> a patched system will not proof you if someone on your system runs the > executable..
Yeah, of course. > patching a system only helps against works like blaster that do a > remote infection.. if someone double clicks an attachemnt, all bets > are off in windows. So in the case of sobig, it doesn't remotely target a "hole" in micr*soft, but relies on somebody running the file? I see. With so many micr*soft seurity problems, i have trouble keeping the facts straight... So that means that on all these infected sobig machines, someone double clicked? That just blows my mind. I can't understand why outhouse still allows executables to be run. If you want people to double click on files and have them opened up by the proper program, fine. But how often does it even make sense to run an executable from an email program? You'd think by now outhouse would disable that ability. If people really want to infect themselves, make them copy it somewhere first. Sorry. As many times as i encounter it, i never get used to such blatant stupidity. -- Mandrake HowTo's & More: http://twiki.mdklinuxfaq.org Join the content organization discussion: http://mandrake.vmlinuz.ca/bin/view/Main/NewIndex Join the General Wiki Development discussion: http://mandrake.vmlinuz.ca/bin/view/Main/DevelopingTheMandrakeCommunity#Discussion
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com
