DavidR
2
It won’t hurt to send it again from the chest.
Where was the original file found, e.g. (C:\windows\system32\infected-file-name.xxx) ?
If it was in a system folder and it is effectively able to infect other system files, it needs permissions to do that and it gets that by inheriting the permission of the user account, if you log on and have administrative privileges so does the worm.
Prevention is obviously better than cure. Whilst browsing or collecting email, etc. if you get infected then the malware by default inherits the same permissions that you have for your user account. So if the user account has administrator rights, the malware has administrator rights and can reap havoc. With limited rights the malware can’t put files in the system folders, create registry entries, etc. This greatly reduces the potential harm that can be done by an undetected or first day virus, etc. So if it can’t get established it can’t inherit permission to infect system files.
Check out the link to DropMyRights (in my signature below) - Browsing the Web and Reading E-mail Safely as an Administrator. This obviously applies to those NT based OSes that have administrator settings, winNT, win2k, winXP.