RL, you seem to be a combative personality type based on your posts.
Projection noted.
Many people that do REAL work use IM all over the planet, many
development teams, support teams, etc...
I suppose if you are in sales. Development teams? Why? Except for
group online meetings, and even, then (Skype video is better) I would
think email is better...but perhaps you're right.
What you seem to be missing is the concept of how malware is spread on
windows machines - exploits and social engineering as well as drive-by
web attacks. Like many malware spread via IM, Facebook, email, they all
appear to be legit attachments, files, links, until you inspect them and
for most people that's too late.
Fine. THEORY. Give me a real work EXAMPLE Leythos.
HA HA HA. A comedian. A combative comedian. Andrew Dice Clay your
show name?
that having an Antivirus solution doesn't protect
you in all cases. We've all, at least those of us that run IT companies,
have seen exploits get past "Local User" accounts, such as the SQL
injection ones....
BU LL S H IT. Now you've become the "Rex Ballard" of C.O.L.A. SQL
injection attacks are ancient history and obsolete, due to the way
commands are entered, parametrically, in ADO.NET (Windows database
language). I know, as I code. Any other falsehoods you care to
share?
So, running as a local user, with any version of anti-virus software
from any vendor, all patches installed from MS, I've seen, first hand,
hundreds of Windows WP and now Vista/Win 7 computers compromised.
Nope. You have not seen. What you've seen (and I've seen this too) is
a corporation get infected because a user installed a virus by
mistake, and sent it around to co-workers (typically via email) who
did not have the latest AV patches installed on their machines.
Corporations use old hardware and software and are often behind the
times in Safe Hex.
Oh, and most of those computers were not using IM, didn't even have it
installed.
Oh, really? Oh. Doubtful. How did they get infected then?
RL