Re: Java/ByteVerify a Trojan
From: David H. Lipman (DLipman~nospam~_at_Verizon.Net)
Date: Sat, 18 Sep 2004 23:48:07 -0400
No. One just has to go to Windows Update web site. It will do the rest.
"MAP" <MAP@discussions.microsoft.com> wrote in message
| Patching the vulnerability?
| Doesn't this require one to know what version he is using? Which is why I
| asked in the first place.
| Except for using a good A/V of course.
| "David H. Lipman" wrote:
| > Patching the vulnerability and keeping his AV application up-to-date with On Access
| > enabled is what will keep the OP from being re-infected. Like I previously stated, this
| > goes back to 4/'03.
| > http://www.microsoft.com/technet/security/bulletin/MS03-011.mspx
| > Dave
| > "MAP" <MAP@discussions.microsoft.com> wrote in message
| > news:8B0DDB07-DAA3-4277-9DB6-7DF20B6DAECF@microsoft.com...
| > | A good responce not only will help the poster remove the trojan but will
| > | also help him to prevent reinfection tomorrow! In which case the type of Java
| > | he is using
| > | is vey relevant.What's the point of removing it if he just gets infected
| > | again in a few days?