Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
Julian V. Noble
Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu
^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science."
-- Bertolt Brecht, "Galileo". 44 4958
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and
not download any attachments bigger than 50k so they are quickly deleted
--
Ian Tuomi
Jyväskylä, Finland
"Very funny scotty, now beam down my clothes."
GCS d- s+: a--- C++>$ L+>+++$ E- W+ N+ !o>+ w---
!O- !M- t+ !5 !X R+ tv- b++ DI+ !D G e->+++ h!
NOTE: Remove NOSPAM from address
Ian Tuomi <ia*******@co.j yu.fi> writes: Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and not download any attachments bigger than 50k so they are quickly deleted
For me, these two procmail rules got the signal/noise ratio down to
levels manageable by Gnus. (But then I was getting more like ~1000
messages/day for a few days there).
:0 B
* ^Content-Type:.applicati on/(msword|(x-)?msdownload|vn d.ms-[aptw].*)
{
LOG="[worm] "
:0
/dev/null
}
:0 B
* ^Content-Transfer-Encoding:.*base 64
* ^TVqQAAMAAAAEAA AA//8AALg
* 4fug4AtAnNIbg
{
LOG="[worm] "
:0
/dev/null
}
--
Björn Lindström <bk**@elektruba dur.se> http://bkhl.elektrubadur.se/
Hearken to the new *Elektrubadur* demo at http://elektrubadur.se/
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and
not download any attachments bigger than 50k so they are quickly deleted
--
Ian Tuomi
Jyväskylä, Finland
"Very funny scotty, now beam down my clothes."
GCS d- s+: a--- C++>$ L+>+++$ E- W+ N+ !o>+ w---
!O- !M- t+ !5 !X R+ tv- b++ DI+ !D G e->+++ h!
NOTE: Remove NOSPAM from address
Ian Tuomi <ia*******@co.j yu.fi> writes: Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and not download any attachments bigger than 50k so they are quickly deleted
For me, these two procmail rules got the signal/noise ratio down to
levels manageable by Gnus. (But then I was getting more like ~1000
messages/day for a few days there).
:0 B
* ^Content-Type:.applicati on/(msword|(x-)?msdownload|vn d.ms-[aptw].*)
{
LOG="[worm] "
:0
/dev/null
}
:0 B
* ^Content-Transfer-Encoding:.*base 64
* ^TVqQAAMAAAAEAA AA//8AALg
* 4fug4AtAnNIbg
{
LOG="[worm] "
:0
/dev/null
}
--
Björn Lindström <bk**@elektruba dur.se> http://bkhl.elektrubadur.se/
Hearken to the new *Elektrubadur* demo at http://elektrubadur.se/
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
You are off topic here, but it is propably Swen that you are seeing,
read more about it for example from here: http://www.f-secure.com/v-descs/swen.shtml
Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
You are off topic here, but it is propably Swen that you are seeing,
read more about it for example from here: http://www.f-secure.com/v-descs/swen.shtml
On Wed, 24 Sep 2003, Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I used to get less than a dozen a day so I never worried about spoofing my
return address. As you can see, I now spoof my return address. I'm getting
around 500 a day now. I didn't read my email over the weekend and had over
1300 messages waiting for me.
If you are on a Unix box you can look into using procmail to filter your
incoming.
-- Julian V. Noble Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu ^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science." -- Bertolt Brecht, "Galileo".
--
darrell at cs dot toronto dot edu
or
main(){int j=1234;char t[]=":@abcdefghijk lmnopqrstuvwxyz .\n",*i=
"iqgbgxmdbjlgdv .lksrqek.n";cha r *strchr(const char *,int);while(
*i){j+=strchr(t ,*i++)-t;j%=sizeof t-1;putchar(t[j]);} return 0;}
On Wed, 24 Sep 2003, Julian V. Noble wrote: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I used to get less than a dozen a day so I never worried about spoofing my
return address. As you can see, I now spoof my return address. I'm getting
around 500 a day now. I didn't read my email over the weekend and had over
1300 messages waiting for me.
If you are on a Unix box you can look into using procmail to filter your
incoming.
-- Julian V. Noble Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu ^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science." -- Bertolt Brecht, "Galileo".
--
darrell at cs dot toronto dot edu
or
main(){int j=1234;char t[]=":@abcdefghijk lmnopqrstuvwxyz .\n",*i=
"iqgbgxmdbjlgdv .lksrqek.n";cha r *strchr(const char *,int);while(
*i){j+=strchr(t ,*i++)-t;j%=sizeof t-1;putchar(t[j]);} return 0;}
On Wed, 24 Sep 2003 19:22:05 +0300, Ian Tuomi wrote: Julian V. Noble wrote:
Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I got suprised one day as it turned out that I had ~200 messagess waiting
for me. The bad thing is that I have *slow* connection and those messages
were simply killing my system. I had 100+ of sendmails hanging around and
waiting forever for the mail to arrive.
To be topical: what is the keyword "restricted " for, how old is it? I've
noticed a couple of people giving little hints that it's for telling the
programmer/compiler it's illegal to pass the same thing more than once. I
dont know if I got it correctly or is it just my imagination working.
Anyway what is the reason for such a construct? The olny example I could
think of was something like memcpy - memove (it's a little slopy, I know
it's not exactly the same).
Fell free to correct me
Zygmunt This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Chung Leong |
last post by:
See http://www.theregister.co.uk/2005/11/07/linux_worm/
|
by: Dennis Gearon |
last post by:
<OT about the worm>
Jeessh, a lot of people have my email address.
I have received about 500 copies of the worm in the last 24 hours. My
mail spool at work was sooooo full I couldn't get out or relay or
anything. The wierd part is that it's my work address, and I'm
subscribed to almost all my lists through the address above or my
previous home address. YEARS ago I was using the work address for lists,
but not for a LOOOOOOOOOOOONG time....
|
by: RollForward Wizard |
last post by:
Exciting Oracle News
Oracle DB Worm Code Published
http://www.eweek.com/article2/0,1895,1880682,00.asp?kc=ewnws110205dtx1k0000599
Researcher: Oracle Passwords Crack in Mere Minutes
http://www.eweek.com/article2/0,1895,1878883,00.asp
|
by: Chuck Grimsby |
last post by:
As many of you know, I occasionally get messages from the MS team on
various things. Today I got the following, and (personally) I think
it certainly is worthy of passing on.
If you haven't protected yourself from the sasser worm, GET THE HECK
OFF THE NET!! <Grin>
No, seriously, get the patch. And a firewall. Even one of the free
personal ones like Zome Alarm or Outpost or whatever, and then
hopefully, someday, all this ......
|
by: Julian V. Noble |
last post by:
Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
| |
by: David H. Lipman |
last post by:
w32/sdbot.worm do not download or open
|
by: Mohamoss |
last post by:
Microsoft has been made aware of a worm identified as “W32.Sasser.worm”
and it is currently circulating on the Internet. The worm exploits the
Local Security Authority Subsystem Service (LSASS) vulnerability fixed in
Microsoft Security Update MS04-011 on April 13, 2004.
Microsoft encourages customers to protect themselves against this worm by
installing Microsoft Security Bulletin MS04-011...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
| |
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |