Computer virus shuts down Ambulance dispatch service

Sylvia Else wrote
terryc wrote
Don McKenzie wrote

HUH?
Could they possibly be running a windows Operating System,

Almost definitely.

without full back up and recovery, for an ambulance dispatch system?

Wouldn't fix this problem. you need to remove the "infection"

A full reinstall and restore from a backup made before the infection
would do it. Mind you, determining when the infection occurred might
be difficult.

Perhaps just a full reinstall. It's an ambulance dispatch system -
what happened yesterday is already history.
But they may well not want to just lose that history.

They may not be legally allowed to just bin it regardless.
 
kreed wrote
Don McKenzie <5...@2.5A> wrote

Computer virus shuts down Ambulance dispatch service

The Ambulance Service of NSW computer dispatch system
became infected by a virus at about 1pm (AEDT) on Saturday,
forcing staff to shut it down and revert to co-ordinating the state's
paramedics and ambulances via a manual paper-based system.

The cause and source of the virus were unknown and the system
was still offline at 1pm (AEDT) on Sunday and it was not
known when it would be back up and running, Willis said.

http://www.arnnet.com.au/article/376471/computer_virus_shuts_down_amb...

HUH?
Could they possibly be running a windows Operating System, without
full back up and recovery, for an ambulance dispatch system?

Which will be another reason to push for internet censorship.
Nope, no one will buy that line now.

To "protect" vital infrastructure.
No reason for it to be net connected even if it does use the google maps database.
 
Don McKenzie wrote:

FULL means FULL.
Your "backup service is definitely nota FULL backup system.
My service provider backs up my FULL server
(http://server.the-wizard-from-oz.com/) every 4 hours, and saves 30 days
of these backups. The system is capable of providing hundreds of
recovery points per day. I have access to restore a backup, from any
point at any time.

And I'm running a 2 bob shopping cart, not a life critical ambulance
dispatch system.
So don't compare them.
Think network.
 
On Mon, 14 Feb 2011 10:21:42 +1100, John Tserkezis
<jt@techniciansyndrome.org.invalid> wrote:

Petzl wrote:

Best I could make out was that even at the best of times (worse still
on Sundays), all IT administrators are such utter bastards, that they
block innocent sites such as Twitter, Myspace, FriendFace, gmail and all
porn sites from their corporate networks, the users have to wait till
they get home to use their own ISP (or steal it from their neighbours)
before they can whine on usenet about how hard off they.

Not that hard was it

I get that bit, what I don't get is how you gleaned that assumption
about the Ambulance service, what it has to do with them, and more
importantly, how do you know how they work to be able to make the
assumption that their IT administrators are utter totalitarian bastards.
Or lazy smucks who don't care about network security.

The original report doesn't give enough to point to either conclusion.
Not just Ambulance service that are "over securtitising" a Network to
the point where it stil gets trojans or viruses. But is not productive
for it's intended use.
Just a while ago I went to send a email to my syate MP and get a
bounce
*******
Delivery to the following recipient failed permanently:
Technical details of permanent failure:
Google tried to deliver your message, but it was rejected by the
recipient domain. We recommend contacting the other email provider for
further information about the cause of this error. The error that the
other server returned was: 501 501 Syntax error - Badly formatted
address. (state 14).
*******
Which is and was bull.
Only in Australia
--
Petzl
http://home.iprimus.com.au/petzl/Mono.htm
 
On 14-Feb-11 3:02 PM, terryc wrote:
Don McKenzie wrote:

FULL means FULL.

Your "backup service is definitely nota FULL backup system.

My service provider backs up my FULL server (http://server.the-wizard-from-oz.com/) every 4 hours, and saves 30 days
of these backups. The system is capable of providing hundreds of recovery points per day. I have access to restore a
backup, from any point at any time.

And I'm running a 2 bob shopping cart, not a life critical ambulance dispatch system.

So don't compare them.
Think network.
You didn't read my PC backup procedure also Terry?

If it is a network, then every item on the network must be restored to a working condition. Bit by bit. Piece by piece.
Section isolate, then get it all on line.

Think Network?
I worked on (arguably) the world's first networked systems:
http://www.dontronics.com/first_multi_user_real_time.html

I just found out a bit more info on the system used:

TRAINEE CONTROL CENTRE OFFICER (NSW Ambulance dispatch service)
http://x2t.com/TRAINEE

1. Six weeks of classroom training in various systems such as VisiCAD,

Selection Criteria:
* Computer literacy with demonstrated experience in the use of windows based computer applications and the ability to
transfer voice activated information into computerised data entry system.

It looks very much like it is a windows based system.

Cheers Don...

=======================


--
Don McKenzie

Site Map: http://www.dontronics.com/sitemap
E-Mail Contact Page: http://www.dontronics.com/email
Web Camera Page: http://www.dontronics.com/webcam
No More Damn Spam: http://www.dontronics.com/spam

These products will reduce in price by 5% every month:
http://www.dontronics-shop.com/minus-5-every-month.html
http://www.dontronics-shop.com/ics.html

Bare Proto PCB for PIC or AVR projects?
"I'd buy that for a Dollar!".
 
On Feb 14, 1:24 pm, "Rod Speed" <rod.speed....@gmail.com> wrote:
kreed wrote

Don McKenzie <5...@2.5A> wrote
Computer virus shuts down Ambulance dispatch service
The Ambulance Service of NSW computer dispatch system
became infected by a virus at about 1pm (AEDT) on Saturday,
forcing staff to shut it down and revert to co-ordinating the state's
paramedics and ambulances via a manual paper-based system.
The cause and source of the virus were unknown and the system
was still offline at 1pm (AEDT) on Sunday and it was not
known when it would be back up and running, Willis said.
http://www.arnnet.com.au/article/376471/computer_virus_shuts_down_amb....
HUH?
Could they possibly be running a windows Operating System, without
full back up and recovery, for an ambulance dispatch  system?
Which will be another reason to push for internet censorship.

Nope, no one will buy that line now.

To "protect" vital infrastructure.

No reason for it to be net connected even if it does use the google maps database.
And the Carbon Tax ? will that get anywhere ?
 
kreed wrote
Rod Speed <rod.speed....@gmail.com> wrote
kreed wrote
Don McKenzie <5...@2.5A> wrote

Computer virus shuts down Ambulance dispatch service
The Ambulance Service of NSW computer dispatch system
became infected by a virus at about 1pm (AEDT) on Saturday,
forcing staff to shut it down and revert to co-ordinating the
state's paramedics and ambulances via a manual paper-based system.
The cause and source of the virus were unknown and the system
was still offline at 1pm (AEDT) on Sunday and it was not
known when it would be back up and running, Willis said.
http://www.arnnet.com.au/article/376471/computer_virus_shuts_down_amb...
HUH?
Could they possibly be running a windows Operating System, without
full back up and recovery, for an ambulance dispatch system?

Which will be another reason to push for internet censorship.

Nope, no one will buy that line now.

To "protect" vital infrastructure.

No reason for it to be net connected even if it does use the google maps database.

And the Carbon Tax ? will that get anywhere ?
Probably, because most of the 'independant' fools and the greens want it.
 
Petzl wrote:

Not just Ambulance service that are "over securtitising" a Network to
the point where it stil gets trojans or viruses. But is not productive
for it's intended use.
Just a while ago I went to send a email to my syate MP and get a
bounce

*******
Delivery to the following recipient failed permanently:
Technical details of permanent failure:
Google tried to deliver your message, but it was rejected by the
recipient domain. We recommend contacting the other email provider for
further information about the cause of this error. The error that the
other server returned was: 501 501 Syntax error - Badly formatted
address. (state 14).
*******

Which is and was bull.
Only in Australia
Ahh, run by shmucks obviously...

I had a problem with a client some time back, he couldn't download the
connection software for our gear, from our web site. His end objected
to the .exe installation file.

So I emailed the exe on its own. Still blocked.
So I renamed it, and tried again. Found it interrogates files, and
still blocks it.
So I zipped it, and tried yet again. Nope, it opens zips and checks
inside too.

I still had a password protected zip to try, but thought better of it.
I burnt a CD and sent it via snail mail. A three hundred year old
technology by-passed their modern day data security.
Though, truth be said, I can't really blame the admin for that, it was
probably a four-brain-celled-upper management directive. To this day I
still wonder how they manage to undo their zipper before pissing. Or
that they managed to get their pants on in the first place...
--
Never count your chickens before they rip your lips off
 
On 15/02/2011 3:05 AM, John Tserkezis wrote:
Petzl wrote:

Not just Ambulance service that are "over securtitising" a Network to
the point where it stil gets trojans or viruses. But is not productive
for it's intended use.
Just a while ago I went to send a email to my syate MP and get a
bounce

*******
Delivery to the following recipient failed permanently:
Technical details of permanent failure:
Google tried to deliver your message, but it was rejected by the
recipient domain. We recommend contacting the other email provider for
further information about the cause of this error. The error that the
other server returned was: 501 501 Syntax error - Badly formatted
address. (state 14).
*******

Which is and was bull.
Only in Australia

Ahh, run by shmucks obviously...

I had a problem with a client some time back, he couldn't download the
connection software for our gear, from our web site. His end objected
to the .exe installation file.

So I emailed the exe on its own. Still blocked.
So I renamed it, and tried again. Found it interrogates files, and
still blocks it.
So I zipped it, and tried yet again. Nope, it opens zips and checks
inside too.

I still had a password protected zip to try, but thought better of it.
I burnt a CD and sent it via snail mail. A three hundred year old
technology by-passed their modern day data security.
Though, truth be said, I can't really blame the admin for that, it was
probably a four-brain-celled-upper management directive. To this day I
still wonder how they manage to undo their zipper before pissing. Or
that they managed to get their pants on in the first place...
My employer's e-mail system rejects anything vaguely executable, you
just add another extension to make it something like fred.exe.zzz and
get the recipient to strip the extra extension before use.
 
On Tue, 15 Feb 2011 20:29:05 +1100, keithr <keith@nowhere.com.au>
wrote:

On 15/02/2011 3:05 AM, John Tserkezis wrote:
Petzl wrote:

I still had a password protected zip to try, but thought better of it.
I burnt a CD and sent it via snail mail. A three hundred year old
technology by-passed their modern day data security.
Though, truth be said, I can't really blame the admin for that, it was
probably a four-brain-celled-upper management directive. To this day I
still wonder how they manage to undo their zipper before pissing. Or
that they managed to get their pants on in the first place...

My employer's e-mail system rejects anything vaguely executable, you
just add another extension to make it something like fred.exe.zzz and
get the recipient to strip the extra extension before use.
Looks to me like this was a "closed" network not connected to internet
The IT do not seem to of not updared "virus" definitions
The infection most likley by USB or CD

I just use Security Essentials which you have already paid for from
Microsoft. So far always picked up and trojan/virus as it was being
download, Malware sites incucled
--
Petzl
http://home.iprimus.com.au/petzl/Mono.htm
 
Pretzl wrote
keithr <keith@nowhere.com.au> wrote
John Tserkezis wrote
Pretzl wrote

I still had a password protected zip to try, but thought better
of it. I burnt a CD and sent it via snail mail. A three hundred
year old technology by-passed their modern day data security.

Though, truth be said, I can't really blame the admin for that,
it was probably a four-brain-celled-upper management directive.
To this day I still wonder how they manage to undo their zipper before
pissing. Or that they managed to get their pants on in the first place...

My employer's e-mail system rejects anything vaguely executable,
you just add another extension to make it something like fred.exe.zzz
and get the recipient to strip the extra extension before use.
Stupid implementation. Its completely trivial to reject stuff done like that too.

Looks to me like this was a "closed" network not connected to internet
Guess again.

The IT do not seem to of not updared "virus" definitions
Or they just arent interested in anything executable entering their system.

The infection most likley by USB or CD
Guessing, as always.

I just use Security Essentials which you have already paid
for from Microsoft. So far always picked up and trojan/virus
as it was being download, Malware sites incucled
You'll never know what it missed.
 
Petzl wrote:
On Tue, 15 Feb 2011 20:29:05 +1100, keithr<keith@nowhere.com.au
wrote:

On 15/02/2011 3:05 AM, John Tserkezis wrote:
Petzl wrote:

I still had a password protected zip to try, but thought better of it.
I burnt a CD and sent it via snail mail. A three hundred year old
technology by-passed their modern day data security.
Though, truth be said, I can't really blame the admin for that, it was
probably a four-brain-celled-upper management directive. To this day I
still wonder how they manage to undo their zipper before pissing. Or
that they managed to get their pants on in the first place...

My employer's e-mail system rejects anything vaguely executable, you
just add another extension to make it something like fred.exe.zzz and
get the recipient to strip the extra extension before use.

Looks to me like this was a "closed" network not connected to internet

The IT do not seem to of not updared "virus" definitions
??


The infection most likley by USB or CD

I just use Security Essentials which you have already paid for from
Microsoft. So far always picked up and trojan/virus as it was being
download, Malware sites incucled
--
Petzl
http://home.iprimus.com.au/petzl/Mono.htm
 
On 16/02/2011 9:12 AM, Rod Speed wrote:
Pretzl wrote
keithr<keith@nowhere.com.au> wrote
John Tserkezis wrote
Pretzl wrote

I still had a password protected zip to try, but thought better
of it. I burnt a CD and sent it via snail mail. A three hundred
year old technology by-passed their modern day data security.

Though, truth be said, I can't really blame the admin for that,
it was probably a four-brain-celled-upper management directive.
To this day I still wonder how they manage to undo their zipper before
pissing. Or that they managed to get their pants on in the first place...

My employer's e-mail system rejects anything vaguely executable,
you just add another extension to make it something like fred.exe.zzz
and get the recipient to strip the extra extension before use.

Stupid implementation. Its completely trivial to reject stuff done like that too.
There is always a way around it as long as any file attachment is
allowed, they are just trying to prevent attachments from auto-executing.
 
keithr wrote
Rod Speed wrote
Pretzl wrote
keithr<keith@nowhere.com.au> wrote
John Tserkezis wrote
Pretzl wrote

I still had a password protected zip to try, but thought better
of it. I burnt a CD and sent it via snail mail. A three hundred
year old technology by-passed their modern day data security.

Though, truth be said, I can't really blame the admin for that,
it was probably a four-brain-celled-upper management directive.
To this day I still wonder how they manage to undo their zipper
before pissing. Or that they managed to get their pants on in
the first place...

My employer's e-mail system rejects anything vaguely executable,
you just add another extension to make it something like fred.exe.zzz and get the recipient to strip the extra
extension before use.

Stupid implementation. Its completely trivial to reject stuff done like that too.

There is always a way around it
Nope, not if its binned if there is any possibility that the attachment is executable.

as long as any file attachment is allowed,
Utterly mangled all over again.

they are just trying to prevent attachments from auto-executing.
Irrelevant to what is being discussed.
 
keithr wrote:

My employer's e-mail system rejects anything vaguely executable, you
just add another extension to make it something like fred.exe.zzz and
get the recipient to strip the extra extension before use.
Like I said, theirs was much more restrictive, in that it looked within
the binary and worked out what the file was.

This is just way over the top, and can be managed via other means.

Back a billion years ago, the company I worked for had a minor issue of
a virus appearing on our distributed media. Thankfully, the source
wasn't our department, nor the "official" disk duplicator / machine
builder guy. Turns out, while he was on break, some other guys in
another department thought it was an easy job and thoughtfully took over.

As a result of that, an instant company-wide policy of "if you bring
media into our premises, you're out the door" was brought in. (clearly
before the unions made it impossible to fire idiots).

At that time, I agreed with that stance, and appreciate it was the
right course of action.

But that was when software was being sourced via official means and we
had no *real* need to bring our own "unofficially sourced" stuff in.
Or, where required, we had the option of writing tools ourselves anyway
- which we did on occasion.

Today however, EVERYONE uses software in some form or another. We have
established procedures to look out for obvious clues to infection, and
have other procedures for handling the disinfection.
Preventing infection is also accounted for, while we block web access
to verified dodgy sites, users are otherwise free to download the latest
software of what they use.

Today, an outright blockage of executables - with no (electronic)
options offered, is just silly. It servers only to stop you working.
--
Old MacDonald had a computer with an EIE I/O
 
John Tserkezis wrote
keithr wrote

My employer's e-mail system rejects anything vaguely executable,
you just add another extension to make it something like fred.exe.zzz
and get the recipient to strip the extra extension before use.

Like I said, theirs was much more restrictive, in that it
looked within the binary and worked out what the file was.
Their choice.

This is just way over the top,
Nope.

and can be managed via other means.
Why should they bother ?

Back a billion years ago, the company I worked for had a minor issue
of a virus appearing on our distributed media. Thankfully, the source
wasn't our department, nor the "official" disk duplicator / machine
builder guy. Turns out, while he was on break, some other guys in
another department thought it was an easy job and thoughtfully took over.

As a result of that, an instant company-wide policy of "if you bring
media into our premises, you're out the door" was brought in.
(clearly before the unions made it impossible to fire idiots).
Thats never the case.

At that time, I agreed with that stance, and appreciate it was the right course of action.

But that was when software was being sourced via official means and
we had no *real* need to bring our own "unofficially sourced" stuff in.
Or, where required, we had the option of writing tools ourselves
anyway - which we did on occasion.

Today however, EVERYONE uses software in some form or another.
Some dont.

We have established procedures to look out for obvious clues to
infection, and have other procedures for handling the disinfection.
Preventing infection is also accounted for, while we block web
access to verified dodgy sites, users are otherwise free to
download the latest software of what they use.

Today, an outright blockage of executables - with no (electronic)
options offered, is just silly. It servers only to stop you working.
Mindlessly silly.
 
On 16/02/2011 5:55 PM, John Tserkezis wrote:
keithr wrote:

My employer's e-mail system rejects anything vaguely executable, you
just add another extension to make it something like fred.exe.zzz and
get the recipient to strip the extra extension before use.

Like I said, theirs was much more restrictive, in that it looked within
the binary and worked out what the file was.
That must do interesting things to e-mail throughput. I'll keep that one
away from out IT dept although there would be a a revolution in the
engineering department if they tried it.

This is just way over the top, and can be managed via other means.

Back a billion years ago, the company I worked for had a minor issue of
a virus appearing on our distributed media. Thankfully, the source
wasn't our department, nor the "official" disk duplicator / machine
builder guy. Turns out, while he was on break, some other guys in
another department thought it was an easy job and thoughtfully took over.

As a result of that, an instant company-wide policy of "if you bring
media into our premises, you're out the door" was brought in. (clearly
before the unions made it impossible to fire idiots).

At that time, I agreed with that stance, and appreciate it was the
right course of action.

But that was when software was being sourced via official means and we
had no *real* need to bring our own "unofficially sourced" stuff in.
Or, where required, we had the option of writing tools ourselves anyway
- which we did on occasion.
In some areas of our company, especially in the remote support centres,
the machines are "Locked down". The users cannot alter the installed
software at all. All the laptops have SafeBoot installed, you can't boot
in safe mode without a special USB key plugged in.

Today however, EVERYONE uses software in some form or another. We have
established procedures to look out for obvious clues to infection, and
have other procedures for handling the disinfection.
Preventing infection is also accounted for, while we block web access
to verified dodgy sites, users are otherwise free to download the latest
software of what they use.

Today, an outright blockage of executables - with no (electronic)
options offered, is just silly. It servers only to stop you working.
 
"Rod Speed" <rod.speed.aaa@gmail.com> wrote in message
news:8s1h58FqjdU1@mid.individual.net...
John Tserkezis wrote
keithr wrote

My employer's e-mail system rejects anything vaguely executable,
you just add another extension to make it something like fred.exe.zzz
and get the recipient to strip the extra extension before use.

Like I said, theirs was much more restrictive, in that it
looked within the binary and worked out what the file was.

Their choice.

This is just way over the top,

Nope.

and can be managed via other means.

Why should they bother ?

Back a billion years ago, the company I worked for had a minor issue
of a virus appearing on our distributed media. Thankfully, the source
wasn't our department, nor the "official" disk duplicator / machine
builder guy. Turns out, while he was on break, some other guys in
another department thought it was an easy job and thoughtfully took over.

As a result of that, an instant company-wide policy of "if you bring
media into our premises, you're out the door" was brought in.
(clearly before the unions made it impossible to fire idiots).

Thats never the case.
Did a large telco sack you Roddles????

At that time, I agreed with that stance, and appreciate it was the right
course of action.

But that was when software was being sourced via official means and
we had no *real* need to bring our own "unofficially sourced" stuff in.
Or, where required, we had the option of writing tools ourselves
anyway - which we did on occasion.

Today however, EVERYONE uses software in some form or another.

Some dont.

We have established procedures to look out for obvious clues to
infection, and have other procedures for handling the disinfection.
Preventing infection is also accounted for, while we block web
access to verified dodgy sites, users are otherwise free to
download the latest software of what they use.

Today, an outright blockage of executables - with no (electronic)
options offered, is just silly. It servers only to stop you working.

Mindlessly silly.
 
SG1 wrote
Rod Speed <rod.speed.aaa@gmail.com> wrote
John Tserkezis wrote
keithr wrote

My employer's e-mail system rejects anything vaguely executable,
you just add another extension to make it something like
fred.exe.zzz and get the recipient to strip the extra extension
before use.

Like I said, theirs was much more restrictive, in that it
looked within the binary and worked out what the file was.

Their choice.

This is just way over the top,

Nope.

and can be managed via other means.

Why should they bother ?

Back a billion years ago, the company I worked for had a minor issue
of a virus appearing on our distributed media. Thankfully, the
source wasn't our department, nor the "official" disk duplicator /
machine builder guy. Turns out, while he was on break, some other
guys in another department thought it was an easy job and
thoughtfully took over.

As a result of that, an instant company-wide policy of "if you bring
media into our premises, you're out the door" was brought in.
(clearly before the unions made it impossible to fire idiots).

Thats never the case.

Did a large telco sack you Roddles????
Not possible given that I have never been employed by one.

At that time, I agreed with that stance, and appreciate it was the
right course of action.

But that was when software was being sourced via official means and
we had no *real* need to bring our own "unofficially sourced" stuff
in. Or, where required, we had the option of writing tools ourselves
anyway - which we did on occasion.

Today however, EVERYONE uses software in some form or another.

Some dont.

We have established procedures to look out for obvious clues to
infection, and have other procedures for handling the disinfection.
Preventing infection is also accounted for, while we block web
access to verified dodgy sites, users are otherwise free to
download the latest software of what they use.

Today, an outright blockage of executables - with no (electronic)
options offered, is just silly. It servers only to stop you working.

Mindlessly silly.
 

Welcome to EDABoard.com

Sponsor

Back
Top