Yesterday, one of my users got infected with a trojan, and since all our
users are "restricted users", we were trying to figure out if perhaps
the computer's local administrator permissions allowed this to happen.
It turns out that a new profile was created named "XXXX" with
administrative permissions, So, my question is how can a virus/trojan
create a user while logged in as a restricted user?
 

Murray 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to