Malicous software removal tool

Discussion in 'Virus Information' started by Dseqra, Jan 11, 2005.

  1. Dseqra

    Dseqra Guest

    Ok, so I got this tool from Automatic updates (win xp) and windowsupdate.com
    shows that it is installed but I'm stumped on how to run it. Doesnt seem to
    have any entry on the start menu, nor could I find a command line option to
    run it. Any ideas?

    Dseqra
     
    Dseqra, Jan 11, 2005
    #1
    1. Advertisements

  2. Dseqra

    Bigbruva Guest

    For those who don't know about this tool (it only went live today), go here

    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Dseqra, check this link out for information

    http://support.microsoft.com/kb/890830

    HTH

    BB
     
    Bigbruva, Jan 11, 2005
    #2
    1. Advertisements

  3. Supposedly it is an Internet worm tool that searches for the following...

    Win32/Berbew
    Win32/Doomjuice
    Win32/Gaobot
    Win32/Msblast
    Win32/Mydoom
    Win32/Nachi
    Win32/Sasser
    Win32/Zindos

    However, the tool is ONLY for Win2K, WinXP and Win2003 Server

    --
    Dave




    | For those who don't know about this tool (it only went live today), go here
    |
    |
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
    |
    | Dseqra, check this link out for information
    |
    | http://support.microsoft.com/kb/890830
    |
    | HTH
    |
    | BB
    |
    | | > Ok, so I got this tool from Automatic updates (win xp) and
    | > windowsupdate.com shows that it is installed but I'm stumped on how to run
    | > it. Doesnt seem to have any entry on the start menu, nor could I find a
    | > command line option to run it. Any ideas?
    | >
    | > Dseqra
    | >
    |
    |
     
    David H. Lipman, Jan 11, 2005
    #3
  4. Dseqra

    robin Guest

    it seems to run only when you go to windows update or use automatic update
    in xp
    I also could not find an icon for it and read microsoft's pages to figure
    this out
    it should at least tell you, it is run this way only

    robin
     
    robin, Jan 11, 2005
    #4
  5. Dseqra

    Bigbruva Guest

    You are right David and it is VERY important to understand it has NO
    real-time monitoring functionality.

    You still need a real-time antivirus scanner

    BB
     
    Bigbruva, Jan 11, 2005
    #5
  6. Dseqra

    Jim Macklin Guest

    http://support.microsoft.com/?kbid=890830
    --
    The people think the Constitution protects their rights;
    But government sees it as an obstacle to be overcome.


    | Ok, so I got this tool from Automatic updates (win xp) and
    windowsupdate.com
    | shows that it is installed but I'm stumped on how to run
    it. Doesnt seem to
    | have any entry on the start menu, nor could I find a
    command line option to
    | run it. Any ideas?
    |
    | Dseqra
    |
    |
     
    Jim Macklin, Jan 11, 2005
    #6
  7. Dseqra

    Max Burke Guest

    Dseqra scribbled: Ok, so I got this tool from Automatic updates (win xp)
    I allowed WU to install it, but also manually downloaded it. I went back to
    WU after rebooting, but there is nothing on that page that allows me to run
    the tool....

    The only way I have found to run it is by manually downloading the install
    file from:

    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    ....and double clicking on it. It means you have to agree to the EULA each
    time.... :-(
    No way of automating it's scan through task scheduler when that has to be
    done by the user...

    This webpage http://support.microsoft.com/?kbid=890830 says:

    <quote>
    When the Malicious Software Removal Tool runs, it performs the following
    functions. Except where noted, the tool has the same behavior independent of
    what command-line switches you use or how you download and run the tool.
    Note that the tool is not actually installed on a computer. Therefore, no
    entry is created for it in the Programs folder or in Add/Remove Programs.
    <end quote>

    ....which appears to say that it doesn't actually install an 'executable' on
    the hard drive that users can run.

    Still looking CLOSELY at what it reports back to Microsoft each time it's
    run. Dont know how that's going to work if I'm not online when I run it.
     
    Max Burke, Jan 12, 2005
    #7
  8. Max,

    When executed via WU / AU, the tool does not remain on your system. If you
    would like to re-run the tool yourself, you can download it from the
    Microsoft Download Center (i.e.
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en).
    If you would like it to run in an automated fashion, you can use the /Q
    switch, which will suppress the UI.

    Hope that helps.

    Matt
     
    Matt Braverman [MSFT], Jan 12, 2005
    #8
  9. Dseqra

    RJK Guest

    MS could have pointed out that after downloading it, it runs, and then
    VANISHES !! :)

    regards, Richard
     
    RJK, Jan 12, 2005
    #9
  10. Dseqra

    Max Burke Guest

    Matt Braverman [MSFT] scribbled:
    Which I have done....
    Which does NOT suppress the requirement for a user to accept the EULA each
    time it's run.
     
    Max Burke, Jan 12, 2005
    #10
  11. Dseqra

    Max Burke Guest

    RJK scribbled: MS could have pointed out that after downloading it, it
    They do, but you have to go looking for that fact....

    This webpage http://support.microsoft.com/?kbid=890830 says:
    <quote>
    Note that the tool is not actually installed on a computer. Therefore, no
    entry is created for it in the Programs folder or in Add/Remove Programs.
    <end quote>

    ....which appears to say that it doesn't actually install an 'executable' on
    the hard drive that users can run.
     
    Max Burke, Jan 12, 2005
    #11
  12. Actually, just go the online scanner --
    http://www.microsoft.com/security/malwareremove/default.mspx

    That's it !

    --
    Dave




    | > Matt Braverman [MSFT] scribbled:
    |
    | > Max,
    | > When executed via WU / AU, the tool does not remain on your system.
    | > If you would like to re-run the tool yourself, you can download it
    | > from the Microsoft Download Center (i.e.
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en).
    |
    | Which I have done....
    |
    | > If you would like it to run in an automated fashion, you can use the
    | > /Q switch, which will suppress the UI.
    |
    | Which does NOT suppress the requirement for a user to accept the EULA each
    | time it's run.
    |
    | > Hope that helps.
    | > Matt
    |
    |
    |
    | > | >>> Dseqra scribbled: Ok, so I got this tool from Automatic updates
    | >>> (win xp) and
    | >>> windowsupdate.com shows that it is installed but I'm stumped on how
    | >>> to run it. Doesnt seem to have any entry on the start menu, nor
    | >>> could I find a command line option to run it. Any ideas?
    | >>
    | >> I allowed WU to install it, but also manually downloaded it. I went
    | >> back to WU after rebooting, but there is nothing on that page that
    | >> allows me to run the tool....
    | >>
    | >> The only way I have found to run it is by manually downloading the
    | >> install file from:
    | >>
    | >>
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
    | >>
    | >> ...and double clicking on it. It means you have to agree to the EULA
    | >> each time.... :-(
    | >> No way of automating it's scan through task scheduler when that has
    | >> to be done by the user...
    | >>
    | >> This webpage http://support.microsoft.com/?kbid=890830 says:
    | >>
    | >> <quote>
    | >> When the Malicious Software Removal Tool runs, it performs the
    | >> following functions. Except where noted, the tool has the same
    | >> behavior independent of what command-line switches you use or how
    | >> you download and run the tool. Note that the tool is not actually
    | >> installed on a computer. Therefore, no entry is created for it in
    | >> the Programs folder or in Add/Remove Programs.
    | >> <end quote>
    | >>
    | >> ...which appears to say that it doesn't actually install an
    | >> 'executable' on the hard drive that users can run.
    | >>
    | >> Still looking CLOSELY at what it reports back to Microsoft each time
    | >> it's run. Dont know how that's going to work if I'm not online when
    | >> I run it. --
    | >>
    | >> Replace the obvious with paradise.net to email me
    | >> Found Images
    | >> http://homepages.paradise.net.nz/~mlvburke
    |
    | --
    |
    | Replace the obvious with paradise.net to email me
    | Found Images
    | http://homepages.paradise.net.nz/~mlvburke
    |
     
    David H. Lipman, Jan 12, 2005
    #12
  13. Dseqra

    Bigbruva Guest

    That is okay for a few users but I think they have provided the download
    option to allow larger organizations to deploy it on their internal network
    (without every using having to download it) or on computers that don't have
    Internet access.

    It is good to see MS release a small exe that just does the job, nice job
    guys ;-)

    BB

     
    Bigbruva, Jan 12, 2005
    #13
  14. In a properly configured corp. LAN environment, there is ZERO need to run that limited
    I-worm scanner.

    --
    Dave




    | That is okay for a few users but I think they have provided the download
    | option to allow larger organizations to deploy it on their internal network
    | (without every using having to download it) or on computers that don't have
    | Internet access.
    |
    | It is good to see MS release a small exe that just does the job, nice job
    | guys ;-)
    |
    | BB
    |
    | | > Actually, just go the online scanner --
    | > http://www.microsoft.com/security/malwareremove/default.mspx
    | >
    | > That's it !
    | >
    | > --
    | > Dave
    | >
    | >
    | >
    | >
    | > | > | > Matt Braverman [MSFT] scribbled:
    | > |
    | > | > Max,
    | > | > When executed via WU / AU, the tool does not remain on your system.
    | > | > If you would like to re-run the tool yourself, you can download it
    | > | > from the Microsoft Download Center (i.e.
    | > | >
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en).
    | > |
    | > | Which I have done....
    | > |
    | > | > If you would like it to run in an automated fashion, you can use the
    | > | > /Q switch, which will suppress the UI.
    | > |
    | > | Which does NOT suppress the requirement for a user to accept the EULA
    | > each
    | > | time it's run.
    | > |
    | > | > Hope that helps.
    | > | > Matt
    | > |
    | > |
    | > |
    | > | > | > | >>> Dseqra scribbled: Ok, so I got this tool from Automatic updates
    | > | >>> (win xp) and
    | > | >>> windowsupdate.com shows that it is installed but I'm stumped on how
    | > | >>> to run it. Doesnt seem to have any entry on the start menu, nor
    | > | >>> could I find a command line option to run it. Any ideas?
    | > | >>
    | > | >> I allowed WU to install it, but also manually downloaded it. I went
    | > | >> back to WU after rebooting, but there is nothing on that page that
    | > | >> allows me to run the tool....
    | > | >>
    | > | >> The only way I have found to run it is by manually downloading the
    | > | >> install file from:
    | > | >>
    | > | >>
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
    | > | >>
    | > | >> ...and double clicking on it. It means you have to agree to the EULA
    | > | >> each time.... :-(
    | > | >> No way of automating it's scan through task scheduler when that has
    | > | >> to be done by the user...
    | > | >>
    | > | >> This webpage http://support.microsoft.com/?kbid=890830 says:
    | > | >>
    | > | >> <quote>
    | > | >> When the Malicious Software Removal Tool runs, it performs the
    | > | >> following functions. Except where noted, the tool has the same
    | > | >> behavior independent of what command-line switches you use or how
    | > | >> you download and run the tool. Note that the tool is not actually
    | > | >> installed on a computer. Therefore, no entry is created for it in
    | > | >> the Programs folder or in Add/Remove Programs.
    | > | >> <end quote>
    | > | >>
    | > | >> ...which appears to say that it doesn't actually install an
    | > | >> 'executable' on the hard drive that users can run.
    | > | >>
    | > | >> Still looking CLOSELY at what it reports back to Microsoft each time
    | > | >> it's run. Dont know how that's going to work if I'm not online when
    | > | >> I run it. --
    | > | >>
    | > | >> Replace the obvious with paradise.net to email me
    | > | >> Found Images
    | > | >> http://homepages.paradise.net.nz/~mlvburke
    | > |
    | > | --
    | > |
    | > | Replace the obvious with paradise.net to email me
    | > | Found Images
    | > | http://homepages.paradise.net.nz/~mlvburke
    | > |
    | >
    | >
    |
    |
     
    David H. Lipman, Jan 12, 2005
    #14
  15. Max,

    It does, in fact, suppress that requirement. When you run the tool with the
    /Q switch, you do not need to accept a EULA.

    Matt

     
    Matt Braverman [MSFT], Jan 13, 2005
    #15
  16. Dseqra

    Bigbruva Guest

    Sorry David I don't agree

    In environments that have mobile computers and VPN connectivity a tool like
    this can be useful to help test the condition of the systems that have been
    exposed to the untrusted world outside of the network.
    Does this application replace any AV apps? Not at all! However it is simple,
    small, and targeted which IMHO makes it useful for things like a quarantine
    solution or off network system checking.

    BB

     
    Bigbruva, Jan 13, 2005
    #16
  17. I would use a Broad-spectrum scanner. One that targets just nine is just insufficient.
    Otherwise you would have to use many different scanners.

    --
    Dave




    | Sorry David I don't agree
    |
    | In environments that have mobile computers and VPN connectivity a tool like
    | this can be useful to help test the condition of the systems that have been
    | exposed to the untrusted world outside of the network.
    | Does this application replace any AV apps? Not at all! However it is simple,
    | small, and targeted which IMHO makes it useful for things like a quarantine
    | solution or off network system checking.
    |
    | BB
    |
    | | > In a properly configured corp. LAN environment, there is ZERO need to run
    | > that limited
    | > I-worm scanner.
    | >
    | > --
    | > Dave
    | >
    | >
    | >
    | >
    | > | > | That is okay for a few users but I think they have provided the download
    | > | option to allow larger organizations to deploy it on their internal
    | > network
    | > | (without every using having to download it) or on computers that don't
    | > have
    | > | Internet access.
    | > |
    | > | It is good to see MS release a small exe that just does the job, nice
    | > job
    | > | guys ;-)
    | > |
    | > | BB
    | > |
    | > | | > | > Actually, just go the online scanner --
    | > | > http://www.microsoft.com/security/malwareremove/default.mspx
    | > | >
    | > | > That's it !
    | > | >
    | > | > --
    | > | > Dave
    | > | >
    | > | >
    | > | >
    | > | >
    | > | > | > | > | > Matt Braverman [MSFT] scribbled:
    | > | > |
    | > | > | > Max,
    | > | > | > When executed via WU / AU, the tool does not remain on your
    | > system.
    | > | > | > If you would like to re-run the tool yourself, you can download it
    | > | > | > from the Microsoft Download Center (i.e.
    | > | > | >
    | > | >
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en).
    | > | > |
    | > | > | Which I have done....
    | > | > |
    | > | > | > If you would like it to run in an automated fashion, you can use
    | > the
    | > | > | > /Q switch, which will suppress the UI.
    | > | > |
    | > | > | Which does NOT suppress the requirement for a user to accept the
    | > EULA
    | > | > each
    | > | > | time it's run.
    | > | > |
    | > | > | > Hope that helps.
    | > | > | > Matt
    | > | > |
    | > | > |
    | > | > |
    | > | > | > | > | > | >>> Dseqra scribbled: Ok, so I got this tool from Automatic updates
    | > | > | >>> (win xp) and
    | > | > | >>> windowsupdate.com shows that it is installed but I'm stumped on
    | > how
    | > | > | >>> to run it. Doesnt seem to have any entry on the start menu, nor
    | > | > | >>> could I find a command line option to run it. Any ideas?
    | > | > | >>
    | > | > | >> I allowed WU to install it, but also manually downloaded it. I
    | > went
    | > | > | >> back to WU after rebooting, but there is nothing on that page
    | > that
    | > | > | >> allows me to run the tool....
    | > | > | >>
    | > | > | >> The only way I have found to run it is by manually downloading
    | > the
    | > | > | >> install file from:
    | > | > | >>
    | > | > | >>
    | > | >
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
    | > | > | >>
    | > | > | >> ...and double clicking on it. It means you have to agree to the
    | > EULA
    | > | > | >> each time.... :-(
    | > | > | >> No way of automating it's scan through task scheduler when that
    | > has
    | > | > | >> to be done by the user...
    | > | > | >>
    | > | > | >> This webpage http://support.microsoft.com/?kbid=890830 says:
    | > | > | >>
    | > | > | >> <quote>
    | > | > | >> When the Malicious Software Removal Tool runs, it performs the
    | > | > | >> following functions. Except where noted, the tool has the same
    | > | > | >> behavior independent of what command-line switches you use or how
    | > | > | >> you download and run the tool. Note that the tool is not actually
    | > | > | >> installed on a computer. Therefore, no entry is created for it in
    | > | > | >> the Programs folder or in Add/Remove Programs.
    | > | > | >> <end quote>
    | > | > | >>
    | > | > | >> ...which appears to say that it doesn't actually install an
    | > | > | >> 'executable' on the hard drive that users can run.
    | > | > | >>
    | > | > | >> Still looking CLOSELY at what it reports back to Microsoft each
    | > time
    | > | > | >> it's run. Dont know how that's going to work if I'm not online
    | > when
    | > | > | >> I run it. --
    | > | > | >>
    | > | > | >> Replace the obvious with paradise.net to email me
    | > | > | >> Found Images
    | > | > | >> http://homepages.paradise.net.nz/~mlvburke
    | > | > |
    | > | > | --
    | > | > |
    | > | > | Replace the obvious with paradise.net to email me
    | > | > | Found Images
    | > | > | http://homepages.paradise.net.nz/~mlvburke
    | > | > |
    | > | >
    | > | >
    | > |
    | > |
    | >
    | >
    |
    |
     
    David H. Lipman, Jan 13, 2005
    #17
  18. Dseqra

    Bigbruva Guest

    Sure David, as I said, it does not replace an active AV scanner. However to
    say this tool has "ZERO" use in an organization is blinkered.
    There are many uses for a small targeted tool, that does not required local
    installation, and addresses the major threats, quickly.
    This tool will be updated monthly (or so MS say) so I am sure the detection
    signatures will increase.

    Anyway we finally have an AV product from MS! So I guess for now we will
    just have to "Watch this space".
    If MS are true to their past version 3.0 with rock! :)

    BB

     
    Bigbruva, Jan 14, 2005
    #18
  19. I guess we can also say, Microsoft "is" now in the anti virus/anti malware business !

    I guess that's what you get with Microsoft buying both Giant and RAV.

    --
    Dave




    | Sure David, as I said, it does not replace an active AV scanner. However to
    | say this tool has "ZERO" use in an organization is blinkered.
    | There are many uses for a small targeted tool, that does not required local
    | installation, and addresses the major threats, quickly.
    | This tool will be updated monthly (or so MS say) so I am sure the detection
    | signatures will increase.
    |
    | Anyway we finally have an AV product from MS! So I guess for now we will
    | just have to "Watch this space".
    | If MS are true to their past version 3.0 with rock! :)
    |
    | BB
    |
    | | >I would use a Broad-spectrum scanner. One that targets just nine is just
    | >insufficient.
    | > Otherwise you would have to use many different scanners.
    | >
    | > --
    | > Dave
    | >
    | >
    | >
    | >
    | > | > | Sorry David I don't agree
    | > |
    | > | In environments that have mobile computers and VPN connectivity a tool
    | > like
    | > | this can be useful to help test the condition of the systems that have
    | > been
    | > | exposed to the untrusted world outside of the network.
    | > | Does this application replace any AV apps? Not at all! However it is
    | > simple,
    | > | small, and targeted which IMHO makes it useful for things like a
    | > quarantine
    | > | solution or off network system checking.
    | > |
    | > | BB
    | > |
    | > | | > | > In a properly configured corp. LAN environment, there is ZERO need to
    | > run
    | > | > that limited
    | > | > I-worm scanner.
    | > | >
    | > | > --
    | > | > Dave
    | > | >
    | > | >
    | > | >
    | > | >
    | > | > | > | > | That is okay for a few users but I think they have provided the
    | > download
    | > | > | option to allow larger organizations to deploy it on their internal
    | > | > network
    | > | > | (without every using having to download it) or on computers that
    | > don't
    | > | > have
    | > | > | Internet access.
    | > | > |
    | > | > | It is good to see MS release a small exe that just does the job,
    | > nice
    | > | > job
    | > | > | guys ;-)
    | > | > |
    | > | > | BB
    | > | > |
    | > | > | | > | > | > Actually, just go the online scanner --
    | > | > | > http://www.microsoft.com/security/malwareremove/default.mspx
    | > | > | >
    | > | > | > That's it !
    | > | > | >
    | > | > | > --
    | > | > | > Dave
    | > | > | >
    | > | > | >
    | > | > | >
    | > | > | >
    | > | > | > | > | > | > | > Matt Braverman [MSFT] scribbled:
    | > | > | > |
    | > | > | > | > Max,
    | > | > | > | > When executed via WU / AU, the tool does not remain on your
    | > | > system.
    | > | > | > | > If you would like to re-run the tool yourself, you can
    | > download it
    | > | > | > | > from the Microsoft Download Center (i.e.
    | > | > | > | >
    | > | > | >
    | > | >
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en).
    | > | > | > |
    | > | > | > | Which I have done....
    | > | > | > |
    | > | > | > | > If you would like it to run in an automated fashion, you can
    | > use
    | > | > the
    | > | > | > | > /Q switch, which will suppress the UI.
    | > | > | > |
    | > | > | > | Which does NOT suppress the requirement for a user to accept the
    | > | > EULA
    | > | > | > each
    | > | > | > | time it's run.
    | > | > | > |
    | > | > | > | > Hope that helps.
    | > | > | > | > Matt
    | > | > | > |
    | > | > | > |
    | > | > | > |
    | > | > | > | > | > | > | > | >>> Dseqra scribbled: Ok, so I got this tool from Automatic
    | > updates
    | > | > | > | >>> (win xp) and
    | > | > | > | >>> windowsupdate.com shows that it is installed but I'm stumped
    | > on
    | > | > how
    | > | > | > | >>> to run it. Doesnt seem to have any entry on the start menu,
    | > nor
    | > | > | > | >>> could I find a command line option to run it. Any ideas?
    | > | > | > | >>
    | > | > | > | >> I allowed WU to install it, but also manually downloaded it.
    | > I
    | > | > went
    | > | > | > | >> back to WU after rebooting, but there is nothing on that page
    | > | > that
    | > | > | > | >> allows me to run the tool....
    | > | > | > | >>
    | > | > | > | >> The only way I have found to run it is by manually
    | > downloading
    | > | > the
    | > | > | > | >> install file from:
    | > | > | > | >>
    | > | > | > | >>
    | > | > | >
    | > | >
    | >
    http://www.microsoft.com/downloads/details.aspx?familyid=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
    | > | > | > | >>
    | > | > | > | >> ...and double clicking on it. It means you have to agree to
    | > the
    | > | > EULA
    | > | > | > | >> each time.... :-(
    | > | > | > | >> No way of automating it's scan through task scheduler when
    | > that
    | > | > has
    | > | > | > | >> to be done by the user...
    | > | > | > | >>
    | > | > | > | >> This webpage http://support.microsoft.com/?kbid=890830 says:
    | > | > | > | >>
    | > | > | > | >> <quote>
    | > | > | > | >> When the Malicious Software Removal Tool runs, it performs
    | > the
    | > | > | > | >> following functions. Except where noted, the tool has the
    | > same
    | > | > | > | >> behavior independent of what command-line switches you use or
    | > how
    | > | > | > | >> you download and run the tool. Note that the tool is not
    | > actually
    | > | > | > | >> installed on a computer. Therefore, no entry is created for
    | > it in
    | > | > | > | >> the Programs folder or in Add/Remove Programs.
    | > | > | > | >> <end quote>
    | > | > | > | >>
    | > | > | > | >> ...which appears to say that it doesn't actually install an
    | > | > | > | >> 'executable' on the hard drive that users can run.
    | > | > | > | >>
    | > | > | > | >> Still looking CLOSELY at what it reports back to Microsoft
    | > each
    | > | > time
    | > | > | > | >> it's run. Dont know how that's going to work if I'm not
    | > online
    | > | > when
    | > | > | > | >> I run it. --
    | > | > | > | >>
    | > | > | > | >> Replace the obvious with paradise.net to email me
    | > | > | > | >> Found Images
    | > | > | > | >> http://homepages.paradise.net.nz/~mlvburke
    | > | > | > |
    | > | > | > | --
    | > | > | > |
    | > | > | > | Replace the obvious with paradise.net to email me
    | > | > | > | Found Images
    | > | > | > | http://homepages.paradise.net.nz/~mlvburke
    | > | > | > |
    | > | > | >
    | > | > | >
    | > | > |
    | > | > |
    | > | >
    | > | >
    | > |
    | > |
    | >
    | >
    |
    |
     
    David H. Lipman, Jan 14, 2005
    #19
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.