Amen Michael... In addition you must do regular backups of your hard drive(s). Even the best AV programs can let something sneak through and without a backup of your programs and data you are sunk. Backups also protect you should your hard drive fail or you have other hardware problems. I back up my drives at least once a week and more often if I feel it necessary. Before I do my backup I manually run a virus scan and a spyware scan and clean up anything they find so I have a clean system should I have to restore.
My backup program of choice is Norton Ghost although I am sure there are others out there. Regards, Tom Maugham -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michael Wilkinson Sent: October 01, 2004 5:27 PM To: [EMAIL PROTECTED] Subject: Re: [PRODIG] Malicious jpegs in open I fail to understand why anyone connected to the internet does not have the best AV software they can buy. I learnt the hard way when even the PC manufacturer was unaware of the problems and in the mid 90s had motherboards and memory swapped several times on warranty all down to a virus unwittingly installed by an equipment supplier ,thank you Imapro UK. At that time it took 3 months out of my working year and I was rescued by someone who simply said,"It could be a virus" You have to buy the best. Second best is not ever good enough and if you are too tight to buy the best you deserve to crash. Regards Michael Wilkinson. 106 Holyhead Rd, Ketley, Telford, Shropshire. England .TF1 5DJ 44 (0) 1952 618986. www.infocus-photography.co.uk For Negatives & transparencies from digital files ___________________________________ ----- Original Message ----- From: "Skyscan" Subject: [PRODIG] Malicious jpegs in open > Hi Folks I pass on this worrying news item > regards > Brenda Marks, Skyscan > > JPEG exploit goes wild > [PC Pro] 11:57 > > > Code that was able to take advantage of the JPEG bug began circulating > on the Internet about a week ago. > > As is common with much of the malicious software written to attack > Microsoft vulnerabilities, this particular exploit appeared after > Microsoft had issued a patch. Hackers often reverse engineer > Microsoft's patches in order to create code to exploit the hole that > the patch fixed. However, the time between releasing a patch and the > appearance of malicious code to exploit the identified vulnerability > grows ever shorter. Security experts greatest fear is a 'zero-day' > exploit, where hackers launch exploit code less than a day after > Microsoft issues a patch, so that no-one has time to update their > systems. =============================================================== GO TO http://www.prodig.org for ~ GUIDELINES ~ un/SUBSCRIBING ~ ITEMS for SALE =============================================================== GO TO http://www.prodig.org for ~ GUIDELINES ~ un/SUBSCRIBING ~ ITEMS for SALE
