Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
Julian V. Noble
Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu
^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science."
-- Bertolt Brecht, "Galileo". 44 4959
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and
not download any attachments bigger than 50k so they are quickly deleted
--
Ian Tuomi
Jyväskylä, Finland
"Very funny scotty, now beam down my clothes."
GCS d- s+: a--- C++>$ L+>+++$ E- W+ N+ !o>+ w---
!O- !M- t+ !5 !X R+ tv- b++ DI+ !D G e->+++ h!
NOTE: Remove NOSPAM from address
Ian Tuomi <ia*******@co.j yu.fi> writes: Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and not download any attachments bigger than 50k so they are quickly deleted
For me, these two procmail rules got the signal/noise ratio down to
levels manageable by Gnus. (But then I was getting more like ~1000
messages/day for a few days there).
:0 B
* ^Content-Type:.applicati on/(msword|(x-)?msdownload|vn d.ms-[aptw].*)
{
LOG="[worm] "
:0
/dev/null
}
:0 B
* ^Content-Transfer-Encoding:.*base 64
* ^TVqQAAMAAAAEAA AA//8AALg
* 4fug4AtAnNIbg
{
LOG="[worm] "
:0
/dev/null
}
--
Björn Lindström <bk**@elektruba dur.se> http://bkhl.elektrubadur.se/
Hearken to the new *Elektrubadur* demo at http://elektrubadur.se/
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and
not download any attachments bigger than 50k so they are quickly deleted
--
Ian Tuomi
Jyväskylä, Finland
"Very funny scotty, now beam down my clothes."
GCS d- s+: a--- C++>$ L+>+++$ E- W+ N+ !o>+ w---
!O- !M- t+ !5 !X R+ tv- b++ DI+ !D G e->+++ h!
NOTE: Remove NOSPAM from address
Ian Tuomi <ia*******@co.j yu.fi> writes: Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and not download any attachments bigger than 50k so they are quickly deleted
For me, these two procmail rules got the signal/noise ratio down to
levels manageable by Gnus. (But then I was getting more like ~1000
messages/day for a few days there).
:0 B
* ^Content-Type:.applicati on/(msword|(x-)?msdownload|vn d.ms-[aptw].*)
{
LOG="[worm] "
:0
/dev/null
}
:0 B
* ^Content-Transfer-Encoding:.*base 64
* ^TVqQAAMAAAAEAA AA//8AALg
* 4fug4AtAnNIbg
{
LOG="[worm] "
:0
/dev/null
}
--
Björn Lindström <bk**@elektruba dur.se> http://bkhl.elektrubadur.se/
Hearken to the new *Elektrubadur* demo at http://elektrubadur.se/
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
You are off topic here, but it is propably Swen that you are seeing,
read more about it for example from here: http://www.f-secure.com/v-descs/swen.shtml
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
You are off topic here, but it is propably Swen that you are seeing,
read more about it for example from here: http://www.f-secure.com/v-descs/swen.shtml
On Wed, 24 Sep 2003, Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I used to get less than a dozen a day so I never worried about spoofing my
return address. As you can see, I now spoof my return address. I'm getting
around 500 a day now. I didn't read my email over the weekend and had over
1300 messages waiting for me.
If you are on a Unix box you can look into using procmail to filter your
incoming.
-- Julian V. Noble Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu ^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science." -- Bertolt Brecht, "Galileo".
--
darrell at cs dot toronto dot edu
or
main(){int j=1234;char t[]=":@abcdefghijk lmnopqrstuvwxyz .\n",*i=
"iqgbgxmdbjlgdv .lksrqek.n";cha r *strchr(const char *,int);while(
*i){j+=strchr(t ,*i++)-t;j%=sizeof t-1;putchar(t[j]);} return 0;}
On Wed, 24 Sep 2003, Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I used to get less than a dozen a day so I never worried about spoofing my
return address. As you can see, I now spoof my return address. I'm getting
around 500 a day now. I didn't read my email over the weekend and had over
1300 messages waiting for me.
If you are on a Unix box you can look into using procmail to filter your
incoming.
-- Julian V. Noble Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu ^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science." -- Bertolt Brecht, "Galileo".
--
darrell at cs dot toronto dot edu
or
main(){int j=1234;char t[]=":@abcdefghijk lmnopqrstuvwxyz .\n",*i=
"iqgbgxmdbjlgdv .lksrqek.n";cha r *strchr(const char *,int);while(
*i){j+=strchr(t ,*i++)-t;j%=sizeof t-1;putchar(t[j]);} return 0;}
On Wed, 24 Sep 2003 19:22:05 +0300, Ian Tuomi wrote: Julian V. Noble wrote:
Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I got suprised one day as it turned out that I had ~200 messagess waiting
for me. The bad thing is that I have *slow* connection and those messages
were simply killing my system. I had 100+ of sendmails hanging around and
waiting forever for the mail to arrive.
To be topical: what is the keyword "restricted " for, how old is it? I've
noticed a couple of people giving little hints that it's for telling the
programmer/compiler it's illegal to pass the same thing more than once. I
dont know if I got it correctly or is it just my imagination working.
Anyway what is the reason for such a construct? The olny example I could
think of was something like memcpy - memove (it's a little slopy, I know
it's not exactly the same).
Fell free to correct me
Zygmunt This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Chung Leong |
last post by:
See http://www.theregister.co.uk/2005/11/07/linux_worm/
|
by: Dennis Gearon |
last post by:
<OT about the worm>
Jeessh, a lot of people have my email address.
I have received about 500 copies of the worm in the last 24 hours. My
mail spool at work was sooooo full I couldn't get out or relay or
anything. The wierd part is that it's my work address, and I'm
subscribed to almost all my lists through the address above or my
previous home address. YEARS ago I was using the work address for lists,
but not for a LOOOOOOOOOOOONG time....
|
by: RollForward Wizard |
last post by:
Exciting Oracle News
Oracle DB Worm Code Published
http://www.eweek.com/article2/0,1895,1880682,00.asp?kc=ewnws110205dtx1k0000599
Researcher: Oracle Passwords Crack in Mere Minutes
http://www.eweek.com/article2/0,1895,1878883,00.asp
|
by: Chuck Grimsby |
last post by:
As many of you know, I occasionally get messages from the MS team on
various things. Today I got the following, and (personally) I think
it certainly is worthy of passing on.
If you haven't protected yourself from the sasser worm, GET THE HECK
OFF THE NET!! <Grin>
No, seriously, get the patch. And a firewall. Even one of the free
personal ones like Zome Alarm or Outpost or whatever, and then
hopefully, someday, all this ......
|
by: Julian V. Noble |
last post by:
Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
| |
by: David H. Lipman |
last post by:
w32/sdbot.worm do not download or open
|
by: Mohamoss |
last post by:
Microsoft has been made aware of a worm identified as “W32.Sasser.worm”
and it is currently circulating on the Internet. The worm exploits the
Local Security Authority Subsystem Service (LSASS) vulnerability fixed in
Microsoft Security Update MS04-011 on April 13, 2004.
Microsoft encourages customers to protect themselves against this worm by
installing Microsoft Security Bulletin MS04-011...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
| |
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |