Too much "execution" is what gives us the virus problems in the first place....
Cue tumbleweed....I'll get my coat On 10 March 2010 14:19, Bill Lambert <[email protected]> wrote: > Nice⦠there should be public executions for virus/malware writers. Death > by 1000 cuts. > > > > *Bill Lambert* > > *Concuity* > > *Phone 847-941-9206* > > > > *The information contained in this e-mail message, including any attached > files, is intended only for the personal and confidential use of the > recipient(s) named above. If you are not the intended recipient (or > authorized to receive information for the recipient) you are hereby notified > that you have received this communication in error and that any review, > dissemination, distribution, or copying of this message is strictly > prohibited. If you have received this communication in error, please contact > the sender by reply email and delete all copies of this message. Thank you. > *** > > > > *From:* David Lum [mailto:[email protected]] > *Sent:* Wednesday, March 10, 2010 8:05 AM > *To:* NT System Admin Issues > *Subject:* Phone exploit of the week > > > > http://news.cnet.com/8301-27080_3-10466230-245.html?tag=mncol;posts > > *David Lum** **// *SYSTEMS ENGINEER > NORTHWEST EVALUATION ASSOCIATION > (Desk) 971.222.1025 *// *(Cell) 503.267.9764 > > > > > > > > > > > > -- "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question." ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
