David H. Lipman wrote:
> From: "John Mason Jr" <notvalid@cox.net.invalid>
>
>
> | <snip>
> |
> | SG normally raises the same point, and you might not like it but it is
> | true.
> |
> | If a machine has been compromised/infected, and you rely on signature
> | based cleaning/detection methods then you cannot be sure you are not
> | still compromised.
> |
> | The correct way to recover is to restore from known good media, and then
> | make sure that you patch the vulnerability that allowed the compromise
> | in the first place
> |
> | If you accept the risk that you may still be compromised then go ahead
> | and use signature based solutions.
> |
> | John
> |
>
> First you have to define "compramised".
>
> Is a system compramised if you have a Gain/Gator malware infection or NYB virus on a FAT32
> based system ?
yes and the habits that caused the infection, may have resulted in other
currently undetected malware on the machine.
I do believe that there is a use for malware detection/removal software,
but that the risks are not well explained in a manner that is
understandable to the average user.
John


Reply With Quote