Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows

How To Avoid Viruses At Windows Install Time? 833

reallocate writes "Can a home user install and update Windows without being attacked by a virus or worm? I'm a Linux user; have been since 1995. Recently, I needed to install Windows XP Pro on a home desktop machine with a Roadrunner cable connection. I tried twice. Both times, the machine was attacked and rendered unusable before I was able to pull down the first update from Windows Update." Read on for more details of what went wrong and when.

Here's a synopsis of my install method:

  1. Put the Windows XP CD in the drive;
  2. Disconnect the cable modem from the network card;
  3. Reboot and install Windows;
  4. The box remains off the net during the entire install: no registering, no setting up an ISP, no activation, no network configuration, no nothing. (BTW, the only networking component that I install is tcp/ip. All the other MS stuff never gets on the machine.)
  5. Reboot; Windows runs and all is well;
  6. Install the current version of Norton Internet Security Professional from a shrinkwrapped CD (firewall, anti-virus, etc.);
  7. Configure the Roadrunner net connection and reboot to pick up a DHCP lease;
  8. Launch the Norton update facility (per Norton's recommendation, the built-in XP firewall is turned off);
  9. Complete the Norton update and reboot;
  10. Launch Windows Update;
  11. Start to pull down Service Pack One; per Microsoft's instructions, all firewalls are turned off.

That's as far I got. During the first attempt, I acquired a virus or worm before I could finish the Norton update (machine powered down). On the second attempt, I got as far as Windows Update and SP1(continual rebooting).

So...how would you do it?"

This discussion has been archived. No new comments can be posted.

How To Avoid Viruses At Windows Install Time?

Comments Filter:
  • by foidulus ( 743482 ) * on Sunday June 20, 2004 @08:33PM (#9480185)
    You can get a cd from microsoft(more info here [microsoft.com] that would have a lot of the updates you are looking for. You could also download it from your linux machine, and then do the whole installation offline.
    • by XaviorPenguin ( 789745 ) on Sunday June 20, 2004 @08:42PM (#9480282) Homepage Journal
      There is another way. If you go to Autopatcher.com [autopatcher.com], you can download all of Service Pack 1 and pre-Service Pack 2 updates with all critical and recommended updates. It is a hefty download (300MB +) but it is worth it. It comes with:
      -Direct X 9.0b + Updates
      -XP Powertoys
      -SP1 Critical and Recommended Updates
      -Pre SP2 Critical and Recommended Updates
      - + More

      I use it and it is updated every month. Get it while you can!
      • by Condor7 ( 541565 ) <Condor7@NOsPAM.operamail.com> on Sunday June 20, 2004 @10:38PM (#9480975)


        Autopatcher.com [autopatcher.com] also has a Lite version and an UltraLite version.

        The UltraLite version contains only Critical and Recommended updates, along with IE and Outlook patches, and weighs in at 89MB.

      • 300mb+? At what point does it stop being just updates and gives out the entire damn OS?
        • by jonfelder ( 669529 ) on Monday June 21, 2004 @12:45AM (#9481655)
          That's not too different from the amount of patches you have to download after a fresh install of linux. Hell, when I loaded Suse 9.1, there were at least 100mb of updates already. If I installed a distro that was as old as XP I could very well see 300mb of updates.

          • Slightly exaggerating. Most of that space is all the updates to non-linux (the "GNU/" part of "GNU/Linux") that's part of SUSE.

            Linux's updates shouldn't be more than a few megs, considering there are floppy-based distros where the whole distro fits in a meg or two.

            Of course if by "Linux" you're counting Wine & MSFT-office-warez & more, you'd have more security updates than a core Linux distro.

            • by jonfelder ( 669529 ) on Monday June 21, 2004 @01:46AM (#9481907)
              You're being awfully pedantic there. Yes, technically the updates to Linux (i.e. the kernel) are small. However, I'm sure if you just patch kernel32.exe or whatever the binaries for the kernel under windows are, the updates would be small too.

              A system consisting of just the kernel and a few command line tools would be awfully boring and not a particularly fair comparison.

              By "Linux" I'm referring to the kernel itself, along with X and the base applications that come along with gnome or KDE. Installing a distro with the base set of libraries, GUI, window manager, apps, etc that give a reasonable approximation of what you get with windows (no gimp, no koffice, etc) will require a considerable amount of downloading of patches if it's as old as XP.
    • by phorm ( 591458 ) on Sunday June 20, 2004 @08:42PM (#9480284) Journal
      You could also download it from your linux machine, and then do the whole installation offline

      Or better yet, use a morphix [morphix.org] bootCD. You should be able to download the patches to Welchia et al directly (not using windows update), then reboot w/o the network cable in, patch, reboot, and you should be able to get the other less critical updates without being infected by RPC viruses.
    • by LoneIguana ( 681297 ) on Sunday June 20, 2004 @08:43PM (#9480294)
      You can access the windows update catalog here: http://v4.windowsupdate.microsoft.com/catalog/en/d efault.asp There you can get secruity updates for all versions of windows. You actually download them to your computer rather then installing them. You could download them on another computer burn them to a CD, then install before connecting to the internet. The only problem is you need a computer with IE. Maybe get a friend to burn it for you?
      • by zoloto ( 586738 ) on Sunday June 20, 2004 @08:56PM (#9480395)
        DUDE THIS ROCKS!
        Actually, what you can do is use Wine or WinEX and install Internet Explorer 5.5 from an old 5.5 installation CD on Linux,... download then burn to CD and you'll be great. I did that just now and i have to say thank you for the link.

        It seems that any useful links, MS hides behind a rediculous naming scheme for some odd reason.

        Thank you again, if I had MOD points, I'd certianly give them to you.
        • Actually, that's just the site that http://windowsupdate.microsoft.com/ automatically redirects you to... I know that "rediculous" naming scheme may seem unfathomable to you, but I think at least a few people in the /. crowd are capable of handling it.
      • by BollocksToThis ( 595411 ) on Sunday June 20, 2004 @09:33PM (#9480585) Journal
        The only problem is you need a computer with IE.

        If you go to the Microsoft download center [microsoft.com], you can download every patch with (almost?) any browser. I downloaded service pack 1 and every patch after that using nothing but Opera.

        It was less convenient than using WindowsUpdate/IE, but it would still have worked on a linux machine. The best part is, when friends give me their computers to reinstall XP, I don't need to spend four hours downloading patches from scratch.
        • by BroncoInCalifornia ( 605476 ) on Monday June 21, 2004 @01:30AM (#9481857)
          Here are some ideas:

          1) Hide behind a NAT router - Install windows disconnected from networks. Find someone with DSL and a NAT router. Intall all the patches from the safety of their home network.

          2) Before installing windows, format the disk to have a FAT partition. Boot Knoppix Linux from a CD. get on the internet and download the patches to the FAT partion. Boot Windows - install patches.

    • but if you can't.... (Score:5, Informative)

      by Mydron ( 456525 ) on Sunday June 20, 2004 @08:45PM (#9480308)
      There are a few guides out there explaining what to do. Most of them involve shutting off windows services (such as file sharing and the windows network client) and using the firewall included with Windows XP before connecting to the internet.

      Here is a fairly comprehensive guide, aptly named: Windows XP: Surviving the First Day [sans.org]

      • by dknj ( 441802 ) on Sunday June 20, 2004 @11:12PM (#9481182) Journal
        This is a pretty poor Ask Slashdot article, IMHO. Here is how I do it within an hour and have nothing to worry about:

        1. Unplug network cable
        2. Install Windows XP
        3. Upon first boot turn on the Windows Firewall and reconnect network cable
        4. http://www.windowsupdate.com [windowsupdate.com]
        5. Wait for patches to download, then remove network cable and reboot after patches have installed
        6. Return to http://www.windowsupdate.com [windowsupdate.com] and download the remaining patches
        7. Reboot (no need to unplug network cable this time) and install a Virus Scanner/Firewall Suite.

        This takes an hour and isn't rocket science.

        -dk
        • Problem is, the Windows Firewall is almost completely useless, and the average computer is probably hit by an attack every 20 minutes, which is far less time than it takes to download all of the patches, especially since the first reboot will only cover SP1, which only eliminates about 5% of the active exploits. The original (I'm told the SP2 version is better) windows firewall does not protect people from any of the attack vectors I've seen coming through my network so far this year. It is a "stateful fi
          • by dknj ( 441802 ) on Monday June 21, 2004 @12:28AM (#9481575) Journal
            Except the firewall will block incoming connections. Don't go to other sites which will exploit old IE bugs and install spyware/viruses/etc, go straight to windows update after installing windows. That will patch up to SP1.. there is a known bug with the firewall that will leave the machine vulnerable for a few seconds (enough to get infected) during the boot before SP1 finishes (or it may be another patch that fixes it.. i don't remember), this is why you remove the network cable before you boot the second time. After you patch it completely, you can install your firewall suite and virus scanners (as i stated).

            I used to do this on a daily basis, before I switched to a fully automated ris build, and never had an infected machine.

            -dk
          • The ICF is no less useful than a linksys box running NAT. I frequently run portscans on machines running ICF, and the only ports that ever come up are the ones I've opened.
    • by TPS Report ( 632684 ) on Sunday June 20, 2004 @08:50PM (#9480349) Homepage
      You can (with just a few mouse clicks) automatically create an up-to-date ISO of Windows XP/2000/2003 with XPCreate [msfnhosting.com]. It's a really nice utility.
    • by Anonymous Coward on Monday June 21, 2004 @01:22AM (#9481832)
      1. Pull machine off net
      2. Install box
      3. Configure TCP/IP and enable windows firewall
      4. Plug in network cable
      5. Windows update
      6. Repeat windows update

      Job done.
      • by phasm42 ( 588479 ) on Monday June 21, 2004 @09:30AM (#9483467)
        Mod parent up. I don't understand why this guy simply didn't use the XP firewall and be done with it. It would've worked better, and he wouldn't have had to install Norton BS. Plus, in step 11 HE TURNS ALL FIREWALLS OFF. Of course he's getting infected. I don't think many people have pointed that out, but he got infected because he turned off the damn firewall like an idiot. Reading MS's line on the subject: here [microsoft.com], they say to turn off ANTIVIRUS, not firewall. So he probably turned off all of NISP, not just the AV portion.
  • SP1 From CD (Score:5, Informative)

    by The Snowman ( 116231 ) * on Sunday June 20, 2004 @08:33PM (#9480186)

    When I install Windows it is behind a NAT firewall which helps (no open ports from the outside). The first thing I do is install SP1 from CD, next I update from Windows Update.

    I recommend downloading SP1 and burning it in Linux, then using that CD to patch up the Windows box before connecting it to the network.

    • Re:SP1 From CD (Score:5, Insightful)

      by Malc ( 1751 ) on Sunday June 20, 2004 @10:27PM (#9480903)
      The article submitter could just as easily have written "Can a home user install and update Linux without being attacked". It doesn't matter which OS you install, if it's out of date then you're vulnerable. I think the article is almost flamebait!

      There are things the submitter could have done, like stopped all services that listen for connections. Ran Windows XP's firewall on their connection. Unbound Microsoft Networking Client from their NIC, etc. They could have booted up in safe mode with network support.

      But the solution you offered is probably the best. I recommend to everybody these days that they run behind a cheap NAT box. It doesn't matter which OS you use, keep your computer off the internet! A NAT box is the simplest and not particulary expensive solution, and it'll leave you much safer and require less effort on the vigilance (note: I didn't no vigilance ;)).

      We have incompetent IT guys at our place and Sasser is loose on the corporate LAN. We were trying to create a Win2K box but it kept rebooting. We just copied the patch for that over via CDRW, although the submitter could have downloaded everything they needed first from their Linux installation. In carpentry they always say "measure twice, cut once". This person didn't do enough preparation.
      • Re:SP1 From CD (Score:5, Insightful)

        by TrixX ( 187353 ) on Sunday June 20, 2004 @11:12PM (#9481184) Journal

        All the linux update tools I know (apt, red-carpet, urpmi) run perfectly with the firewall up and at maximum paranoia level. So I could install, set my firewall to reject all incoming connections, and update; that would leave me vulnerable only to very basic level exploits (like some hypothetical hole in ICMP).

        I've not used windows update, but the poster said it asked to lower the firewall, and I think that's a weak point.

    • Re:SP1 From CD (Score:4, Informative)

      by msobkow ( 48369 ) on Monday June 21, 2004 @01:06AM (#9481761) Homepage Journal

      I run behind a firewall as well. Last time I did a WinXP install (not that long, unfortunately), I had no problems.

      But I don't install or enable any services during an initial installation, just the core OS. I don't do anything but install manufacturer's drivers before installing an anti-virus product.

      After the anti-virus is fully updated, then I start dealing with Windows updates.

      At no point have I ever had to disable hardware or software firewalls to install Windows updates. I have no idea why they continue to insanely recommend you remove all your security just to download updates -- you don't need to.

      In fact, the only time I shut down the antivirus is during a disconnected defrag. And there is no way to disable the hardware firewall.

      If you're connecting directly to the net with a Windows box, you're just getting what you deserve. Either hide it behind a hardware firewall, or accept the fact that you're just another spambot-in-waiting.

  • Easy (Score:5, Informative)

    by daveschroeder ( 516195 ) * on Sunday June 20, 2004 @08:33PM (#9480188)
    Do the installation behind a personal NAT/firewall device.

    (Or, read all the posts about how you can put together some huge, convoluted update CD that's never completely up-to-date instead of just spending $35 on a little hardware firewall.)
    • Re:Easy (Score:5, Insightful)

      by Phosphor3k ( 542747 ) on Sunday June 20, 2004 @08:49PM (#9480338)
      OR turn on the windows XP firewall under the advanced tab on your network connection's properties before you plug the network cable in.
      • Re:Easy (Score:4, Informative)

        by Otter ( 3800 ) on Sunday June 20, 2004 @08:58PM (#9480413) Journal
        OR turn on the windows XP firewall under the advanced tab on your network connection's properties before you plug the network cable in.

        I've installed Windows once (98, several years ago) and even I know about turning the firewall on. Why?

        Because this is at least the fouth freaking article Slashdot has run on this question!!!

        (Remember the one that linked to an article about "Installing Windows Safely" and all the posts were "Instead of linking to a large PDF, why not tell people to just turn the firewall off?"?)

      • Re:Easy (Score:3, Informative)

        by pjt33 ( 739471 )
        If you RTFA, you'll see that
        per Microsoft's instructions, all firewalls are turned off.
        Microsoft need to fix one of the update process, the firewall, or the docs.
        • If you read the submitter's story you'll see that he can install Windows without connecting to the 'net. He unplugged his pipe, installed XP, rebooted. Why can't he turn the firewall on NOW before he plugs the box back into the 'net? Goodness.
      • Re:Easy (Score:4, Interesting)

        by caffeineboy ( 44704 ) <{ude.uso} {ta} {22.eromdiks}> on Sunday June 20, 2004 @10:29PM (#9480914)
        EXCEPT that the stupid XP firewall service is not started when the interface is started. You have your ass in the wind every time the machine boots.

        • Re:Easy (Score:3, Insightful)

          by kalidasa ( 577403 ) *
          Turn the machine on. Turn the firewall on. THEN plug in the ethernet cable. Or just use Windows catalog on another machine to download the service pack and all the security patches (there's a rollup for most of them), burn to Cd, and install them before plugging in the ethernet cable. Me, I just install behind a router with all the ports off. (Conveniently, my home Windows box is running through my Airport, and only my Mac is exposed to the outside world.)
    • Re:Easy (Score:5, Informative)

      by Josh_Borke ( 325390 ) on Sunday June 20, 2004 @08:50PM (#9480348)
      or install zonealarm. and don't turn off the firewall. I've never had to turn off my firewall when doing any windows update.

      I would update windows before updating the firewall, that way you don't have to worry so much about being shutdown while the firewall is down.

      my .02
    • Re:Easy (Score:3, Informative)

      by moosesocks ( 264553 )
      No need to put together a huge convoluted update CD.

      Some people have already done it [autopatcher.com]. Autopatcher contains every update available on Windows Update since SP1 and then some (it's advisable to download SP1 onto the CD as well, though most recent WinXP CDs have SP1 pre-installed).

      Basically, you put the CD in, click 'Update', and all the relevant patches are installed. No downloads. Only one reboot at the end. No virus risk. It's also excellent for my clients who are still on 56k :)
    • Re:Easy (Score:4, Funny)

      by bcrowell ( 177657 ) on Sunday June 20, 2004 @09:11PM (#9480482) Homepage
      Or, read all the posts about how you can put together some huge, convoluted update CD that's never completely up-to-date instead of just spending $35 on a little hardware firewall.
      Well, yeah, but c'mon, there are plenty of ways to do it without spending any extra money on hardware or software. Some possibilities:
      • Use Lindows as a substitute for Windows.
      • Wait for the next version of Windows. MS says they're making security a top priority now, so I'm sure the next version won't have any vulnerabilities.
      • Run DOS -- I don't think anybody is writing viruses that can infect it.
      • When your machine gets attacked, look at your log files to see where the attack came from, find out who their ISP is, and then send a polite letter by U.S. mail asking them to make their customer stop behaving badly. Repeat until all the bad, naughty machines are gone from the internet.
      • Start your own internet. Only people you trust are invited to join it, and nobody is allowed to link it to the bad, old internet.
      • Call MS tech support and ask for help.
      OK, I admit that last one was a little silly.
  • Its easy... (Score:5, Informative)

    by CyberBill ( 526285 ) on Sunday June 20, 2004 @08:34PM (#9480192)
    Leave the software firewall turned on if you can, if not, get a cheap Linksys Cable/DSL router, it will block all of those viruses.

    I have to reinstall most of my family's computers when I go home, I made all of them have routers. :P

    -Bill
    • Re:Its easy... (Score:3, Interesting)

      by Deathlizard ( 115856 )
      I'll second this. putting on the Built in Firewall in XP will stop Blaster from infecting the machine. Pretty unplug from the network, install XP, turn on the built in firewall and hit windowsupdate until you get all the patches.

      With Windows 2000 however, it gets fun since there is no built in firewall for that. You can use zonealarm to block the virus traffic, or you can use a Router/Firewall to block traffic. I know you can set IP security policies in windows 2000 without downloading anything but I never
    • by majid ( 306017 ) on Sunday June 20, 2004 @09:37PM (#9480605) Homepage
      It is not active during startup or shutdown [microsoft.com]. This window of vulnerability will be fixed in SP2. That said, I wouldn't trust a "firewall" written by people clueless enough not to enable it before the network stack goes up.
  • Firewall (Score:5, Informative)

    by jpaz ( 512242 ) on Sunday June 20, 2004 @08:34PM (#9480194) Homepage
    Keep the firewalling on, no matter what Microsoft says. I've never had an instance where having a firewall turned on kept windowsupdate from working properly.
    • Re:Firewall (Score:5, Informative)

      by orin ( 113079 ) on Sunday June 20, 2004 @08:37PM (#9480230)
      This is absolutely correct. You can even use the simple Internet Connection Firewall that is built into Windows XP
  • Easy (Score:5, Informative)

    by Masami Eiri ( 617825 ) <brain.wav@NOSPAm.gmail.com> on Sunday June 20, 2004 @08:34PM (#9480195) Journal
    We do this all the time where I work.
    Use another machine to burn a copy of the latest service pack, and the Sasser worm fix, and whatever other updates you want to include.
    After installing, install the updates from the CD, then check windows update for anything else.
  • by __aavhli5779 ( 690619 ) on Sunday June 20, 2004 @08:35PM (#9480204) Journal
    Yes, a firewall and/or NAT is all you really need. Evidently Norton Internet Security did not live up to its promise, which comes as little surprise to me, I must admit.

    I've had success installing Windows XP and upgrading it with only Microsoft's Internet Connection Firewall enabled.
  • Odd (Score:5, Insightful)

    by The-Bus ( 138060 ) on Sunday June 20, 2004 @08:35PM (#9480205)
    What about a router/firewall?

    How do you get these worms? This sounds incredulous...
    • Re:Odd (Score:4, Interesting)

      by Patoski ( 121455 ) on Sunday June 20, 2004 @09:20PM (#9480537) Homepage Journal
      How do you get them? All the RPC Worms which currently inflict unpatched Windows NT based OSes is how. These worms do network sweeps and will find a vulnerable machine anywhere from a few seconds to a few minutes depending on the size of your network.

      I recall one particular instance at work where an outside laptop that was infected got plugged into the network (our network has about 2000 various boxes connected to it). Our security team got alerted by our intrusion detection systems was on the way to whack the offending user with a clue stick and unplug the laptop. Too late....

      During that time I had just finished ghosting a machine with SP4 integrated into the build. In only a matter of a minute or two the new box I was working on became infected and started doing net sweeps of its own (the whole process of infection was done silently of course). I don't doubt the tales of machines becoming infected in a very short period of time given the rate of infection with RPC based worms because I have seen it. All it takes is one rogue machine to infect other boxes it can talk to.
    • Re:Odd (Score:5, Interesting)

      by ktakki ( 64573 ) on Sunday June 20, 2004 @10:14PM (#9480819) Homepage Journal
      How do you get these worms? This sounds incredulous...

      Here's a snippet of the log from my Linksys router:
      00:00:26 TCP from 200.63.154.32:4927 to XXX.XXX.XXX.XXX:445
      00:00:29 TCP from 68.219.231.103:2712 to XXX.XXX.XXX.XXX:445
      00:00:29 TCP from 200.63.154.32:4927 to XXX.XXX.XXX.XXX:445
      00:00:32 TCP from 68.219.231.103:2712 to XXX.XXX.XXX.XXX:445
      00:00:42 TCP from 68.144.136.248:3225 to XXX.XXX.XXX.XXX:445
      00:00:59 TCP from 81.185.113.170:3646 to XXX.XXX.XXX.XXX:445
      00:01:36 TCP from 68.144.169.29:2873 to XXX.XXX.XXX.XXX:445
      00:01:52 TCP from 4.41.255.6:3139 to XXX.XXX.XXX.XXX:445
      00:02:07 TCP from 200.223.92.184:4958 to XXX.XXX.XXX.XXX:445
      00:02:08 TCP from 68.94.121.110:3927 to XXX.XXX.XXX.XXX:445
      00:02:10 TCP from 200.223.92.184:4958 to XXX.XXX.XXX.XXX:445
      00:02:11 TCP from 68.94.121.110:3927 to XXX.XXX.XXX.XXX:445
      00:02:19 TCP from 81.218.207.145:4814 to XXX.XXX.XXX.XXX:445
      00:02:28 TCP from 80.198.29.151:4015 to XXX.XXX.XXX.XXX:445
      00:02:48 TCP from 63.230.237.96:3181 to XXX.XXX.XXX.XXX:445
      00:03:00 TCP from 209.50.93.166:4294 to XXX.XXX.XXX.XXX:445
      00:03:12 TCP from 24.80.105.49:2350 to XXX.XXX.XXX.XXX:445
      The timestamp is hours:minutes:seconds. XXX.XXX.XXX.XXX is my WAN address (redacted), an East Coast Verizon DSL line. Port 445 is probably being targetted by W32.Sasser.

      Sixteen attempts in 3 minutes and 12 seconds.

      A couple of things are interesting about this log excerpt. First, there are no attempts from the 141.154.* netblock (where my WAN address resides). Second, I usually see a number of different ports listed (139, 1025, 1026, 1080, 3129, 5000), from both viruses and people probing for open proxies. Then again, it's Sunday night. I've noticed that virus traffic is higher during business hours in the US.

      k.
    • Re:Odd (Score:3, Interesting)

      by Funksaw ( 636954 )
      It's not as incredulous as it might seem. I use a Mac for my day to day operations - so I don't get virii or trojans or worms - but I do keep a Windows laptop around - I usually only use it when I'm travelling on the road or the mac breaks down. Well, my cable modem's out for about 24 hours, so I decide to take the laptop for a spin earlier this month - connecting to my ISP through the phone line. This, of course, bypasses the router I usually keep the Windows computer on. Without exaggeration, the comp
  • Get a router. (Score:5, Insightful)

    by Anonymous Coward on Sunday June 20, 2004 @08:35PM (#9480209)
    Why don't people pay ~30$ for a router with built in firewall? Even if one got only one PC connected to it it's worth it. No worries about worms or hacks.
  • Firewall (Score:4, Informative)

    by fremen ( 33537 ) on Sunday June 20, 2004 @08:36PM (#9480217)
    ...all firewalls are turned off.

    Why don't you try turning the firewall on? It will block the RPC calls that are necessary to infect your machine with the most recent series of worms and allow you to install whatever patches are necessary worry free.

    Plus, it just makes your PC safer in general.
  • Use NAT (Score:4, Interesting)

    by hkb ( 777908 ) on Sunday June 20, 2004 @08:36PM (#9480218)
    Duh.

    Perhaps also turning on the firewall just actually might work. Windows is targeted for the average Joe. Microsoft doesn't want to have to incur the support costs of explaining to average Joe how firewalls work, so they suggest you keep it off.

    If you've really been using Linux that long, you'd have a clue. Really, this submission just sounds like a troll...
  • Comment removed (Score:4, Informative)

    by account_deleted ( 4530225 ) * on Sunday June 20, 2004 @08:36PM (#9480220)
    Comment removed based on user account deletion
  • by kevlar ( 13509 ) on Sunday June 20, 2004 @08:36PM (#9480226)
    Barring the fact that I don't believe you when you say that you get viruses over the 20 minutes that it takes to download and install the patches, the fix is simple: get some sort of router/firewall combo, or install a soft firewall before doing the update.

    Alternatively, shut down all the services so that you have nothing listening, but if you're too lazy to do that, go out and spend $40 on a Netgear router and voila, you're safe from that crap.
    • by yamla ( 136560 ) <chris@@@hypocrite...org> on Sunday June 20, 2004 @08:41PM (#9480279)
      You don't believe you can get infected in 20 minutes? The record at the undergraduate department of Computing Science at the University of Alberta is SIX SECONDS from plugging in an installed, unprotected Windows XP system until the time it is infected.

      It is highly unlikely that you could run an unprotected XP system with no firewall and no patches, hooked up via a cable modem or ADSL, for even ten minutes before getting infected.
      • by kevlar ( 13509 ) on Sunday June 20, 2004 @08:51PM (#9480358)
        Actually.... jusdging by my router logs, I can believe it now...

        Sunday, June 20, 2004 20:12:54 Unrecognized access from 24.164.33.43:9118 to UDP port 1026
        Sunday, June 20, 2004 20:16:48 Unrecognized access from 218.88.103.123:3822 to TCP port 1025
        Sunday, June 20, 2004 20:16:51 Unrecognized access from 218.88.103.123:3822 to TCP port 1025
        Sunday, June 20, 2004 20:16:57 Unrecognized access from 218.88.103.123:3822 to TCP port 1025
        Sunday, June 20, 2004 20:21:46 Unrecognized access from 195.250.112.73:35973 to TCP port 443
        Sunday, June 20, 2004 20:22:18 Unrecognized access from 222.183.185.252:3881 to TCP port 1025
        Sunday, June 20, 2004 20:22:21 Unrecognized access from 222.183.185.252:3881 to TCP port 1025
        Sunday, June 20, 2004 20:22:27 Unrecognized access from 222.183.185.252:3881 to TCP port 1025
        Sunday, June 20, 2004 20:31:26 Unrecognized access from 193.227.0.37:3365 to UDP port 1434
        Sunday, June 20, 2004 20:45:50 Unrecognized access from 24.164.31.171:8860 to UDP port 1026
        • by Anonymous Coward on Sunday June 20, 2004 @09:20PM (#9480532)
          Sunday, June 20, 2004 20:31:26 Unrecognized access from 193.227.0.37:3365 to UDP port 1434
          Sunday, June 20, 2004 20:45:50 Unrecognized access from 24.164.31.171:8860 to UDP port 1026

          ^^ RIGHT THERE! That was 14 minutes! You could have EASILY installed a few critical updates. You just need to install them between attacks, and unplug your network cable before each new attack starts.

          How hard is that? What is everyone here complaining about?
    • by tomakaan ( 673394 ) on Sunday June 20, 2004 @08:43PM (#9480293)
      If definitely believe him. I've seen it happen all the time. My situation may be unique since I'm on a large college network, but I've seen blaster/welchia/gaobot/sasser infect a machine in a quarter of that time without the proper Windows Updates.
    • by Qzukk ( 229616 ) on Sunday June 20, 2004 @08:51PM (#9480353) Journal
      I don't believe you when you say that you get viruses over the 20 minutes that it takes

      Aside from the terminology, consider that at the peak of infection, many nimda attacks were being logged EVERY SECOND by logging machines setup for capturing and monitoring attacks. Slammer [patcheasy.com] was scanning 55 million hosts PER SECOND. These things just pick random addresses and spit data out. If you haven't been getting any of these hits then either you're behind a firewall, or you're less random than the rest of the internet.

      20 minutes is a long time to go without protection in computer time, especially on today's wild west of an internet.

      Agreed though, the questioner should have just gone and gotten a firewall (or used one of his linux machines). I've never seen anything on windows update suggest that I turn off my firewall.
    • by ScrewMaster ( 602015 ) on Sunday June 20, 2004 @09:14PM (#9480501)
      My firewall logs show that I get worm propagation attempts at a significant rate, sometimes dozens per second (you can hear the drive in my firewall machine chattering when that happens.) Mind you, I'm on Comcast and there's a bunch of machines on my subnet that are infected as hell (I've reported this to Comcast, but the same IPs keep showing up, sometimes with attempts from multiple worms!) but I have no problem believing that this dude got infected in twenty minutes. I'm surprised it took even that long. Last year, my cousin hooked up her Win2K box to her brand, spanking new cable modem. After two or three minutes, a console window popped up and she watched some nut case typing in "SECEDIT" trying to guess her admin password. Things happen FAST nowadays.
  • by gwoodrow ( 753388 ) on Sunday June 20, 2004 @08:37PM (#9480238)
    So the WORST case scenario is that you don't actually succeed in getting Windows installed? Man, talk about a win-win situation!
  • Slipstream it! (Score:3, Informative)

    by DarkHelmet ( 120004 ) * <mark&seventhcycle,net> on Sunday June 20, 2004 @08:39PM (#9480249) Homepage
    Easy... I would Slipstream [windows-help.net] a copy of Windows SP1 or SP2 onto a burned CD, so that the windows I install is a fresh copy that's not suseptible to worms off the bat.

    Even better, I would get a hardware firewall, so that none of the ports that worms travel through are even open.

    Basic security from automated attacks isn't particularly hard, you know. Why is this even on slashdot?

  • by borwells ( 566148 ) on Sunday June 20, 2004 @08:39PM (#9480250) Homepage
    Download the SP1 Network install [microsoft.com] before beginning your XP installation. Stick it on a CD or a Samba share and install it prior to connecting to the Internet.
    • Download the SP1 Network install before beginning your XP installation. Stick it on a CD or a Samba share and install it prior to connecting to the Internet .

      Figuring out how to do this with only one machine and no installed OS is left as an exercise for the reader.

  • External firewall? (Score:5, Informative)

    by pilkul ( 667659 ) on Sunday June 20, 2004 @08:39PM (#9480251)
    You say you're a Linux user; why not plug one of your Linux boxes to the 'net, use it as NAT-routing firewall using iptables, and download the updates from behind the firewall? It's always worked for me. Or if you only have one machine, you can buy a cheap NAT router for 50$ nowadays.

    This solution seems so obvious to me that I wonder why you even bothered to ask. With your apparent technical knowledge, surely you must've thought of this. I'm inclined to think this question was just a veiled way to start an article bashing Microsoft about all the worms affecting their system.

  • by bstil ( 652204 ) on Sunday June 20, 2004 @08:39PM (#9480262)
    All you need for a home installation is a NAT firewall connected to your cable modem/dsl. As long as your firewall is properly configured and no other computer on your NAT network is infected, you should be okay.
  • by alyandon ( 163926 ) on Sunday June 20, 2004 @08:40PM (#9480271) Homepage
    Just turn on the internal XP firewall (Network Properties -> -> Properties -> Advanced) before you connect to the net. You'll be safe long enough to get SP1/Kerio/etc all downloaded and installed.
  • Autopatcher! (Score:4, Informative)

    by calebb ( 685461 ) * on Sunday June 20, 2004 @08:43PM (#9480291) Homepage Journal
    I can't believe nobody's posted this yet!

    Autopatcher [autopatcher.com]

    AutoPatcher was started in October of 2003. It was started by Jason Kelley and was a simple batch program that would install many updates silently. Upon reaching version 2.65, Jason was contacted by Antonis Kaladis, who offered to help make a VB front-end for the program. And thus, the current incarnation of AutoPatcher was born.

    Not only does it install all your Windows updates with just one reboot, it can also (optionally) install many other programs such as the Windows XP Powertoys, IESpell, etc. There's even some registry config options such as increasing the max connections per server (IE) to something greater than 2.
  • by phrasebook ( 740834 ) on Sunday June 20, 2004 @08:44PM (#9480298)
    I'm putting XP on my laptop next to me right now actually. I think it is pretty safe because a) it is connected to the net using NAT, not directly to the modem and b) I slipstreamed SP1 into my XP CD, so that when I install it I'm already at SP1 level. See here [old.bink.nu] for instructions (that's win2k, but same for winxp of course). And I dunno why you'd bother with Norton Anything quite frankly. Maybe you can just buy a cheap router doing NAT and put it between the modem and computer while you get updates.
  • Firewall (Score:3, Insightful)

    by $exyNerdie ( 683214 ) on Sunday June 20, 2004 @08:44PM (#9480299) Homepage Journal
    Like others have mentioned, use a Router (eg. from Linksys, DLink, Netgear) as firewall or get FREE Zonealarm firewall [zonelabs.com] or just turn WinXP's firewall on. You need a firewall or use another box (e.g Linux) as proxy to connect to web.

  • by steve.m ( 80410 ) on Sunday June 20, 2004 @08:48PM (#9480334) Journal
    sasser exploits a vulnerability in lsass.exe, which listens on 445. Some software firewalls leave this open, as it is required for Active Directory logins under some circumstances. If you do that and then go straight to windows update you should be fine.
  • I work for an ISP (Score:3, Informative)

    by mAineAc ( 580334 ) <mAineAc_____&hotmail,com> on Sunday June 20, 2004 @08:50PM (#9480352) Homepage
    I have people do this all the time without any problems. I have the WinXP firewall enabled then connect and go to windows update. No one has an issue doing it this way.
  • by ellem ( 147712 ) * <ellem52.gmail@com> on Sunday June 20, 2004 @08:53PM (#9480374) Homepage Journal
    1 - Hardware Firewall Only. Software firewalls are for pikers and people waiting to be hacked.

    2 - Download SP1 to a CD.

    3 - STOP USING NORTON for ANYTHING OTHER THAN ANTIVIRUS

    4 - Read 3 again

  • by jjohnson ( 62583 ) on Sunday June 20, 2004 @08:55PM (#9480388) Homepage
    Buy a LinkSys cable/dsl router for $50, which includes a firewall (if you can't afford a Cisco Pix). I've never had anything get through to any Windows box I was installing up to the point I got it completely updated.

    No one should have any Windows box directly on a cable/dsl line anyway.
  • by pixel_bc ( 265009 ) on Sunday June 20, 2004 @09:12PM (#9480485)
    ... or any brand name for that matter. My windows box is behind one of these and I've never had any problems. You can choose to forward any ports you DO care about (it blocks by default), and you can also set up some cool net policy stuff on the later models.

    Seriously -- you can pick one of these puppys up for about $50... and they're incredibally functional if you ever decide to start you own little home network (5 ports is the norm for the price).
  • by grioghar ( 228683 ) <thegrio AT gmail DOT com> on Sunday June 20, 2004 @09:13PM (#9480491) Homepage
    " Start to pull down Service Pack One; per Microsoft's instructions, all firewalls are turned off."

    Firewall is on before I connect to my cable modem if you're going to be DUMB enough to connect it without a hardware firewall protecting the machine. Get an intermediary device like a Linksys or Netgear router, and now you don't have to worry about it. And seriously. Don't install your AV until AFTER you've installed all your updates. You're only complicating the registry before it needs to be.

    Seriously, is Slashdot a "News for Nerds", or "HOWTOs for N00bs"? Some of these questions would be better handled by Google and half a brain about networking.
  • I pretty much refuse to run a Windows box on the net without a firewall... The $40 cable routers will generally do a fine job. If you're doing it in the same place as your Linux box, you can use IP Tables to do the same thing..

    Get either a dumb hub or a crossover cable, and connect the Windows box by that.
    turn on NAT via iptables:

    • iptables -t nat -I POSTROUTING -s 192.168.1.0/24 --out-interface eth0 -j MASQUERADE

    • iptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
      iptables -I FORWARD --in-interface eth1 --out-interface eth0 -j ACCEPT
      # turn off most packet forwarding (other than outgoing connections above) iptables --policy FORWARD DROP
    Turn on packet forwarding
    ( echo 1 > /proc/sys/net/ipv4/ip_forward )

    This, of course, presumes that ETH1 is facing your windows box with an IP address in 192.168.1.{1-254}.

    You can then either set your Windows box IP address manually, or learn how to turn on dhcpd (i'm not going to go there, but it's not too hard.). In any case, this should be enough NAT protection to allow you to get out on the net from your Windows box without opening it up to inbound virus connections. You can then get to places like Microsoft and Norton's without being pre-emptively infected.

  • Very very simple. (Score:3, Informative)

    by skinfitz ( 564041 ) on Sunday June 20, 2004 @10:13PM (#9480813) Journal
    1. Disconnect machine from net
    2. Install XP
    3. Before connecting to net, enable XP firewall. (Right click on network connection, properties, advanced, "Protect my computer.."
    4. Turn on Automatic Updates (Right click on My Computer, properties, then click tick box on automatic updates).
    5. Connect to net.
    6. Let it patch itself, or if you want, do it manually via Windows Update.

    Really, why this simple simple process seems so difficult to Linux users is beyond me. You wouldn't connect a Linux system running say, an old version of Samba or Apache to the net without IP Tables now would you?
  • by oogoliegoogolie ( 635356 ) on Sunday June 20, 2004 @10:37PM (#9480972)
    ...because obviously you're too stupid to do it yourself.

    You say you've been using Linux since 95, yet the obvious solution of using a firewall excapes you! If you're such a linux expert then where's your iptables firewall machine? Or even your $50 router/firewall. I have one for sale for $40 if you want. That's Cdn $$ too! Man, even installing sygate, zonealarm, or any other personal firewall right after winxp is installed would prevent the shit out there from getting onto your machine.

    I've been using Linux since 95 too, but I know better to put any machine, Linux or Windows, directly on the net or in the DMZ unless that's my intention. Windows is much worse than other OS's, but I wouldn't even put a fresh linux install of any distribution on the net without doing some work on it first.
  • by rfc1394 ( 155777 ) <Paul@paul-robinson.us> on Sunday June 20, 2004 @11:21PM (#9481243) Homepage Journal
    I have a linksys wireless router between my DSL modem and my computers. I've gotten malware and spyware on my main computer (I found out later when I ran a checking program) but never got a virus or a worm. When I later installed Apache locally on a Win 98 machine and put in a .hosts file with a list of all the adware companies and their servers routed back to localhost, (which causes the local copy of Apache to try to serve them and report no such page) it also stopped almost all popups and a lot of in-line ads.
  • Visa (Score:5, Funny)

    by gmuslera ( 3436 ) on Sunday June 20, 2004 @11:22PM (#9481247) Homepage Journal
    • Windows XP Pro Original - US$ 200
    • Follow the Microsoft Instructions - US$ 0
    • Apply recommended patches by microsoft using microsoft recommended way - US$ 0
    • ...
    • Getting worms, viruses, and trojans even after all of this work: priceless
  • by KC7GR ( 473279 ) on Monday June 21, 2004 @01:33AM (#9481870) Homepage Journal
    Use a hardware firewall, or a decent router with a firewall built in, instead of depending on something that's software-based. That way, the nasties are stopped before they even get to your computer.

    I've not had personal experience with them, but others I've spoken with have had good luck with Linksys and D-Link. For my part, I've always depended on our Watchguard Firebox II [watchguard.com] to handle things.

    Granted, such a unit is well beyond the cost range of most home setups (unless you get a phenomenal deal on it used, as I did). However, before I had the Firebox, I was part of the Beta testing team for the Zyxel [zyxel.com] 'Prestige 312' combo dual-Ethernet router/firewall. The 312 has been discontinued for some time now, but it performed like a champ for me.

    If I were going to pick another unit today, I would look at Zyxel's ZyWall 100 [zyxel.com] series, or something similar. They're quite a bit less expensive than Watchguard's products, and I see no reason they shouldn't work just as well.

    If the 100's a little too costly for you, the entire ZyWall series comes in a variety of sizes from 1 on up. The number usually designates the number of VPN connections the unit allows.

    If you're a DIY'er, you can, of course, just get hold of a spare PC, stick a couple of NICs in it, load it up with FreeBSD or some such, and turn it into a router/firewall.

    The bottom line is that I don't believe any purely software-based firewall can ever be as secure as one that's hardware-based, and dedicated to the purpose of just being a firewall. I certainly don't trust Uncle Bill or Symantec to do it right (witness the problems you've already had).

    Happy hunting.

  • by cascadefx ( 174894 ) * <morlockhq@@@gmail...com> on Monday June 21, 2004 @02:07PM (#9486479) Journal
    Enable the built-in firewall in Windows XP before going online. This will resolve a lot of your problems.

    Also go into the widnows update site (on another connected computer) and click the update options to the right. There is an option to turn on the catalog view (or something like that... in Linux right now). This will allow you to search for all the updates of a particular Windows platform.

    Use this to download the patches and burn them to a CD... Use this CD to patch your system.

    Jim

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...