473,796 Members | 2,712 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How To Protect Your Address Book

cjbrx3115
93 New Member
Hey guys-

I just got this email from my friend. I'm not sure it will really work (it's a forward), so I'm askin' you people. Well, here it is:

-----------------------------------------------------------------------------------------------
HOW TO PROTECT YOUR ADDRESS BOOK


I learned a computer trick today that's really ingenious in its
simplicity.

As you may know, when/if a worm virus gets into your computer

it heads straight for your email address book,

and sends itself to everyone in there,

thus infecting all your friends and associates.


This trick won't keep the virus from getting into your computer,
but it will stop it from using your address book to spread further,
and it will alert you to the fact that the worm has gotten into your
system.

Here's what you do :
First, open your address book and click on "new contact,"

just as you would do if you were adding a new friend

to your list of email addresses.


In the window where you would type your friend's first name, type in
"A".
For the screen name or email address, type "AAAAAAA@AAA.AA A ".

Now, here's what you've done and why it works :

The "name" "A" will be placed at the top of your address book

as entry #1.

This will be where the worm will start

in an effort to send itself to all your friends.


But, when it tries to send itself to AAAAAAA@AAA.AAA ,

it will be undeliverable because of the phony email address you entered.

If the first attempt fails (which it will because of the phony address),

the worm goes no further and your friends will not be infected.


Here's the second great advantage of this method :

If an email cannot be delivered,

you will be notified of this in your 'In Box' almost immediately.

Hence, if you ever get an email telling you that an email

addressed to AAAAAAA@AAA.AAA A could not be delivered,

you know right away that you have the worm virus in your system.

You can then take steps to get rid of it!

Pretty slick huh?

If everybody you know does this,

then you need not ever worry about opening mail from friends.
Pass this on to your friends.
-----------------------------------------------------------------------------------------------
Apr 8 '07 #1
11 2453
Dököll
2,364 Recognized Expert Top Contributor
Hey guys-

I just got this email from my friend. I'm not sure it will really work (it's a forward), so I'm askin' you people. Well, here it is:

-----------------------------------------------------------------------------------------------
HOW TO PROTECT YOUR ADDRESS BOOK



Here's what you do :

In the window where you would type your friend's first name, type in
"A".
For the screen name or email address, type "AAAAAAA@AAA.AA A ".


Hence, if you ever get an email telling you that an email

addressed to AAAAAAA@AAA.AAA A could not be delivered,

you know right away that you have the worm virus in your system.

You can then take steps to get rid of it!

Pretty slick huh?

If everybody you know does this,

then you need not ever worry about opening mail from friends.
Pass this on to your friends.
-----------------------------------------------------------------------------------------------
Your a gentleman and scholar for posting such good and helpful data. Will give it a whirl...Thanks much!
Apr 8 '07 #2
cjbrx3115
93 New Member
Lol I'll try it too.
Apr 8 '07 #3
bartonc
6,596 Recognized Expert Expert
I've seen that before. It will notify you of worm activity. There's no guarrentee that the worm will give up after the failed attemp, though.
Apr 8 '07 #4
debasisdas
8,127 Recognized Expert Expert
R u sure the bug will not atempt further after the 1st failed attempt
n
what if there is already any mail id starting with numbers.
because numbers have higher precedence so comes first in list.
Apr 12 '07 #5
cjbrx3115
93 New Member
R u sure the bug will not atempt further after the 1st failed attempt
n
what if there is already any mail id starting with numbers.
because numbers have higher precedence so comes first in list.
Well then you would have to make the fake email your 1st priority by looking at your first contact and aiming higher. As for the failed attempt thing....I'm clueless!
Apr 12 '07 #6
Ganon11
3,652 Recognized Expert Specialist
In any case, can anyone think of a reason it would do any harm? Even if it doesn't protect against further worm activity, it at least lets you know of its presence - that's a big plus, and I don't see any minus', so it looks like it's worth it.
Apr 12 '07 #7
Metaphis
2 New Member
I will take the liberty to point you to a few site that explain why you should not do it ( not because its bad but because it is useless)

http://www.snopes.com/computer/virus/quickfix.htm
http://www.hoax-slayer.com/virus-control-hoax.html
http://antivirus.about.com/cs/hoaxes/p/aaaa.htm

good reading
Apr 26 '07 #8
Killer42
8,435 Recognized Expert Expert
...you should not do it...
I have to disagree. The fact that it might not work is no reason not to do it. After all, even if it doesn't protect you from infection (as it obviously won't), it would at least provide an extra fall-back. That is, notification if you have been infected and started sending out bogus e-mail.

Let's look at it logically...

Pro
If a worm does get through your defences and starts mailing itself from your system, you'll probably get a notification that you wouldn't have otherwise.

Con
An extra entry in your address book - who cares!

Or try looking at it another way. A smoke alarm will not stop a fire. And in fact it might not work at all. But does that mean I shouldn't have one?
Apr 28 '07 #9
Metaphis
2 New Member
There are thousands of worms in the wild and even more virus that do not classify as worms. Among them only a very very small part of them are affected by this bug (Melissa is a exemple). Most newer worm use there own SMTP server to send messages and will not enter your email address as the source email. You will most likely not receive any Mail delivery failure and it would not stop the worm from spreading at all. Other have the cleaver technique to take an email from your address book and use it as the sender, when one of your contact receive a virus the kind person could then try to contact the sender telling him he is infected but the real source of infection (you) will not be aware of it.

So you can still do theses procedures but it is like saying I will put a small rock in the front of my door because a thief that want to enter will trip on it and it will stop him from robbing my house. It is not really effective and may give some user a small sentiment of security making them careless.

Most of the time, the general rule applies: Do not open attachments you did not expect even from people you know. At least expect a personalized message so you know the sender is aware of sending it there. Also, a good antivirus (There are free one like avast and AVG) is a good idea to reduce the risk.
Apr 29 '07 #10

Sign in to post your reply or Sign up for a free account.

Similar topics

5
2388
by: truckmen | last post by:
Hello All, I still can't figure it all out. I am trying to create a web page (using php) where: 1) A visitor add his or her name to an address book that can also be viewed online by other visitors to the website.
6
384
by: YK | last post by:
All, What is the best way to protect IL code? --------------------------------------------------- Typical scenario: Visual Studio .NET 2003 includes Dotfuscator Community Edition, which intends to protect IL code. However, many .NET applications use data binding in UI forms. For example: Employee e = new Employee();
5
10470
by: Ignacio Domínguez | last post by:
Hi. Is there a way of accessing the address book, similar to what Outlook Express does, using C#? Thanks Ignacio Domínguez
0
3990
by: Bob Avallone | last post by:
MetaPro Systems Inc. Visual Studio Dot Net Tips & Tricks #3 – Direct Access to Your Outlook Address Book. Project Type: VS.NET Windows Application Code Behind: Visual Basic I have a project where I needed to access my Outlook Address book directly. This is possible but very tricky. I got it to work and I would like to share it with you. Thanks go to Jim Lennox of Scientific
3
4104
by: SpIcH | last post by:
Hi All, This is all about protecting my data in Executable file. I have developed a program in Visual Basic .NET 2002. I have many questions in mind... please help me to complete my project. 1. I have very much data to be incorporated into the executable file. I have to add much data into my developed program into 2 Combo Boxes and 1 List Box control. For that i have created an xml element with all of the
22
5830
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help would be much appreciated. Thanks in advanced.
1
2884
by: Lpitt56 | last post by:
I am running MS Access 2007 and I want to update an Outlook Address book from my Access Database. I started out by importing the Outlook Address Book as a linked table and it linked fine. I then built a query to filter a master contact list of contacts and I made it an append query to added to the linked Outlook address book table. However, I am getting an error message that says I do not have the necessary permissions to use this object. At...
3
4399
by: Sin Jeong-hun | last post by:
It seems like the Protect() uses the Windows accout information to encrypt data. If I know the user name and the password, can I decrypt it on another PC? If it is not, how about the exported key? On Windows Vista, if file encryption is used, Windows suggests to back up the key. If I import the key on another PC, then can I decrypt a data protected by the Protect() method? Or it is impossible by any means?
10
6923
by: Mike Miller | last post by:
Hi, Am wanting to send email with php and need to access the global outlook address book. Are there any examples/tutorials on how to do this? M
0
9673
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9524
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10449
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10217
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10168
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9047
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6785
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
2
3730
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2924
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.