473,804 Members | 2,536 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How To Protect Your Address Book

cjbrx3115
93 New Member
Hey guys-

I just got this email from my friend. I'm not sure it will really work (it's a forward), so I'm askin' you people. Well, here it is:

-----------------------------------------------------------------------------------------------
HOW TO PROTECT YOUR ADDRESS BOOK


I learned a computer trick today that's really ingenious in its
simplicity.

As you may know, when/if a worm virus gets into your computer

it heads straight for your email address book,

and sends itself to everyone in there,

thus infecting all your friends and associates.


This trick won't keep the virus from getting into your computer,
but it will stop it from using your address book to spread further,
and it will alert you to the fact that the worm has gotten into your
system.

Here's what you do :
First, open your address book and click on "new contact,"

just as you would do if you were adding a new friend

to your list of email addresses.


In the window where you would type your friend's first name, type in
"A".
For the screen name or email address, type "AAAAAAA@AAA.AA A ".

Now, here's what you've done and why it works :

The "name" "A" will be placed at the top of your address book

as entry #1.

This will be where the worm will start

in an effort to send itself to all your friends.


But, when it tries to send itself to AAAAAAA@AAA.AAA ,

it will be undeliverable because of the phony email address you entered.

If the first attempt fails (which it will because of the phony address),

the worm goes no further and your friends will not be infected.


Here's the second great advantage of this method :

If an email cannot be delivered,

you will be notified of this in your 'In Box' almost immediately.

Hence, if you ever get an email telling you that an email

addressed to AAAAAAA@AAA.AAA A could not be delivered,

you know right away that you have the worm virus in your system.

You can then take steps to get rid of it!

Pretty slick huh?

If everybody you know does this,

then you need not ever worry about opening mail from friends.
Pass this on to your friends.
-----------------------------------------------------------------------------------------------
Apr 8 '07
11 2454
Killer42
8,435 Recognized Expert Expert
All true. I am quite cautious, and have up to date protection.

However, I have experienced one case where something like this might have helped. Except, of course, for the usual problem that the person who could have benefited from it would have been too clueless to even put in this little extra safeguard.

A person had me in his address list even though we had not corresponded in months. Suddenly I got a weird message from him, obviously fake. I contacted him and it turned out he had been infected with something-or-other and was completely unaware of it. If I had simply dumped the fake e-mail, he wouldn't have known and would have continued spreading it. Unless he had something to warn him, such as the AAAAA thing.

As I said though, one of the biggest problems here is that he wouldn't have thought to put in even this simple safeguard. So I guess it's a bit of a circular argument. If you could convince people to do the AAAAA thing, you could probably convince them to do something more effective.

Even so, I think it's probably not a bad thing to have, just as an extra backup that might catch something which slips by your defences. As long as people don't rely on it.
Apr 29 '07 #11
Denburt
1,356 Recognized Expert Top Contributor
Many valid points made however I will have to agree with Killer on this one. I will add that entry, good idea if only to POSSIBLY receive a rejection notice. I have had similar instances where the person had no clue they had the virus fortunately they were clients so it actually turned out good for me since it informed me they had a virus $$$. I bet the virus writer didn't see that one coming or he would have simply inserted "stupid user" or something similar in the from lines. Sure they can use their own SMTP server or find one that is open but I think there are more half wits trying to be programmers out there doing this rather than an actual professional trying to wreak some real havoc.

BTW for a virus writer to actually verify an email before going to the next entry... I send out lots of automated emails and when I make a typo or an email turns up a dead link it doesn't stop or error out, the program has no clue, it keeps right on processing. You would need to add code to verify an email address and for most virus writers they just won't take the time.
Apr 30 '07 #12

Sign in to post your reply or Sign up for a free account.

Similar topics

5
2388
by: truckmen | last post by:
Hello All, I still can't figure it all out. I am trying to create a web page (using php) where: 1) A visitor add his or her name to an address book that can also be viewed online by other visitors to the website.
6
384
by: YK | last post by:
All, What is the best way to protect IL code? --------------------------------------------------- Typical scenario: Visual Studio .NET 2003 includes Dotfuscator Community Edition, which intends to protect IL code. However, many .NET applications use data binding in UI forms. For example: Employee e = new Employee();
5
10470
by: Ignacio Domínguez | last post by:
Hi. Is there a way of accessing the address book, similar to what Outlook Express does, using C#? Thanks Ignacio Domínguez
0
3992
by: Bob Avallone | last post by:
MetaPro Systems Inc. Visual Studio Dot Net Tips & Tricks #3 – Direct Access to Your Outlook Address Book. Project Type: VS.NET Windows Application Code Behind: Visual Basic I have a project where I needed to access my Outlook Address book directly. This is possible but very tricky. I got it to work and I would like to share it with you. Thanks go to Jim Lennox of Scientific
3
4105
by: SpIcH | last post by:
Hi All, This is all about protecting my data in Executable file. I have developed a program in Visual Basic .NET 2002. I have many questions in mind... please help me to complete my project. 1. I have very much data to be incorporated into the executable file. I have to add much data into my developed program into 2 Combo Boxes and 1 List Box control. For that i have created an xml element with all of the
22
5835
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help would be much appreciated. Thanks in advanced.
1
2885
by: Lpitt56 | last post by:
I am running MS Access 2007 and I want to update an Outlook Address book from my Access Database. I started out by importing the Outlook Address Book as a linked table and it linked fine. I then built a query to filter a master contact list of contacts and I made it an append query to added to the linked Outlook address book table. However, I am getting an error message that says I do not have the necessary permissions to use this object. At...
3
4400
by: Sin Jeong-hun | last post by:
It seems like the Protect() uses the Windows accout information to encrypt data. If I know the user name and the password, can I decrypt it on another PC? If it is not, how about the exported key? On Windows Vista, if file encryption is used, Windows suggests to back up the key. If I import the key on another PC, then can I decrypt a data protected by the Protect() method? Or it is impossible by any means?
10
6926
by: Mike Miller | last post by:
Hi, Am wanting to send email with php and need to access the global outlook address book. Are there any examples/tutorials on how to do this? M
0
9711
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9591
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10594
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
10331
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
6861
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5529
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5667
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4306
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3831
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.