¨Use
antivirus tools
–Can
detect fingerprints (by checking filenames, registry key settings, services) of
attack tools
–Update
virus definition files weekly
¨Don’t
use single-purpose BO2K checkers
–Application
itself may be a Trojan horse which installs BO2K but tells user that machine
is clean