Ok, I guess that exploit was too complicated for simple Mac folks to understand. Let me make it so that even a Macaholic can understand. Forgive me for assuming you understood, you know what happens when one assumes? And for that I apologize.
Here it is in pretty simple terms. 1) Grandma turns on Mac. 2) Grandma is smart enough to update to the latest updates so she updates via Mac's built in software update service 3) Hacker attacks her update and replaces the official Apple update with any application he wants. 4) Grandma didn't "install a trojan" she installed an approved update from Apple
As far as name changing...making my name shorter is worse than changing yours...unless you're too dim to understand what my name stands for. And once again I must apologize because I should have realized based on your incoherant posts and circular logic that you couldn't translate it. Try saying my screen name outloud to somone and they will explain to you what you just said.
I believe this horse has been beat enough. You won't open your eyes no matter what evidence is provided. And when proven wrong you just ignore your previous posts and put them out of order to fit your twisted/circular logic.
How does he do that? To do what you claim, the hacker has to have complete physical ROOT access to her computer. ROOT is turned off in OSX... a user has to first activate it then provide a separate password. Grandma is not operating in ROOT. That is the point. If he has that, your virus scenario is superfluous.
To be a "virus" it must be able to install itself without user interaction.