X-Virus-Scanned: clean according to Sophos on Logan.com Return-Path: Received: from mx2.netapp.com ([216.240.18.37] verified) by logan.com (CommuniGate Pro SMTP 5.4.4) with ESMTPS id 5466784 for flyrotary@lancaironline.net; Tue, 03 Apr 2012 10:50:08 -0400 Received-SPF: none receiver=logan.com; client-ip=216.240.18.37; envelope-from=echristley@att.net X-IronPort-AV: E=Sophos;i="4.75,362,1330934400"; d="scan'208";a="638250201" Received: from smtp2.corp.netapp.com ([10.57.159.114]) by mx2-out.netapp.com with ESMTP; 03 Apr 2012 07:49:19 -0700 Received: from [10.62.16.167] (ernestc-laptop.hq.netapp.com [10.62.16.167]) by smtp2.corp.netapp.com (8.13.1/8.13.1/NTAP-1.6) with ESMTP id q33EnIwk001076 for ; Tue, 3 Apr 2012 07:49:19 -0700 (PDT) Message-ID: <4F7B0DDD.2060804@att.net> Date: Tue, 03 Apr 2012 10:49:01 -0400 From: Ernest Christley Reply-To: echristley@att.net User-Agent: Thunderbird 2.0.0.24 (X11/20100623) MIME-Version: 1.0 To: Rotary motors in aircraft Subject: Re: [FlyRotary] Re: This Kit changed all my life! References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Ed Anderson wrote: > Yep! its keeping me busy {:<{ > > A computer scan revealed a Malware hidden in some of the Java files and > removed it. I just don't understand why if it can remove it why it can > not stop it from infecting. But, we will see if this fixes the > problem. You would think MS would have some sort of catch so that if > any thing attempts to access your CONTACTS it would warn you as it does > for other applications. > Do a google search on the "lying general" problem for interesting in depth analysis, but in this case, what would a warning do to help. Either the software could forbid access to everyone, or it would have you click an "OK" button so that you could send email. Clicking the button would then call a function that allowed access to the contacts. The virus would simply access the function that the OK button accesses. Most of the underpinnings of Microsoft operating systems are based on a single user computer without network access. Their security has traditionally been atrocious as a result. Why bother locking anything down in software, if only the owner has physical access. But, in their defense, if you come up with a generalize answer to this problem, you will quickly become a hero and a billionaire.