tagged
malware,
potentially unwanted programs,
trojans,
vampires,
worms in
Writing,
risk,
risk management








Give me a few minutes of your attention and I’ll tell you how some very real "electronic vampires", while not very entertaining, are remarkably similar to fictional vampires. I think you’ll find vampires and malware behave very much alike and that the rules for dealing with vampires are a good guide for dealing with malware.
You can find the original story over at the M2GRC blog: http://m2grc.com/2010/02/16/mcafee-the-malware-slayer/ :)
The story can also be found here. :)