| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Virus worm |
Received: by fanciful.org (Wildcat! SMTP Router v5.6.450.8)
for photo{at}fanciful.org; Fri, 22 Aug 2003 06:07:24 -0700
Received: from saf.tzo.com ([216.75.195.46]) HELO=saf.tzo.com
by fanciful.org (Wildcat! SMTP v5.6.450.8) with SMTP
id 333333796; Fri, 22 Aug 2003 06:07:22 -0700
Received: from 216.174.194.56 by saf.tzo.com
id 2003082209090245375 for photo{at}fanciful.org;
Fri, 22 Aug 2003 13:09:02 GMT
Received: (qmail 12944 invoked from network); 22 Aug 2003 13:07:02 -0000
Received: from unknown (HELO Carl?Cook.olywa.net) (64.42.74.15)
by queue2.atgi.net with SMTP; 22 Aug 2003 13:07:02 -0000
Message-Id:
X-Sender: clcook{at}mail.olywa.net
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 22 Aug 2003 06:06:23 -0700
To:
From: Carl Cook
Subject: Virus worm
In-Reply-To:
X-Orig-Mime-Version: 1.0
X-Orig-Content-Type: text/plain; charset="us-ascii"; format=flowed
Anybody gotten messages with the new "W32/SOBIG{at}MM" virus worm yet? I've
just received my 20th email with the darn thing attached! I have McAfee
Virus Scan which has caught it every time. Here is McAfee's web page with
details on this virus"
http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100561
Watch for the subject lines in your incoming emails.
--- Platinum Xpress/Win/WINServer v3.0pr5
* Origin: Fanciful Online, San Diego, CA (1:202/801)SEEN-BY: 633/267 270 @PATH: 202/801 300 1324 10/3 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.