Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Blaster Infection Tracing

Posted on 2004-08-23
5
286 Views
Last Modified: 2013-12-04
Hi

I have a machine on my LAN that has become infected with the Blaster Virus.

What is the quickest way to find out where this infection has come from. I bascially want a scanner that can scan an IP range and tell me if the machine has Blaster on it.

Does anyone know of such a tool?

Many thanks

Ste
0
Comment
Question by:stewatts
  • 2
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 11871518
Hi stewatts,

Scan your network for PC's needing the blaster patch
http://members.shaw.ca/techcd/VB_Projects/BlasterPatched.exe

PeteL
0
 

Author Comment

by:stewatts
ID: 11871550
Hi

This web address says page cannot be displayed?
0
 
LVL 17

Expert Comment

by:Microtech
ID: 11871598
0
 

Author Comment

by:stewatts
ID: 11871673
Hi Microtech

Thanks for this but this will only scan and remove it from 1 machine. I need to be able to scan an IP range for a machine that has infected my machine.

My OS is XP BTW

Many thanks
0
 
LVL 17

Accepted Solution

by:
Microtech earned 125 total points
ID: 11872230
stewatts,
http://support.microsoft.com/?kbid=823980 download the scan tool
http://support.microsoft.com/default.aspx?kbid=827363 this doc will help you

hope this helps
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question