By using this site, you agree to our updated Privacy Policy and our Terms of Use. Manage your Cookies Settings.
449,207 Members | 1,870 Online
Bytes IT Community
+ Ask a Question
Need help? Post your question and get tips & solutions from a community of 449,207 IT Pros & Developers. It's quick & easy.

FWD: Try on that corrective package from the MS Corporation

P: n/a
Share this Question
Share on Google+
3 Replies


P: n/a
"Tomoaki Ikeuchi" <zg*****************@nuky.com> pontificated in
news:bl**********@news01ch.so-net.ne.jp:
--jjlmgdlsvupmyz
--ddwkffjpyno
MS User

this is the latest version of security update, the

ab***@so-net.ne.jp

--
TeGGeR®
Jul 20 '05 #2

P: n/a

"Tegger$B%g(B" <te*****************@changetheobvious.invalid> wrote in message
news:Xn***************************@66.11.168.195.. .
"Tomoaki Ikeuchi" <zg*****************@nuky.com> pontificated in
news:bl**********@news01ch.so-net.ne.jp:
--jjlmgdlsvupmyz
--ddwkffjpyno
MS User

this is the latest version of security update, the

ab***@so-net.ne.jp


Don't waste your time. It was an automated zombie post in which the "sender"
had no involvement. He does need to get the well-known trojan off his
computer. Well, him and hundreds of other victims fueling these robo-posts. :/

As for you, you should know better. Opening any post or email about a
Microsoft/Windows/Internet Explorer patch is an invitation to infect yourself
with this trojan. The only, repeat only, place to get patches for any
Microsoft program is www.microsoft.com and its Windows Update/Office
Update/TechNet Security services.

-Rob
(Who watches his B.I. Index spike as high as the number of these trojan emails
he's still receiving.)

Norton AntiVirus definitely helps, too.

--
TeGGeR$B%g(B

Jul 20 '05 #3

P: n/a
"Rob Maxwell" <ro******@excite.com> pontificated in
news:bl************@ID-80930.news.uni-berlin.de:

"Tegger$B%g(B" <te*****************@changetheobvious.invalid> wrote
in message news:Xn***************************@66.11.168.195.. .
"Tomoaki Ikeuchi" <zg*****************@nuky.com> pontificated in
news:bl**********@news01ch.so-net.ne.jp:
> --jjlmgdlsvupmyz
> --ddwkffjpyno
> MS User
>
> this is the latest version of security update, the

ab***@so-net.ne.jp


Don't waste your time. It was an automated zombie post in which the
"sender" had no involvement. He does need to get the well-known trojan
off his computer. Well, him and hundreds of other victims fueling
these robo-posts. :/


That domain is the one that allowed itself to be used as a conduit for the
zombie. Emailing abuse is a good idea, even if they don't give a flying
f***, as most don't seem to.

As for you, you should know better. Opening any post or email about a
Microsoft/Windows/Internet Explorer patch is an invitation to infect
yourself with this trojan. The only, repeat only, place to get patches
for any Microsoft program is www.microsoft.com and its Windows
Update/Office Update/TechNet Security services.
I did not open it, except in a text-only newsreader. That message contains
IMG SRCs in the HTML part. My relabelling the spam was an attempt to
prevent people from getting curious and clicking it anyway.

-Rob
(Who watches his B.I. Index spike as high as the number of these
trojan emails he's still receiving.)

Norton AntiVirus definitely helps, too.


I don't use anti-virus. A good hardware firewall and some common sense will
do you better than anti-virus. And a good ISP that filters out obviously
infected messages.

--
TeGGeR®
Jul 20 '05 #4

This discussion thread is closed

Replies have been disabled for this discussion.