Tom Piwowar > Wow! An attack that penetrates firewalls to seek you > out -- "no user action required". I don't see how anyone > after this -- including WFBs -- can take umbrage when I > refer to it as "crappy software."
> > Microsoft says it found evidence two weeks ago of an > > RPC (remote procedure call) attack that can potentially > > infect Windows machines across the Net with no user > > action required. What is required for this attack to occur? Does the victim/user have to visit a website hosting the malware? (Note the website could be having ads for bandaids that have the malware as the actual content not the bandaids) Or can the user sit behind their router (NAT'ed) and be infected. Does anyone know if the contents of the ads are actually screened for malware?? -- Take care | This clown speaks for himself, his job doesn't Wayne D. | supply this, at least not directly Uninitialized pointers can get you in a heap of trouble! ************************************************************************* ** List info, subscription management, list rules, archives, privacy ** ** policy, calmness, a member map, and more at http://www.cguys.org/ ** *************************************************************************
