How much longer..

How much longer will people put up with the millions of
dollars of losses in time, resources and service inflicted
on the net by the joke vulnerabilities in the toy operating
system known as Windows? Enough is Enough.

Sure, let's just filter everything..all service providers
please become M$'s virtual firewall now please.

Haven't you windows lamers learned anything yet?

Len

http://darkuncle.net/microsoft_rant.html

for those financial types reading the list (courtesy /. post):

http://news.bbc.co.uk/1/hi/sci/tech/737353.stm
California-based IT consultancy Computer Economics estimated worldwide
damage to be $2.6bn by the end of Thursday. It said that figure could soar
to $10bn by next week.
    
http://www.usatoday.com/tech/news/2001-08-01-code-red-costs.htm
Lloyds of London put the estimate for Love Bug at $15 billion.

http://www.usatoday.com/tech/news/2001-08-01-code-red-costs.htm

the economic damage from the Melissa virus in 1999 to be about $1 billion.

http://atlanta.bizjournals.com/atlanta/stories/2001/10/22/focus4.html

"Code Red, which started in mid-July, so far has cost the U.S. economy $2.6
billion."

http://www.theregister.co.uk/content/55/30072.html

"The Klez virus last year cost businesses $9 billion worldwide in lost
productivity,"

http://www.bstpierre.org/Articles/fog0000000073.html
"SirCam", which also propagates through email, cost $1 billion.
    
Summary:
"ILOVEYOU" virus: $2.6 - 15.0 Billion
Melissa: $1 Billion
CodeRed: $2.6 Billion
Klez: $9 Billion
SirCAM: $1 Billion
Estimated Total TCO: $16.2 - 28.6 billion

Len Rose wrote:

How much longer will people put up with the millions of dollars of losses in time, resources and service inflicted on the net by the joke vulnerabilities in the toy operating system known as Windows? Enough is Enough.

Sure, let's just filter everything..all service providers
please become M$'s virtual firewall now please.

Haven't you windows lamers learned anything yet?

You could of course just filter spoofed traffic, which would then stop a
lot of the DDoS attack that I'm suffering with.

For the second time in 2 weeks, 2 of my IPs have been null routed at the
USA -> Australia International links because of a massive DDoS attack.

If anyone is seeing traffic directed at: 203.15.51.34 203.15.51.44 or
216.168.20.77 and 216.168.20.77 (the latter 2 not being my hosts but
seeing DDoS traffic as well) you might be well advise to
shutdown/disconnect the machines as they are likely hacked and/or trojaned.

Last attack was a mixture of SYN flood (which has virtually no effect
here), 1k packets UDP send at a high volume from distributed machines
all aimed at ports arounf 1024. ICMP echo floods, and bogus DNS
requests from hosts with the IP: 'x.x.0.0'

Obviously some of the floods are not using sppoofed addresses, but I am
really at a loss to see why I see _any_ spoofed traffic, I would have
expected ISPs out there to be filtering traffic not from their networks
by default nowadays. I must just be nieve.

Yours

Mat

indeed - and yet companies claim these kind of damages, at least publicly,
whenever these worms come along (every month or two, it seems). Two questions
spring to mind: 1) where are these figures coming from, and 2) if they're
accurate, why in the world would a company make the same mistake that cost
them a million bucks last month, again next month? That's the kind of stuff
that gets executives fired (you'd think) ...

(note: the figures I posted were just gathered from publicly available news
sources. We all know how accurate reporters tend to be when covering
technical issues, so take them with a grain of salt. The point of the post
was, there are a great many companies out there throwing good money after
bad, month after month, without seeming to realize it.)