473,386 Members | 1,715 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Prove this patch for MS Internet Explorer

7 2096
THIS IS A VIRUS!

DO NOT DOWNLOAD OR INSTALL THE ATTACHMENT. DELETE THIS IMMEDIATELY!

For security updates please use Windows Update. Microsoft NEVER distribute security patches by email or newsgroup!
"Comcast Mail" <uz****@syfw.com> wrote in message news:OOzab.385432$cF.117762@rwcrnsc53...
Microsoft All Products | Support | Search | Microsoft.com Guide
Microsoft Home


MS Client

this is the latest version of security update, the "September 2003, Cumulative Patch" update which resolves all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three new vulnerabilities. Install now to help maintain the security of your computer from these vulnerabilities, the most serious of which could allow an attacker to run code on your system. This update includes the functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
Recommendation Customers should install the patch at the earliest opportunity.
How to install Run attached file. Choose Yes on displayed dialog box.
How to use You don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be found on the Microsoft Technical Support web site. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site, or Contact Us.

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored e-mail address and we are unable to respond to any replies.

------------------------------------------------------------------------
The names of the actual companies and products mentioned herein are the trademarks of their respective owners.

Contact Us | Legal | TRUSTe
©2003 Microsoft Corporation. All rights reserved. Terms of Use | Privacy Statement | Accessibility

Jul 21 '05 #2
Has somebody in any of these groups got this virus because I keep getting
sent about 7 copies every ten minutes!

Kieran
"Ed Crowley" <cu******@pacbell.net> wrote in message
news:uU**************@TK2MSFTNGP12.phx.gbl...
THIS IS A VIRUS!

DO NOT DOWNLOAD OR INSTALL THE ATTACHMENT. DELETE THIS IMMEDIATELY!

For security updates please use Windows Update. Microsoft NEVER distribute
security patches by email or newsgroup!
"Comcast Mail" <uz****@syfw.com> wrote in message
news:OOzab.385432$cF.117762@rwcrnsc53...
Microsoft All Products | Support | Search | Microsoft.com Guide
Microsoft Home
MS Client

this is the latest version of security update, the "September 2003,
Cumulative Patch" update which resolves all known security vulnerabilities
affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as
three new vulnerabilities. Install now to help maintain the security of your
computer from these vulnerabilities, the most serious of which could allow
an attacker to run code on your system. This update includes the
functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
RecommendationCustomers should install the patch at the earliest
opportunity.
How to installRun attached file. Choose Yes on displayed dialog box.
How to useYou don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security
Advisor web site, or Contact Us.

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored e-mail
address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are the
trademarks of their respective owners.

Contact Us | Legal | TRUSTe
©2003 Microsoft Corporation. All rights reserved. Terms of Use | Privacy
Statement | Accessibility
Jul 21 '05 #3
Me too. virus probably scans ms ngs for more names, local hd, etc.

--
William Stacey, DNS MVP

"Kieran Benton" <ki**********@fastmail.fm> wrote in message
news:ee**************@TK2MSFTNGP12.phx.gbl...
Has somebody in any of these groups got this virus because I keep getting
sent about 7 copies every ten minutes!

Kieran
"Ed Crowley" <cu******@pacbell.net> wrote in message
news:uU**************@TK2MSFTNGP12.phx.gbl...
THIS IS A VIRUS!

DO NOT DOWNLOAD OR INSTALL THE ATTACHMENT. DELETE THIS IMMEDIATELY!

For security updates please use Windows Update. Microsoft NEVER distribute security patches by email or newsgroup!
"Comcast Mail" <uz****@syfw.com> wrote in message
news:OOzab.385432$cF.117762@rwcrnsc53...
Microsoft All Products | Support | Search | Microsoft.com Guide
Microsoft Home
MS Client

this is the latest version of security update, the "September 2003,
Cumulative Patch" update which resolves all known security vulnerabilities
affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three new vulnerabilities. Install now to help maintain the security of your computer from these vulnerabilities, the most serious of which could allow
an attacker to run code on your system. This update includes the
functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
RecommendationCustomers should install the patch at the earliest
opportunity.
How to installRun attached file. Choose Yes on displayed dialog box.
How to useYou don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be found on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security
Advisor web site, or Contact Us.

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored e-mail address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are the
trademarks of their respective owners.

Contact Us | Legal | TRUSTe
©2003 Microsoft Corporation. All rights reserved. Terms of Use | Privacy
Statement | Accessibility

Jul 21 '05 #4
Ive been swamped with this as well. Anyone have a decent rule for
outlook they want to share? hehe
--
- Nicholas Paldino [.NET/C# MVP]
- ni**************@exisconsulting.com

"William Stacey" <st*****@mvps.org> wrote in message
news:u2**************@TK2MSFTNGP12.phx.gbl...
Me too. virus probably scans ms ngs for more names, local hd, etc.

--
William Stacey, DNS MVP

"Kieran Benton" <ki**********@fastmail.fm> wrote in message
news:ee**************@TK2MSFTNGP12.phx.gbl...
Has somebody in any of these groups got this virus because I keep getting sent about 7 copies every ten minutes!

Kieran
"Ed Crowley" <cu******@pacbell.net> wrote in message
news:uU**************@TK2MSFTNGP12.phx.gbl...
THIS IS A VIRUS!

DO NOT DOWNLOAD OR INSTALL THE ATTACHMENT. DELETE THIS IMMEDIATELY!

For security updates please use Windows Update. Microsoft NEVER distribute
security patches by email or newsgroup!
"Comcast Mail" <uz****@syfw.com> wrote in message
news:OOzab.385432$cF.117762@rwcrnsc53...
Microsoft All Products | Support | Search | Microsoft.com Guide
Microsoft Home
MS Client

this is the latest version of security update, the "September 2003,
Cumulative Patch" update which resolves all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as
three new vulnerabilities. Install now to help maintain the security of

your
computer from these vulnerabilities, the most serious of which could

allow an attacker to run code on your system. This update includes the
functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
RecommendationCustomers should install the patch at the earliest
opportunity.
How to installRun attached file. Choose Yes on displayed dialog box.
How to useYou don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be

found
on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security Advisor web site, or Contact Us.

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored

e-mail
address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are the
trademarks of their respective owners.

Contact Us | Legal | TRUSTe
©2003 Microsoft Corporation. All rights reserved. Terms of Use | Privacy Statement | Accessibility


Jul 21 '05 #5
Fraid not Nic, seems pretty random to me. Tried tracing the IPs from the
header but it appears its pretty well spoofed. Grrr. This is really doing my
head in, why dont people just patch their machines?

Kieran

"Nicholas Paldino [.NET/C# MVP]" <ni**************@exisconsulting.com> wrote
in message news:%2***************@tk2msftngp13.phx.gbl...
Ive been swamped with this as well. Anyone have a decent rule for
outlook they want to share? hehe
--
- Nicholas Paldino [.NET/C# MVP]
- ni**************@exisconsulting.com

"William Stacey" <st*****@mvps.org> wrote in message
news:u2**************@TK2MSFTNGP12.phx.gbl...
Me too. virus probably scans ms ngs for more names, local hd, etc.

--
William Stacey, DNS MVP

"Kieran Benton" <ki**********@fastmail.fm> wrote in message
news:ee**************@TK2MSFTNGP12.phx.gbl...
Has somebody in any of these groups got this virus because I keep getting sent about 7 copies every ten minutes!

Kieran
"Ed Crowley" <cu******@pacbell.net> wrote in message
news:uU**************@TK2MSFTNGP12.phx.gbl...
THIS IS A VIRUS!

DO NOT DOWNLOAD OR INSTALL THE ATTACHMENT. DELETE THIS IMMEDIATELY!

For security updates please use Windows Update. Microsoft NEVER

distribute
security patches by email or newsgroup!
"Comcast Mail" <uz****@syfw.com> wrote in message
news:OOzab.385432$cF.117762@rwcrnsc53...
Microsoft All Products | Support | Search | Microsoft.com Guide
Microsoft Home
MS Client

this is the latest version of security update, the "September 2003,
Cumulative Patch" update which resolves all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well
as
three new vulnerabilities. Install now to help maintain the security of
your
computer from these vulnerabilities, the most serious of which could

allow an attacker to run code on your system. This update includes the
functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
RecommendationCustomers should install the patch at the earliest
opportunity.
How to installRun attached file. Choose Yes on displayed dialog box.
How to useYou don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be

found
on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security Advisor web site, or Contact Us.

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored

e-mail
address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are
the trademarks of their respective owners.

Contact Us | Legal | TRUSTe
©2003 Microsoft Corporation. All rights reserved. Terms of Use |

Privacy Statement | Accessibility



Jul 21 '05 #6
Nicholas,
I check for message headers that contain Client, Partner, User, Customer,
Consumer, recipient, Recipient, or Receiver. Except if I am in the To or CC
fields. I move them to the Junk E-mail folder, and then I scan the list and
delete them.

Hope this helps
Jay
"Nicholas Paldino [.NET/C# MVP]" <ni**************@exisconsulting.com> wrote
in message news:%2***************@tk2msftngp13.phx.gbl...
Ive been swamped with this as well. Anyone have a decent rule for
outlook they want to share? hehe
--
- Nicholas Paldino [.NET/C# MVP]
- ni**************@exisconsulting.com

"William Stacey" <st*****@mvps.org> wrote in message
news:u2**************@TK2MSFTNGP12.phx.gbl...
Me too. virus probably scans ms ngs for more names, local hd, etc.

--
William Stacey, DNS MVP

"Kieran Benton" <ki**********@fastmail.fm> wrote in message
news:ee**************@TK2MSFTNGP12.phx.gbl...
Has somebody in any of these groups got this virus because I keep getting sent about 7 copies every ten minutes!

Kieran
"Ed Crowley" <cu******@pacbell.net> wrote in message
news:uU**************@TK2MSFTNGP12.phx.gbl...
THIS IS A VIRUS!

DO NOT DOWNLOAD OR INSTALL THE ATTACHMENT. DELETE THIS IMMEDIATELY!

For security updates please use Windows Update. Microsoft NEVER

distribute
security patches by email or newsgroup!
"Comcast Mail" <uz****@syfw.com> wrote in message
news:OOzab.385432$cF.117762@rwcrnsc53...
Microsoft All Products | Support | Search | Microsoft.com Guide
Microsoft Home
MS Client

this is the latest version of security update, the "September 2003,
Cumulative Patch" update which resolves all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well
as
three new vulnerabilities. Install now to help maintain the security of
your
computer from these vulnerabilities, the most serious of which could

allow an attacker to run code on your system. This update includes the
functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
RecommendationCustomers should install the patch at the earliest
opportunity.
How to installRun attached file. Choose Yes on displayed dialog box.
How to useYou don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be

found
on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security Advisor web site, or Contact Us.

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored

e-mail
address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are
the trademarks of their respective owners.

Contact Us | Legal | TRUSTe
©2003 Microsoft Corporation. All rights reserved. Terms of Use |

Privacy Statement | Accessibility



Jul 21 '05 #7
Hi,

Kieran Benton wrote:
Fraid not Nic, seems pretty random to me. Tried tracing the IPs from
the header but it appears its pretty well spoofed. Grrr. This is
really doing my head in, why dont people just patch their machines?


Why not just filter out message bodies containing "September 2003,
Cumulative Patch".. it seems to work fine for me. I'm also filtering out
mail with "Undelivered" or "Undeliverable" to catch those ones too (although
I realise I won't get any valid undeliverable messages now).

-- Pete
Jul 21 '05 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: renato | last post by:
1
by: Gottardo Ottorino | last post by:
1
by: John C. Shinn, III | last post by:
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.