Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
Julian V. Noble
Professor Emeritus of Physics jv*@lessspamfor mother.virginia .edu
^^^^^^^^^^^^^^^ ^^^ http://galileo.phys.virginia.edu/~jvn/
"Science knows only one commandment: contribute to science."
-- Bertolt Brecht, "Galileo".
Nov 13 '05
44 4959
On Wed, 24 Sep 2003 19:22:05 +0300, Ian Tuomi <ia*******@co.j yu.fi> wrote: Julian V. Noble wrote:
Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and not download any attachments bigger than 50k so they are quickly deleted
Are you saying that inspite of mangling your address with nospam you get the spam messages?
--
main(){char s[19]="SbwjCAUpvhiHv z/ofu";
int i;for(i=0;i<18; putchar(s[i++]-1));}
> Dear C Mavens, Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
I get about 100 mails every day :(
Christian Bau <ch***********@ cbau.freeserve. co.uk> spoke thus: 1. If you use a pointer like "int * restrict p", then it is undefined behavior if you modify an object through an expression that is derived from the value of p, and access it through a different pointer; and it is also undefined behavior if you access an object through an expression that is derived from the value of p, and access it modify it through a different pointer.
This is important for an optimising compiler. Example:
int *restrict p; int *q;
int x = *q, y; *p = 2; y = *q;
(I'm assuming you ommitted the calls to malloc() for simplicity...)
The compiler can assume that y == x because the assignment to *p cannot change *q (if it did you would have violated the first rule).
So basically the restrict keyword means that p may not share write access to a
given area of memory with another pointer?
2. If you use a pointer like "const int * restrict p", then it is undefined behavior if you modify an object that is accessed through an expression that is derived from the value of p. In other words, *p cannot be modified as long as the pointer p exists. Usually, if you have a const* pointer then the object pointed to can still be modified by other means, or by casting the const-ness away. Not if it is a const *restrict pointer.
So restrict is a way of forcing strict const-ness?
--
Christopher Benson-Manica | Jumonji giri, for honour.
ataru(at)cybers pace.org |
On 24 Sep, in message <87************ ***@lucien.drea ming> bk**@elektrubad ur.se (Björn Lindström) wrote: Ian Tuomi <ia*******@co.j yu.fi> writes:
Julian V. Noble wrote:
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox? I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages.
Yes. I am getting ~200/day but I made mozilla identify them as spam and not download any attachments bigger than 50k so they are quickly deleted
For me, these two procmail rules got the signal/noise ratio down to levels manageable by Gnus.
[snip]
From Message-ID <bk**********@n ntp0.reith.bbc. co.uk> on
comp.sys.acorn. misc the following procmail recipe will catch the virus
itself, but not the faked bounces - I've had none since installing it on
my ISPs server.
:0
* > 140000
* < 165000
{
:0 BD
* b3IAAABBZG1pbgA AAEdFVCBodHRwOi 8vd3cyLmZjZS52d XRici5jei9iaW4v Y291bnRlci5naWY v
/dev/null
}
FYI: that string contains a base64-encoded URL of a vanity counter that
the virus apparently has hard-coded in it
Yours,
Phil L.
-- http://www.philipnet.com http://director.sourceforge.net
The From address is valid, but anything over 32k is deleted by the server
i ou a uea i e a o ie e a o a a oue oae
In article <bk**********@c hessie.cirr.com >,
Christopher Benson-Manica <at***@nospam.c yberspace.org> wrote: So basically the restrict keyword means that p may not share write access to a given area of memory with another pointer?
Slightly more. As you said, only one pointer is allowed to write in that
area. But if one of the pointers writes, then the other pointer is not
even allowed to read from the same area.
That allows an optimising compiler to reorder read and write accesses
through both pointers. 2. If you use a pointer like "const int * restrict p", then it is undefined behavior if you modify an object that is accessed through an expression that is derived from the value of p. In other words, *p cannot be modified as long as the pointer p exists. Usually, if you have a const* pointer then the object pointed to can still be modified by other means, or by casting the const-ness away. Not if it is a const *restrict pointer.
So restrict is a way of forcing strict const-ness?
By using const + restrict, _you_ guarantee to the compiler that nothing
will try to change an object, as long as the const+restrict pointer
variable exists. As soon as the const+restrict pointer variable
disappears, you are allowed to modify the object again, unless it is
really const, of course. For example, if a function argument is a
const+restrict pointer, and you pass the address of an object to that
function, then you can modify the object again after the function call
is finished.
in comp.lang.c i read: Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages. I get about 100 mails every day :(
a spoofed from header is against my custom. things have calmed down a
little, so i only get around 150 per minute of these swen worms.
--
a signature
those who know me have no need of my name wrote: in comp.lang.c i read: Dear C Mavens, Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages. I get about 100 mails every day :(
a spoofed from header is against my custom. things have calmed down a little, so i only get around 150 per minute of these swen worms.
I get about 50 an hour. Apparently Verisign is doing it to us. They
handle the DNS for .com and .net domains for the entire Internet. Sven
is emailed from non-existent domains and used to be effectively blocked
by anti-spam software which would look up Sven's domain, not find it and
therefore reject the email. Now that no longer works. Verisign's DNS
returns 'found' signal for all domains since early last week. Part of
their SiteFinder feature.
They are being sued. They have to be stopped.
--
Joe Wright mailto:jo****** **@earthlink.ne t
"Everything should be made as simple as possible, but not simpler."
--- Albert Einstein ---
in comp.lang.c i read:
[re: the swen worm and it's bounces] I get about 50 an hour. Apparently Verisign is doing it to us.
only indirectly. the worm doesn't synthesize a (potentially non-existent)
domain, it uses the domains present in e-mail addresses it finds in msoe's
local cache, some of which will be invalid yet within .com or .net, so some
of the messages might have been rejected by some mta's were it not for the
wildcard.
--
a signature
In article <m1************ *@usa.net>,
those who know me have no need of my name <no************ ****@usa.net>
wrote: in comp.lang.c i read: Dear C Mavens, Anyone here getting hosts of spam with nefarious attachments, purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel I have gotten well over 10K such messages. I get about 100 mails every day :(
a spoofed from header is against my custom. things have calmed down a little, so i only get around 150 per minute of these swen worms.
I was thinking about doing lots of posts with forged sender address of ab***@freeserve .com. Maybe if they get 100 or so 150KB emails per minute
they will figure out that there is a problem and what to do.
My ISPs idea is that whenever I get an Swen32 email I should complain
about it at their "abuse" email address, in which case they would then
find out who sent it (fat chance since the address is forged anyway) and
then probably do nothing about it because it's just a guy with an
infected PC.
What they could do quite easily: Find out which ones of _their own
customers_ are infected. That is quite simple; they only let you access
the Internet through their servers if you call from the right phone
number. So if one of their customers connects and starts sending 150 KB
emails, then some simple programming would direct that customer to a
webpage telling them their computer is infected the next time they try
to connect to any webpage. Install that software with every ISP, and
within a week Swen is gone.
You would think they would come up with something like that, because it
is their money too. Actually, it is only their money, it costs me only
time and nothing else.
In article <m1************ *@usa.net>,
those who know me have no need of my name <no************ ****@usa.net>
wrote: in comp.lang.c i read:
[re: the swen worm and it's bounces]
I get about 50 an hour. Apparently Verisign is doing it to us.
only indirectly. the worm doesn't synthesize a (potentially non-existent) domain, it uses the domains present in e-mail addresses it finds in msoe's local cache, some of which will be invalid yet within .com or .net, so some of the messages might have been rejected by some mta's were it not for the wildcard.
I found a few messages that told me that a virus sent from _my_ email
address was caught and not delivered. Since I use a Macintosh I am quite
sure that my computer is not infected; since there are emails going it
with my address as the sender I know that the virus uses real, but
forged, email addresses.
That doesn't mean that Verisign's land grab isn't disgusting and must be
stopped. By the way, the guys are already convicted for sending forged
letters to domain owners where they claim a domain name is up for
renewal (which it usually isn't), and if you fill out the forms and send
them back then you just transferred your domain to Verisign which
charges more than your old name registrar. This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Chung Leong |
last post by:
See http://www.theregister.co.uk/2005/11/07/linux_worm/
|
by: Dennis Gearon |
last post by:
<OT about the worm>
Jeessh, a lot of people have my email address.
I have received about 500 copies of the worm in the last 24 hours. My
mail spool at work was sooooo full I couldn't get out or relay or
anything. The wierd part is that it's my work address, and I'm
subscribed to almost all my lists through the address above or my
previous home address. YEARS ago I was using the work address for lists,
but not for a LOOOOOOOOOOOONG time....
|
by: RollForward Wizard |
last post by:
Exciting Oracle News
Oracle DB Worm Code Published
http://www.eweek.com/article2/0,1895,1880682,00.asp?kc=ewnws110205dtx1k0000599
Researcher: Oracle Passwords Crack in Mere Minutes
http://www.eweek.com/article2/0,1895,1878883,00.asp
|
by: Chuck Grimsby |
last post by:
As many of you know, I occasionally get messages from the MS team on
various things. Today I got the following, and (personally) I think
it certainly is worthy of passing on.
If you haven't protected yourself from the sasser worm, GET THE HECK
OFF THE NET!! <Grin>
No, seriously, get the patch. And a firewall. Even one of the free
personal ones like Zome Alarm or Outpost or whatever, and then
hopefully, someday, all this ......
|
by: Julian V. Noble |
last post by:
Dear C Mavens,
Anyone here getting hosts of spam with nefarious attachments,
purporting to be from M$ or its lackeys, into your mailbox?
I neglected to spoof my header, and since Hurricane Isabel
I have gotten well over 10K such messages.
--
| |
by: David H. Lipman |
last post by:
w32/sdbot.worm do not download or open
|
by: Mohamoss |
last post by:
Microsoft has been made aware of a worm identified as “W32.Sasser.worm”
and it is currently circulating on the Internet. The worm exploits the
Local Security Authority Subsystem Service (LSASS) vulnerability fixed in
Microsoft Security Update MS04-011 on April 13, 2004.
Microsoft encourages customers to protect themselves against this worm by
installing Microsoft Security Bulletin MS04-011...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
| |
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |