Amen Michael...

In addition you must do regular backups of your hard drive(s).  Even the
best AV programs can let something sneak through and without a backup of
your programs and data you are sunk.  Backups also protect you should your
hard drive fail or you have other hardware problems.  I back up my drives at
least once a week and more often if I feel it necessary.  Before I do my
backup I manually run a virus scan and a spyware scan and clean up anything
they find so I have a clean system should I have to restore.

My backup program of choice is Norton Ghost although I am sure there are
others out there.

Regards,
Tom Maugham 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Michael
Wilkinson
Sent: October 01, 2004 5:27 PM
To: [EMAIL PROTECTED]
Subject: Re: [PRODIG] Malicious jpegs in open 


I fail to understand why anyone connected to the internet does not have the
best AV software they can buy. I learnt the hard way when even the PC
manufacturer was unaware of the problems and in the mid 90s had motherboards
and memory swapped several times on warranty  all down to a virus
unwittingly installed by an equipment supplier ,thank you Imapro UK. At that
time it took 3 months out of my working year and I was rescued by someone
who simply said,"It could be a virus" You have to buy the best. Second best
is not ever good enough and if you are too tight to buy the best you deserve
to crash. Regards Michael Wilkinson. 106 Holyhead Rd, Ketley, Telford,
Shropshire. England .TF1 5DJ  44 (0)  1952 618986.
www.infocus-photography.co.uk For Negatives & transparencies from digital
files

___________________________________
----- Original Message ----- 
From: "Skyscan" Subject: [PRODIG] Malicious jpegs in open


> Hi Folks I pass on this worrying news item
> regards
> Brenda Marks, Skyscan
>
> JPEG exploit goes wild
> [PC Pro] 11:57
>

>
> Code that was able to take advantage of the JPEG bug began circulating 
> on the Internet about a week ago.
>
> As is common with much of the malicious software written to attack 
> Microsoft vulnerabilities, this particular exploit appeared after 
> Microsoft had issued a patch. Hackers often reverse engineer 
> Microsoft's patches in order to create code to exploit the hole that 
> the patch fixed. However, the time between releasing a patch and the 
> appearance of malicious code to exploit the identified vulnerability 
> grows ever shorter. Security experts greatest fear is a 'zero-day' 
> exploit, where hackers launch exploit code less than a day after 
> Microsoft issues a patch, so that no-one has time to update their 
> systems.

===============================================================
GO TO http://www.prodig.org for ~ GUIDELINES ~ un/SUBSCRIBING ~ ITEMS for
SALE


===============================================================
GO TO http://www.prodig.org for ~ GUIDELINES ~ un/SUBSCRIBING ~ ITEMS for SALE

Reply via email to