[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RT] VIRUS ALERT!!!



PureBytes Links

Trading Reference Links




A while back someone at RT posted a very simple 
method which supposedly prevented a virus from gaining control of an address 
book.
 
It was to open up a new contact in the address book 
with the first name of !0000 and the last name of !0000 and without an 
email address. 
 
The madness behind the method as I understood it 
was that !0000 would be the first name in the list of the address book and 
because no email address was associated with it a virus would fail on its first 
attempt at a mass mailing.
 
Don't know it if works but I am inundated with 
viral emails these days at work (from which I believe I am protected) and I have 
yet to receive a complaint that I am the source of a virus.
 
In any event, it costs nothing and at worst it's 
akin to the coach who scratches his left ear at critical points of the game for 
luck.
 
FWIW
 
Tony Pylypuk
<BLOCKQUOTE 
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  ----- Original Message ----- 
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black">From: 
  owen 
  davie 
  To: <A title=realtraders@xxxxxxxxxxxxxxx 
  href="mailto:realtraders@xxxxxxxxxxxxxxx";>realtraders@xxxxxxxxxxxxxxx 
  
  Sent: Wednesday, April 24, 2002 7:45 
  PM
  Subject: Re: [RT] VIRUS ALERT!!!
  Kent Rollins asked:> Was it an ActiveX control 
  or what?Not a clue, as that sort of thing is well beyond my 
  competence.A Net search found that Symantic had this to say about it as of 
  4/22:> Due to an increased rate of submissions, Symantec Security 
  Response> is upgrading the threat level for <A 
  href="mailto:W32.Klez.E@xx";>W32.Klez.E@xx from level 2 to level 3> 
  as of March 6, 2002.> W32.Klez.E@xx is similar to W32.Klez.A@xxx It 
  is a mass-mailing> email worm that also attempts to copy itself to 
  network shares. The worm> uses random subject lines, message bodies, 
  and attachment file names.> The worm exploits a vulnerability in 
  Microsoft Outlook and Outlook Express> in an attempt to execute itself 
  when you open or even preview the message> in which it is contained. 
  Information and a patch for the vulnerabilityare> available 
  at<A 
  href="http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.";>http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.> 
  The worm overwrites files and creates hidden copies of the originals. 
  Inaddition,> the worm drops the virus W32.Elkern.3587, which is 
  similar toW32.ElKern.3326.> The worm attempts to disable some 
  common antivirus products and has a> payload which fills files with all 
  zeroes.Owen DaviesTo 
  unsubscribe from this group, send an email 
  to:realtraders-unsubscribe@xxxxxxxxxxxxxxxYour 
  use of Yahoo! Groups is subject to the <A 
  href="http://docs.yahoo.com/info/terms/";>Yahoo! Terms of Service. 







Yahoo! Groups Sponsor


  ADVERTISEMENT  









To unsubscribe from this group, send an email to:
realtraders-unsubscribe@xxxxxxxxxxxxxxx





Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.