> a patched system will not proof you if someone on your system runs the
> executable..

Yeah, of course.

> patching a system only helps against works like blaster that do a
> remote infection.. if someone double clicks an attachemnt, all bets
> are off in windows.

So in the case of sobig, it doesn't remotely target a "hole" in
micr*soft, but relies on somebody running the file?  I see.
With so many micr*soft seurity problems, i have trouble keeping the
facts straight...  

So that means that on all these infected sobig machines, someone double
clicked?  That just blows my mind.


I can't understand why outhouse still allows executables to be run.
If you want people to double click on files and have them opened up by
the proper program, fine.
But how often does it even make sense to run an executable from an email
program?  You'd think by now outhouse would disable that ability.  If
people really want to infect themselves, make them copy it somewhere
first.
Sorry.  As many times as i encounter it, i never get used to such
blatant stupidity. 


-- 
Mandrake HowTo's & More:          http://twiki.mdklinuxfaq.org

Join the content organization discussion:
http://mandrake.vmlinuz.ca/bin/view/Main/NewIndex

Join the General Wiki Development discussion:
http://mandrake.vmlinuz.ca/bin/view/Main/DevelopingTheMandrakeCommunity#Discussion

Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to