| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: word 0-day exploit |
From: John Beckett "Geo" wrote in message news:: > There is a new MS word exploit going around, opening an untrusted doc file > can compromise your machine. Watch for this stuff being sent in emails. > (just a heads up folks.) Imagine trying to explain to users what a trusted doc file, and what an untrusted doc file is. Oh, and by the way, if someone you know gets malware, it can email anything it likes to you! I did a new install of a box today (failed disk), and was thinking about this as I solemnly clicked through the messages to install the ActiveX thingummies for Windows and Microsoft Update. Make sure you only install good ActiveX components foks, don't install any nasty ones! John --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.