Yesterday, one of my users got infected with a trojan, and since all our users are "restricted users", we were trying to figure out if perhaps the computer's local administrator permissions allowed this to happen. It turns out that a new profile was created named "XXXX" with administrative permissions, So, my question is how can a virus/trojan create a user while logged in as a restricted user?
Murray ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~