Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment My preferred removal Technique (Score 1) 334

We remove the infected hard drive, then scan it on a linux box using five different AntiVirus/Spyware programs. Then we boot in safe mode back on the original machine and scan it as a running system. Some of the new virus / spyware programs are actually running the installed avg within a wrapper and not allowing them avg to see the whole hard drive. Really pretty well written if they could have gone unobserved.

Comment Sounds like a poor choice (Score 1) 384

Sounds like a poor choice of mail systems together with poor controls. As an ISP, we handle thousands of mails per second. If I send a single mail to every customer in our system (thousands) the total time to have them delivered to the mail box (server) is less than 1.5 minutes. Rate controls should also be used to ensure no one mail can slam a system.: max messages per second max messages per user max connections per client etc.

Slashdot Top Deals

If a subordinate asks you a pertinent question, look at him as if he had lost his senses. When he looks down, paraphrase the question back at him.

Working...