You Are Reading
0
Important:
If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.
For instructions on how to do this, refer to your Windows documentation, or the document: How to configure shared Windows folders for maximum network protection.
For further information on the vulnerability and patches to resolve it please refer to the following document:
Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability
If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only.
This tool is not designed to run on Novell NetWare servers. To remove this threat from a NetWare server, first make sure that you have the current virus definitions, and then run a full system scan with the Symantec antivirus product.
How to download and run the tool
Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.
Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: XADM: Do Not Back Up or Scan Exchange 2000 Drive M (Article 298924).
Source : www.symantec.com/
Symantec W32.Downadup Removal Tool
Important:
If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.
For instructions on how to do this, refer to your Windows documentation, or the document: How to configure shared Windows folders for maximum network protection.
For further information on the vulnerability and patches to resolve it please refer to the following document:
Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability
If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only.
This tool is not designed to run on Novell NetWare servers. To remove this threat from a NetWare server, first make sure that you have the current virus definitions, and then run a full system scan with the Symantec antivirus product.
How to download and run the tool
Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.
Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: XADM: Do Not Back Up or Scan Exchange 2000 Drive M (Article 298924).
Source : www.symantec.com/
Subscribe to:
Post Comments (Atom)
Categories
- Anti Virus (13)
- Application (43)
- Crack Keygen CD-Key (5)
- Games (41)
- Media (26)
- MP3 Indonesia (398)
- MP3 Mancanegara (2)
- Networking (29)
- Theme (26)
Search This Blog
Followers
Like Box
Chat
Looker
Total Pageviews Since 22/04/2011
Note :
Please report broken or expired link
0 komentar:
Post a Comment