Hello tbudlers, Further to this, you MUST make sure that your Windows installation has been FULLY patched with all the latest updates. This vulnerability has been addressed, but ONLY if you have regularly and RELIGIOUSLY executed all the updates. If you fail to do this, you are vulnerable. Almost ALL the infections I have found have been traced to users accessing their Hotmail from a browser. There are other vectors of infection, but this seems to be the common thread. ALL my clients have a prohibition against employees accessing webmail at work, but they are not ENFORCING it, much to their detriment.
I have one law firm that is TOTALLY down with no machines working in the office at present. They are all XP machines, which figures! I will be leaving for their offices shortly after I send this. There is a tool available to check for (and remove) BLASTER at: http://www.sarc.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html -- Warmest tropical wishes, Spike Quote for the nanosecond: "Ability is a good thing but stability is even better." /"\ ASCII Ribbon Campaign - Against HTML Mail \ / If it aint a webpage it shouldn't be HTML. X Say NO! to bloatmail - ban HTML mail! / \ Ask Spikey, he hates everything (HTML). -------------------------------------------------- Using TheBat! v1.62r hamstrung by Windows XP 5.1 Build 2600 Service Pack 1' -------------------------------------------------- ________________________________________________ Current version is 1.62r | "Using TBUDL" information: http://www.silverstones.com/thebat/TBUDLInfo.html

