Please fix Windows as soon as possible!

Homeland Security recommends that Windows users update the patch as soon as possible to combat computer worms.

Picture 1 of Please fix Windows as soon as possible! This is also the first time Homeland Security requires computer users to perform security updates. This error lies in the Windows Server Service function. Affects all versions of Windows 2000 and later versions. A buffer overflow attack can pave the way for malicious code to operate and alter a system.

Some other security firms are also very interested in the security bug that Homeland Security announced. Security firm eEye Digital Security said malicious code to exploit the bug could be found in some places on the internet and could attack " zero-day " (*). Unpatched systems will operate under the threat of computer worm attacks.

eEye Digital Security has also proved itself to be "salty" with Windows security bugs. The company immediately released a NetApi tool to test the system to detect 'sensitive' points on the system that could be attacked.

US-CERT (US Computer Emergency Response Team) is actively working with Microsoft to limit the damage caused by this error. US-CERT also recommends that users make sure that they have installed and updated the latest data for their anti-virus program or that the firewall is always open and tightly controlled. In addition, users should not open emails or attachments of unknown origin, do not even open attachments for addresses in trusted lists.

Users can refer to the information and download the patch update here as soon as possible. It is best to leave the automatic update mode for Windows.

(*) zero-day : Information has not been widely published and is often used to describe the exploitation of unknown security bugs even for security experts.

ONLINE