Too much "execution" is what gives us the virus problems in the first
place....

Cue tumbleweed....I'll get my coat

On 10 March 2010 14:19, Bill Lambert <[email protected]> wrote:

>  Nice… there should be public executions for virus/malware writers.  Death
> by 1000 cuts.
>
>
>
> *Bill Lambert*
>
> *Concuity*
>
> *Phone  847-941-9206*
>
>
>
> *The information contained in this e-mail message, including any attached
> files, is intended only for the personal and confidential use of the
> recipient(s) named above. If you are not the intended recipient (or
> authorized to receive information for the recipient) you are hereby notified
> that you have received this communication in error and that any review,
> dissemination, distribution, or copying of this message is strictly
> prohibited. If you have received this communication in error, please contact
> the sender by reply email and delete all copies of this message.  Thank you.
> ***
>
>
>
> *From:* David Lum [mailto:[email protected]]
> *Sent:* Wednesday, March 10, 2010 8:05 AM
> *To:* NT System Admin Issues
> *Subject:* Phone exploit of the week
>
>
>
> http://news.cnet.com/8301-27080_3-10466230-245.html?tag=mncol;posts
>
> *David Lum** **// *SYSTEMS ENGINEER
> NORTHWEST EVALUATION ASSOCIATION
> (Desk) 971.222.1025 *// *(Cell) 503.267.9764
>
>
>
>
>
>
>
>
>
>
>
>


-- 
"On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
the machine wrong figures, will the right answers come out?' I am not able
rightly to apprehend the kind of confusion of ideas that could provoke such
a question."

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to