B
- Bob -
How does this trojan get on your machine ?
I visited a (appeared to be reputable) web site the other day and
within a moment or two AVG started popping alerts. An instant later I
had a rogue c:\explorer.exe in addition to stuff in Temp Internet
files. All appears to be OK now after some clean up.
But, I am curious as to how this specific trojan made it on to my
machine? I understand the general principles involved, but what is the
specific exploit it used - and can I plug it?
Thanks,
I visited a (appeared to be reputable) web site the other day and
within a moment or two AVG started popping alerts. An instant later I
had a rogue c:\explorer.exe in addition to stuff in Temp Internet
files. All appears to be OK now after some clean up.
But, I am curious as to how this specific trojan made it on to my
machine? I understand the general principles involved, but what is the
specific exploit it used - and can I plug it?
Thanks,