I am looking to find out the mechanics of their technique that essentially uses a browser to infect ones
system.
I have personal experience of contracting a what I believe a virus/malware and it ending up somewhere on the client's computer and not
in the browser cache.How is this possible and how can registry be modified at the same time ? I believe that the virus is able to circumvent
the browser memory/disk space and into the rest of the system ? I just don't know how this is done.
Any comments would be appreciated
Victor
Hello Victor,
I think if you click this address http://home.mcafee.com/virusInfo/default.aspx you well find a host of information that well answer all your questions. It's McAfee library.
Thanks CrazyChuck.
I'll definitely go through some of the viruses to see if I can find one that matches the one I have been infected with.
Victor
My pleasure to be of help.
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: