On Thu, Mar 12, 2009 at 3:35 PM, Andy Ognenoff <[email protected]> wrote: > "Microsoft Security Update Fails to Patch the Vulnerability It Was Meant to > Fix, According to PandaLabs"
What they're saying is that if you've *already* been compromised, then the Microsoft patch -- which simply blocks the compromise in the first place -- won't help. That's really not a new scenario. It's just a little different in this case just because the "block" apparently consists solely of a DNS entry. :) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
