After reading the article on Facebook's Juan Martinez concerning TA computer etc. I asked the IT person at the school I volunteer, some questions. This article was spot on. Also, when I asked him about the incinerator he looks at me and says that does not make any since unless it was by accident and of course on purpose which was done when the law was at your door.. why erase? The defense would not incinerate the *advertiser censored*, so my guess it is something TA wrote....Another thing we talked about was the *advertiser censored* in itself and his thought that that would be a big mistake for the defense anyway, unless it was child *advertiser censored*, because who cares.....I am sure there is at least one male on the jury who has looked at *advertiser censored*. He also said that once you have malware or a trojan on the computer you never get rid of it, it is always there unless you totally set fire to the hard drive. It literally cost thousands of dollars to erase any malware completely from the computer. I am betting the CD incident where TA suppose to slam it to the wall probably happened because this IT person said that is another thing that happened during that time, Was the sharing of CD's with the malware embedded onto the CD. My bet is CMJA knew that CD had this Malware on it and that was why TA was pissed.
Malware is just a module that is tied to and run via Trojan. Trojan and Malware are actually worlds apart in terms of complexity and application and most malware just looks like unallocated space on the disk (when things are done the right way) and is run via circumvention of execution protocols i.e Trojans, however Malware still has to preform tasks using standard system protocols meaning Malware has to run just like any other ordinary software does. And how does it do? Well, the answer is simple via Trojan and also what I'm getting here at is that becasue in order for Trojan to be able to preform tasks as regular software Trojan is going to have to need an ability to write to the disk and insurance that it won't get overwritten over time and the only way it can achieve this is by getting "registered (Malware doesn't have to be entered into the registry to operate, though) " with the OS usually as a system task and then and only then "Virus" can get resources allocated to it so that it can be used to run all sorts of other programs thus it can be located quite easily. And since it is a must for Trojan software to be recognized as a system process by any given OS then in turn its location on the disk will be known to the OS in question and this is the exploit antiviruses use or in other simpler words they (anti-viruses) locate where the core data of Trojan is stored on the disk and then they( antiviruses) overwrite(delete) Trojan and all modules associated with it.
Well, yeah Malware can be a bit pesky when it comes to locating it on the disk, but Trojan is very easy to locate and delete and you can't run Malware without Trojan (unless you installed it using Trojan and it is recognized by the OS) and that's why nobody really cares about deleting Malware