|Re: Corrupted PC's Find New Home in the Dumpster|
Sun, 24 Jul 2005 13:27:15 -0500
In message <email@example.com> Steve Sobol|
> Pat said:
>> Also I would like to comment on your allegation 'the only way to get
> Pat's right.
> You can be computer-savvy, even, and not necessarily know within hours
While true, the vast majority of malware released post-XPSP2 requires
It doesn't install itself, it asks for permission (often more then once).
[TELECOM Digest Editor's Note: This is very true also, but often times
|Post Followup Article||Use your browser's quoting feature to quote article into reply|
|Go to Next message: John Levine: "Re: Ethics of Deterrence"|
|Go to Previous message: John L. Shelton: "TV Telephone History"|
|May be in reply to: Monty Solomon: "Corrupted PC's Find New Home in the Dumpster"|
|Next in thread: Steve Sobol: "Re: Corrupted PC's Find New Home in the Dumpster"|
|TELECOM Digest: Home Page|