So when I was working at BT on their Wireplay on-line video game service ('96-'01), we occasionally shipped cover disks with updated client software or new games via large UK publishing houses, so we really did have an RTM step.
Our most memorable & costly 'bug' was actually shipping malware that came in from a 3rd party games developer (I won't name them, sorry!), and which our corporate-managed sheep dip machine missed, because the corporate AV update process took about two weeks. Lesson learned - always pull the latest anti-malware signatures directly from suppliers before dipping new things, and always have 2+ anti-malware products to cover each other's gaps. These days, we have the joys of VirusTotal, heuristics, sandboxed execution and crowd-connected detection that provide much better protection!
Luckily for us, the malware was mostly harmless (tm) and could be removed with a suitable 'silver bullet' tool, that we delivered directly to known affected parties (~350 people) on floppy disk, and made available on our forum for download, hoping that the bandwidth didn't DoS the forum!
Thanks for detailed answer Phil. Always nice to hear from past experiences, especially when times were different. Good point on advances on malware tools, one can never be too safe when it comes to that, nowadays sandbox is really the way to go if unsure about any executables for sure.
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.