This points to the worst security holes I've ever seen - unlocked developer machines.
More often than not, I've seen that dev groups have the absolute worst security practices - even if their policies are rock-solid.
Just a few weeks ago, I mentioned in a public developer discussion about spyware and spyware removal tools that, if I wanted to distribute it, I'd create a spyware-killer with spyware in it - and post a link on open spyware discussions.
Gates was right when he said that "Trustworthy Computing" should be a priority for developers.
If I get just ONE more contract, where I warn the business about security holes and they dismiss it as an "acceptible risk" - I swear I'll beat them senseless with a pipe.
I know (a little) how the security manager of WTC felt. He had been warning the federal government and NYC for *years*, quite loudly, that 9/11 was inevitable.
I hope I'm not in the building when our IT card house comes down. We already know, from the arrests in Pakistan this month (Aug 04) that al Quaeda is very cyber-aware.
If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
Trojan found
http://www.evrsoft.com/1stpage2.shtml
Norton picked it before installation complete..