波音游戏-波音娱乐城赌球打不开

Operation Fighting Nimda

by Noel Laam

Early in the morning of 20 September 2001 when I came into the office and switched on the PC as usual, the screen was appearing funny and small windows kept popping up as if they were saying hello to me. While I was wide at sea about what had happened, a neighbouring colleague came to my rescue and told me that we were likely to be attacked by a virus/worm.

And the Operation Fighting Nimda formally began.

An interim command was set up at once, and the whole of the Computing Services Centre (CSC) was on the alert and prepared to fight the malicious worm. All departments were informed of the news and to shut down the machines right away to stop the infection from spreading. At 10 am when the necessary information of Nimda and the essential patches were collected, the technical staff of the CSC and the Enterprise Solutions Unit (ESU) were immediately gathered, briefed and sent to all departments that had reported to have infected with Nimda to carry out the rescue - to check the machines, to clean up the worms if the machines were infected, to apply patches to all machines, and to boot up the systems again when all machines in a department were all fixed.

Minimal staff were left in the office for liaison, and most were running in and out of the office cross-checking for the latest information and reporting on the progress. It was just like in the battlefield. After one whole day of hectic work, except for those departments who opted to take care of their own machines, most machines in a number of departments were rescued by the following day, and were able to perform their duties as normal.

After this worm attack, I was thinking, what did we learn from it?

This incident certainly reminded us of the urgency to raise users' awareness on security protection so as to better protect our campus network. At the moment, some departments look after their own servers, and CSC's recommended measures, security patches, and virus updates may not be adopted or implemented in time. As a result, these servers were invaded and being used to mount other attacks. We need to better organise the University strength in intrusion detection and virus protection, and to have better control and management of the network services. The CSC is now working out ways to tighten the network security in various areas, and though this may cause some inconveniences to users, it is necessary and vital if we want to safeguard the users' interest and protect the University from avoidable virus/worm and hacker attacks.

We in the CSC will definitely continue to work hard to strengthen our sophisticated network to fight against virus/worm attack. How about you? Will you lend us a hand?

欢乐谷娱乐城信誉| 金海岸百家乐娱乐城| 澳门百家乐官网官网站| 澳门百家乐娱乐城网址| 线上真人游戏| 百家乐技巧发布| 边坝县| 百家乐娱乐城介绍| 最好的棋牌游戏平台| 百家乐官网赌场大赢家| 大发888娱乐城取款| 沙龙百家乐官网娱乐平台| 大发888 打法888游戏| 百家乐官网任你博娱乐| 大发888娱乐游戏可以玩吗| 鑫鑫百家乐官网的玩法技巧和规则| 皇冠正网开户| 百家乐赌博走势图| 366百家乐官网娱乐城| 迪威百家乐娱乐平台| 百家乐官网最新庄闲投注法| 现金网注册送彩金| 精通百家乐官网的玩法技巧和规则 | 新时代百家乐的玩法技巧和规则 | 百家乐游戏什么时间容易出对| 百家乐官网在线娱乐平台| 一二博网| 百家乐官网网上最好网站| 中华百家乐娱乐城| 网络百家乐官网赌博赢钱| 大发888备用网| 百家乐视频游戏中心| 百家乐官网桌码合| 古田县| 云鼎娱乐城优惠| 威尼斯人娱乐城投注网| 百家乐透视牌靴| 太子百家乐官网娱乐城| 真人百家乐官网输钱惨了| 大发888娱乐真钱游戏 官方| 韩国百家乐的玩法技巧和规则 |