home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!ames!sun-barr!rutgers!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: cjkuo@ccmail.norton.com (Jimmy Kuo)
- Newsgroups: comp.virus
- Subject: re[2]: Infection Density
- Message-ID: <0017.9211161950.AA15221@barnabas.cert.org>
- Date: 14 Nov 92 11:11:19 GMT
- Sender: virus-l@lehigh.edu
- Lines: 21
- Approved: news@netnews.cc.lehigh.edu
-
- Tarkan Yetiser writes:
- >It is usually an alert user who discovers the beast, even without an
- >a-v product. After that discovery, they bring in the big guns.
-
- Thank you for saying this! This is the real life world in which we
- live. This is the root of the differences between the philosophies
- espoused by the academics and the words this forum has heard from some
- of the people who represent products.
-
- Products have to be concerned with being fast (invisible) during the
- normal course of a day's work. The normal course is one where there
- are no viruses on the system. When a virus is detected, the big guns
- get called and they arrive to work in a different environment, where
- there is known to be a virus. That would imply a different set of
- tools.
-
- The program is an alarm system. You don't house firemen in everyone's
- homes.
-
- Jimmy Kuo cjkuo@ccmail.norton.com
- Norton AntiVirus Research
-