DM said:
I've seen worse - someone at work asked me why their email was not working.
It turned out they had poured 1/2 a cup of tea in the keyboard!!!
I bet that information didn't come out easily. Most users will try to
make you believe they did nothing to cause a failure. They are in fact
happy that viruses exist to take the blame.
There were some inside zip files but the rest were ordinary files. None were
in mail folders. Most appeared to be trojans - they have a teenage daughter
who is into downloading music files.
As for archive files and other container files the AV might not be able
to delete only the malware file from them, so they don't attempt it.
They won't delete the whole thing because the user may still want the
other content. Some trojans aren't covered in the removal feature of the
AV because they are not specifically identified - only detected. In that
case you follow the generic instructions for manual removal. Actually,
it is a bonus that any automatic removal at all is offered.
I was just surprised that as Norton tried to delete the files it was unable
to do so despite there being no reason why they could not be deleted.
There probably was a reason, we just don't know what it was yet.
I knew
how to delete them (I'm the sysadmin at work) but as Norton is aimed at
ordinary users most of whom would not know how to, or be afraid to delete
something they don't know about.
That is sort of funny when you think about it - the main thing that the
average user is incapable of is the detection of malware. Most are
capable of not executing it or even deleting it as it arrives.
Prevention is relatively easy aside from the problem of detection - and
that is the reason they (and we) need AV scanners. If they need to
delete something that the OS or resident malware is "protecting", some
even know how to "clean boot" and delete from there. But alas - AV has
become a crutch for doing all of the things that the users are actually
quite capable of doing for themselves yet can't be bothered to make the
effort.
Now we're stuck with the mindset that "removal" is the essential part of
an AV product and executing malware is no problem because you can run a
removal tool after the fact. E-mail vector worms (and blended threats)
make their mark by using the time allotted them between their release
and the removal tools' appearance.
Sorry for the rant - but I feel better now.
)