TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Gregg N
from: Geo
date: 2006-01-13 05:55:26
subject: Re: new patches today

From: "Geo" 

"Gregg N"  wrote in message
news:43c7325e{at}w3.nls.net...


> No, the piece of mind that you can know that certain subdirectories and
> registry keys could not possibly have been modified by the thing, and
> that you can be sure that the integrity of the operating system itself
> has not been compromised, so that you can log in as administrator and
> restore the system to the way it was before the infection. If you run as
> admin, you never can be quite sure without reformatting and reinstalling
> everything.

First, I don't know that it really matters once you have hostile code
running on your box it's game over in my book but ok lets assume you are
correct for a moment..

You don't get that piece of mind, because the first tuesday of every month
you need to login as admin to patch your machine and soon as you do that
the code you are infected with is now running as admin. (or maybe you
logged in as admin sooner than that to do something else like say run a
backup or do a restore or trouble shoot some problem that the infection
caused).

Geo.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.