site. The iwmp3 error has nothing to do with malware activity. IMO the only way to get infected is downloading a mod or map from a compromised redirect server. But I am not sure.



  • Member ID:  389
  • Group:  *** Clan Members
  • Followers:  48
  • Topic Count:  347
  • Topics Per Day:  0.06
  • Content Count:  5145
  • Content Per Day:  0.89
  • Reputation:   4387
  • Achievement Points:  41369
  • Solved Content:  0
  • Days Won:  67
  • Joined:  09/14/09
  • Status:  Offline
  • Last Seen:  
  • Birthday:  01/01/1970
  • Device:  Windows

Posted (edited)

Microsoft withdraws Windows patch over crashing bug

Microsoft has withdrawn one of the security updates it released on Tuesday, following reports of crashes on Windows 7 systems.
 Patch MS13-036/2823324, a fix for a critical-rated security flaw in the Windows file system kernel-mode driver ntfs.sys, was part of a bundle of software updates released by Microsoft earlier this week as part of its regular 'Patch Tuesday' scheduled update cycle. Unfortunately, it seems the cure is worse than the disease: while the hole it patches may or may not ever be exploited on your system, the chances are good installing the patch will crash your computer hard.
 With the patch installed, affected systems - thus far seemingly limited to Windows 7 machines - will crash on reboot, with some reports claiming that the system will see the hard drives as uncleanly mounted and run CheckDisk on every boot. While this is not thought to put any data at risk, it's certainly annoying - and doubly so when the crashes continue to mount, causing delays as you wait for yet another disk check to complete.
 Microsoft has confirmed that there is something seriously awry with the update, posting a knowledge base entry claiming it is investigating the issue. 'Systems may not recover from a restart, or applications cannot load, after security update 2823324 is applied,' the company admitted in the posting. 'We recommend that customers uninstall this update.'
 To prevent any further mishaps, Microsoft has removed the patch from Windows Update until a fixed version can be released - but with most users installing updates as soon as they are released by the company, the damage is likely already done. For those who do uninstall the patch, or who never installed it in the first place, the race is now on for Microsoft to release a fixed version before ne'er-do-wells take advantage of the opportunity to attack systems through the vulnerability.
 This most recent Patch Tuesday is doubly embarrassing for the software giant: as well as releasing a broken patch, it also failed to fix a major security hole highlighted at the Pwn2Own event earlier this year, leaving its customers vulnerable to attack..  12th April 2013 by Gareth Halfacree

Edited by KaptCrunch


  • Member ID:  2069
  • Group:  ***- Inactive Clan Members
  • Followers:  24
  • Topic Count:  214
  • Topics Per Day:  0.04
  • Content Count:  2411
  • Content Per Day:  0.45
  • Reputation:   2409
  • Achievement Points:  18298
  • Solved Content:  0
  • Days Won:  7
  • Joined:  12/25/10
  • Status:  Offline
  • Last Seen:  
  • Birthday:  08/08/1966

Posted

 

Microsoft withdraws Windows patch over crashing bug

Microsoft has withdrawn one of the security updates it released on Tuesday, following reports of crashes on Windows 7 systems.

 Patch MS13-036/2823324, a fix for a critical-rated security flaw in the Windows file system kernel-mode driver ntfs.sys, was part of a bundle of software updates released by Microsoft earlier this week as part of its regular 'Patch Tuesday' scheduled update cycle. Unfortunately, it seems the cure is worse than the disease: while the hole it patches may or may not ever be exploited on your system, the chances are good installing the patch will crash your computer hard.

 With the patch installed, affected systems - thus far seemingly limited to Windows 7 machines - will crash on reboot, with some reports claiming that the system will see the hard drives as uncleanly mounted and run CheckDisk on every boot. While this is not thought to put any data at risk, it's certainly annoying - and doubly so when the crashes continue to mount, causing delays as you wait for yet another disk check to complete.

 Microsoft has confirmed that there is something seriously awry with the update, posting a knowledge base entry claiming it is investigating the issue. 'Systems may not recover from a restart, or applications cannot load, after security update 2823324 is applied,' the company admitted in the posting. 'We recommend that customers uninstall this update.'

 To prevent any further mishaps, Microsoft has removed the patch from Windows Update until a fixed version can be released - but with most users installing updates as soon as they are released by the company, the damage is likely already done. For those who do uninstall the patch, or who never installed it in the first place, the race is now on for Microsoft to release a fixed version before ne'er-do-wells take advantage of the opportunity to attack systems through the vulnerability.

 This most recent Patch Tuesday is doubly embarrassing for the software giant: as well as releasing a broken patch, it also failed to fix a major security hole highlighted at the Pwn2Own event earlier this year, leaving its customers vulnerable to attack..  12th April 2013 by Gareth Halfacree

 

 

Ah! This explains what happened to me. The update royally pooched my system. I tried a crapload of things to recover and get back up and running. Oddly, a system restrore from an earlier image had the same issues: reboots, checkdisks running every time etc. I suspect part of the issue affected the drive's boot sector. My system needed a refresh anyway, so I wiped the partition and installed Windows 8 with "Classic Shell" to boot into the familiar desktop and add a Start button. So far, so good. Win8 without the new interface is actrually pretty snappy and has a lot of enhancements "under the hood"


Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.