| 1:50 pm on Jul 1, 2010 (gmt 0)|
No fix yet? Microsoft better get their act together then!
| 2:33 pm on Jul 1, 2010 (gmt 0)|
I have a dual-boot system (Linux and XP). I have my networking disabled in XP. I literally only boot XP if I have to for my Quickbooks software (a few times a year).
I know I may sound crazy, but I'm afraid to be logged on to the internet while in XP. I've had too many issues in the past.
| 4:08 pm on Jul 1, 2010 (gmt 0)|
You have to admire Microsoft - they even make the workaround vastly more complicated than necessary!
Simply rename the registry key HKEY_CLASSES_ROOT\HCP to something like HKEY_CLASSES_ROOT\HCP_
When the fix is released and installed, restore the key name.
| 5:44 pm on Jul 1, 2010 (gmt 0)|
|In addition to the mitigations listed in the advisory, customers using Microsoft Security Essentials, Microsoft Forefront Client Security, Windows Live OneCare, the Forefront Threat Management Gateway, and the Windows Live Safety Platform have had coverage for this exploit since June 10th through the following two antimalware signatures: |
Signature builds 1.83.1561 and later contain both signatures.
Payloads are detected by the signatures mentioned above.
| 7:21 pm on Jul 1, 2010 (gmt 0)|
Microsoft Security Essentials
that is what I use and i find it better then any 3rd party solution.
| 7:00 pm on Jul 2, 2010 (gmt 0)|
Kaled, thanks for that tip, which makes perfect sense as a temporary 'fix'.