PureBytes Links
Trading Reference Links
|
A while back someone at RT posted a very simple
method which supposedly prevented a virus from gaining control of an address
book.
It was to open up a new contact in the address book
with the first name of !0000 and the last name of !0000 and without an
email address.
The madness behind the method as I understood it
was that !0000 would be the first name in the list of the address book and
because no email address was associated with it a virus would fail on its first
attempt at a mass mailing.
Don't know it if works but I am inundated with
viral emails these days at work (from which I believe I am protected) and I have
yet to receive a complaint that I am the source of a virus.
In any event, it costs nothing and at worst it's
akin to the coach who scratches his left ear at critical points of the game for
luck.
FWIW
Tony Pylypuk
<BLOCKQUOTE
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
----- Original Message -----
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black">From:
owen
davie
To: <A title=realtraders@xxxxxxxxxxxxxxx
href="mailto:realtraders@xxxxxxxxxxxxxxx">realtraders@xxxxxxxxxxxxxxx
Sent: Wednesday, April 24, 2002 7:45
PM
Subject: Re: [RT] VIRUS ALERT!!!
Kent Rollins asked:> Was it an ActiveX control
or what?Not a clue, as that sort of thing is well beyond my
competence.A Net search found that Symantic had this to say about it as of
4/22:> Due to an increased rate of submissions, Symantec Security
Response> is upgrading the threat level for <A
href="mailto:W32.Klez.E@xx">W32.Klez.E@xx from level 2 to level 3>
as of March 6, 2002.> W32.Klez.E@xx is similar to W32.Klez.A@xxx It
is a mass-mailing> email worm that also attempts to copy itself to
network shares. The worm> uses random subject lines, message bodies,
and attachment file names.> The worm exploits a vulnerability in
Microsoft Outlook and Outlook Express> in an attempt to execute itself
when you open or even preview the message> in which it is contained.
Information and a patch for the vulnerabilityare> available
at<A
href="http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.">http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.>
The worm overwrites files and creates hidden copies of the originals.
Inaddition,> the worm drops the virus W32.Elkern.3587, which is
similar toW32.ElKern.3326.> The worm attempts to disable some
common antivirus products and has a> payload which fills files with all
zeroes.Owen DaviesTo
unsubscribe from this group, send an email
to:realtraders-unsubscribe@xxxxxxxxxxxxxxxYour
use of Yahoo! Groups is subject to the <A
href="http://docs.yahoo.com/info/terms/">Yahoo! Terms of Service.
Yahoo! Groups Sponsor
ADVERTISEMENT
To unsubscribe from this group, send an email to:
realtraders-unsubscribe@xxxxxxxxxxxxxxx
Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
|