百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

Operation Fighting Nimda

by Noel Laam

Early in the morning of 20 September 2001 when I came into the office and switched on the PC as usual, the screen was appearing funny and small windows kept popping up as if they were saying hello to me. While I was wide at sea about what had happened, a neighbouring colleague came to my rescue and told me that we were likely to be attacked by a virus/worm.

And the Operation Fighting Nimda formally began.

An interim command was set up at once, and the whole of the Computing Services Centre (CSC) was on the alert and prepared to fight the malicious worm. All departments were informed of the news and to shut down the machines right away to stop the infection from spreading. At 10 am when the necessary information of Nimda and the essential patches were collected, the technical staff of the CSC and the Enterprise Solutions Unit (ESU) were immediately gathered, briefed and sent to all departments that had reported to have infected with Nimda to carry out the rescue - to check the machines, to clean up the worms if the machines were infected, to apply patches to all machines, and to boot up the systems again when all machines in a department were all fixed.

Minimal staff were left in the office for liaison, and most were running in and out of the office cross-checking for the latest information and reporting on the progress. It was just like in the battlefield. After one whole day of hectic work, except for those departments who opted to take care of their own machines, most machines in a number of departments were rescued by the following day, and were able to perform their duties as normal.

After this worm attack, I was thinking, what did we learn from it?

This incident certainly reminded us of the urgency to raise users' awareness on security protection so as to better protect our campus network. At the moment, some departments look after their own servers, and CSC's recommended measures, security patches, and virus updates may not be adopted or implemented in time. As a result, these servers were invaded and being used to mount other attacks. We need to better organise the University strength in intrusion detection and virus protection, and to have better control and management of the network services. The CSC is now working out ways to tighten the network security in various areas, and though this may cause some inconveniences to users, it is necessary and vital if we want to safeguard the users' interest and protect the University from avoidable virus/worm and hacker attacks.

We in the CSC will definitely continue to work hard to strengthen our sophisticated network to fight against virus/worm attack. How about you? Will you lend us a hand?

百博百家乐的玩法技巧和规则 | 百家乐官网庄闲符号记| 百家乐官网入庄闲概率| 百家乐娱乐城博彩| 百家乐作| 大发888线上| 免费百家乐官网规则| 大发888娱乐城出纳| 大发888完整客户端| 百家乐官网玩法及细则| 国美百家乐官网的玩法技巧和规则| 真人百家乐平台排行| 大发888娱乐城动态| 网上的百家乐官网怎么才能| 百家乐微笑打| 百家乐官网国际赌场娱乐网规则 | 足球博彩网站| 百家乐官网最好的投注方法| 新全讯网2| 状元百家乐官网的玩法技巧和规则 | 百家乐大路小路| 网上百家乐官网网址| 同花顺百家乐的玩法技巧和规则| 博天堂百家乐官网官网| 投真钱百家乐必输吗| 澳门百家乐官网鸿福厅| 哈尔滨百家乐赌场| 百家乐官网有作弊的吗| 威尼斯人娱乐网代理| 阳宅24方位判断方法| 大发888娱乐日博备用| 赢家百家乐的玩法技巧和规则 | 百家乐注码论坛| 大发888真坑阿| 新葡京百家乐官网的玩法技巧和规则 | 克东县| 全讯网百家乐官网的玩法技巧和规则 | 大发888娱乐城888bg| 百家乐微笑投注| 百家乐官网压分技巧| e世博百家乐攻略|