Curt Christianson said:
YW Bear.
As for BD-- to each his own; but I'm afraid it's your loss.
Keep an open mind, and remember what a wise one said about judging
others. I
agree that there are those that I don't particularly care for, but I
prefer
to keep that to myself, lest I poison someone else's opinion before
they
have had a chance to get to know another poster themselves.
--
HTH,
Curt
http://dundats.mvps.org/
http://www.aumha.org/
http://dundats.mvps.org/AutoIt/default.aspx
I hear what you say, Curt but you seem to assume that I do not 'know' PA
Bear.
I've found the very first instance of when he placed a <plonk> in
response to one of my concerns. Please note the date: Wed, 12 Oct 2005
You will also note that I refer to a missing 'a' - at the time I had
almost no experience of newsgroups or the language used in Usenet groups
and had interpreted it to mean "plonka" or "plonker" an English term
with wich I was familiar!
http://www.archivum.info/microsoft.public.windowsupdate/2005-10/msg01011.html
I often wonder if it is always the same persona that posts under the
name of PA Bear - but whenever I check an IP address it seems
consistently confusing (to me!) 24.152.248.232 relates to Pennsylvania
yet 71.173.71.14 resolves to Dodge City, Kansas - a long way apart I
believe. Instead of simply explaining why this may be so, I am
stone-walled. That, in turn, makes me suspicious.
You said in a response to Bill Castner "My machine did not care for SP3,
and I *did* un-install it, but have kept up with all the other patches."
Have you got SP3 satisfactorily installed now? IMO you should have!
<smile>
We seemed to relate well whilst I was active at Aumha. I know you read
many of my posts. To this day I still do not know why I was expelled
(banned from posting) but perceive it may have been because I'd been
furished with a Corporate edition of Symantec Antivirus (which includes
anti-everything! - I'll list below!). Oh yes - I was watching everything
too and often asking 'difficult' questions!
I'm confident that you are one of the good guys, Curt. Perhaps *you*
could enquire as to the reason for my expulsion and let me and others
here know.
Dave
PS This is what is checked by the Corporate version of Symantec:
Symantec AntiVirus can detect, quarantine, delete, and remove or repair
the side effects of security risks in the following categories:
a.. Spyware: Stand-alone programs that can secretly monitor system
activity and detect information like passwords and other confidential
information and relay the information back to another computer.
Spyware can be unknowingly downloaded from Web sites (typically in
shareware or freeware), email messages, and instant messenger software.
You may unknowingly download spyware by accepting an End User License
Agreement from a software program.
a.. Adware: Stand-alone or appended programs that can secretly gather
personal information through the Internet and relay it back to another
computer. Adware may track browsing habits for advertising purposes.
Adware can also deliver advertising content.
Adware can be unknowingly downloaded from Web sites (typically in
shareware or freeware), email messages, and instant messenger software.
You may unknowingly download adware by accepting an End User License
Agreement from a software program.
a.. Dialers: Programs that use a computer, without your permission or
knowledge, to dial out through the Internet to a 900 number or FTP site,
typically to accrue charges.
b.. Hack tools: Programs that are used by a hacker to gain
unauthorized access to your computer. For example, one hack tool is a
keystroke logger, which tracks and records individual keystrokes and can
send this information back to the hacker. The hacker can then perform
port scans or vulnerability scans. Hack tools may also be used to create
tools for virus creation.
c.. Joke programs: Programs that can alter or interrupt the operation
of a computer in a way that is intended to be humorous or frightening.
For example, a program can be downloaded from Web sites (typically in
shareware or freeware), email messages, or instant messenger software.
It can then move the trash can away from the mouse when you attempt to
delete or cause the mouse to click in reverse.
d.. Other: Security risks that do not conform to any other security
risk category, but that may present a security risk to your computer and
its data.
e.. Remote access: Programs that allow access over the Internet from
another computer to gain information or to attack or alter your
computer. For example, you may install a program, or it may be installed
as part of some other process without your knowledge. The program can be
used for malicious purposes with or without modification of the original
remote access program.
f.. Trackware: Stand-alone or appended applications that trace a
user's path on the Internet and send information to a target system. For
example, the application can be downloaded from Web sites, email
messages, or instant messenger software. It can then obtain confidential
information regarding user behavior.