rpcss.exe is the "Remote Procedure Call Service"<br>
<br>
Go to <A HREF="ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP2/RPC-fix/Q162567.TXT" TARGET="_new">ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP2/RPC-fix/Q162567.TXT</A><br>
<br>
For information on this bug, as well as the fix. <p>John Vogel<br><a href=mailto:john@computerwiz.net>john@computerwiz.net</a><br><a href=
It should be LIVE 1/12/00 or before. I would appreciate suggestions, comments and the like. Please go look and help. Thanks.<br>
---========================
This has happened twice now, and it's freaking me out.
I run a firewall called 'At Guard' and out of nowhere I recieve the message "Inbound TCP being attempted - DCOM Services, related to the 'rpcss.exe' file and then 'nbsession (Net Bus)' associated with this file: rnaapp.exe
Does this indicate a hacker afoot?
Or is there a logical explanation?
Any feedback is appreciated. Thanks.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.