Fred Sampson's Radio Weblog
a card-carrying member of the reality-based community


Contact Fred:


I listen to IT Conversations


Subscribe to "Fred Sampson's Radio Weblog" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

Electronic Freedom Foundation



  Sunday, January 26, 2003

The Raiders can go back to L.A.

Cuz they never showed up in San Diego. 48-21. Ouch.

Now, just because I live on the periphery of the Bay Area doesn't make me a Raiders fan. I don't have any sympathy for Al Davis, sorry. I don't care for the "win at all costs" attitude. I don't care for the Raiders' image. I don't care for what the city of Oakland did to their citizens in order to get the Raiders back from L.A. I don't care for what Al Davis did to Oakland to move back (Oh, and he's suing the city because he didn't make enough money on the deal!) Al let Jon Gruden go for a few bucks and some draft picks, instead of letting him have what he's worth. And Tampa Bay just proved what Gruden's worth. The got what they paid for, and more. Now the Raiders can go home, wherever that is, and shut up.

7:23:20 PM    Questions? Comments? Flames? []

If I couldn't laugh. . .

. . .I would have to cry. Yesterday's SQL Slammer worm attack exploited a known fault in Microsoft SQL Server 2000--which Microsoft patched 6 months ago! Which db admins could fix with a frigging password. Which sysdmins could avoid by not exposing their database servers to the public Internet.  Just like the Nimda and Code Red worms, which exploited known, patched faults. In fact, I applied the IIS patch to my WinNT (it's now Win2K) machine a month before the original Code Red attack--and a month before my employer's IT department took action (day late, many dollars short).

Major SQL Server 2000 Worm Hits The Web. Because of failure to apply existing SQL Server 2000 patch which Microsoft posted last July, a number of database servers across the Web backbone were attacked by a virus-like worm on Saturday morning. [Microsoft Watch from Mary Jo Foley]

Update: 'Slammer' worm slugs Internet, slows Web traffic. One security firm estimated that 150,000 to 200,000 servers worldwide have already been infected by today's attack, which hit the Internet at about 12:30 a.m. EST. [Computerworld News]

Virus Overwhelms Global Internet Systems. A fast-spreading, virus-like infection slowed Internet traffic Saturday, overwhelming the world's digital pipelines and interfering with Web browsing and e-mail delivery. By The Associated Press. [New York Times: Technology]

Fresh warning over cyber attack. Experts warn of new outbreaks of a computer worm when business users return to work. [BBC News | Technology | UK Edition]

And of course the most complete coverage came from Slashdot:

"Since about midnight EST almost every host on the internet has been receiving a 376 byte UDP payload on port ms-sql-m (1434) from a random infected server. Reports of some hosts receiving 10 per minute or more. is reporting UUNet and Internap are being hit very hard. This is the cause of major connectivity problems being experienced worldwide. It is believed this worm leverages a vulnerability published in June 2002. Several core routers have taken to blocking port 1434 outright. If you run Microsoft SQL Server, make sure the public internet can't access it. If you manage a gateway, consider dropping UDP packets sent to port 1434." bani adds "This has effectively disabled 5 of the 13 root nameservers."

If you're running an unpatched server open to the Internet, you (and we) have no one to blame but yourself.

8:59:10 AM    Questions? Comments? Flames? []

Click here to visit the Radio UserLand website. © Copyright 2002-2005 Fred Sampson.
Last update: 5/21/05; 10:15:26 PM.

January 2003
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  
Dec   Feb

Search this site:

Fred's Blogroll

ACLU Safe and Free

What I'm Reading:

The WeatherPixie