TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: DIESEL
date: 2017-05-18 18:05:00
subject: Re: Did Kaspersky step in

0000484f
REPLYTO: 1:396/3 UUCP
REPLYADDR: me@privacy.net
From: Diesel 

"Ant"  news:ofd0vk$1did$1@gioia.aioe.org Mon, 15 May
2017 19:52:07 GMT in alt.comp.anti-virus, wrote: 

> "FredW" wrote:
>> All those that replied have clearly no idea whatsoever of
>> IT-matters. They give only politically desirable answers (they
>> think). 
> 
> Neither do the people running the affected networks and systems,
> apparently. They should be fired.
> 
>> And this massive attack of ransomware was caused by the NSA and
>> the USA. 
> 
> Not really. People (amd Microsoft) should have woken up in 2003
> when the Sever Mesage Block (SMB) software listening on port 445
> was first exploited by the Blaster worm. There is no reason for
> SMB to be listening for incoming internet connections and no
> excuse for not firewalling this port.

+1


-- 
I would like to apologize for not having offended you yet. 
Please be patient. I will get to you shortly.
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.