You are aware of the exploit on the GDI libraries right? Data files and what seems like datafiles are extremely common vectors of attack now. And please tell me your joking about virus scanning software actually being your testcase for success.
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Christopher Fisk Sent: Friday, February 10, 2006 12:28 PM To: The Hardware List Subject: RE: [H] Suggested tools for helping a friend with bad virusinfestation On Fri, 10 Feb 2006, Thane Sherrington (S) wrote: > At 04:00 PM 10/02/2006, Christopher Fisk wrote: >> In a business environment, yeah, removal is fine, but as a favor for >> someone, go the full reinstall route IMO, it's more sure thing, less >> gambling on how long it's going to take, and you leave knowing they at least >> have a backup from that day in case there is a disaster after that. Plus, >> you can sit down and watch TV while the thing is running the reinstall. > > But if you agree that the removal route isn't safe, then how can you guarantee > the data? Because data is data, it's not executed, it's not stored in registry, it's much easier to verify with virus scanning software. When was the last time you saw a tiff file with a virus? Christopher Fisk -- Pop a Poppler in your mouth When you come to Fishy Joe's What they're made of is a mystery Where they come from no one knows You can pick 'em you can lick 'em you can chew 'em you can stick 'em If you promise not to sue us you can shove one up your nose.
