TIP: Click on subject to list as thread! ANSI
echo: tech
to: Wayne Chirnside
from: Charles Angelich
date: 2003-02-28 18:52:16
subject: Re: PnP Monitor?

1237a6a2b721
tech



Hello Wayne - 

--8<--cut 

WC> More impactical than sending millions of file attachments
WC> to to millions of customers utilizing huge resources? The
WC> trojan that keeps showing up in my box carries a 116K plus
WC> payload that installs an executable, adds a register key,
WC> it's own SMTP and incorporates any address books it finds
WC> into it's code. On a bad day when someone with my address
WC> in their book has this trojan I can get 30 copies at over
WC> three meg instead of the zero to two copies of late. When
WC> at it's worst the trojan was triggering notification my
WC> server ten meg allotment was being exceeded in three days!. 

Some day I will spot the commonality in all this, it's
something I'm quite good at with enough information. :-) 

I know this annoys people a bit but I really ever have these
problems. 

I get spam but since removing my _real_ email address from my
browsers and putting a graphic of my email address at my
webpages it's dropped to 33% of what I _was_ getting. Problem
now seems that once these groups get you into a list they
_never_ remove you. I've had the same hotmail address for many
years now therefore my address exists in many spam listings. :-\ 

Virus and worms just don't show up here. I suspect that is
because I don't send out HTML emails. I think the 'signature'
for these is an html email denoting a probable Outlook user who
is vulnerable? I'm guessing that Outlook users who turned off
the duplicate html email attachment would reduce their exposure
considerably. 

>
>        ,                          ,
>      o/      Charles.Angelich      \o       ,
>       __o/
>     / >          USA, MI           < \   __\__
 

___ * ATP/16bit 2.31 * 
... DOS the Ghost in the Machine! http://www.undercoverdesign.com/dosghost/

--- Maximus/2 3.01
* Origin: COMM Port OS/2 juge.com 204.89.247.1 (281) 980-9671 (1:106/2000)
SEEN-BY: 633/267 270
@PATH: 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.