On 17/12/13 03:12, Allen Elwood RR wrote: > > no, but i follow all standard practices to avoid infection, and this was > my first virus at home > > had a few at work when someone opened an invoice, that wasn't really an > invoice, clicked on the attachment and the entire company was infected > in seconds... > > norton was unable to remove it, so i loaded up microsoft security > essentials which deleted the infected backup .dll and automagically > downloaded a new one from the net for the system32 directory and the > backup to that. > > *nice*
I've already moaned about consultants ... When I first set up networking etc (NT3.5, that dates it! - or even NT 3.1) I put all the apps, networked, on a read-only share on the server. All the departments were write-enabled only for that department (and apart from finance and the directors were globally readable - if you *can* look, most people won't bother. And if they want to look you've got a problem regardless...) So what do our consultants do? They use the server as a workstation, writing their personal information all over the central shared installation! :-( I don't know how effective it would have been at stopping your problem - especially if it was Windows itself which was infected, but that setup should at least make life difficult for malware (PEBKAC idiots excepted! :-( Cheers, Wol _______________________________________________ U2-Users mailing list [email protected] http://listserver.u2ug.org/mailman/listinfo/u2-users
