I have been perusing the sub7 website and had a few questions....

In order to infect someone with the "server.exe" file, it pretty much means that one has to have pretty much no AV at all, right?

Also, they have a list of start up options for the malicious file including registry entries and keyname entries, but also "less known" method and "unknown"method......they didn't discuss what those methods were, for reasons they considered obvious (and I guess they are): if they told you publicly what they were then they could be easily question is: does anyone have any idea what these secretive methods are??? and are there really any other ways to protect against it, maybe besides AV?