新版病毒已經出現,明天是上班日,建議各位到辦公室或教室,
1.先拔網路線
2.插上外接硬碟備份重要資料
3.插上網路線進行作業系統與防毒軟體更新
祝各位好運別遇上,若有遇上,請立刻拔掉網路線,整顆硬碟格式化,重新安裝系統,避免擴散。
Wanna cry 2.0 is already beginning the second wave attacking. Tomorrow is Monday. I suggest everyone that you have to pull off network cable first before you turn on computer and make a backup for your data in the other portable hard disk. And then reconnect to internet to update the patch for anti-cracker. Good luck.
Windows 7 (需已安裝 Service Pack 1 ):http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012215
Windows 8.1 (需已安裝 Service Pack 1 ):http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012216
Windows XP 、 Windows Vista 、 Windows 8 等舊版 Windows :http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598
Windows XP 中文 https://drive.google.com/file/d/0B-yDQeNcB-JLMzcweGRTMHA0Qnc/view
法新社報導,微軟表示Windows 10 目前不受這波 WannaCry 勒索病毒攻擊。
微軟說明網站(英文):https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
===================================================================================================================================
●Windows 7 32 位元版:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows6.1-kb4019264-x86_aaf785b1697982cfdbe4a39c1aabd727d510c6a7.msu
●Windows 7 64 位元版:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows6.1-kb4019264-x64_c2d1cef74d6cb2278e3b2234c124b207d0d0540f.msu
●Windows 8.1 32 位元版:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows8.1-kb4019215-x86_fe1cafb988ae5db6046d6e389345faf7bac587d7.msu
●Windows 8.1 64 位元版:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows8.1-kb4019215-x64_d06fa047afc97c445c69181599e3a66568964b23.msu
===================================================================================================================================
若遇中毒,請先拔除網路線,避免災情擴散。
以下為資訊中心提供資料
**注意,本次對於以終止支援的 windows XP & windows 2003 也提供更新,但需要個別下載安裝,無從 WINDOWS UPDATE or WSUS 進行更新。
[下載更新資料來源] MSRC BLOG - Customer Guidance for WannaCrypt Attacks