473,320 Members | 1,845 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,320 software developers and data experts.

How To Protect Your Address Book

cjbrx3115
Hey guys-

I just got this email from my friend. I'm not sure it will really work (it's a forward), so I'm askin' you people. Well, here it is:

-----------------------------------------------------------------------------------------------
HOW TO PROTECT YOUR ADDRESS BOOK


I learned a computer trick today that's really ingenious in its
simplicity.

As you may know, when/if a worm virus gets into your computer

it heads straight for your email address book,

and sends itself to everyone in there,

thus infecting all your friends and associates.


This trick won't keep the virus from getting into your computer,
but it will stop it from using your address book to spread further,
and it will alert you to the fact that the worm has gotten into your
system.

Here's what you do :
First, open your address book and click on "new contact,"

just as you would do if you were adding a new friend

to your list of email addresses.


In the window where you would type your friend's first name, type in
"A".
For the screen name or email address, type "AAAAAAA@AAA.AAA ".

Now, here's what you've done and why it works :

The "name" "A" will be placed at the top of your address book

as entry #1.

This will be where the worm will start

in an effort to send itself to all your friends.


But, when it tries to send itself to AAAAAAA@AAA.AAA,

it will be undeliverable because of the phony email address you entered.

If the first attempt fails (which it will because of the phony address),

the worm goes no further and your friends will not be infected.


Here's the second great advantage of this method :

If an email cannot be delivered,

you will be notified of this in your 'In Box' almost immediately.

Hence, if you ever get an email telling you that an email

addressed to AAAAAAA@AAA.AAAA could not be delivered,

you know right away that you have the worm virus in your system.

You can then take steps to get rid of it!

Pretty slick huh?

If everybody you know does this,

then you need not ever worry about opening mail from friends.
Pass this on to your friends.
-----------------------------------------------------------------------------------------------
Apr 8 '07 #1
11 2413
Dököll
2,364 Expert 2GB
Hey guys-

I just got this email from my friend. I'm not sure it will really work (it's a forward), so I'm askin' you people. Well, here it is:

-----------------------------------------------------------------------------------------------
HOW TO PROTECT YOUR ADDRESS BOOK



Here's what you do :

In the window where you would type your friend's first name, type in
"A".
For the screen name or email address, type "AAAAAAA@AAA.AAA ".


Hence, if you ever get an email telling you that an email

addressed to AAAAAAA@AAA.AAAA could not be delivered,

you know right away that you have the worm virus in your system.

You can then take steps to get rid of it!

Pretty slick huh?

If everybody you know does this,

then you need not ever worry about opening mail from friends.
Pass this on to your friends.
-----------------------------------------------------------------------------------------------
Your a gentleman and scholar for posting such good and helpful data. Will give it a whirl...Thanks much!
Apr 8 '07 #2
Lol I'll try it too.
Apr 8 '07 #3
bartonc
6,596 Expert 4TB
I've seen that before. It will notify you of worm activity. There's no guarrentee that the worm will give up after the failed attemp, though.
Apr 8 '07 #4
debasisdas
8,127 Expert 4TB
R u sure the bug will not atempt further after the 1st failed attempt
n
what if there is already any mail id starting with numbers.
because numbers have higher precedence so comes first in list.
Apr 12 '07 #5
R u sure the bug will not atempt further after the 1st failed attempt
n
what if there is already any mail id starting with numbers.
because numbers have higher precedence so comes first in list.
Well then you would have to make the fake email your 1st priority by looking at your first contact and aiming higher. As for the failed attempt thing....I'm clueless!
Apr 12 '07 #6
Ganon11
3,652 Expert 2GB
In any case, can anyone think of a reason it would do any harm? Even if it doesn't protect against further worm activity, it at least lets you know of its presence - that's a big plus, and I don't see any minus', so it looks like it's worth it.
Apr 12 '07 #7
I will take the liberty to point you to a few site that explain why you should not do it ( not because its bad but because it is useless)

http://www.snopes.com/computer/virus/quickfix.htm
http://www.hoax-slayer.com/virus-control-hoax.html
http://antivirus.about.com/cs/hoaxes/p/aaaa.htm

good reading
Apr 26 '07 #8
Killer42
8,435 Expert 8TB
...you should not do it...
I have to disagree. The fact that it might not work is no reason not to do it. After all, even if it doesn't protect you from infection (as it obviously won't), it would at least provide an extra fall-back. That is, notification if you have been infected and started sending out bogus e-mail.

Let's look at it logically...

Pro
If a worm does get through your defences and starts mailing itself from your system, you'll probably get a notification that you wouldn't have otherwise.

Con
An extra entry in your address book - who cares!

Or try looking at it another way. A smoke alarm will not stop a fire. And in fact it might not work at all. But does that mean I shouldn't have one?
Apr 28 '07 #9
There are thousands of worms in the wild and even more virus that do not classify as worms. Among them only a very very small part of them are affected by this bug (Melissa is a exemple). Most newer worm use there own SMTP server to send messages and will not enter your email address as the source email. You will most likely not receive any Mail delivery failure and it would not stop the worm from spreading at all. Other have the cleaver technique to take an email from your address book and use it as the sender, when one of your contact receive a virus the kind person could then try to contact the sender telling him he is infected but the real source of infection (you) will not be aware of it.

So you can still do theses procedures but it is like saying I will put a small rock in the front of my door because a thief that want to enter will trip on it and it will stop him from robbing my house. It is not really effective and may give some user a small sentiment of security making them careless.

Most of the time, the general rule applies: Do not open attachments you did not expect even from people you know. At least expect a personalized message so you know the sender is aware of sending it there. Also, a good antivirus (There are free one like avast and AVG) is a good idea to reduce the risk.
Apr 29 '07 #10
Killer42
8,435 Expert 8TB
All true. I am quite cautious, and have up to date protection.

However, I have experienced one case where something like this might have helped. Except, of course, for the usual problem that the person who could have benefited from it would have been too clueless to even put in this little extra safeguard.

A person had me in his address list even though we had not corresponded in months. Suddenly I got a weird message from him, obviously fake. I contacted him and it turned out he had been infected with something-or-other and was completely unaware of it. If I had simply dumped the fake e-mail, he wouldn't have known and would have continued spreading it. Unless he had something to warn him, such as the AAAAA thing.

As I said though, one of the biggest problems here is that he wouldn't have thought to put in even this simple safeguard. So I guess it's a bit of a circular argument. If you could convince people to do the AAAAA thing, you could probably convince them to do something more effective.

Even so, I think it's probably not a bad thing to have, just as an extra backup that might catch something which slips by your defences. As long as people don't rely on it.
Apr 29 '07 #11
Denburt
1,356 Expert 1GB
Many valid points made however I will have to agree with Killer on this one. I will add that entry, good idea if only to POSSIBLY receive a rejection notice. I have had similar instances where the person had no clue they had the virus fortunately they were clients so it actually turned out good for me since it informed me they had a virus $$$. I bet the virus writer didn't see that one coming or he would have simply inserted "stupid user" or something similar in the from lines. Sure they can use their own SMTP server or find one that is open but I think there are more half wits trying to be programmers out there doing this rather than an actual professional trying to wreak some real havoc.

BTW for a virus writer to actually verify an email before going to the next entry... I send out lots of automated emails and when I make a typo or an email turns up a dead link it doesn't stop or error out, the program has no clue, it keeps right on processing. You would need to add code to verify an email address and for most virus writers they just won't take the time.
Apr 30 '07 #12

Sign in to post your reply or Sign up for a free account.

Similar topics

5
by: truckmen | last post by:
Hello All, I still can't figure it all out. I am trying to create a web page (using php) where: 1) A visitor add his or her name to an address book that can also be viewed online by other...
6
by: YK | last post by:
All, What is the best way to protect IL code? --------------------------------------------------- Typical scenario: Visual Studio .NET 2003 includes Dotfuscator Community Edition, which...
5
by: Ignacio Domínguez | last post by:
Hi. Is there a way of accessing the address book, similar to what Outlook Express does, using C#? Thanks Ignacio Domínguez
0
by: Bob Avallone | last post by:
MetaPro Systems Inc. Visual Studio Dot Net Tips & Tricks #3 – Direct Access to Your Outlook Address Book. Project Type: VS.NET Windows Application Code Behind: Visual Basic I have a project...
3
by: SpIcH | last post by:
Hi All, This is all about protecting my data in Executable file. I have developed a program in Visual Basic .NET 2002. I have many questions in mind... please help me to complete my project. ...
22
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help...
1
by: Lpitt56 | last post by:
I am running MS Access 2007 and I want to update an Outlook Address book from my Access Database. I started out by importing the Outlook Address Book as a linked table and it linked fine. I then...
3
by: Sin Jeong-hun | last post by:
It seems like the Protect() uses the Windows accout information to encrypt data. If I know the user name and the password, can I decrypt it on another PC? If it is not, how about the exported key?...
10
by: Mike Miller | last post by:
Hi, Am wanting to send email with php and need to access the global outlook address book. Are there any examples/tutorials on how to do this? M
0
by: DolphinDB | last post by:
The formulas of 101 quantitative trading alphas used by WorldQuant were presented in the paper 101 Formulaic Alphas. However, some formulas are complex, leading to challenges in calculation. Take...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
1
by: Shćllîpôpď 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.