Hardening Your Systems Against the DCOM Vulnerability: What Manufacturers Need to Know