On Thu, Mar 12, 2009 at 3:35 PM, Andy Ognenoff <[email protected]> wrote:
> "Microsoft Security Update Fails to Patch the Vulnerability It Was Meant to
> Fix, According to PandaLabs"

  What they're saying is that if you've *already* been compromised,
then the Microsoft patch -- which simply blocks the compromise in the
first place -- won't help.  That's really not a new scenario.  It's
just a little different in this case just because the "block"
apparently consists solely of a DNS entry.  :)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to