Featured Articles

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC has announced that it will begin volume production of 16nm FinFET products in the second half of 2015, in late…

More...
AMD misses earnings targets, announces layoffs

AMD misses earnings targets, announces layoffs

AMD has missed earnings targets and is planning a substantial job cuts. The company reported quarterly earnings yesterday and the street is…

More...
Did Google botch the Nexus 6 and Nexus 9?

Did Google botch the Nexus 6 and Nexus 9?

As expected, Google has finally released the eagerly awaited Nexus 6 phablet and its first 64-bit device, the Nexus 9 tablet.

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 08 October 2007 07:04

Qwest disconnects infected PCs

Written by David Stellmack
Image

ISP gets aggressive in handling infected users

Qwest is getting aggressive in handling DSL user PCs that have become infected. Qwest will block users from Internet access and warn users that their PC has become compromised through a browser redirection.

Qwest is not really explaining the details, but when they detect a customer’s computer is acting as a “bot” they will provide additional information on how to clean the system.

The notice will continue to show up in the browser until the customer resolves the issue. With the amount of garage traffic that continues to clog up the Internet, it is obvious that this is now a step in the right direction, but still one has to wonder what kind of monitoring Qwest is doing beyond looking for infected computers of subscribers that subscribe to their DSL service.

Read more here.

Last modified on Monday, 08 October 2007 08:45

David Stellmack

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments