Discussion:
Virus/Worm email messages
(too old to reply)
Cecil Moore
2003-09-20 17:57:53 UTC
Permalink
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
Steve
2003-09-20 18:23:01 UTC
Permalink
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes, 14 yesterday and 4 so far this morning.

73, Steve
WB6RIB
David Robbins
2003-09-20 18:42:36 UTC
Permalink
Post by Steve
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes, 14 yesterday and 4 so far this morning.
you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.
Wedgew
2003-09-20 22:14:39 UTC
Permalink
I'm getting 30 to 50 per day and another about half that number of of
messages from my isp stating that they had trapped a virus (blaster worm)
Post by David Robbins
Post by Steve
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes, 14 yesterday and 4 so far this morning.
you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.
W3JDR
2003-09-22 11:25:57 UTC
Permalink
I was getting several hundred of these a day. I got the idea to take my
email address out of my Chat group profiles, just in case some hacker
software was 'harvesting' email addressesfrom these sites. When I removed my
email address from the Yahoo Chat groups I was subscribed to, the spam
seemed to stop dead in its tracks. All has been quiet for some time now.

Coincidence??

Joe
W3JDR
Post by David Robbins
Post by Steve
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes, 14 yesterday and 4 so far this morning.
you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.
I only get about 3 or 4 emails a week from the spammers. Mostly about
penile enlargement, for some reason.
I recently changed my email address, and set my ISP email anti-spam
filter to "light". That sure cut down on the email.
I also have no firewall and no anti-virus protection, but the computer
works fine, day after day, regardless of how much I get on the
Internet.
Bob
k5qwg
Jim Kelley
2003-09-22 17:20:53 UTC
Permalink
Post by David Robbins
Post by Steve
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes, 14 yesterday and 4 so far this morning.
you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.
My guess is, they're getting addresses from newgroups.

ac6xg
Mike Andrews
2003-09-22 17:52:22 UTC
Permalink
Post by Jim Kelley
Post by David Robbins
Post by Steve
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes, 14 yesterday and 4 so far this morning.
you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.
My guess is, they're getting addresses from newgroups.
That has been confirmed.
--
"I cannot imagine what it's like to know nearly everything about
systems and have to deal, daily, with people who know nearly nothing
about systems. It's like being a cosmologist at an astrology
convention)...." -- James Lileks
Jim Kelley
2003-09-22 18:43:30 UTC
Permalink
If you're so sure about your 'invulnerability', why do you have seven
email filters? Try turning them off and see what you get. ;-)

jk
Post by Mike Andrews
Post by Jim Kelley
My guess is, they're getting addresses from newgroups.
That has been confirmed.
Hi Mike
How?
I've been a participant here for years with my address freely
available. Not one hit from this virus, not even 30 emails during the
entire period and only one (1) at the peak. Other correspondents here
complain of 1000's in a single day, and 10MB mail storage being
saturated.
Do you have a link to an authoritative site that offers evidence of
your statement?
73's
Richard Clark, KB7QHC
Jim Kelley
2003-09-22 19:41:50 UTC
Permalink
You seem to have missed the point. The particular operating system you
happen to run has nothing to do with whether or not viruses are sent to
your email address.

73, Jim AC6XG
Post by Jim Kelley
If you're so sure about your 'invulnerability', why do you have seven
email filters? Try turning them off and see what you get. ;-)
jk
Hi Jim,
I have, same old spam conforming to exactly what the filters were
designed to weed out. I had to wait quite a while for any to come in.
You think one filter would do it? Now there's dreaming in technicolor
and surround sound.
Among the 7, several cover 26 common explitives and variants of their
spellings (using a unix style of expression to describe them such as
X* where the star denotes 0 or more repetitions of the character X; I
do the same thing with $*). This sure beats the MS method of hotmail
security where you have to list every single person you trust (what a
crock) if you want to keep out the universe of smut. Methinks their
MSN butterfly is on the verge of intellectual extinction.
Of the others, I reject mail not addressed to me (a no brainer - eh?).
Agent would allow me to combine them all into one filter (a dream come
true?), but why bother. Most programming errors are caused by logical
statements that are so vast and cryptic that they are impossible to
read coherently - like any of 600 postings made by Cecil. ;-)
Anyway, I have been engaged in a series of emails since this last
posting (with Mike) where he is averaging 1 hit a minute, and me none
for this entire time. By his accounts, it is from newsgroup
harvesting, and it would seem the majority of sufferers here picked up
the infection somewhere else (not rraa). Of the dozen odd other
groups I follow, this topic is alien to correspondents who show no
signs of infection.
So, Jim, how have you fared during the deluge?
73's
Richard Clark, KB7QHC (with only 1 spam today)
Richard Clark
2003-09-22 20:44:51 UTC
Permalink
Post by Jim Kelley
You seem to have missed the point. The particular operating system you
happen to run has nothing to do with whether or not viruses are sent to
your email address.
73, Jim AC6XG
Hi Jim,

I rely on the evidence of testimony here. 80% of the correspondents
who are also sufferers are using IE/OE in some form of Windows (hard
to do it otherwise). The servers (at least mine at Comcast which have
been infected by Blaster and infected my outgoing mail) are MS
products. MS products and OS's contain documented and autopsied
problems that support such virus activity.

I also use MS products (but certainly not their lame internet
applications). I have never performed a security upgrade, but instead
have simply disabled those faulty modules that they circulate as
product enhancements. Tools for such activity may be found at:
http://grc.com/default.htm
which provides more news and resource than all the nonsense wishing
away nightmares.

In that page's update TODAY is the warning:
"Many security watchers believe that a new worm, not unlike
"MSBlast" which targeted the previous DCOM/RPC vulnerability, is
virtually inevitable."

How many here even comprehend what DCOM is? Are we to be treated to a
new chorus of whines about how the ghosts of the internet haunt them?
I've had this problem fixed (courtesy of the same site) for several
months. Have you taken precautions? (I note you failed to respond to
my query about how you've fared through this latest attack.)

I can say without fear of contradiction that particular operating
systems (MS) are obviously correlated through history and actuality.
I also host a server on a fixed IP (http://12.230.78.56/) that has
surfed through all these disasters and still winging right along
unfazed. It supports an uncrackable OS simply because my net log
reveals no one is looking for anything but MS code. The only thing
that will crash it will be the log filling up (but no one is going to
find an executable to run - too many clowns and not enough
ringmasters).

As to having missed the point, I offer that part of my message you
Post by Jim Kelley
Anyway, I have been engaged in a series of emails since this last
posting (with Mike) where he is averaging 1 hit a minute, and me none
for this entire time. By his accounts, it is from newsgroup
harvesting, and it would seem the majority of sufferers here picked up
the infection somewhere else (not rraa). Of the dozen odd other
groups I follow, this topic is alien to correspondents who show no
signs of infection.
These other users were also clearly (through header examination) MS
users. They were clearly not sufferers. That, or the Darwinian
mechanics thinned them out without chance for recovery (another MS
commonality) to complain, warn, or join in chorus of whine.

73's
Richard Clark, KB7QHC
Richard Clark
2003-09-23 01:38:17 UTC
Permalink
I run a firewall on my desktop system so I can see what's happening on
both sides of the ethernet card. My system is not infected. FYI
there's a free utility called stinger that can be used to scan for these
worms. Nevertheless, the inbox on the unix system that handles my email
has accumulated about 100 of these kind of messages a day since last
Tuesday or so. I have my desktop system set to filter them.
http://grc.com/default.htm
has offered a port scanner for years. Also a Trojan Horse detector.
But if you are trying to say that the author(s) of the viruses are
specifically targeting users with a MS notation in their news header,
then you may be right. But you didn't say that.
73, Jim AC6XG
Hi Jim,

I find it somewhat beyond the bounds of belief that some one
individual, or consortium of individuals are sitting at home and
directing attacks at selected accounts. The only vector of success is
found in an OS that supports this for them.

Look at who's complaining of massive attacks, and with the exception
of Mike, whose posting activity is highly correlatable, and the rest,
who are not; then those who are not are highly correlatable to what
they commonly use. The evidence is overwhelmingly MS oriented, and
not through force of numbers simply because MS dominates the market.

For a simple example of that contradiction is my own situation. I run
Win2000 and I do not use MS internet software. For this entire day
I've gotten 5 emails from folks reading my comments and two that went
to the trash can for transgressing my filters. It is quite obvious to
me that suggestions that the newsgroups are being harvested is not
applicable to this one (rraa), nor the dozen odd others I participate
in. I can easily imagine it may be confined to a few newsgroups, and
through those few, the stream cascades by virtue of poor security
management by those naive enough to use MS software and just let
things ride.

This conflagration would die of lack of combustibles otherwise. This
is classic symptomatology.

73's
Richard Clark, KB7QHC
H. Adam Stevens, NQ5H
2003-09-23 11:03:41 UTC
Permalink
Cecil
At least with a Mac the viruses wouldn't be able to do anything were you
foolish enough to open one of the attachments!
It got to about 1000/day and I had to change my email addresses but they've
already found one of my new addresses.
Random number spam bots I tell ya.
Intentional QRM!!
73
H.
NQ5H
Post by Richard Clark
Look at who's complaining of massive attacks, and with the exception
of Mike, whose posting activity is highly correlatable, and the rest,
who are not; then those who are not are highly correlatable to what
they commonly use. The evidence is overwhelmingly MS oriented, and
not through force of numbers simply because MS dominates the market.
I suspect that if I were running an Apple, my inbox would be just as full.
--
73, Cecil http://www.qsl.net/w5dxp
-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
Cecil Moore
2003-09-23 11:25:05 UTC
Permalink
Post by H. Adam Stevens, NQ5H
Cecil
At least with a Mac the viruses wouldn't be able to do anything were you
foolish enough to open one of the attachments!
I'm running Netscape 7.1 with virus-scan/firewall. Most of my
email is routed through the IEEE forwarding server which removes
virtually all viruses and worms. Unfortunately, they send me what's
left of the message along with another message telling me what
they did. I would be happier if they didn't waste bandwidth
telling me about it.
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
H. Adam Stevens, NQ5H
2003-09-23 11:40:03 UTC
Permalink
So the spammers win anyway by clogging up the system and wasting our time.
H.
Post by Cecil Moore
Post by H. Adam Stevens, NQ5H
Cecil
At least with a Mac the viruses wouldn't be able to do anything were you
foolish enough to open one of the attachments!
I'm running Netscape 7.1 with virus-scan/firewall. Most of my
email is routed through the IEEE forwarding server which removes
virtually all viruses and worms. Unfortunately, they send me what's
left of the message along with another message telling me what
they did. I would be happier if they didn't waste bandwidth
telling me about it.
--
73, Cecil http://www.qsl.net/w5dxp
-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
pez
2003-09-23 21:16:25 UTC
Permalink
| "Richard Clark" wrote:
| ...
| http://grc.com/default.htm
| ...

Useful, indeed!

pez
SV7BAX
Richard Clark
2003-09-24 16:55:06 UTC
Permalink
Richard;
Your statement is in reference to systems that have been infected by a
virus or worm. The O/S has nothing to do with who the virus's are sent to.
I set up several e-mail accounts on yahoo and posted to several groups.
I did pick a subject that would generate responses, after 7 or 8 hours the
e-mail accounts were filled with messages with the virus attachments. I
don't use Microsoft products, So I don't know how Outlook handles replies
to usenet posts. That is, if it treats it as an E-mail address and adds it
to an address book. Although its possible that the subject I picked could
have upset a few enough to intentionally send me an E-mail with a attached
virus, I would tend to think that its based on address books.
I have set several more accounts up on Yahoo, trying to narrow down
which groups seem most prone to generating virus e-mails.
Ken
Hi Ken,

Yours is simply the same chorus before you: "It ain't about MS."

You then snap the rug from under yourself (how do you do that?) by
saying virus (what does a virus infect except an OS?).

It is the height of denial to portray these attacks as coming from an
individual sitting in the bedroom sending emails, or a group of
closeted individuals pushing send buttons. That traffic would be
snuffed so fast where MS would have sheriffs at their door in a
millisecond.

A virus by definition infects the OS. There are many out there built
into the backbone of the internet. Some are router only OS's, others
are Linux machines, Unix machines, Sun Machines, and certainly MS
machines. Does it take Rocket Surgery to diagnose that of those, one
OS source (fill in the blank) in particular has been announcing
security failures in their designs (and I am not talking about the
ubiquitous OE/IE problems so many snuggle up to as it nibbles into
their tender flesh) 2 a week? This is up from an average of once a
week for at least two years. If the backbone escaped attack (and it
is certainly more geared for following events than users are); it
follows someone ELSE's machine has become infected and is acting in
part of a conspiracy to accomplish this work through proxy.

Guess what they have as an OS? Care to wager it is an unprotected
system that has been requiring patches on a weekly basis for years?

All of this is classic symptomatology of recent attacks and hardly a
novel concept drug up from the deep recesses of my paranoia.

There are two classes of MS users. Those who are infected but live
through its effects without obvious harm (except for lost bandwidth
capacity they blame on "general conditions"). A century ago they
would go by the name Typhoid Mary. Then there are those who are
infected but are being hammered by the virus AND spreading infection.
There is a third and fourth class that barely wiggle the digits: the
lucky and the smart.

Eventually, through Darwinian thinning, the smart population will
become dominant, but only if they can crawl over the mountains of
corpses that litter the -ahem- netscape.

73's
Richard Clark, KB7QHC
Richard Clark
2003-09-24 20:29:13 UTC
Permalink
Richard;
Hope you don't mind if I respond to each part of your post?
Not if you don't object to my clipping extraneous material here.
Post by Richard Clark
Yours is simply the same chorus before you: "It ain't about MS."
Really? Where did I say that? I don't even use Microcrap, why would I
defend them?
I cannot speak to your motivation. I can respond to its appearance
however.
"The O/S has nothing to do with who the virus's are sent to:"
Which it TRUE!
Perhaps so, but hardly a subject that merits discussion unless this is
a recovery group where we all talk about feelings.
I don't use windows and have a bunch of e-mails with virus's in them.
Well, do they present an issue vis-a-vis the virus, or simply the
quantity of mail clogging things in general? You don't offer much to
separate what issue you are responding to.
I think you miss read what I was saying, or maybe I didn't make myself
clear. Your system doesn't have to be infected to receive a bunch of
E-mails with the virus. Everyone was complaining about the number of virus
e-mails they were receiving. That doesn't mean that their system is
infected. It does mean that an infected Microsoft system sent them. Is
that better?
Perhaps. I see nothing to consider except to observe that those who
have suffered are likely candidates for spreading the same contagion.
You implicitly offer you are not one to be part of that vector, but
again you've offered nothing in that regard to distinguish what it is
that brings you forward.

I am reacting to those who think that all danger is external (the
fuzzy warm feeling that if there are miscreants mining newsgroups for
names and addresses, then our sufferers are not part of the problem);
nothing could be further from the truth.
Didn't mean to upset you Richard, it sounded like you wanted to discuss
where the list of e-mail address's were coming from that had virus's sent
to them. Do you repond to all posts in such a manner? My first post to
you and respond like I have been arguing with you for the past 2 weeks. I
doubt that you even bothered to read the rest of my post after you saw the
O/S part of it.
And yet you have nothing to offer about where they came from. Every
post made is an act of personal choice. If you choose my
observations as an issue, I respond to that. If you choose
where the list of e-mail address's were coming from that had virus's sent
to them.
then you would have offered that in your post. You did not. I cannot
respond (or actually I hesitate) to my projections of what I think you
want. Others here do that quite well - generally that is very
unsatisfactory dialog (being one-sided and all).

I have offered both points of view throughout this thread, you have
not responded to where I presented the discussion of news group
mining. Again that is a personal choice of yours for which I am not
in a position to dictate.

You presume I want to discuss where the address's are coming from.
Actually no, I have no interest in that at all. It would seem even
fewer of the complainants here do either. I observed earlier that
rraa does not appear to have been mined for any list. I also observed
that if newsgroups were being mined, then those sufferers apparently
became part of the contagion somewhere else, or through some other
activity. Absolutely no one has stepped forward to enumerate their
other activities (public health goes down the crapper in such times if
other activities reveal the vector).

To this point, today, I have received only 7 emails, all of which
triggered the usual porn filtering mechanism. That is fairly typical
for my public exposure here, and I participate in a dozen odd other
groups to notice that discussion of this virus is a wholly alien
subject. This, to me, suggests that the premise of newsgroup mining
is so much looking under the bed for monsters. I have corresponded
with one here who posts to one technical group that is heavily
trafficked by potential miscreants (or so is my presumption by his
description) and I would speculate, yes, any open address in that
group (especially if you respond to those with an attitude) is a
target of opportunity.

But just what does a target offer? A new vector of infection, and if
that target is practicing anti-viral lifestyles, that presents a
fairly limited contagion that barely rises above sniffle.

Just one not practicing an anti-viral lifestyle has, through MS
products, the capacity to spread infection like a firestorm. Hence,
it doesn't really matter where the address's are found, there are
30000 different groups that need only offer a thousandth of a percent
hit rate to cascade into millions.

73's
Richard Clark, KB7QHC
Richard Clark
2003-09-25 00:35:33 UTC
Permalink
Richard;
Sorry, I didn't mean to come across like I did. Can I blame it on a
bad day at work? I had scanned through the messages and thought I had seen
were you had an idea where the E-mail addresses came from. Thats why I
wrote to you with what I had found out, looking for your input and ideas.
If I knew more about how outlooks address book work, I think I have a
pretty good idea where the address's are coming from.
I apologize for the way I acted toward you
Ken
Hi Ken,

I took no slight. Further, I did, as you described, hit you like this
was going on between us for two weeks - just my nature. Some forgive
me, others don't, the rest don't care as long as it makes for good
theater.

There's every chance they (the names and addresses) are mined off the
newsgroup participants. These things have to start somewhere.
However, what feeds them is what I am interested in (being potential
fodder), and when simple maintenance can snuff a bug, and many would
rather suffer through it without dignity - then I don't offer much
sympathy and tea.

To this point in time today, only 10 trash canned items. I don't
expect it is anything more than luck that there are these few as it
has nothing to do with being hit, but rather by who threw the blow
(actually the why).

73's
Richard Clark, KB7QHC
Ryan, KC8PMX
2003-09-23 05:49:42 UTC
Permalink
I can prove it.... gimme an email address to forward all the ones I am
getting!


--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
.. --. .... - . .-. ...
Post by Mike Andrews
Post by Jim Kelley
My guess is, they're getting addresses from newgroups.
That has been confirmed.
Hi Mike
How?
I've been a participant here for years with my address freely
available. Not one hit from this virus, not even 30 emails during the
entire period and only one (1) at the peak. Other correspondents here
complain of 1000's in a single day, and 10MB mail storage being
saturated.
Do you have a link to an authoritative site that offers evidence of
your statement?
73's
Richard Clark, KB7QHC
Dee D. Flint
2003-09-20 18:54:43 UTC
Permalink
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
Yes over 600 in the last 3 or 4 days.

Dee D. Flint, N8UZE
Reg Edwards
2003-09-20 19:01:51 UTC
Permalink
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================

Me too - 2000 per day.

Terrorist attack or just another up-and-coming Bill Gates?

G4FGQ, UK
Walter Maxwell
2003-09-20 19:21:58 UTC
Permalink
On Sat, 20 Sep 2003 19:01:51 +0000 (UTC), "Reg Edwards"
Post by Reg Edwards
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================
Me too - 2000 per day.
Terrorist attack or just another up-and-coming Bill Gates?
G4FGQ, UK
Me too, 49 yesterday and 80 today.

Walt, W2DU
Ryan, KC8PMX
2003-09-23 05:53:46 UTC
Permalink
Hey Mike,

In my case, the virus email bombing that I am getting has not affected my in
regards to being infected, but it definitely has slowed everything down. It
is taking forever to use my ISP's webmail email browser (in order to not
download the infected emails) to load up, when there is 200-1,000 messages
in the email box.

I am quite sure I am not the only one getting this happening to them as
well, that are on the same ISP. Must definitely be overloading the mail
server my guess would have to be.



--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
.. --. .... - . .-. ...
Post by Walter Maxwell
On Sat, 20 Sep 2003 19:01:51 +0000 (UTC), "Reg Edwards"
Post by Reg Edwards
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================
Me too - 2000 per day.
Terrorist attack or just another up-and-coming Bill Gates?
G4FGQ, UK
Me too, 49 yesterday and 80 today.
$ grep -i logging ljoe.txt | wc -l
1286
$ grep -i "\/dev\/null" ljoe.txt | wc -l
976
That's 976 worms out of 1286 mails accepted, total. That doesn't count
the 54 that I bounced because I don't accept mail from the sender's
domain, so it's 976 out of 1340 attempts. At about 150K per try. Rough
on the other people on my cablemodem segment.
--
Mike Andrews, working on his ticket again.
Tired old sysadmin since 1964
WN5EGO back in 1963
H. Adam Stevens, NQ5H
2003-09-23 12:37:47 UTC
Permalink
My old email address was getting to be useless so I killed it and made up
two new ones.
Presumably this post shows the ARRL remailer which goes to one of the new
email addresses.
One of the addresses has not been used.
They found it.
Linux anyone?
73
H.
Post by Ryan, KC8PMX
Hey Mike,
In my case, the virus email bombing that I am getting has not affected my in
regards to being infected, but it definitely has slowed everything down.
It
Post by Ryan, KC8PMX
is taking forever to use my ISP's webmail email browser (in order to not
download the infected emails) to load up, when there is 200-1,000 messages
in the email box.
I am quite sure I am not the only one getting this happening to them as
well, that are on the same ISP. Must definitely be overloading the mail
server my guess would have to be.
--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
.. --. .... - . .-. ...
Post by Walter Maxwell
On Sat, 20 Sep 2003 19:01:51 +0000 (UTC), "Reg Edwards"
Post by Reg Edwards
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================
Me too - 2000 per day.
Terrorist attack or just another up-and-coming Bill Gates?
G4FGQ, UK
Me too, 49 yesterday and 80 today.
$ grep -i logging ljoe.txt | wc -l
1286
$ grep -i "\/dev\/null" ljoe.txt | wc -l
976
That's 976 worms out of 1286 mails accepted, total. That doesn't count
the 54 that I bounced because I don't accept mail from the sender's
domain, so it's 976 out of 1340 attempts. At about 150K per try. Rough
on the other people on my cablemodem segment.
--
Mike Andrews, working on his ticket again.
Tired old sysadmin since 1964
WN5EGO back in 1963
Cecil Moore
2003-09-23 15:56:55 UTC
Permalink
Post by H. Adam Stevens, NQ5H
Presumably this post shows the ARRL remailer which goes to one of the new
email addresses.
Does the ARRL remailer check for viruses/worms?
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
H. Adam Stevens, NQ5H
2003-09-23 20:37:30 UTC
Permalink
I don't know, it may pass 'em right through, like bad food,
but at least the email address at my ISP isn't being openly broadcast on
usenet.
73
H.
Post by Cecil Moore
Post by H. Adam Stevens, NQ5H
Presumably this post shows the ARRL remailer which goes to one of the new
email addresses.
Does the ARRL remailer check for viruses/worms?
--
73, Cecil http://www.qsl.net/w5dxp
-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
Ed Price
2003-09-20 20:41:03 UTC
Permalink
Post by Reg Edwards
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================
Me too - 2000 per day.
Terrorist attack or just another up-and-coming Bill Gates?
G4FGQ, UK
I don't recall anything in Gates' career that's equivalent to the present
worm attack.
Do you have any factual backup for your off-hand slander?

Ed
WB6WSN
Mike Coslo
2003-09-21 00:33:00 UTC
Permalink
Post by Ed Price
Post by Reg Edwards
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================
Me too - 2000 per day.
Terrorist attack or just another up-and-coming Bill Gates?
G4FGQ, UK
I don't recall anything in Gates' career that's equivalent to the present
worm attack.
Do you have any factual backup for your off-hand slander?
He isn't responsible for this.

But he IS responsible for the abysmally poor software his company
writes. It is a litany of flaws.

- Mike KB3EIA -
Ed Price
2003-09-21 01:08:44 UTC
Permalink
Post by Mike Coslo
Post by Ed Price
Post by Reg Edwards
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
================================
Me too - 2000 per day.
Terrorist attack or just another up-and-coming Bill Gates?
G4FGQ, UK
I don't recall anything in Gates' career that's equivalent to the present
worm attack.
Do you have any factual backup for your off-hand slander?
He isn't responsible for this.
But he IS responsible for the abysmally poor software his company
writes. It is a litany of flaws.
- Mike KB3EIA -
My point is that you should save your litanies for the correct occasions.
You can't respond to every net problem with a half-ass reference to
"Redmond" or "Gates".

In point of fact, this IS a terrorist attack. Although software should be
robust, the majority of your ire should be directed toward the terrorist
attacker.

Ed
WB6WSN
Mark Keith
2003-09-21 04:45:27 UTC
Permalink
Post by Ed Price
I don't recall anything in Gates' career that's equivalent to the present
worm attack.
Do you have any factual backup for your off-hand slander?
Ed
WB6WSN
Well, as far as I'm concerned, he had as much hand in it as anyone. If
his company would quit selling reader software with enough holes to
qualify as swiss cheese, many of these macro viruses wouldn't have a
leg to stand on. I've had 100's of server returns accusing me of
spreading viruses, and also that I'm running Microsoft Outlook Express
6.00.2600.0000. But this is not the case. I use old bulletproof
netscape 3.1 to read mail. These viruses are a non issue to me. Why
are they an issue to a software that is supposed to be a step up from
the ancient reader I'm using? If everyone would quit running Billware
6.00.2600.0000, we could nip this macro virus thing in the bud.
Probably would stop 90% of it overnight. Heck, with all the latest
holes in these new win OS's they are spitting out, I'm temped to stay
with win98 a few more years. MK
Ed Price
2003-09-21 07:37:03 UTC
Permalink
Post by Mark Keith
Post by Ed Price
I don't recall anything in Gates' career that's equivalent to the present
worm attack.
Do you have any factual backup for your off-hand slander?
Ed
WB6WSN
Well, as far as I'm concerned, he had as much hand in it as anyone. If
his company would quit selling reader software with enough holes to
qualify as swiss cheese, many of these macro viruses wouldn't have a
leg to stand on. I've had 100's of server returns accusing me of
spreading viruses, and also that I'm running Microsoft Outlook Express
6.00.2600.0000. But this is not the case. I use old bulletproof
netscape 3.1 to read mail. These viruses are a non issue to me. Why
are they an issue to a software that is supposed to be a step up from
the ancient reader I'm using? If everyone would quit running Billware
6.00.2600.0000, we could nip this macro virus thing in the bud.
Probably would stop 90% of it overnight. Heck, with all the latest
holes in these new win OS's they are spitting out, I'm temped to stay
with win98 a few more years. MK
In other words, nothing factual, just "as far as I'm concerned." Thank you
for your rant.

Ed
WB6WSN
m***@xactcom.net
2003-09-21 16:13:26 UTC
Permalink
Post by Ed Price
In other words, nothing factual, just "as far as I'm concerned." Thank you
for your rant.
That was no rant, and pretty factual. Microsoft has left security
hole after security hole. Further, almost none of this would happen
if people would stop using Outlook and Outlook Express for mail. A
good text based email and news program like Agent goes a long way
toward preventing both accidental infection and spreading of the
trash that currently pollutes the system so heavily. Eudora used to
be good also, but I haven't used it in almost 10 years so it could
have given in to the weaknesses by now.

gm
--
Remove any x in adr.
David or Jo Anne Ryeburn
2003-09-21 17:25:33 UTC
Permalink
Post by m***@xactcom.net
Post by Ed Price
In other words, nothing factual, just "as far as I'm concerned." Thank you
for your rant.
That was no rant, and pretty factual. Microsoft has left security
hole after security hole. Further, almost none of this would happen
if people would stop using Outlook and Outlook Express for mail. A
good text based email and news program like Agent goes a long way
toward preventing both accidental infection and spreading of the
trash that currently pollutes the system so heavily. Eudora used to
be good also, but I haven't used it in almost 10 years so it could
have given in to the weaknesses by now.
Eudora is a mail-only program, not a mail plus news program. It hasn't
given in to those weaknesses, at least not on the Mac platform, and I
understand that the Windows version of it is very similar to the Mac
version. (Historically, the Mac version of Eudora came first, and it was
ported to Windows when Qualcomm bought it from the University of
Illinois.)

The latest version, Eudora 6, has been available on both platforms for
several weeks now, and I recently upgraded to it. As has been the case for
some time, Eudora can be configured three ways: Light, Sponsored, and
Paid. The Paid version has no ads and has a new SPAM filter which can
learn what to do over time, very effective I am told. The Sponsored
version is the same as the Paid version except that it doesn't cost money,
there are small ads in the corner of the screen (easily ignorable, and I
ignore them), and the anti-SPAM feature is missing (but you can use other
SPAM-filtering software, or you can easily set up your own filters within
Eudora if you don't opt for Eudora's built-in method of filtering). The
Light version has no ads but lacks many features of the other two
versions. SFU and Telus have very effective SPAM-defeating and
virus-defeating features so I didn't spend the extra US $ 40 to get the
Paid version; otherwise, I would have done so.

Eudora can import mailboxes and address lists from many common e-mail
programs including Outlook and Outlook Express. Using this effective and
safe e-mail program, or another safe one, is an easy first step in
avoiding incoming malware.

Using a different browser than IE is another easy thing to do. My wife
likes Mozilla (available for both Windows and Macintosh). Mozilla today is
what Netscape will be many months from now. The latest completed version
is 1.4; 1.5 is in alpha or beta, but I don't play with such things.
Mozilla is OK but I like iCab better. iCab (Macs only) is an excellent
browser that can be configured to tell useful lies about its identity, and
that of the computer on which it is installed. My copy of iCab is
configured to claim to be IE 6 running on a Windows machine. This lets me
access certain sites (such as some banks) which, for no good reason, turn
away browsers other than IE, or computers other than Windows machines, or
both. Mozilla and iCab are a lot safer browsers than IE. Lying about being
IE doesn't make a browser susceptible to the things IE is susceptible, and
lying about being a Windows machine doesn't make a Mac susceptbile to
Windows-only worms and viruses.
Post by m***@xactcom.net
I am told by knowledgeable UNIX people (another partitioning of the
world) that the structure of UNIX is such that attacks can not be
successful. I am told that there are only three ports into/outof UNIX
modules and it is simple to guard them.
The Bill ware OSs allow all sorts of back doors and side doors and
over-the-transom ports.
agrees with what I have been told by people at SFU. It's not just the
popularity of Windows that accounts for its susceptibility to viruses and
worms.

To cheer everyone up some more, I just learned that a Windows variant will
be coming soon to an ATM near you. See

<http://www.wired.com/news/technology/0,1282,60497,00.html>

When I gave this URL to an old friend of mine (currently a Windows user,
and not enjoying it) who is a retired IBM employee, she replied
Post by m***@xactcom.net
Yuck! I wish I was back on OS/2.
David, ex-W8EZE, strong believer in safer computing
--
David or Jo Anne Ryeburn
***@sfu.caz
To send e-mail, remove the letter "z" from this address.
Roger Halstead
2003-09-22 02:47:22 UTC
Permalink
Post by m***@xactcom.net
Post by Ed Price
In other words, nothing factual, just "as far as I'm concerned." Thank you
for your rant.
That was no rant, and pretty factual. Microsoft has left security
hole after security hole. Further, almost none of this would happen
if people would stop using Outlook and Outlook Express for mail. A
Outlook and OE are both capable of operating as text based if the user
would set the defaults properly. When configured so they are just as
resistant to attack as the other text based readers.

They are every bit as capable as Agent which I happen to be using
here as I prefer the way it handles newsgroups better than the other
two.

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)
Post by m***@xactcom.net
good text based email and news program like Agent goes a long way
toward preventing both accidental infection and spreading of the
trash that currently pollutes the system so heavily. Eudora used to
be good also, but I haven't used it in almost 10 years so it could
have given in to the weaknesses by now.
gm
Roger Halstead
2003-09-21 20:04:08 UTC
Permalink
Post by Mark Keith
Post by Ed Price
I don't recall anything in Gates' career that's equivalent to the present
worm attack.
Do you have any factual backup for your off-hand slander?
Ed
WB6WSN
Well, as far as I'm concerned, he had as much hand in it as anyone. If
his company would quit selling reader software with enough holes to
qualify as swiss cheese, many of these macro viruses wouldn't have a
leg to stand on. I've had 100's of server returns accusing me of
spreading viruses, and also that I'm running Microsoft Outlook Express
6.00.2600.0000. But this is not the case. I use old bulletproof
netscape 3.1 to read mail. These viruses are a non issue to me. Why
I would respectfully suggest that you upgrade to one of the later
versions of Netscape. 3.1 is about as open to giving out your
information as any produced.

I run Netscape, Mozilla (slightly different but Netscape used a
Mozilla core) Thunderbird, and Pearl.
Post by Mark Keith
are they an issue to a software that is supposed to be a step up from
the ancient reader I'm using? If everyone would quit running Billware
6.00.2600.0000, we could nip this macro virus thing in the bud.
If every one would practice safe computing even Bill Ware would work
well.
Post by Mark Keith
Probably would stop 90% of it overnight. Heck, with all the latest
The users alone could prevent more than that. Remember that in *most*
cases they worms and viruses require the user to run them. Only
recently have the true viruses that run when you read them become much
of a problem.
Post by Mark Keith
holes in these new win OS's they are spitting out, I'm temped to stay
It's not the OS. IT's the mail and news readers and even then it's
more of a problem with the default settings. It's also a lack of
firewalls and virus checkers.

If people would just turn off java, HTML, the automated entry of
addresses into their address books, turn off the ability to
automatically run macros when opening a document, and not run
attachments until they verify who ever sent it did so on purpose.
there would be few successful viruses.

It's a knee jerk reaction to blame the OS (which do have lots of holes
in them), but in reality the blame for well over 90% of the problem
comes directly from us...the users.
How many people have you heard state that "they" only open attachments
from people they know. That virus, or worm had to get the address
form some where and it was in some ones address book.
Post by Mark Keith
with win98 a few more years. MK
The new ones are no worse than 98, or 98 SE.
And the early versions of Netscape were terrible for leaking
information about the user.

Computer People forget that over 90% of computer users are clueless.

Roger K8RI (Retired computer systems project manager)

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)
Mark Keith
2003-09-22 18:32:52 UTC
Permalink
Post by Roger Halstead
I would respectfully suggest that you upgrade to one of the later
versions of Netscape. 3.1 is about as open to giving out your
information as any produced.
I only use it to read mail. I don't browse with it. Besides, thats a
different issue than the micro viruses being discussed. P.S I have
newer versions of netscape. KInd of like playing cards. Take your
pick.
Post by Roger Halstead
It's a knee jerk reaction to blame the OS (which do have lots of holes
in them), but in reality the blame for well over 90% of the problem
comes directly from us...the users.
No, it's not a knee jerk reaction. The OS security problems I refer to
have nothing to do with the discussed macro viruses. They are
altogether different problems. Just as serious though. Probably more
so.
Post by Roger Halstead
The new ones are no worse than 98, or 98 SE.
They sure are no better. I would say worse....But, it's not really
important. I don't have any trouble with any of these worms, viruses,
etc. So anything I say can hardly be called a knee jerk reaction. I
have plenty of unmolested time to think about it. MK
David Robbins
2003-09-20 19:07:12 UTC
Permalink
YES. MB worth. So many that E-mail drive was filled on Friday. Just
received five in a five minute period.
Not hard to trap, however they are quite a pain. Have yet to get
ISP to block them.
Good luck. Mac N8TT
my isp is stopping the infected ones, which appears to be most of them.. its
funny though, some get through with an empty attachment. there must be a
bug in the virus that occasionally attaches an empty file instead of itself.
Dee D. Flint
2003-09-20 19:35:15 UTC
Permalink
Post by David Robbins
YES. MB worth. So many that E-mail drive was filled on Friday. Just
received five in a five minute period.
Not hard to trap, however they are quite a pain. Have yet to get
ISP to block them.
Good luck. Mac N8TT
my isp is stopping the infected ones, which appears to be most of them.. its
funny though, some get through with an empty attachment. there must be a
bug in the virus that occasionally attaches an empty file instead of itself.
Actually my ISP is blocking the actual virus/worms but then the message
itself gets passed on to me with a statement from the ISP that if I want the
file to contact the sender and arrange another means of getting it.
However, that still is a huge number of emails in my box.

I've tried to trap them but the headers and senders, etc are all different.
If you have a suggestion on how to stop them, please let us all in on it.

Dee D. Flint, N8UZE
David Robbins
2003-09-20 19:45:49 UTC
Permalink
Post by David Robbins
Post by David Robbins
YES. MB worth. So many that E-mail drive was filled on Friday.
Just
Post by David Robbins
Post by David Robbins
received five in a five minute period.
Not hard to trap, however they are quite a pain. Have yet to get
ISP to block them.
Good luck. Mac N8TT
my isp is stopping the infected ones, which appears to be most of them..
its
Post by David Robbins
funny though, some get through with an empty attachment. there must be a
bug in the virus that occasionally attaches an empty file instead of
itself.
Actually my ISP is blocking the actual virus/worms but then the message
itself gets passed on to me with a statement from the ISP that if I want the
file to contact the sender and arrange another means of getting it.
However, that still is a huge number of emails in my box.
I've tried to trap them but the headers and senders, etc are all different.
If you have a suggestion on how to stop them, please let us all in on it.
Dee D. Flint, N8UZE
if you can filter by the text in the body use "September 2003, Cumulative
Patch" that should be unique enough to catch them without taking out other
messages. the isp messages should be easy to filter out, i use the phrases
"virus found in received message" and "problem found in received message" to
send them to the deleted folder.
David or Jo Anne Ryeburn
2003-09-20 20:37:54 UTC
Permalink
Post by Dee D. Flint
I've tried to trap them but the headers and senders, etc are all different.
The "From:" lines are likely forged. Many such worms and viruses pick
recipients and purported senders randomly from the infected computer's
Outlook or Outlook Express address list. If you want to see where the
message really is coming from, examine full headers carefully --
specifically, the "Received: from" lines.
Post by Dee D. Flint
If you have a suggestion on how to stop them, please let us all in on it.
Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.

David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
--
David or Jo Anne Ryeburn
***@sfu.caz
To send e-mail, remove the letter "z" from this address.
Dee D. Flint
2003-09-21 12:28:16 UTC
Permalink
Post by David or Jo Anne Ryeburn
Post by Dee D. Flint
I've tried to trap them but the headers and senders, etc are all different.
The "From:" lines are likely forged. Many such worms and viruses pick
recipients and purported senders randomly from the infected computer's
Outlook or Outlook Express address list. If you want to see where the
message really is coming from, examine full headers carefully --
specifically, the "Received: from" lines.
Post by Dee D. Flint
If you have a suggestion on how to stop them, please let us all in on it.
Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.
David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.

Dee D. Flint, N8UZE
J. McLaughlin
2003-09-21 15:12:33 UTC
Permalink
Dear Mr. Flint and group:
I am told by knowledgeable UNIX people (another partitioning of the
world) that the structure of UNIX is such that attacks can not be
successful. I am told that there are only three ports into/outof UNIX
modules and it is simple to guard them.
The Bill ware OSs allow all sorts of back doors and side doors and
over-the-transom ports.
What I do not understand is why someone has not funded a set of
bright Indian programmers to produce an OS that can execute Window
programs without committing the errors made by Bill's people. There is
a Unix based program that is able to execute some, well behaved Windows
programs.
I threaten my students with eternal haunting if they ever write a
control program in Bill style. 73 Mac N8TT

--
J. Mc Laughlin - Michigan USA
<snip>
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Persuade the universe to cease using unsafe operating system
software,
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.
David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.
Dee D. Flint, N8UZE
Bill
2003-09-22 01:33:19 UTC
Permalink
Your Unix people told you wrong. Mail worms were invented back before
Outlook, in a primarily unix based internetwork.

"bright Indian programmers" do not exist. If you are going to count on that
craphole of a place to produce anything usable, then you have a hard wake up
coming. A nation without flush toilets is hardly technologically advanced
to write an OS of any merit...just think...those idiots have nuclear
weapons...probably aimed at themselves.

Mac...just what is Bill style?
Post by J. McLaughlin
I am told by knowledgeable UNIX people (another partitioning of the
world) that the structure of UNIX is such that attacks can not be
successful. I am told that there are only three ports into/outof UNIX
modules and it is simple to guard them.
The Bill ware OSs allow all sorts of back doors and side doors and
over-the-transom ports.
What I do not understand is why someone has not funded a set of
bright Indian programmers to produce an OS that can execute Window
programs without committing the errors made by Bill's people. There is
a Unix based program that is able to execute some, well behaved Windows
programs.
I threaten my students with eternal haunting if they ever write a
control program in Bill style. 73 Mac N8TT
--
J. Mc Laughlin - Michigan USA
D.
<snip>
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Persuade the universe to cease using unsafe operating system
software,
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX,
including
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
the version now marketed by Apple, is pretty safe.
David, ex-W8EZE, whose computers are happily MS-free except for safe
11
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
year old versions of Word and Excel
If everyone switched to UNIX, the solution would be short-lived as the
virus
Post by Dee D. Flint
writers would then switch to attacking it. Right now, they simply get
more
Post by Dee D. Flint
"bang for the buck" by attacking Windows and it doesn't give them much
of a
Post by Dee D. Flint
thrill to also go after UNIX system users or Apple computer users.
Dee D. Flint, N8UZE
Zoran Brlecic
2003-09-22 03:42:16 UTC
Permalink
Post by Bill
"bright Indian programmers" do not exist. If you are going to count on that
craphole of a place to produce anything usable, then you have a hard wake up
coming. A nation without flush toilets is hardly technologically advanced
to write an OS of any merit...just think...those idiots have nuclear
weapons...probably aimed at themselves.
Funny... some people would claim the same about trailer trash rednecks
like you.
--
Anti-spam measure: look me up on qrz.com if you need to reply directly
Mike Painter
2003-09-22 15:36:12 UTC
Permalink
Post by Bill
Post by Zoran Brlecic
Post by Bill
"bright Indian programmers" do not exist. If you are going to count
on
Post by Bill
that
Post by Zoran Brlecic
Post by Bill
craphole of a place to produce anything usable, then you have a hard
wake up
Post by Zoran Brlecic
Post by Bill
coming. A nation without flush toilets is hardly technologically
advanced
Post by Zoran Brlecic
Post by Bill
to write an OS of any merit...just think...those idiots have nuclear
weapons...probably aimed at themselves.
Funny... some people would claim the same about trailer trash rednecks
like you.
Next he'll point out that Chandrasekhar was not *really* Indian.
Admittedly he was not a programmer but was a fairly bright person.
Dick Carroll;
2003-09-22 15:52:11 UTC
Permalink
Post by J. McLaughlin
I am told by knowledgeable UNIX people (another partitioning of the
world) that the structure of UNIX is such that attacks can not be
successful. I am told that there are only three ports into/outof UNIX
modules and it is simple to guard them.
The Bill ware OSs allow all sorts of back doors and side doors and
over-the-transom ports.
What I do not understand is why someone has not funded a set of
bright Indian programmers to produce an OS that can execute Window
programs without committing the errors made by Bill's people.
Is is not correct to say that Windows was left vulnerable so that
other computers can deliberately enter and assess remote computers for
various reasons, such as determining whether or not the copy of the OS
in use had been properly :"registered" before issuing updates?

I'm not a programmer but it seems that might xerainly be a very good
reason.
In other words, all these security "holes" are perhaps not accidental.
When a virus writer takes advantage of one of them the "patch" issued
to "fix" it mught just be specific to that particular violation, instead
of permanently taking care of the problem.

I know that the Windows series is an extremely complex piece of work,
but the virii
issuers seem to have little trouble finding cracks that Bill's
programmers couldn't
anticipate..

Dick
Richard Clark
2003-09-22 16:36:51 UTC
Permalink
Post by Dick Carroll;
Is is not correct to say that Windows was left vulnerable so that
other computers can deliberately enter and assess remote computers for
various reasons, such as determining whether or not the copy of the OS
in use had been properly :"registered" before issuing updates?
I'm not a programmer but it seems that might xerainly be a very good
reason.
In other words, all these security "holes" are perhaps not accidental.
When a virus writer takes advantage of one of them the "patch" issued
to "fix" it mught just be specific to that particular violation, instead
of permanently taking care of the problem.
I know that the Windows series is an extremely complex piece of work,
but the virii
issuers seem to have little trouble finding cracks that Bill's
programmers couldn't
anticipate..
Dick
Hi Dick,

Your claim
Post by Dick Carroll;
I'm not a programmer
Should have been the point where you stopped writing.

The security holes are not inadvertent mistakes that anyone could have
suffered in the face of such a monumental work as Windows. These
holes (and I am not talking about the current round of affairs, as
neither was J. McLaughlin) are deliberate design "features" that
Chairman Bill and MS claim to be what the user population clamor for.

In other words, insecure software is being deliberately constructed
and sold for the express purpose of satisfying Market issues. MS is
quite blunt in this admission, and aggressively so! Many years ago,
the computer community bewailed MS's determination to allow raw
sockets to be made available at the user level. As you are "not a
programmer" you probably never heard this debate, and yet it is part
and parcel to the features of insecure design. MS snubbed the
security experts (Not Invented Here syndrome) and went their own way -
the body count over those same years testify to it in the millions.
Unfortunately the income measures in the billions and security is
buried in the digits with the corpses of dead machines.

The feature called DCOM is so insecure, that it leads the way in
current hacker fields of delight. DCOM is a patchwork quilt of an
older Marketing concept called COM (which has been largely ignored by
software professionals such that MS tried to "sex" it up by adding a
"D" to make it "Distributed," yet another Market slide) which in turn
was spun off from OLE. All of these have technical basis in
implementation, but were designed in whole ignorance of security
requirements. You have absolutely no need for DCOM, and yet as a
service to you MS has deliberately left access to it on your machine
open to anyone on the internet.

None of these issues are trivial. None of them require poking and
prodding to discover or crack. None of them came without advanced
warning (and one site has had fixes months in advance of MS). None of
them were designed by accident, or through the misfortune of Windows
being too complex to debug 100% faithfully. What is worse, MS even
submitted a security patch in the last two weeks that did not work!
Making allowances for them is generous in the extreme.

I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the
rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!

73's
Richard Clark, KB7QHC
Roger Halstead
2003-09-22 23:59:44 UTC
Permalink
On Mon, 22 Sep 2003 16:36:51 GMT, Richard Clark <***@comcast.net>
wrote:

<snip>
Post by Richard Clark
Should have been the point where you stopped writing.
The security holes are not inadvertent mistakes that anyone could have
suffered in the face of such a monumental work as Windows. These
holes (and I am not talking about the current round of affairs, as
neither was J. McLaughlin) are deliberate design "features" that
Chairman Bill and MS claim to be what the user population clamor for.
Richard, you reminded me of things I had long forgotten.
I've been around this stuff since before there was a Microsoft.
I purchased my own PC in 1979-1980. We called them PC even before IBM
was given the copyright...much like MS and DOS. <sigh>
Post by Richard Clark
In other words, insecure software is being deliberately constructed
and sold for the express purpose of satisfying Market issues. MS is
quite blunt in this admission, and aggressively so! Many years ago,
the computer community bewailed MS's determination to allow raw
sockets to be made available at the user level. As you are "not a
programmer" you probably never heard this debate, and yet it is part
and parcel to the features of insecure design. MS snubbed the
security experts (Not Invented Here syndrome) and went their own way -
Although I'm not an MS booster, I've had to use it to stay compatible
over the years. I do take exception to their ethics and lack there
of. OTOH, as much as I hate to admit it, I truly believe that had MS
not gone for the "Market" we wouldn't have the abilities we have
today. And...yes that can be taken two ways and both are correct.
<sigh>
Post by Richard Clark
the body count over those same years testify to it in the millions.
Unfortunately the income measures in the billions and security is
buried in the digits with the corpses of dead machines.
The feature called DCOM is so insecure, that it leads the way in
current hacker fields of delight. DCOM is a patchwork quilt of an
older Marketing concept called COM (which has been largely ignored by
software professionals such that MS tried to "sex" it up by adding a
"D" to make it "Distributed," yet another Market slide) which in turn
was spun off from OLE. All of these have technical basis in
implementation, but were designed in whole ignorance of security
requirements. You have absolutely no need for DCOM, and yet as a
service to you MS has deliberately left access to it on your machine
open to anyone on the internet.
None of these issues are trivial. None of them require poking and
prodding to discover or crack. None of them came without advanced
warning (and one site has had fixes months in advance of MS). None of
them were designed by accident, or through the misfortune of Windows
being too complex to debug 100% faithfully. What is worse, MS even
submitted a security patch in the last two weeks that did not work!
Making allowances for them is generous in the extreme.
I guess I'd have to be generous and say I doubt they released the
patch that didn't work on purpose...It's bad for their image.
Post by Richard Clark
I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the
A few years back, I was receiving an inordinate number of viruses
which more correctly were mostly worms. I'd take the IP and head for
what looked like the culprit in the above manner. I verified that was
the source and then sent them an e-mail, or looked up the phone number
and called. True, I didn't track all that many down, but I still
found a bunch and those e-mails had given me the machines address.
Back them dynamic IPs were the norm, not the static IPs on the
broadband of today. BTW, many of those systems would have been very
easy to log in as I was basically in the same position as any user
when they are at the boot up screen. OTOH, I had no desire to root
around in someone else's system and particularly if it most likely
had a virus.

I can't imagine going on the net with an MS system without a firewall,
virus checker, "cookie cruncher" and "SpyBot". I don't use MSs
firewall either and I avoid "Passport" like the plague.

IF MS would just set the defaults to off, it would be a big
improvement, but their market base wants all that stuff that opens
them to the whole wide world.

It's not just individuals who want that fancy stuff either.
My wife has used one of our computers for several years to keep a
large database for a pretty big organization. That database comes
with a complete set of macros and VB programming to make it user
friendly. I have the security features now set to prevent that stuff
from running automatically. If they want her volunteer time they are
going to have to create a stand alone program to use the database as
our system now strips that stuff off on receipt. Maybe it's overkill,
but I don't like the idea of a program having the ability to run
macros and VB when it is opened. Either is quite capable of doing any
operation on my computer that I can and probably no few that I don't
even know about and my degree is in CS.
Post by Richard Clark
rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!
It's interesting to sit here was watch port probes repeatedly move
through the list trying to find a way in. If I did not have a fire
wall they'd be in on the first try.

One day I saw a familiar address as the source of the probes. I
called my ISP and asked them to check out an IP that was probing my
machine. There was a long pause and then the exclamation..."That's
one of OUR IPs"! "Yah, I know...I think you guys have picked up a
termite." To top it off I use multiple layers of isolation and they
were still probing the one machine. Just the one, none of the others.

So, from the marketing standpoint the MS approach has been extremely
successful, but a disaster from the security standpoint.

OTOH, had some other system such as LINUX, or UNIX been adapted to a
user friendly GUI (I mean man-on-the-street friendly)

No system is completely invulnerable, but I wonder what the state of
the art for users and security would be had a more secure route been
followed? Would the industry have progressed as fast? would
redirected energy from crackers eventually have created as much of a
problem? Would we have near as many people capable of interacting
world wide?

All hypothetical questions as there is really no way of answering
"what ifs".

What we do know beyond the history is that the "ordinary" users are
not truly computer literate and no amount of education and training is
going to make them give up those fancy features that open their
computers to the whole wide world and I don't mean internet.

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)
Post by Richard Clark
73's
Richard Clark, KB7QHC
Dick Carroll;
2003-09-23 04:21:09 UTC
Permalink
Post by Richard Clark
Post by Dick Carroll;
I'm not a programmer
Should have been the point where you stopped writing.
Why golly, Rich, I was downright proud of myself for deducing that one
doesn't *need* to
be a programmer to conclude without doubt the origin of all these
"security holes" that are
so frequerntly "found" and for which "fixes" or "patches" are issued
that ostensibly take
THAT particular threat out of circulation......until next time. So much
of the official explanation
is geared to make it appear at least inadvertant, but that wasn't so
difficult to see through.

When one goes to MS update website they warn up front that if your
Windoze version isn't "registered", which they obviously check through
one of the deliberate security holes, then you get nothing from
Microsoft, no matter what you paid them for your OS. Not my kind of
deal. I stopped registering anything long ago. Nothing, ever again.

I normally get NO connect refusals, now I'm getting lots of them,
indicating the ISP is busy with all the wormy emails.

In any event, thanks for the confirmation below, and the detailed
explanation. Interesting stuff.
I see where Bill G has stacked up another $3 bil since this time last
year. Meanwhile, come one come all, buy his newest offerings and come
that much further under his control.
Post by Richard Clark
The security holes are not inadvertent mistakes that anyone could have
suffered in the face of such a monumental work as Windows. These
holes (and I am not talking about the current round of affairs, as
neither was J. McLaughlin) are deliberate design "features" that
Chairman Bill and MS claim to be what the user population clamor for.
In other words, insecure software is being deliberately constructed
and sold for the express purpose of satisfying Market issues. MS is
quite blunt in this admission, and aggressively so! Many years ago,
the computer community bewailed MS's determination to allow raw
sockets to be made available at the user level. As you are "not a
programmer" you probably never heard this debate, and yet it is part
and parcel to the features of insecure design. MS snubbed the
security experts (Not Invented Here syndrome) and went their own way -
the body count over those same years testify to it in the millions.
Unfortunately the income measures in the billions and security is
buried in the digits with the corpses of dead machines.
The feature called DCOM is so insecure, that it leads the way in
current hacker fields of delight. DCOM is a patchwork quilt of an
older Marketing concept called COM (which has been largely ignored by
software professionals such that MS tried to "sex" it up by adding a
"D" to make it "Distributed," yet another Market slide) which in turn
was spun off from OLE. All of these have technical basis in
implementation, but were designed in whole ignorance of security
requirements. You have absolutely no need for DCOM, and yet as a
service to you MS has deliberately left access to it on your machine
open to anyone on the internet.
Yes, I already downloaded the programs you mentioned earlier in this
thread and will replace Zonealarm and Norton with them. I'm pretty sure
the worm made it into my machine since I had a session of "Virtual
memory rsources running low, Windows is assigning additional memory"
then Netscape 4.7 would crash. This running XP (came on the machine from
the OEM).
. *No* Explorer nor Outlook incvolved whatever.

I recognized very early on that an attack was underway when I had 96
various "bounced mail"
messages in my mailbox in the morning a couple days ago, so not only did
I not open any attachments, I didn't open a single email message whose
source I wasn't absolutely sure of.
I went to my ISP website and remotely deleted many more of the same from
the server-I'm still doing that-
And still I got hooked. I'm Running Zonealarm and Norton, though not
with the latest definitions.
Time for a change.

I have a couple versions of Linux on the shelf but really I have no
stomach for starting over again, -by most accounts I've read, the hard
way, so I'll try it your way first..
So I'm now using Netscape 7.1 and cleaned out the worm with tools
found on the web.
Post by Richard Clark
None of these issues are trivial. None of them require poking and
prodding to discover or crack. None of them came without advanced
warning (and one site has had fixes months in advance of MS). None of
them were designed by accident, or through the misfortune of Windows
being too complex to debug 100% faithfully. What is worse, MS even
submitted a security patch in the last two weeks that did not work!
Making allowances for them is generous in the extreme.
I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the
rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!
You confirm what I deduced without computer science training. Must
really be pervasive .
I'm strictly dialup and never leave it online unattended, so with a
little upgrade courtesy your recommendations maybe I'll dodge the next
round. Tnx.

73, Dick W0EX
Roger
2003-09-23 20:10:55 UTC
Permalink
Post by Richard Clark
I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the
rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!
73's
Richard Clark, KB7QHC
I have a static IP address, would you care to prove how open to attack
my system is?
Richard Clark
2003-09-23 20:58:45 UTC
Permalink
Post by Roger
I have a static IP address, would you care to prove how open to attack
my system is?
Hi Roger,

It is not apparent in your headers.

73's
Richard Clark, KB7QHC
Roger
2003-09-24 12:37:37 UTC
Permalink
Post by Richard Clark
Post by Roger
I have a static IP address, would you care to prove how open to attack
my system is?
Hi Roger,
It is not apparent in your headers.
73's
Richard Clark, KB7QHC
I know, I would have to give it to you. I don't think its quite as
easy as you say to "hack" into an NT system, unless the person that
set up has no idea what their doing.
Richard Clark
2003-09-24 16:30:19 UTC
Permalink
Post by Roger
Post by Richard Clark
Post by Roger
I have a static IP address, would you care to prove how open to attack
my system is?
Hi Roger,
It is not apparent in your headers.
73's
Richard Clark, KB7QHC
I know, I would have to give it to you. I don't think its quite as
easy as you say to "hack" into an NT system, unless the person that
set up has no idea what their doing.
Hi Roger,

So why ask in the first place?

73's
Richard Clark, KB7QHC
H. Adam Stevens, NQ5H
2003-09-25 10:33:31 UTC
Permalink
I have created email addresses that have never been exposed to the net or
the web.
The ones using regular words get hit sooner and more frequently that the
ones using random alphanumeric characters.

Can you say ViralSpamBot?
But.....
What I want to know is......
.....why?

Is life THAT boring?

73
H.
Richard Clark
2003-09-25 16:10:05 UTC
Permalink
On Thu, 25 Sep 2003 05:33:31 -0500, "H. Adam Stevens, NQ5H"
Post by H. Adam Stevens, NQ5H
Is life THAT boring?
73
H.
Hi OM,

Put the word "pound" in one posting and see what happens. ;-)

73's
Richard Clark, KB7QHC
Roger Halstead
2003-09-22 02:43:37 UTC
Permalink
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Post by Dee D. Flint
I've tried to trap them but the headers and senders, etc are all
different.
Waste of time. It *used* to work, but rarely will it now. Check the
IP, not the from address.
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
The "From:" lines are likely forged. Many such worms and viruses pick
recipients and purported senders randomly from the infected computer's
They also make them up, or combine several to make one.
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Outlook or Outlook Express address list. If you want to see where the
message really is coming from, examine full headers carefully --
specifically, the "Received: from" lines
Look for the IP.
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Post by Dee D. Flint
If you have a suggestion on how to stop them, please let us all in on
it.
Post by David or Jo Anne Ryeburn
Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.
Unfortunately this is not really the case.
There are no truly safe operating systems (and yes MS has a few more
problems than others), but the cases in point are not operating system
problems. They are mail and newsgroup reader problems and *nearly*
all can be prevented by properly configuring said programs. Turn off
the ability to read mail in HTML, don't let macros run, disable Java,
and above all don't open attachments until after verifying whoever
really sent it. This is particularly true if the thing came from some
one you know. How many times have you heard some one say, Oh, I don't
worry. I only open attachments from people I know. Now there is a
prime candidate for a virus.

MS operating systems are written for the masses. It depends on your
definition of computer literate, but unless you make the definition
very lenient there are few computer users who are computer literate.

In grad school I taught intro to Computer Science. It was one of
those courses where we taught them to turn 'em on, insert a disk, run
an app, save the date, and turn it off.

I had 195 students. 5 or so shouldn't have been in there as they knew
as much as I did and I was working on my masters in CS. Unfortunately
they fell into one of those cases where they had to take the course.
Another 5 or so were never going to survive that simple goal of the
class. The other 185 covered the spectrum in between. Oh...I had
about 10 that could type.

I'm not defending windows...What I am doing is trying to show where we
have gone wrong across the board and the unlikely prospect of it being
fixed soon...if ever.

Windows was designed to be user friendly. Any one who has done much
programming at all knows the more you work to make a "program" user
friendly the more difficult it becomes for the programmer. The
program becomes more complex. Sometimes much more complex and with
each increase in complexity comes an increase in the likely hood of
"side effects".

For those unfamiliar with the term, side effects are ... well...just
that...They are unexpected operations, outputs, or even capabilities
from a program, routine, or function that were not expected. Just
like side effects from a medication, only in this case it gives your
computer a case of diarrhea.

Windows was also designed to create a uniform environment for
programmers that would also simplify program design...I.E. The DLL,
or Dynamic Linked Library.

You can create a relatively small but capable program in Visual Basic,
or Visual C++. However, compile it into a stand alone program that
can be installed on other computers and it will become huge. It
includes all the needed DLLs. A 32 K program can easily become 10 or
20 megs. However when you install it the program will only install
DLLs that are newer than the ones on the computer. It will ask if you
want to install a DLL if the DLL is older than the one currently on
the computer. So that 32K program that turned into 9 megs may only
add a 100K or so to some computers.

Outlook and Outlook Express make use of these integrated functions, or
DLLs. Unfortunately they also come with the default settings

Which brings me to the main fault of windows. The one that most likely
will never be cured. US...You, me, who ever is at the keyboard, that
is where the main responsibility lies. We want HTML as it makes the
netzines look nice. We want it so we can send professional looking
letters and resumes even if it does have the capability of reporting
back to who ever sent you the unwanted e-mail. We want Java running.
It does do some neat things. We want macros enabled so when we
receive that database it will be displayed as the builder intended and
we only have to fill in the blanks. Never mind that the macro can do
anything on your computer that you can...probably more in most cases.

You can do all the education you want, but if the user wants to use
those functions/capabilities then they are going to use them whether
it opens their computer up to the whole wide world or not.

Virus checkers and spam botts are a necessity to keep track of many
things. Some reputable companies seem to be including trojans and spy
bots in their soft ware. That stuff lets them track your every move.
I have no idea as to why they'd want to track mine, but... "SpyBot
Search & Destroy" has found a number of them. In one year I received
over 250 copies of viruses and worms. BTW, SpyBot, Search & Destroy
is free and does a great job. The writer is just looking for
donations.

So, were Windows to disappear tomorrow, we might get a brief respite
from the viruses while the writers retrenched, but they would be back.
The users, still looking for functionality above all else would soon
be complaining about the security in the new OS, even though they had
been taught the principals of safe computing.
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
In the computing world older is often not better. If word and excel
can run macros when you receive them, or load a document then they are
vulnerable. To top it off they can't read any of the documents from
newer versions. Old versions of Netscape are particularly bad, but
early Internet Explorer was no better. Being MS free is no guarantee
of safety.
Post by Dee D. Flint
If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.
Yup! I have to admit that Unix/Linux, and Apple might be a bit more
work, but they are not immune. Once some one, or a group puts
together the tools in a package the script kiddies take over and use
them like an erector set.

Without going into details, Worms and viruses can be amazingly simple
to write. I wrote a worm as an under grad student. It was only on
paper. I gave it to my instructor and asked if we could try it on a
virtual machine. After studying the thing for just a couple of
minutes he said, I don't think we better try it. I gave him the
paper and said "You keep it". The simplest being the macro viruses.
OTOH, some of these things are getting pretty sophisticated. They
"call home" to see if there is an update to their code,or payload.
They don't always behave the same. Now we have some that don't
require user intervention if the default settings are such as to let
them loose.

Still, the vast majority depend on the "idiot" at the keyboard. IF
the user never opened the attachment without verification, never let
some one trick them into installing a patch from MS, or some other
company (those companies don't work that way), never deleted a file
because the official looking e-mail told them to do so, never
answered an e-mail asking them to update their account information,
(particularly when they ask for the account name), and actually
practiced safe computing the virus and worm problem would become a
relatively small irritation.

BTW, I've set here and watched the firewall report probes of the
ports. They would start, try a port, not get in, try the next port,
and repeat until they had gone through the whole list, and then start
over. It doesn't matter if you have one port, or 10,000. If you have
one open that is all it takes.

Contrary to government figures as to computer literacy, I doubt any
where near half the population could truly be called computer
literate. When it comes to computer savvy, I doubt more than 5 to
maybe 10% would qualify and I think 10% is really stretching it.
If 75 to 80% were really computer literate spam and viruses would not
be any where near the present problem. It's part ignorance and part
apathy...The old "It only happens to other people" syndrome. Kinda
like the immortal teenager in his invincible SUV. I drove half way
though one of those a couple of years back and shortened my Transam up
nearly two feet. (My last thoughts before impact were: "Boy, I'll bet
this is gonna hurt") Surprisingly I wasn't even sore the next day,
but man was I punch for about a half an hour after the impact. I
don't think a 6-pack would have that much effect.

An aside to security...Using signed documents...Verisign recently
hijacked all the unused dot coms and a bunch of other extensions.
Type in a non existent URL and see where you end up. They get paid
for every so called click through. That means they get paid for every
invalid address typed. As a warning...You end up with the prompt for
a secure page and no graceful way to say no. IF you say <Yes> they
make money. In windows that just means using the program manager to
close the browser. And...Yes they are already getting sued.

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)
Post by Dee D. Flint
Dee D. Flint, N8UZE
Mark Keith
2003-09-24 10:42:38 UTC
Permalink
Post by Roger Halstead
They are mail and newsgroup reader problems and *nearly*
all can be prevented by properly configuring said programs. Turn off
the ability to read mail in HTML, don't let macros run, disable Java,
and above all don't open attachments until after verifying whoever
really sent it. This is particularly true if the thing came from some
one you know. How many times have you heard some one say, Oh, I don't
worry. I only open attachments from people I know. Now there is a
prime candidate for a virus.
MS operating systems are written for the masses. It depends on your
definition of computer literate, but unless you make the definition
very lenient there are few computer users who are computer literate.
Thats the exact problem as I see it. The *average* e-mail user, who
has little on the ball as far as puters is left to the wolves because
MS installs all that stuff with all the options wide open. And unless
you go and read all the docs to learn how to turn it off, the average
user will not even be aware that they are at risk. And you know how
many probably read the docs....Yep, about 4.27%...If MS gave a real
hoot about protecting peoples security, they would install with it all
turned off, and instruct the user to turn on features as or if needed.
But nooooooo......The average users first instruction on the problem,
or feature that led to the problem, is after they are cleaning out a
macro virus. And with a virus like sobigf, you could go for months
without knowing you had it , unless someone finally tells you. The
sent emails are forged with someone in the address book, or whatever.
Then, hummmmm, they finally learn about attachement problems, etc..
It's kind of the same way with the "ports" that MS likes to leave wide
open with a default install. The average user won't have a clue his
box is wide open. Well, Maybe if he stumbles across Gibson research or
whatever...
A good majority of the outlook virus problem victims are e-mail
readers that could give a hoot about puter OS's, outlook or whatever.
They plug it in, and dial up. MS doesn't do them any favors by leaving
them wide open to attack, and not even telling them about it in a
noticable manner. There are worms out now that need no e-mail
connection. They are planting them through open ports I think. I don't
keep up with all the "new" OS problems much. I only worry about the
one I'm running at the time. MK
Mike Coslo
2003-09-24 01:02:18 UTC
Permalink
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Post by Dee D. Flint
I've tried to trap them but the headers and senders, etc are all
different.
Post by David or Jo Anne Ryeburn
The "From:" lines are likely forged. Many such worms and viruses pick
recipients and purported senders randomly from the infected computer's
Outlook or Outlook Express address list. If you want to see where the
message really is coming from, examine full headers carefully --
specifically, the "Received: from" lines.
Post by Dee D. Flint
If you have a suggestion on how to stop them, please let us all in on
it.
Post by David or Jo Anne Ryeburn
Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.
David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.
You have touched on the answer, Dee.

What computer and software manufacturers have done that is a fatal flaw
in their systems is insist that "EVERYTHING HAS TO BE THE SAME" I
remember the abuse that I took from PC users because I was running an
Amiga for so many years. Installed User Base, PC Compatibility and other
mantras were tossed at me and others who dared to use "non-standard"
computers like the Amiga and the Mac.

But here we are undergoing attack after attack because of what. 95
percent of us are using the same platform, the same OS and the same
software. We are going through an computer analog (heh heh) of the Irish
potato famine.

I do like to draw a parallel between the agricultural monoculture and
computer monoculture. Only grow one crop, and you're vulnerable.

Whether MS likes it or not, one big step toward a cure (besides them
writing incredibly poor software) is for there to be several different
types of email software. This software is not to be crippled by all the
features that they try to add, with every feature seems to come a new
vulnerability. Especially things like IE and Outlook coupling up mailing
addys.

I personally use only the MS products that I absolutely have to, and
will not use their mailing system. I use Netscape for mail, and it works
okay. If Netscape were to somehow become the big mail program - which
will never happen - I'll switch to something else.

But the majority of PC users are unwilling to believe this sort of
rationale, as they scramble daily to update their Virus definitions, an
other stunts that don't really work too well.

After all, there has to be a virus that infect a computer before there
can be a definition for it.

- Mike KB3EIA -
Floyd Davidson
2003-09-24 02:00:04 UTC
Permalink
Post by Mike Coslo
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Post by Dee D. Flint
If you have a suggestion on how to stop them, please let us all in on it.
Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.
David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.
You have touched on the answer, Dee.
David is the one who touched on it. The answer *is* to use an
OS designed to be secure. Microsoft products are not, while
virtually all of the current unix systems are. Some unixes (the
ones with open source code, which does not include Apple) do
have higher potential for good security than others.

The "bang for the buck" argument is proof of it too. If you
want a *bang*, then shutdown the *entire* Internet, not just
some percentage of the hosts connected to it. The fact is
that from the start the Internet itself ran on unix. That is
less true today, but it is still true enough that if one could
write a virus to knock out unix, one could just shut the
Internet off for days.

But, of course, it can't be done (or that is exactly what they
would be doing).
--
Floyd L. Davidson <http://web.newsguy.com/floyd_davidson>
Ukpeagvik (Barrow, Alaska) ***@barrow.com
Roger Halstead
2003-09-25 23:33:51 UTC
Permalink
Post by Floyd Davidson
Post by Mike Coslo
Post by Dee D. Flint
Post by David or Jo Anne Ryeburn
Post by Dee D. Flint
If you have a suggestion on how to stop them, please let us all in on it.
Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.
David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel
If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.
You have touched on the answer, Dee.
David is the one who touched on it. The answer *is* to use an
OS designed to be secure. Microsoft products are not, while
virtually all of the current unix systems are. Some unixes (the
ones with open source code, which does not include Apple) do
have higher potential for good security than others.
The "bang for the buck" argument is proof of it too. If you
want a *bang*, then shutdown the *entire* Internet, not just
some percentage of the hosts connected to it. The fact is
that from the start the Internet itself ran on unix. That is
less true today, but it is still true enough that if one could
write a virus to knock out unix, one could just shut the
Internet off for days.
But, of course, it can't be done (or that is exactly what they
would be doing).
Unfortunately this is an academic argument as the "rest-of-the-world",
is not going to change and wouldn't change if you provided it
free...which much already is.

The vast majority wouldn't change even if you installed UNIX, or LINUX
and set up the applications.

Then, most of those who would be willing to use one of those "if you
set it up", they would want mail and news readers that do the same as
Outlook and Outlook Express. If the OS didn't open them to the world
their applications would albeit they would be less likely to trash the
OS ...

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)

Dick Carroll
2003-09-24 03:13:16 UTC
Permalink
Post by Mike Coslo
I use Netscape for mail, and it works
okay. If Netscape were to somehow become the big mail program - which
will never happen - I'll switch to something else.
Mike I also use Netscape, and have for the entire time I've been on
the net. And I thought I'd never catch one of the Outlook/IE bugs
because of that.... but-

When I turned on the computer this morning and fired up Netscape 7.1
I soon learned that there was NOTHING whatever remaining of any of my
settings, stored email, usenet subscribed groups, address book,
bookmarks-- it was ALL gone! Right to the bare Netscape installation
itself.

So I fired up Stinger which I had on the hard drive and scanned the
entire system, and turned up the Nachi worm virus in two separate
locations. Stinger (from Mcafee) cleanmed it out, and I ran Stinger
again just to make sure.

After that I took this opportunity to install a ner 120 GB I picked up
last month and another 256 MB of RAM, and started anew with a completely
new software system, relegating the old 20 GB to slave status.
AND, I'm pleased that I provoked Richard Clark into telling his secrets
of avoidance, as I had dounloaded and am now running DCOM to disable
that particular gaping hole. Still using Zonealarm for a firewall but
think I'll try his recommendation there, also.

If any of this was really simple there'd be no money in it! :-)
Post by Mike Coslo
But the majority of PC users are unwilling to believe this sort of
rationale, as they scramble daily to update their Virus definitions, an
other stunts that don't really work too well.
Well, I've kept Norton in slush funds over the years but had'nt got
around to springing for this year's version yet, and now I don't plan
to. Turns out by some reports that Norton wouldn't have stopped the SWEN
worm anyway. I have no clue about the NACHI thing that I somehow picked
up. I NEVER ran either OE nor Outlook, never opened even one attachment,
never even opened a suspicious email message, but it grabbed me anyway.

Beats me.
Post by Mike Coslo
After all, there has to be a virus that infect a computer before
there can be a definition for it.
Not to sound conspiratorial, but there'd be a real recession among the
antivirus folks if someone should do a good job of spreading a real cure
for all this, and everyone had the success at avoidance that Rich Clark
has had. I'm working my way in that direction.

73, Dick W0EX
Irv Finkleman
2003-09-20 20:21:39 UTC
Permalink
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
You are not alone! We are not alone! You can learn a bit about
it -- just hit google with 'swen virus' as a search term and look'
at any of the antivirus sites such as Symantec. It may take a while
before this one dies down!
--
--------------------------------------
Diagnosed Type II Diabetes March 5 2001
Beating it with diet and exercise!
297/215/210 (to be revised lower)
58"/43"(!)/44" (already lower too!)
--------------------------------------
Visit my HomePage at http://members.shaw.ca/finkirv/
Visit my very special website at http://members.shaw.ca/finkirv4/
Visit my CFSRS/CFIOG ONLINE OLDTIMERS website at http://members.shaw.ca/finkirv5/
--------------------
Irv Finkleman,
Grampa/Ex-Navy/Old Fart/Ham Radio VE6BP
Calgary, Alberta, Canada
Ed Price
2003-09-20 20:36:36 UTC
Permalink
There is a major net attack in progress. The Swen worm can bug even
well-protected computers, since the payload arrives as a 106 kB email
attachment. If your mailbox has a 10 MB capacity, then all you need is 90+,
and you admin will automatically start bouncing ALL your incoming mail. In
effect, a Denial of Service fringe benefit for the worm.

In addition to trying to look like an official MS announcement, the worm is
also arriving in the form of a fake notice of undeliverable email. Don't
investigate ANY attachments unless you want to live very dangerously.

Ed
WB6WSN
YES. MB worth. So many that E-mail drive was filled on Friday. Just
received five in a five minute period.
Not hard to trap, however they are quite a pain. Have yet to get
ISP to block them.
Good luck. Mac N8TT
--
J. Mc Laughlin - Michigan USA
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
pez
2003-09-20 21:03:53 UTC
Permalink
Yes.
In the last two or three days.
A lot of them.

pez
SV7BAX

"Cecil Moore" <***@ieee.org> wrote in message news:3f6c96ed$***@corp.newsgroups.com...
| Is anyone else being deluged with Virus/Worm email messages?
| --
| 73, Cecil http://www.qsl.net/w5dxp
|
|
|
| -----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
| http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
| -----== Over 100,000 Newsgroups - 19 Different Servers! =-----
Dennis Kaylor
2003-09-20 21:17:32 UTC
Permalink
boy looks like you guys are getting the long end of the stick
i have had over 300 emails in the past 24 hours and i would say 100 of
them had virus attachments with them
thank the gods for spam filters and norton antivirus running all the time
Richard Clark
2003-09-20 22:00:58 UTC
Permalink
On Sat, 20 Sep 2003 12:57:53 -0500, Cecil Moore
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
Hi All,

Almost across the board, the problem is glaringly evident, and
certainly one you choose to live with. :-)
Post by Cecil Moore
X-Newsreader: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Post by David Robbins
1000 overnight last night and about 2500 the day before
over 600
MB worth. So many that E-mail drive was filled on Friday.
2000 per day
Of ten current correspondents, 8 use insecure MS products and their
numbers of incoming mails are easily 10 fold over the two that are
not. (Walt, even though you now use Agent for news reading, you still
use Outlook Express for mail).

My count stands at 0 aside from the usual load of porn that Agent
filters directly into the bit bucket (perhaps one half to one dozen a
day).

This doesn't protect me entirely. My own ISP's newserver (being a
microsoft product) decided to whack out during the Blaster attack by
resetting my cable modem every 15 seconds (through the early hours
when I simply turned off my machine). Through the attack (again, my
machine was still off), I contacted Comcast's service line to get a
fellow pitifully scripted to provide no real answers:
him: "our network is currently down"
me: "are you using MS servers?"
him: "No"
me: "What are you doing about it?"
him: "We are in contact with MS about the problem."
me: (significant silence)
him: (keys banging away) "I cannot ping your modem."
me: "The network is down. Why did you even try?"
him: (significant silence)

For several weeks afterword, their still infected server was sending
infected e-mails in my behalf, using an old address (not even in my
machine anymore after being changed from AT&T) they keep for
forwarding. How do I know I wasn't infected? I corresponded daily
through another ISP (my co-host) without a hitch through the entire
period.

Visit:
http://grc.com/default.htm
to obtain security fixes BEFORE the viruses are diagnosed through
autopsy. I've been living quite free of these problems (aside from
stupid Comcast) WITHOUT ONE MS security (sic) upgrade for 8 years.

Now, as to you having made this choice of product and enjoying the
virtues of all the marketing concepts. MS has clearly described how
to fix these problems by turning all javascript and OLE switches off -
and I might add, never double clicking OE or IE.
feds: "When are you going to take care of these virus problems?"
MS: "Viruses are not our fault, prosecute the lawbreakers."

In today's Business section (Seattle):
"Goodby, Mr. Bill Gates?
Japan, South Korea and China
discuss working to promote Linux"
"But the Redmond-based company
said 'consumers and market forces,
not government preferences, should
determine software selection...'"

8 out of 10 here support MS's agenda, and it shows in the numbers.

73's
Richard Clark, KB7QHC
Dave Shrader
2003-09-20 22:47:22 UTC
Permalink
Cecil, the virus/worm messages at my QTH got so bad that I went to my
non read mail list at Comcast and deleted over 65 message related to
Microsoft with attachments and file sizes greater than 100K. I had two
days of being flooded with messages containing viri and McAffee kept
deleting them and I had to reboot to get control. Finally, tonight,
Saturday at 6:45 EST, the backlog is temporarily [I hope] cleared off
and I am using Netscape 7.1 again instead of Comcast.

Expolit-MIME.gen and W32/***@MM really flooded the net this weekend.

Deacon Dave, W1MCE
+ + +
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
Mark Keith
2003-09-20 23:06:00 UTC
Permalink
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
Only about 800 in the last 3 weeks...Sobigf was a real PIA. All the
servers thought I was sending that crap, being the e-mails are forged.
The "server" notices are as bad a spam as the actual spam or virus
itself as far as clogging bandwidth. Not to mention the 100's of
"microsoft" patches I get. My frigging anti-spam filter probably traps
75-80 funky e-mails a day. I have to weed through them often for
"good" e-mails, or I get so many stacked up, it takes an hour to weed
through them all. I have my anti-spam set to industrial strength. It
catches some "good" emails... MK
Irv Finkleman
2003-09-21 00:27:29 UTC
Permalink
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
Last night I downloaded a program called Mailwasher. It is freeware,
and very easy to use. It checks your e-mail while it is still on the
server, and you can delete it from there without having to download
it to your computer. It allows you to check the e-mail addresses
of the originating messages and have them deleted. You can then
just download what you want -- messages from friends. I just went
to Google, typed in Mailwasher, and it took me directly to the
download site. It sure helps here as I have had well over 1500
messages in the past twenty four hours! Only about fifty were wanted.
The problem is that I belong to 8 newsgroups, and that's where a
lot of the email addresses get harvested! This is one of the eight!

I don't think there's much can be done until everyone clears the
virus off their computers. Although I am virus free, it still doesn't
stop the e-mails from coming in!
--
--------------------------------------
Diagnosed Type II Diabetes March 5 2001
Beating it with diet and exercise!
297/215/210 (to be revised lower)
58"/43"(!)/44" (already lower too!)
--------------------------------------
Visit my HomePage at http://members.shaw.ca/finkirv/
Visit my very special website at http://members.shaw.ca/finkirv4/
Visit my CFSRS/CFIOG ONLINE OLDTIMERS website at http://members.shaw.ca/finkirv5/
--------------------
Irv Finkleman,
Grampa/Ex-Navy/Old Fart/Ham Radio VE6BP
Calgary, Alberta, Canada
RB
2003-09-21 00:35:23 UTC
Permalink
The virus is in the original attachments and at the web site the text urges
you to download. If you don't open the attachment, or download the
"security patch", you won't get the virus. However, you will get floods of
this kind of traffic. It's coming from infected computers that have your
email address, and from your email address harvested from newsgroups, and
even from some web sites you've gone to. I think the flooding will continue
for awhile longer.

Some ISPs neutralize the attachment, but the message comes on through with
an empty attachment. Whatever, don't take a chance and open the attachment.

If you haven't done it yet, mung your newsgroup email address so this won't
happen in the future. Something like ***@yyyy.nospam.net. That will keep
you from getting flooded in the future.
Martin
2003-09-21 01:02:26 UTC
Permalink
If you use Norton System Works or Norton Antivirus, bring up their main
configuration screen, click on antivirus > options > email and choose the
last item: "Repair and silently delete if unsuccessful". The messages end
up pronto in the Deleted Item folder where you can check later for desirable
messages that might have slipped through and then get rid of all the nasties
with one right click on that folder. Saves a lot of aggravation. Keep
incoming email scanning on.

Marty K1FHR
Post by RB
The virus is in the original attachments and at the web site the text urges
you to download. If you don't open the attachment, or download the
"security patch", you won't get the virus. However, you will get floods of
this kind of traffic. It's coming from infected computers that have your
email address, and from your email address harvested from newsgroups, and
even from some web sites you've gone to. I think the flooding will continue
for awhile longer.
Some ISPs neutralize the attachment, but the message comes on through with
an empty attachment. Whatever, don't take a chance and open the attachment.
If you haven't done it yet, mung your newsgroup email address so this won't
you from getting flooded in the future.
Roger Halstead
2003-09-22 02:56:06 UTC
Permalink
Post by RB
The virus is in the original attachments and at the web site the text urges
you to download. If you don't open the attachment, or download the
"security patch", you won't get the virus. However, you will get floods of
this kind of traffic. It's coming from infected computers that have your
That's why I keep changing my posting address. I use a valid one, but
it changes as soon as the spam starts to build.
Post by RB
email address, and from your email address harvested from newsgroups, and
even from some web sites you've gone to. I think the flooding will continue
for awhile longer.
Some ISPs neutralize the attachment, but the message comes on through with
an empty attachment. Whatever, don't take a chance and open the attachment.
If you haven't done it yet, mung your newsgroup email address so this won't
you from getting flooded in the future.
Now that is one of my pet peeves. I always use a valid address,
although it changes from time to time. Every once in a while I
receive an e-mail off a newsgroup and almost invariably the sender
forgets to make the return valid. Those get treated just like spam.

Just go to one of the e-mail services and get a throwaway address. Use
it till it starts getting spam and viruses. Then cancel it and create
a new one. If you don't want to receive e-mail from the newsgroups
don't use a valid address and state so in your sig. The easiest is to
just make the address "don'***@email or some such that indicates
you don't want to be bothered with e-mail answers.

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)
Cecil Moore
2003-09-21 04:12:53 UTC
Permalink
The two smartest things I've ever done was invest in a
good antivirus program and a good firewall.
I've got those but they don't block the emails telling me a virus
has been removed.
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
'Doc
2003-09-21 15:08:46 UTC
Permalink
Cecil,
Each antivirus program is different, but most have
an email checking option, both incoming and outgoing
email. That option should be activated. The options
for email checking vary, some require that you decide
what to do about an infected email, some will 'clean'
it automatically or get rid of it in some way. Which
method you choose is up to you.
Firewalls are even more varied than antivirus
programs and are a real P.I.T.A. to set up correctly.
so R.T.F.M. is the key with them. It also depends on
the programs/TSR's you use. Some are not safe at all.
Richard listed a site in his post that is very very good
about telling you the how/what/where about spamming and
virus/worm/?? activities. The utilities on that site
work, are a good idea, and I recommend them.
'Doc

PS - These virus 'floods' are still a P.I.T.A. and I
have to delete them, but they stand NO chance of
infecting my machine.
Alexander Schewelew
2003-09-21 16:57:49 UTC
Permalink
Virus/Worm - What is it?

73!,
Alexander, DL1PBD
Richard Clark
2003-09-21 18:31:30 UTC
Permalink
Post by Dave Shrader
Cecil,
Each antivirus program is different, but most have
an email checking option, both incoming and outgoing
email. That option should be activated. The options
for email checking vary, some require that you decide
what to do about an infected email, some will 'clean'
it automatically or get rid of it in some way. Which
method you choose is up to you.
Firewalls are even more varied than antivirus
programs and are a real P.I.T.A. to set up correctly.
so R.T.F.M. is the key with them. It also depends on
the programs/TSR's you use. Some are not safe at all.
Richard listed a site in his post that is very very good
about telling you the how/what/where about spamming and
virus/worm/?? activities. The utilities on that site
work, are a good idea, and I recommend them.
'Doc
PS - These virus 'floods' are still a P.I.T.A. and I
have to delete them, but they stand NO chance of
infecting my machine.
Hi Doc,
Post by Dave Shrader
http://grc.com/default.htm
to obtain security fixes BEFORE the viruses are diagnosed through
autopsy. I've been living quite free of these problems (aside from
stupid Comcast) WITHOUT ONE MS security (sic) upgrade for 8 years.
I also have not used an "antivirus" program in 12 years. In that same
time I have probably downloaded several 10's of GB of software, run
it, kept some, discarded most, and to no ill effect. In fact, I am
probably my own worst enemy when some 15 years ago I was writing a
file interface where one wrong bit erased my hard drive before my jaw
could sag.

Yesterday only two (2) emails arrived and were caught by one of 7
email filters in my purchased version of Agent - all of them set to
trash porn. No other email at all (pretty slow day). They may have
been part of this latest Virus, perhaps not, I will never know and I
don't care either way. Clearly 80% of those who suffer and complain
have some sort of Masochistic need to feed their habit.

The folks at Agent are about to release version 2 which will have many
more configurable features like multiple accounts support, multiple
connection support, folders within folders (for hierarchal email and
article storage) and all while maintaining a safe separation between
sanity and MS. I will only have to pay an upgrade fee, but I would
buy into it full price without hesitation.

I also use Agnitum Outpost Firewall. Visit:
http://www.agnitum.com/
This blows away nearly all the ads that fill up the browser display
(leaving only their default titles as links). When an ad slips
through to annoy me, I just add it to the list Outpost ignores
downloading. I can set any application's level of trust and block
traffic in configurable settings (however, default Outpost works quite
well out of the box) - and this is the FREE version.

73's
Richard Clark, KB7QHC
Ryan, KC8PMX
2003-09-22 05:14:09 UTC
Permalink
Yep.... in one account I am getting something like 1200-1500 of the alleged
"Microsoft" patch per day, and about 3 weeks ago I got nailed the same way
with the Sobig:f virus. Since the release of these viruses, I now use the
"webmail" mail servers before downloading any email through Outlook Express.

I haven't been affected by the viruses in regards to what they were designed
directly to do, but affected by the time it takes to download email or going
through the webmail service that my ISP offers. I am quite sure that I am
not the only one and I am sure that these bogus emails are depleting free
space on the email servers in general.


--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
.. --. .... - . .-. ...
Post by Cecil Moore
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp
-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----
Loading...