Assuming the accuracy of everything in M. Thompson's email, an
infected email would either have to sit benignly on the client or have
to begin the process of delivering its payload. The delivery process
would then have to begin with the code's running, either from its own
file or from a pre-existing file it has infected or the message
envelope. In any of those situations, wouldn't the reconstructed virus
still be blocked if (a) there is an AV scanning program at the client
side with an appropriate definitions file and (b) the AV program is
set to scan on either execution or creation?

-- 
JN


________________________________________________
Current version is 1.61 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to