TIP: Click on subject to list as thread! ANSI
echo: photo
to: PHOTO
from: CLCOOK{at}OLYWA.NET
date: 2003-08-22 06:06:24
subject: Virus worm

Received: by fanciful.org (Wildcat! SMTP Router v5.6.450.8)
          for photo{at}fanciful.org; Fri, 22 Aug 2003 06:07:24 -0700
Received: from saf.tzo.com ([216.75.195.46]) HELO=saf.tzo.com
          by fanciful.org (Wildcat! SMTP v5.6.450.8) with SMTP
          id 333333796; Fri, 22 Aug 2003 06:07:22 -0700
Received: from 216.174.194.56 by saf.tzo.com
 id 2003082209090245375 for photo{at}fanciful.org;
 Fri, 22 Aug 2003 13:09:02 GMT
Received: (qmail 12944 invoked from network); 22 Aug 2003 13:07:02 -0000
Received: from unknown (HELO Carl?Cook.olywa.net) (64.42.74.15)
  by queue2.atgi.net with SMTP; 22 Aug 2003 13:07:02 -0000
Message-Id: 
X-Sender: clcook{at}mail.olywa.net
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 22 Aug 2003 06:06:23 -0700
To: 
From: Carl Cook 
Subject: Virus worm
In-Reply-To: 
X-Orig-Mime-Version: 1.0
X-Orig-Content-Type: text/plain; charset="us-ascii"; format=flowed



Anybody gotten messages with the new "W32/SOBIG{at}MM" virus worm yet? I've 
just received my 20th email with the darn thing attached! I have McAfee 
Virus Scan which has caught it every time. Here is McAfee's web page with 
details on this virus"

http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100561

Watch for the subject lines in your incoming emails. 

--- Platinum Xpress/Win/WINServer v3.0pr5
* Origin: Fanciful Online, San Diego, CA (1:202/801)
SEEN-BY: 633/267 270
@PATH: 202/801 300 1324 10/3 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.