HP3000-L Archives

September 2003, Week 4

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
John Lee <[log in to unmask]>
Reply To:
Date:
Mon, 22 Sep 2003 10:35:07 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (40 lines)
Good (or bad) Morning:

It's Monday and I'm still getting these.  My ISP theorizes that someone (or
more than one) on the 3000L is infected and their system(s) are
broadcasting these messages.  My email program is unable to capture the
full header.  Can anyone else capture a full header and send it to me?  MY
ISP is willing to look at it and try to decipher where it's coming from.

Thanks.

John Lee



This morning I received over 100 unsolicited emails containing executable
files.  Obviously, this presents several problems.  Most are from the
following:

Delivered-To: [log in to unmask]
From: "Microsoft Corporation Program Security Center"
<[log in to unmask]>
To: "User" <[log in to unmask]>
SUBJECT: Current Internet Critical Upgrade
Date: Fri, 19 Sep 2003 14:40:33 +0800


Does anyone have ideas about:

1.  Filtering software to block emails that carry .exe files?
2.  How to trace the perpetrators?

I know that there are more informed minds on this list than mine!

Thanks in advance,

John Lee

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2