On 17/12/13 03:12, Allen Elwood RR wrote:
> 
> no, but i follow all standard practices to avoid infection, and this was
> my first virus at home
> 
> had a few at work when someone opened an invoice, that wasn't really an
> invoice, clicked on the attachment and the entire company was infected
> in seconds...
> 
> norton was unable to remove it, so i loaded up microsoft security
> essentials which deleted the infected backup .dll and automagically
> downloaded a new one from the net for the system32 directory and the
> backup to that.
> 
> *nice*

I've already moaned about consultants ...

When I first set up networking etc (NT3.5, that dates it! - or even NT
3.1) I put all the apps, networked, on a read-only share on the server.
All the departments were write-enabled only for that department (and
apart from finance and the directors were globally readable - if you
*can* look, most people won't bother. And if they want to look you've
got a problem regardless...)

So what do our consultants do? They use the server as a workstation,
writing their personal information all over the central shared
installation! :-(

I don't know how effective it would have been at stopping your problem -
especially if it was Windows itself which was infected, but that setup
should at least make life difficult for malware (PEBKAC idiots excepted! :-(

Cheers,
Wol
_______________________________________________
U2-Users mailing list
[email protected]
http://listserver.u2ug.org/mailman/listinfo/u2-users

Reply via email to