Tuesday, August 26, 2003
Can you guess which OS Microsoft.com runs?
Can you guess which OS Microsoft.com runs?
Can You? It's obviously Linux! MS even had their coders modify IIS to run on Linux. Windows was never intended to provide stable and fast webhosting, but this recent discovery really makes me wonder.
Can You? It's obviously Linux! MS even had their coders modify IIS to run on Linux. Windows was never intended to provide stable and fast webhosting, but this recent discovery really makes me wonder.
Sunday, August 24, 2003
WarcraftIII.net - The unofficial Warcraft III site
WarCraftIII.Net - The Unofficial Warcraft III Site
Great, it's Sunday yet again and I still did not find my UT CD, although I did not search for it either. Anyway, I finished Warcraft 3 (Classic) Single Player mode and might go for Frozen Throne. While reading WCIII.net I also figured out how to creep rush your enemy and receive an instant win without the need of heroes or other units. Exploit? Nahhhhh ;)
Great, it's Sunday yet again and I still did not find my UT CD, although I did not search for it either. Anyway, I finished Warcraft 3 (Classic) Single Player mode and might go for Frozen Throne. While reading WCIII.net I also figured out how to creep rush your enemy and receive an instant win without the need of heroes or other units. Exploit? Nahhhhh ;)
Sunday, August 17, 2003
Unreal Tournament: Assault
Unreal Tournament: Assault
While surfing the web and googling for random terms, I felt the need to play UT Assault after all these years. It looks like a lot of assault players sticked to the original instead of playing the sequel, UT 2003. Personally, I uninstalled the game like 2 years ago, however the CD must be right there... or there... out there... well, somewhere for sure :)
While surfing the web and googling for random terms, I felt the need to play UT Assault after all these years. It looks like a lot of assault players sticked to the original instead of playing the sequel, UT 2003. Personally, I uninstalled the game like 2 years ago, however the CD must be right there... or there... out there... well, somewhere for sure :)
Saturday, August 16, 2003
Online racers against EA - Need for Speed: Porsche in the fall
Online Racers against EA
Electronic Arts will effectively shut down all of their own online racing servers, Need for Speed: High Stakes and Porsche Unleashed plus Motor City Online, in autumn 2003.
On the other hand there are still a lot of die-hard online racers on the servers who naturally do anything to keep the multi billion dollar company from killing their beloved online games. Another round of david vs. goliath? Maybe. But this one aint rigged, thus EA could easily pull the plug and make it end... even before October.
Electronic Arts will effectively shut down all of their own online racing servers, Need for Speed: High Stakes and Porsche Unleashed plus Motor City Online, in autumn 2003.
On the other hand there are still a lot of die-hard online racers on the servers who naturally do anything to keep the multi billion dollar company from killing their beloved online games. Another round of david vs. goliath? Maybe. But this one aint rigged, thus EA could easily pull the plug and make it end... even before October.
Wednesday, August 13, 2003
Warcraft 3 Patch Chaos (Custom_V0\Units\MiscGame.txt)
Warcraft 3 Patch Chaos
I was just forced by blizzard, especially warcraft 3: reign of chaos, to re-install the game. Version 1.12 was downloading the 1.12 patch over and over again and quit with the following message every time:
Blizzard BNUpdate v2.71 compiled on Jul 24 2003
Log created at 6:22 pm on 08/13/2003
This patch upgrades Warcraft III from version 1.11 to version 1.12.
ERROR: unable to apply patch to file 'Custom_V0\Units\MiscGame.txt'
RESULT: Patch failed
Since I could not find any "miscgame.txt" (must have been part of the warcraft mpq file) I finally re-installed it. Works like a charm. I love you, blizzard ;)
I was just forced by blizzard, especially warcraft 3: reign of chaos, to re-install the game. Version 1.12 was downloading the 1.12 patch over and over again and quit with the following message every time:
Blizzard BNUpdate v2.71 compiled on Jul 24 2003
Log created at 6:22 pm on 08/13/2003
This patch upgrades Warcraft III from version 1.11 to version 1.12.
ERROR: unable to apply patch to file 'Custom_V0\Units\MiscGame.txt'
RESULT: Patch failed
Since I could not find any "miscgame.txt" (must have been part of the warcraft mpq file) I finally re-installed it. Works like a charm. I love you, blizzard ;)
Tuesday, August 12, 2003
MSBlast prevention and cure
http://zdnet.com.com/2100-1105_2-5062532.html
The script kiddies and IRC nerds all around the world unite to make windows admins look like microsoft approved idiots once again.
This special worm exploits a buffer overflow in the RPC (remote procedure call) service to install itself and target new windows computers. Nothing special really, it's just that it might cause real damage later on, DDOS will be possible easily once enough windows machines are infected. Right now the major anti virus companies use the hot days of August to analyze the worm itself and its occurence patterns.
While W32/Blaster.A targets thousands of new windows systems as we speak, the script kiddies themselves have fun shutting down XP/2000 computers by sending random, malicious packets through the web.
The worst part of it is probably that the RPC core itself was not bugged at all until Microsoft added its "extensions".
Solutions:
# Delete MSBlast itself ::: first step, basic... does not cure the MS bugs... errr... "features" in RPC of course.
# Windows Update / Hotfix / Bugfix ::: probably the easiest. however, as we are talking about Microsoft, this does not work for all users... eg. it does not install saying it requires "Microsoft Windows XP Service Pack 2. amen.
# Install a firewall, block all ports being used by RPC (UDP AND TCP) ::: this will do, however some of us actually require RPC to work.
# Using a router, with NAT and integrated firewall ::: good. just make sure you dont use DMZ for any of your network computers.
# Uninstalling DCOM / RPC services ::: I don't recommend this as quite a few (plus maybe some future) applications and system components depend on them.
# "Take no action" on RPC failures (Admin->Services) ::: you might want to try this so your system does not shut down in the process of updating/installing/etc. Be sure to change this back to default once you have a real solution.
For full info and MSBlast removal instructions, check any of the articles on Google News. It is easy enough to do it yourself, no need to download any "MSBlast remover" being advertised since yesterday. On a side note: Update your Virus scanner definitions :)
The script kiddies and IRC nerds all around the world unite to make windows admins look like microsoft approved idiots once again.
This special worm exploits a buffer overflow in the RPC (remote procedure call) service to install itself and target new windows computers. Nothing special really, it's just that it might cause real damage later on, DDOS will be possible easily once enough windows machines are infected. Right now the major anti virus companies use the hot days of August to analyze the worm itself and its occurence patterns.
While W32/Blaster.A targets thousands of new windows systems as we speak, the script kiddies themselves have fun shutting down XP/2000 computers by sending random, malicious packets through the web.
The worst part of it is probably that the RPC core itself was not bugged at all until Microsoft added its "extensions".
Solutions:
# Delete MSBlast itself ::: first step, basic... does not cure the MS bugs... errr... "features" in RPC of course.
# Windows Update / Hotfix / Bugfix ::: probably the easiest. however, as we are talking about Microsoft, this does not work for all users... eg. it does not install saying it requires "Microsoft Windows XP Service Pack 2. amen.
# Install a firewall, block all ports being used by RPC (UDP AND TCP) ::: this will do, however some of us actually require RPC to work.
# Using a router, with NAT and integrated firewall ::: good. just make sure you dont use DMZ for any of your network computers.
# Uninstalling DCOM / RPC services ::: I don't recommend this as quite a few (plus maybe some future) applications and system components depend on them.
# "Take no action" on RPC failures (Admin->Services) ::: you might want to try this so your system does not shut down in the process of updating/installing/etc. Be sure to change this back to default once you have a real solution.
For full info and MSBlast removal instructions, check any of the articles on Google News. It is easy enough to do it yourself, no need to download any "MSBlast remover" being advertised since yesterday. On a side note: Update your Virus scanner definitions :)