Subject: | |
From: | |
Reply To: | INTERLNG: Discussiones in Interlingua |
Date: | Wed, 5 Sep 2001 23:02:04 +0300 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Ingvar!
Ha tu inviate iste message o ha le virus forsan prendite lo ex tu
libro de adresses?
In iste adresse on trova un description super iste virus.
[log in to unmask]" target="_blank">http:[log in to unmask]
Ingvar!
Ha tu vermente scripte iste lineas?
Qui es "un officiero de SHAPE" qui ama InterlinguJa?
-- Allan
Ingvar Stenström wrote: (Did Ingvar Stenström surely write this? --
Allan)
Car amicos de INTERLNG,Un officiero de SHAPE, qui es interessate in
Interlinguja,me ha inviate un VIRUS ALERTE, e me permittite re-viar lo a
vos.
Il appare que iste virus pote esser periculose. Illo usa le run-time
version
del Visual Basic, que es usate p.ex. con macros del Microsoft Word.
Salutante
Allan
P.S. Non aperi attachate files "readme.exe"!
-- Allan
> Car amicos de INTERLNG,Un officiero de SHAPE, qui es interessate in
> Interlinguja,me ha inviate un VIRUS ALERTE, e me permittite re-viar lo
> a vos.
>
> ----- Original Message -----
>
> Sent: Wednesday, September 05, 2001 1:10 PMSubject: FW: [alerts] VIRUS
> ALERT
> Car Amico,
>
> You may send this sanitized version to the Interlingua group.
>
> Gald to help.
>
> Patri?ia
> ____________________________________________
> To All,
>
> We are currently experiencing a VIRUS attack on our email networks.
> This attack is coming from outside of our area and we are working
> diligently to get it stopped. This is what you will see if you get
> any:
>
> SUBJECT LINE: As per your request!
> ATTACHMENT NAME: readme.e x e (spaces added to prevent filtering)
>
> Just delete all messages with this subject line and then right click
> on your deleted items folder and delete them again. Below you will
> find a partial explanation of this virus if you are interested.
>
> _________________________________________
> Text
>
> SUBJECT: VIRUS ALERT W32.Apost.Worm@mm
>
> SUBJECT LINE: As per your request!
> ATTACHMENT NAME: readme.e x e (spaces added to prevent filtering)
>
> We have received indicators that our networks have
> been infected with this worm, formerly known as [log in to unmask]
>
> Analysis of the code revealed that IP address 210.169.20.21
> (registered to Japan) is associated with this worm, and it hosts
> the download of various virus components related to the worm.
>
> The body of the e-mail asks you to to review the attachment but once
> viewed, the worm will hook your systems activation routines
> and then spread itself to all persons in your address book.
>
> Also Known As: W32/Apost-mm, W32/Apost-A,
>
> The new Symantec definitions will detect the W32.Qint@mm
> (W32/InvalidSSL@MM)
> and W32.Magistr.39921@mm (W32/Magistr.b@MM) viruses as well.
|
|
|