Solved

Blaster Infection Tracing

Posted on 2004-08-23
5
287 Views
Last Modified: 2013-12-04
Hi

I have a machine on my LAN that has become infected with the Blaster Virus.

What is the quickest way to find out where this infection has come from. I bascially want a scanner that can scan an IP range and tell me if the machine has Blaster on it.

Does anyone know of such a tool?

Many thanks

Ste
0
Comment
Question by:stewatts
  • 2
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 11871518
Hi stewatts,

Scan your network for PC's needing the blaster patch
http://members.shaw.ca/techcd/VB_Projects/BlasterPatched.exe

PeteL
0
 

Author Comment

by:stewatts
ID: 11871550
Hi

This web address says page cannot be displayed?
0
 
LVL 17

Expert Comment

by:Microtech
ID: 11871598
0
 

Author Comment

by:stewatts
ID: 11871673
Hi Microtech

Thanks for this but this will only scan and remove it from 1 machine. I need to be able to scan an IP range for a machine that has infected my machine.

My OS is XP BTW

Many thanks
0
 
LVL 17

Accepted Solution

by:
Microtech earned 125 total points
ID: 11872230
stewatts,
http://support.microsoft.com/?kbid=823980 download the scan tool
http://support.microsoft.com/default.aspx?kbid=827363 this doc will help you

hope this helps
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 2012 session collection security. 2 100
How to implement SSO? 22 87
Design of sending events/logs to SIEM/Arcsight 2 410
Share and Advanced Sharing permissions 8 141
Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question