Originally posted by wormwoodI actually just posted this because of all those threads.
sort of pointless to reiterate after all previous threads touching the subject, but I couldn't agree more.
Hopefully this will make the people see that some of these chess nerds in the general forum do actually know what they are talking about when we raised all the points a ZDNet tech columnist did...
Originally posted by CrowleyAye at "unintentional data" extraction.
* Subjective term I know, but from personal experience as well as independent studies confirms that it does the job commendably.
What happens to the "unintentional data" that gets passed with a false positive virus?
lets say for example a word document that happens to be a C.V that is infected with a dubious macro (or not so dubious).
Its OK though, the system runs real quick!!!!1
🙄