* Resources to help guard against security attacks Servers around the globe were crippled last week by an insidious worm called “Slammer,” which attacks Microsoft’s SQL Server. Worms normally bring out empathy from network executives, but this time, there was none to be had.My colleagues Jason Meserve and Denise Dubie scoured the show floor at ComNet in Washington, D.C., last week to get reaction from the network set. What they found was a critical group that blamed their peers for not installing a patch that would have prevented the worm from infecting their servers.“It’s on the user’s side. If Microsoft didn’t do anything, I’d put the blame on them, but this one is the users’ fault,” said Rich Johnson, network specialist with the Food and Drug Administration.Johnson wasn’t alone in his harsh words. On the television newscasts and radio programs, experts were quick to point out that network managers need to keep up with the patches. Some would argue that there shouldn’t be so many patches and that trying to keep tabs on them and download them to all the machines in the network is difficult.Microsoft has published a page on the Slammer worm at https://www.microsoft.com/security/slammer.asp that gives details of how to block its effect on SQL Server. Staying up to date on patches for all the programs you service is daunting, but most companies have e-mail lists for products that alert you when a service pack or update is available. Microsoft’s e-mail sign-up page is at https://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/notify.aspAlso, when it comes to security breaches, it’s good to get to know the CERT site. CERT quickly issues advisories on fast-spreading worms and other vulnerabilities (view its advisory on the Slammer worm at https://www.cert.org/advisories/CA-2003-04.html). You can bookmark the advisory home page at https://www.cert.org/advisories/“Network World” also has a Security and Bug Patch Alert newsletter, which is a compilation of reports and their fixes. You can sign up for the newsletter and track the archives at https://www.nwfusion.com/newsletters/bug/index.htmlFinally, you should keep up with the antivirus software company Web sites (such as http://www.Symantec.com and http://www.McAfee.com). Both post alerts and suggestions to fix the issues they’ve found. Symantec’s Slammer page can be found at https://securityresponse.symantec.com/avcenter/venc/data/w32.sqlexp.worm.htmlMcAfee has its own Slammer area at https://vil.mcafee.com/dispVirus.asp?virus_k=99992 The sites also tell you the level of risk the vulnerabilities pose to your network.Do you have any sites you turn to for security information? Let me know at sgittlen@nww.com Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe