473,795 Members | 3,157 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Worm storms

Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?

I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
Julian V. Noble
Professor Emeritus of Physics
jv*@lessspamfor mother.virginia .edu
^^^^^^^^^^^^^^^ ^^^
http://galileo.phys.virginia.edu/~jvn/

"Science knows only one commandment: contribute to science."
-- Bertolt Brecht, "Galileo".
Nov 13 '05 #1
44 4958
Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?

I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.


Yes. I am getting ~200/day but I made mozilla identify them as spam and
not download any attachments bigger than 50k so they are quickly deleted

--
Ian Tuomi
Jyväskylä, Finland

"Very funny scotty, now beam down my clothes."

GCS d- s+: a--- C++>$ L+>+++$ E- W+ N+ !o>+ w---
!O- !M- t+ !5 !X R+ tv- b++ DI+ !D G e->+++ h!

NOTE: Remove NOSPAM from address

Nov 13 '05 #2
Ian Tuomi <ia*******@co.j yu.fi> writes:
Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox? I
neglected to spoof my header, and since Hurricane Isabel I have
gotten well over 10K such messages.


Yes. I am getting ~200/day but I made mozilla identify them as spam
and not download any attachments bigger than 50k so they are quickly
deleted


For me, these two procmail rules got the signal/noise ratio down to
levels manageable by Gnus. (But then I was getting more like ~1000
messages/day for a few days there).

:0 B
* ^Content-Type:.applicati on/(msword|(x-)?msdownload|vn d.ms-[aptw].*)
{
LOG="[worm] "

:0
/dev/null
}

:0 B
* ^Content-Transfer-Encoding:.*base 64
* ^TVqQAAMAAAAEAA AA//8AALg
* 4fug4AtAnNIbg
{
LOG="[worm] "

:0
/dev/null
}

--
Björn Lindström <bk**@elektruba dur.se>
http://bkhl.elektrubadur.se/

Hearken to the new *Elektrubadur* demo at http://elektrubadur.se/
Nov 13 '05 #3
Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?

I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.


Yes. I am getting ~200/day but I made mozilla identify them as spam and
not download any attachments bigger than 50k so they are quickly deleted

--
Ian Tuomi
Jyväskylä, Finland

"Very funny scotty, now beam down my clothes."

GCS d- s+: a--- C++>$ L+>+++$ E- W+ N+ !o>+ w---
!O- !M- t+ !5 !X R+ tv- b++ DI+ !D G e->+++ h!

NOTE: Remove NOSPAM from address

Nov 13 '05 #4
Ian Tuomi <ia*******@co.j yu.fi> writes:
Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox? I
neglected to spoof my header, and since Hurricane Isabel I have
gotten well over 10K such messages.


Yes. I am getting ~200/day but I made mozilla identify them as spam
and not download any attachments bigger than 50k so they are quickly
deleted


For me, these two procmail rules got the signal/noise ratio down to
levels manageable by Gnus. (But then I was getting more like ~1000
messages/day for a few days there).

:0 B
* ^Content-Type:.applicati on/(msword|(x-)?msdownload|vn d.ms-[aptw].*)
{
LOG="[worm] "

:0
/dev/null
}

:0 B
* ^Content-Transfer-Encoding:.*base 64
* ^TVqQAAMAAAAEAA AA//8AALg
* 4fug4AtAnNIbg
{
LOG="[worm] "

:0
/dev/null
}

--
Björn Lindström <bk**@elektruba dur.se>
http://bkhl.elektrubadur.se/

Hearken to the new *Elektrubadur* demo at http://elektrubadur.se/
Nov 13 '05 #5
Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?


You are off topic here, but it is propably Swen that you are seeing,
read more about it for example from here:

http://www.f-secure.com/v-descs/swen.shtml

Nov 13 '05 #6
Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?


You are off topic here, but it is propably Swen that you are seeing,
read more about it for example from here:

http://www.f-secure.com/v-descs/swen.shtml

Nov 13 '05 #7
On Wed, 24 Sep 2003, Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?

I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
I used to get less than a dozen a day so I never worried about spoofing my
return address. As you can see, I now spoof my return address. I'm getting
around 500 a day now. I didn't read my email over the weekend and had over
1300 messages waiting for me.

If you are on a Unix box you can look into using procmail to filter your
incoming.
--
Julian V. Noble
Professor Emeritus of Physics
jv*@lessspamfor mother.virginia .edu
^^^^^^^^^^^^^^^ ^^^
http://galileo.phys.virginia.edu/~jvn/

"Science knows only one commandment: contribute to science."
-- Bertolt Brecht, "Galileo".


--
darrell at cs dot toronto dot edu
or
main(){int j=1234;char t[]=":@abcdefghijk lmnopqrstuvwxyz .\n",*i=
"iqgbgxmdbjlgdv .lksrqek.n";cha r *strchr(const char *,int);while(
*i){j+=strchr(t ,*i++)-t;j%=sizeof t-1;putchar(t[j]);} return 0;}
Nov 13 '05 #8
On Wed, 24 Sep 2003, Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?

I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
I used to get less than a dozen a day so I never worried about spoofing my
return address. As you can see, I now spoof my return address. I'm getting
around 500 a day now. I didn't read my email over the weekend and had over
1300 messages waiting for me.

If you are on a Unix box you can look into using procmail to filter your
incoming.
--
Julian V. Noble
Professor Emeritus of Physics
jv*@lessspamfor mother.virginia .edu
^^^^^^^^^^^^^^^ ^^^
http://galileo.phys.virginia.edu/~jvn/

"Science knows only one commandment: contribute to science."
-- Bertolt Brecht, "Galileo".


--
darrell at cs dot toronto dot edu
or
main(){int j=1234;char t[]=":@abcdefghijk lmnopqrstuvwxyz .\n",*i=
"iqgbgxmdbjlgdv .lksrqek.n";cha r *strchr(const char *,int);while(
*i){j+=strchr(t ,*i++)-t;j%=sizeof t-1;putchar(t[j]);} return 0;}
Nov 13 '05 #9
On Wed, 24 Sep 2003 19:22:05 +0300, Ian Tuomi wrote:
Julian V. Noble wrote:
Dear C Mavens,

Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?

I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.


I got suprised one day as it turned out that I had ~200 messagess waiting
for me. The bad thing is that I have *slow* connection and those messages
were simply killing my system. I had 100+ of sendmails hanging around and
waiting forever for the mail to arrive.

To be topical: what is the keyword "restricted " for, how old is it? I've
noticed a couple of people giving little hints that it's for telling the
programmer/compiler it's illegal to pass the same thing more than once. I
dont know if I got it correctly or is it just my imagination working.
Anyway what is the reason for such a construct? The olny example I could
think of was something like memcpy - memove (it's a little slopy, I know
it's not exactly the same).
Fell free to correct me

Zygmunt
Nov 13 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
1998
by: Chung Leong | last post by:
See http://www.theregister.co.uk/2005/11/07/linux_worm/
9
1906
by: Dennis Gearon | last post by:
<OT about the worm> Jeessh, a lot of people have my email address. I have received about 500 copies of the worm in the last 24 hours. My mail spool at work was sooooo full I couldn't get out or relay or anything. The wierd part is that it's my work address, and I'm subscribed to almost all my lists through the address above or my previous home address. YEARS ago I was using the work address for lists, but not for a LOOOOOOOOOOOONG time....
0
1318
by: RollForward Wizard | last post by:
Exciting Oracle News Oracle DB Worm Code Published http://www.eweek.com/article2/0,1895,1880682,00.asp?kc=ewnws110205dtx1k0000599 Researcher: Oracle Passwords Crack in Mere Minutes http://www.eweek.com/article2/0,1895,1878883,00.asp
14
1703
by: Chuck Grimsby | last post by:
As many of you know, I occasionally get messages from the MS team on various things. Today I got the following, and (personally) I think it certainly is worthy of passing on. If you haven't protected yourself from the sasser worm, GET THE HECK OFF THE NET!! <Grin> No, seriously, get the patch. And a firewall. Even one of the free personal ones like Zome Alarm or Outpost or whatever, and then hopefully, someday, all this ......
0
414
by: Julian V. Noble | last post by:
Dear C Mavens, Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages. --
1
1438
by: David H. Lipman | last post by:
w32/sdbot.worm do not download or open
0
1345
by: Mohamoss | last post by:
Microsoft has been made aware of a worm identified as “W32.Sasser.worm” and it is currently circulating on the Internet. The worm exploits the Local Security Authority Subsystem Service (LSASS) vulnerability fixed in Microsoft Security Update MS04-011 on April 13, 2004. Microsoft encourages customers to protect themselves against this worm by installing Microsoft Security Bulletin MS04-011...
0
9672
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10437
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10214
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10164
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
1
7538
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5437
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4113
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3723
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2920
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.