Guest
On Sunday, May 19, 2019 at 10:22:46 AM UTC-4, Sylvia Else wrote:
Has anyone verified that if it's disabled, then the vulnerability does not
exist? It's possible that the route for the hack uses some part of the OS
that remote administration uses, but that turning it off still leaves
that path open.
On 16/05/2019 2:04 pm, bitrex wrote:
https://www.wired.com/story/microsoft-windows-xp-patch-very-bad-sign/?utm_source=facebook&utm_medium=social&utm_campaign=wired&utm_brand=wired&utm_social-type=owned&mbid=social_fb&fbclid=IwAR32t0CMFVPvsWeUtE8j-KHTf7JAQir5Z3INDu9inRktnfWOGl-NnleyB6s
Malware exploiting the vulnerability will be hitting the 'net in the
next 48 hours
Or disable remote administration.
Why is that enabled by default anyway?
Sylvia.
Has anyone verified that if it's disabled, then the vulnerability does not
exist? It's possible that the route for the hack uses some part of the OS
that remote administration uses, but that turning it off still leaves
that path open.