[Others are sympathetic to the Microsoft plight.] The problem is that it is nearly impossible to offer security without blocking legitimate files, ... Microsoft's effort is a good first step. At least it should reduce the speed at which viruses can spread. |
A worm is specifically designed to spread itself from one computer to another, ... It will infect a computer once, deploy its payload, and then try to move on to other computers. |
A worm is specifically designed to spread itself from one computer to another. It will infect a computer once, deploy its payload, and then try to move on to other computers. |
Basically if you don't have to wait and your users don't have to wait, that's important. Turnaround time is going to be critical in this field. Every minute that an IS manger is waiting, they have people who are waiting to get their systems back. |
By the end of last year, there were more than 200 million PCs connected to the Internet. Ninety percent of these are Windows machines running the same applications, such as Word, Microsoft Exchange, and Excel. |
I love my job a lot, ... I look forward to every day. It's actually quite challenging. |
If people receive executables in the mail, they should not run them, |
It is very different from anything we have seen before. For the first time, we have a computing monoculture. Monocultures in the natural world are extremely vulnerable to pests such as viruses. |
Rather than humans doing the analysis, we're going to have computers do it. That way we won't have to come back from our vacations. |
Think of it like this: If you see someone walking down your street wearing a mask and carrying an automatic weapon, you might get suspicious. Our heuristic software is designed to recognize suspicious code. |
What it will do is it will search through the C through Z drives and select randomly a set of files of varying extensions, and then it will zero out or kill the contents of an arbitrary extension of those files, |
What it will do is search through the C: through Z: drives and select randomly a set of files of varying extensions, and then it will zero out or kill the contents of an arbitrary extension of those files, |