You are aware of the exploit on the GDI libraries right? Data files and
what seems like datafiles are extremely common vectors of attack now. 
And please tell me your joking about virus scanning software actually
being your testcase for success.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Christopher
Fisk
Sent: Friday, February 10, 2006 12:28 PM
To: The Hardware List
Subject: RE: [H] Suggested tools for helping a friend with bad
virusinfestation

On Fri, 10 Feb 2006, Thane Sherrington (S) wrote:

> At 04:00 PM 10/02/2006, Christopher Fisk wrote:
>> In a business environment, yeah, removal is fine, but as a favor for 
>> someone, go the full reinstall route IMO, it's more sure thing, less 
>> gambling on how long it's going to take, and you leave knowing they
at least 
>> have a backup from that day in case there is a disaster after that.
Plus, 
>> you can sit down and watch TV while the thing is running the
reinstall.
>
> But if you agree that the removal route isn't safe, then how can you
guarantee 
> the data?

Because data is data, it's not executed, it's not stored in registry,
it's 
much easier to verify with virus scanning software.

When was the last time you saw a tiff file with a virus?


Christopher Fisk
-- 
Pop a Poppler in your mouth
When you come to Fishy Joe's
What they're made of is a mystery
Where they come from no one knows
You can pick 'em you can lick 'em you can chew 'em you can stick 'em
If you promise not to sue us you can shove one up your nose.

Reply via email to