On Monday 14 October 2002 02:21, Jamin W. Collins wrote: > For example, lets > say that for some reason an exploit is found and it will take a few > hours or days to patch. Meanwhile, the signature of the exploit is > already known. In one case it requires someone to write a patch to > resolve the exploit, then for the effected sysadmin(s) to acquire and > apply said patch, after becoming aware of it's existence. On the > other, it simply requires the signature of the exploit to be added to > a database, which in many cases is automatically updated.
Yes, that is indeed an excellent argument, and it does indeed punch a hole in my argument. OK, so I guess virus scanners may be a good tool after all. Best, Kjetil -- Kjetil Kjernsmo Astrophysicist/IT Consultant/Skeptic/Ski-orienteer/Orienteer/Mountaineer [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] Homepage: http://www.kjetil.kjernsmo.net/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]