波音游戏-波音娱乐城赌球打不开

Operation Fighting Nimda

by Noel Laam

Early in the morning of 20 September 2001 when I came into the office and switched on the PC as usual, the screen was appearing funny and small windows kept popping up as if they were saying hello to me. While I was wide at sea about what had happened, a neighbouring colleague came to my rescue and told me that we were likely to be attacked by a virus/worm.

And the Operation Fighting Nimda formally began.

An interim command was set up at once, and the whole of the Computing Services Centre (CSC) was on the alert and prepared to fight the malicious worm. All departments were informed of the news and to shut down the machines right away to stop the infection from spreading. At 10 am when the necessary information of Nimda and the essential patches were collected, the technical staff of the CSC and the Enterprise Solutions Unit (ESU) were immediately gathered, briefed and sent to all departments that had reported to have infected with Nimda to carry out the rescue - to check the machines, to clean up the worms if the machines were infected, to apply patches to all machines, and to boot up the systems again when all machines in a department were all fixed.

Minimal staff were left in the office for liaison, and most were running in and out of the office cross-checking for the latest information and reporting on the progress. It was just like in the battlefield. After one whole day of hectic work, except for those departments who opted to take care of their own machines, most machines in a number of departments were rescued by the following day, and were able to perform their duties as normal.

After this worm attack, I was thinking, what did we learn from it?

This incident certainly reminded us of the urgency to raise users' awareness on security protection so as to better protect our campus network. At the moment, some departments look after their own servers, and CSC's recommended measures, security patches, and virus updates may not be adopted or implemented in time. As a result, these servers were invaded and being used to mount other attacks. We need to better organise the University strength in intrusion detection and virus protection, and to have better control and management of the network services. The CSC is now working out ways to tighten the network security in various areas, and though this may cause some inconveniences to users, it is necessary and vital if we want to safeguard the users' interest and protect the University from avoidable virus/worm and hacker attacks.

We in the CSC will definitely continue to work hard to strengthen our sophisticated network to fight against virus/worm attack. How about you? Will you lend us a hand?

六合彩码报| 大庆冠通棋牌下载| 百家乐手机壳| 新葡京| 百家乐15人桌子| 百家乐官网技术下载| 百家乐官网威尼斯人| 百家乐澳门路规则算法| 百家乐官网真钱电玩| 百家乐如何盈利| 百家乐官网赌博导航| 实战百家乐官网的玩法技巧和规则 | 骰子百家乐官网的玩法技巧和规则| 永利高网址| 百家乐平注资讯| 百家乐棋牌交友| 云鼎百家乐作弊| 玩百家乐官网的玩法技巧和规则| 兴宁市| 大发888娱乐大发体育| 百家乐百胜注码法| 百家乐官网电子| A8百家乐官网娱乐场| 百家乐官网赢钱秘密| 永利百家乐赌场娱乐网规则 | 百家乐官网赌场技巧论坛| 雅安市| 亚洲百家乐的玩法技巧和规则| 百家乐15人桌子| 百家乐官网旺门打法| 真人百家乐官网什么平台| 百家乐官网体育博彩| bet365 金融| 大发888备用网站| 飞天百家乐的玩法技巧和规则 | 哪个百家乐网站信誉好| 澳门百家乐官网小| 网上百家乐官网娱乐网| 阿尔山市| 百家乐官网网址多少| 安达市|