Mike Hammett wrote: > What about forcing those accounts to change paswords?
I've been doing that - again, I'm trying to be proactive rather than reactive. If I told my boss "yeah, we need to change everyone's password" he'd laugh at me. And not in a funny-ha-ha way. The computer belonging to the most recent compromised account is on our workbench right now. My PC-cleanup-guy says he thinks it may have set a new record for number of viruses and spyware on one machine; we're not even sure we can clean it up. We may have to give it back and tell them it needs a full reformat. Given that lots of customers have computers that are screwed-up in that same way, even changing everyone's passwords is of questionable value - they'll still have the same keyloggers on their computers, sending these passwords off to Nigeria or wherever. This isn't a college campus; I can't force my users to have current AV software, or else deny them access. Sometimes I wish I could, but... There will be compromises. I accept this as fact. It's effectively impossible to keep thousands of end-user PCs perfectly clean, especially given our largely-residential, largely-rural, largely-non-techie customer base. I'm just trying to minimize the damage in a proactive way. David Smith MVN.net -------------------------------------------------------------------------------- WISPA Wants You! Join today! http://signup.wispa.org/ -------------------------------------------------------------------------------- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/