- May 14, 2008
That's so not true. Back in the days there used to be multiple 'fly by' infections where it was enough to accidentally click a link and view a website and you got infected. Just not so long ago there were malware embedded in jpeg headers and displayed in advertisements on regular 'harmless' web sites. If you read e-mail locally and you're attacked, outlook will kindly preview the mail for you to make sure the payload gets run and you get infected.
So yet again, that is user's fault. They clicked on stuff they should not have.
Not to mention the software source model of windows that attracts people to download and run executables from the wild and untrusted sources. Without forgetting the very flawed 'protections' that make running Windows in limited user mode a pain - and on the other hand UAC pop-ups that get triggered constantly for trivial reasons just to teach the end user to accept the prompt when ever it happens - without thinking twice.
As opposed to the model that Linux uses, where many times you can do the same thing now by just clicking on a link on the web that is going to install a package?
The USB implementation is STILL critically flawed and a direct route to infect any Windows machine. It's simply not safe to use a USB stick twice if you use it on another computer. And in some cases the infection came new out of the box
Also not true. I have actually had Windows catch a number of malware intrusions via USB and block them.