Re: Java/ByteVerify a Trojan

From: David H. Lipman (DLipman~nospam~_at_Verizon.Net)
Date: 09/19/04


Date: Sat, 18 Sep 2004 23:48:07 -0400

No. One just has to go to Windows Update web site. It will do the rest.

Dave

"MAP" <MAP@discussions.microsoft.com> wrote in message
news:A5327251-D76A-46D4-AE0D-5D78FDC269D5@microsoft.com...
| Patching the vulnerability?
| Doesn't this require one to know what version he is using? Which is why I
| asked in the first place.
| Except for using a good A/V of course.
|
| "David H. Lipman" wrote:
|
| > Patching the vulnerability and keeping his AV application up-to-date with On Access
scanning
| > enabled is what will keep the OP from being re-infected. Like I previously stated, this
| > goes back to 4/'03.
| >
| > http://www.microsoft.com/technet/security/bulletin/MS03-011.mspx
| >
| > Dave
| >
| >
| >
| > "MAP" <MAP@discussions.microsoft.com> wrote in message
| > news:8B0DDB07-DAA3-4277-9DB6-7DF20B6DAECF@microsoft.com...
| > | A good responce not only will help the poster remove the trojan but will
| > | also help him to prevent reinfection tomorrow! In which case the type of Java
| > | he is using
| > | is vey relevant.What's the point of removing it if he just gets infected
| > | again in a few days?
| >
| >
| >