Tom Piwowar
> Wow! An attack that  penetrates firewalls to seek you
> out -- "no user action required". I don't see how anyone
> after this -- including WFBs -- can take umbrage when I
> refer to it as "crappy software."

> > Microsoft says it found evidence two weeks ago of an
> > RPC (remote procedure call) attack that can potentially
> > infect Windows machines across the Net with no user
> > action required.

What is required for this attack to occur?  Does the
victim/user have to visit a website hosting the malware?
(Note the website could be having ads for bandaids that
have the malware as the actual content not the bandaids)

Or can the user sit behind their router (NAT'ed) and be
infected.

Does anyone know if the contents of the ads are actually
screened for malware??

-- 
Take care  | This clown speaks for himself, his job doesn't
Wayne D.   | supply this, at least not directly
Uninitialized pointers can get you in a heap of trouble!


*************************************************************************
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*************************************************************************

Reply via email to