Dawgy - how do you protect yourself from an application level security hole?

The only way (besides patching) would be to run some sort of passthru application that changes the word "<object..." in all web page source code. That's why I was pretty much forced to change to Mozilla, there was no practical workaround for IE.
I submitted the file I was infected with to f-prot, I think this is it...
http://www.f-prot.com/news/vir_alert/qhosts-1.html
I've just run windows update to get my IE patched, but I'm not sure if I'm game to try and reinfect myself... the last infection overwrote Windows Media Player.
