Two days to go until we see what happens when the Blaster virus (aka Lovesan) does its worst to the Windows Update website. Now, like the paranoid geek that I am, I'm always fully patched up on Windows critical updates, and hide all my ports firmly behind a firewall. However I know too many Windows users who never download critical updates from Windows Update, and their computers' security must be holier than the Pope at a Hole concert. Eating swiss cheese.
But with Blaster on the loose, you don't even need to have received a single email in your life to get your computer scuppered. It'll get you anyway. Scary.
So to these people I say: Update your security NOW before it's too late. Go to Windows Update, download the latest antivirus definitions for your a/v software, and get yourself a nice firewall (like Zonealarm - go on, its free! And lovely!)
And if you've never downloaded a Critical Update in your life, and theres a few score big patches waiting for you to pipe down your crappy two-tin-cans-and-a-bit-of-string dialup internet connection, at least start it off with this one for the RPC vulnerability that Blaster targets...
(As a Windows Millenium Edition user, I am proud to have an operating system that the vulnerability does not affect. I knew that perseverence with this piece of coding-cackness would pay off some day...)
Related: Here's an interesting little post from Digital Hamster regarding the waiting game that system administrators have been known to play when a security vulnerability comes to light.