473,788 Members | 2,867 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

python script as an emergency mailbox cleaner

All my mailboxes have been filling up with files of about 130k to 150k, no
doubt copies of some immensely popular virus. So, I've no doubt lost lots
of real mail because of "mailbox full" conditions (the proliferating fake
bounce messages more or less ensure nobody knows their mail to me has
bounced, either).

As an emergency response I and Anna developed, over the last half hour, a
small Python script to be run from cron every few minutes and automatically
scrub any POP3 mailbox from files in the target size range. I'm saving them
to a local file for potential later perusal, but that's obviously easy to
comment out if needed. Here's the tiny script in question...:

import poplib
import time

print 'Start at', time.asctime()

host = 'pop.mail.yahoo .com'
port = 110
user = 'aleaxit'
pasw = 'secret'

logfilename = 'bigjunk'
minsize = 130000
maxsize = 180000
fromtag = 'From al*****@yahoo.c om %s\n'

ps = poplib.POP3(hos t, port)
ps.user(user)
ps.pass_(pasw)

messages = ps.list()
print '%d messages, %d bytes' % (len(messages[1]), messages[-1])

logfile = open(logfilenam e, 'a')

for sms in messages[1]:
sid, ssize = sms.split()
if minsize <= int(ssize) < maxsize:
message = ps.retr(sid)
print 'retrieving and deleting msg#%s, %d bytes, %d lines' % (
sid, message[-1], len(message[1]))
logfile.write(f romtag % time.asctime())
for line in message[1]:
logfile.write(l ine)
logfile.write(" \n")
logfile.write(' \n')
ps.dele(sid)

ps.quit()

print 'Done at', time.asctime()
print
Hope it can come in useful to somebody...!!!

Alex & Anna

Jul 18 '05 #1
9 2736
It's a worm. Worm.Automat.AG H. This is going to be a bad one. The worm
installs, among other things, an SMPT engine, searches an infected system
for email address, and sends two types of e-mail: the first is HTML and is
a fake "security patch" supposedly from Microsoft. It looks very official,
but the attachment, 104 KBytes long, is infectious. Norton Antivirus
definitions only began to identify it with the 18SEP03 manual definition
update. The worm also posts to usenet newsgroups. The other type of e-mail
is a fake notification of undeliverable e-mail. This one is a real bear.
There seem to be hundreds variations in the body content and thousands of
variations in the header. The infectious package is also about 104 KBytes.
I'm getting nearly 100 of the two types per hour. Norton Antivirus does not
detect the worm in usnet posts read by Outlook Express Newsreader or Outlook
Newsreader. Only when you attempt to open the attachment or save the
attachment to disk will Norton identify it. Norton will NOT detect the
virus in the newsgroup posts folder NOR will it detect the newsgroup folder
in a full system scan. It will not remove the infected file from the
newsgroup folder, but it will prevent execution of the vermal payload.

Microsoft Outlook with the SP3 security update when used as your e-mail
reader protects against infection. Prior to 18SEP03 Norton did not.

The worm is also retrieving additional variations, so you can expect the
payload size to begin changing soon. The HTML message is easy to identify;
it is always the same (so far), and includes the phrase 'Run attached file'.
The bogus 'Undeliverable e-mail' variations have no commonality but the
payload attachment (that purports to be your bounced e-mail.) This will
likley change soon.

My guess is that the internet will not open on Monday.

Phil Weldon, pw*****@mindspr ing.com

"Alex Martelli" <al***@aleax.it > wrote in message
news:G6******** **************@ news2.tin.it...
All my mailboxes have been filling up with files of about 130k to 150k, no
doubt copies of some immensely popular virus. So, I've no doubt lost lots
of real mail because of "mailbox full" conditions (the proliferating fake
bounce messages more or less ensure nobody knows their mail to me has
bounced, either).

As an emergency response I and Anna developed, over the last half hour, a
small Python script to be run from cron every few minutes and automatically scrub any POP3 mailbox from files in the target size range. I'm saving them to a local file for potential later perusal, but that's obviously easy to
comment out if needed. Here's the tiny script in question...:

import poplib
import time

print 'Start at', time.asctime()

host = 'pop.mail.yahoo .com'
port = 110
user = 'aleaxit'
pasw = 'secret'

logfilename = 'bigjunk'
minsize = 130000
maxsize = 180000
fromtag = 'From al*****@yahoo.c om %s\n'

ps = poplib.POP3(hos t, port)
ps.user(user)
ps.pass_(pasw)

messages = ps.list()
print '%d messages, %d bytes' % (len(messages[1]), messages[-1])

logfile = open(logfilenam e, 'a')

for sms in messages[1]:
sid, ssize = sms.split()
if minsize <= int(ssize) < maxsize:
message = ps.retr(sid)
print 'retrieving and deleting msg#%s, %d bytes, %d lines' % (
sid, message[-1], len(message[1]))
logfile.write(f romtag % time.asctime())
for line in message[1]:
logfile.write(l ine)
logfile.write(" \n")
logfile.write(' \n')
ps.dele(sid)

ps.quit()

print 'Done at', time.asctime()
print
Hope it can come in useful to somebody...!!!

Alex & Anna

Jul 18 '05 #2

"Phil Weldon" <pw*****@mindsp ring.com> wrote in message
news:ZC******** ***********@new sread1.news.atl .earthlink.net. ..
It's a worm. Worm.Automat.AG H. This is going to be a bad one. The worm
installs, among other things, an SMPT engine, searches an infected system
for email address, and sends two types of e-mail: the first is HTML and is a fake "security patch" supposedly from Microsoft. It looks very official, but the attachment, 104 KBytes long, is infectious. Norton Antivirus
definitions only began to identify it with the 18SEP03 manual definition
update. The worm also posts to usenet newsgroups. The other type of e-mail is a fake notification of undeliverable e-mail. This one is a real bear.
There seem to be hundreds variations in the body content and thousands of
variations in the header. The infectious package is also about 104 KBytes. I'm getting nearly 100 of the two types per hour. Norton Antivirus does not detect the worm in usnet posts read by Outlook Express Newsreader or Outlook Newsreader. Only when you attempt to open the attachment or save the
attachment to disk will Norton identify it. Norton will NOT detect the
virus in the newsgroup posts folder NOR will it detect the newsgroup folder in a full system scan. It will not remove the infected file from the
newsgroup folder, but it will prevent execution of the vermal payload.

Microsoft Outlook with the SP3 security update when used as your e-mail
reader protects against infection. Prior to 18SEP03 Norton did not.

The worm is also retrieving additional variations, so you can expect the
payload size to begin changing soon. The HTML message is easy to identify; it is always the same (so far), and includes the phrase 'Run attached file'. The bogus 'Undeliverable e-mail' variations have no commonality but the
payload attachment (that purports to be your bounced e-mail.) This will
likley change soon.

My guess is that the internet will not open on Monday.


So far, I have seen no copies of the worm on usenet. This may be
the result of my paying $$$ to a good usenet provider (Supernews.)
Unfortunately, my e-mail provider got the stupid idea that "delete"
meant "save a complete copy for 14 days just in case you want
to see it." Most of the stuff is going into two mailboxes that I need
to clean out manually every two or three hours (they're not my inbox,
so the POP3 script won't do it.)

It looks like two worms that just happened to hit at one time,
doesn't it?

John Roth

Jul 18 '05 #3
According to Phil Weldon <pw*****@mindsp ring.com>:
The other type of e-mail
is a fake notification of undeliverable e-mail. This one is a real bear.
There seem to be hundreds variations in the body content and thousands of
variations in the header.
So far I've caught all of these using this procmail recipe:

:0 B
* ^<BR><BR><BR>(< BR>)*Undeliver
/dev/null

This scans the body for a string matching the regex in the second line. "*"
is a delimiter, not part of the regex.

The first several hundred I got had 3 <BR>'s, then it started coming with
4.

Similarly, the fake MS update first said "September 2003 Cumulative Patch",
then after several hundred I started to see "July 2003". I just saw one
"January 2000". The thing feels like it is mutating in response to filters!
My guess is that the internet will not open on Monday.


Civilisation is under attack.
--
Ng Pheng Siong <ng**@netmemeti c.com>

http://firewall.rulemaker.net -+- Manage Your Firewall Rulebase Changes
http://sandbox.rulemaker.net/ngps -+- Open Source Python Crypto & SSL
Jul 18 '05 #4
No, it is only one worm with multiple methods of attack.

#1. The fake 'security update' announcement purporting to be from Microsoft
(this e-mail is in HTML) and that includes an infected attachment. If you
don't have protection, opening this e-mail runs the attachment even if you
don't run it. So far the body of this vector doesn't vary, though the
header information does.

#2. The bogus 'Undeliverable e-mail' message in which everything seems to
vary except, so far, the infected attachment that purports to be your
bounced e-mail.

#3. The worm scans PtoP file-sharing data to spread further.

#4. The worm hijacks servers to act as a source from which to download
packages to vary the infectious e-mail.

#5. The worm can post to usenet. Here's the header of a post that appeared
this morning on alt.comp.periph s.mainboard.abi t

Path:
newsspool1.news .atl.earthlink. net!stamper.new s.atl.earthlink .net!elnk-atl-nf
1!newsfeed.eart hlink.net!newsh osting.com!news-xfer2.atl.newsh osting.com!prox
ad.net!proxad.n et!news-hub.cableinet.n et!blueyonder!i nternal-news-hub.cablei
net.net!news-binary.blueyond er.co.uk.POSTED !53ab2750!not-for-mail
FROM: "Clive Skingle" <mu************ *****@ykmke.com >
NEWSGROUPS:
alt.comp.lang.p hp,alt.comp.mai l.postfix,alt.c omp.mail.qmail, alt.comp.malays i
a,alt.comp.peri phs.cdr,alt.com p.periphs.mainb oard.abit,alt.c omp.periphs.mai n
board.asus,alt. comp.periphs.ma inboard.gigabyt e,alt.comp.peri phs.videocards. a
ti
SUBJECT: Watch this critical update from the M$
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="hilgh fawbnhbqydk"
Lines: 2182
Message-ID: <3R************ @news-binary.blueyond er.co.uk>
Date: Sat, 20 Sep 2003 11:27:59 GMT
NNTP-Posting-Host: 82.32.208.238
X-Complaints-To: ab***@blueyonde r.co.uk
X-Trace: news-binary.blueyond er.co.uk 1064057279 82.32.208.238 (Sat, 20 Sep
2003 11:27:59 GMT)
NNTP-Posting-Date: Sat, 20 Sep 2003 11:27:59 GMT
Organization: blueyonder (post doesn't reflect views of blueyonder)
Xref: news.earthlink. net alt.comp.lang.p hp:12068 alt.comp.mail.q mail:7299
alt.comp.malays ia:17767 alt.comp.periph s.cdr:403271
alt.comp.periph s.mainboard.abi t:567500
alt.comp.periph s.mainboard.asu s:661135
alt.comp.periph s.mainboard.gig abyte:41619
alt.comp.periph s.videocards.at i:145487
X-Received-Date: Sat, 20 Sep 2003 04:28:01 PDT
(newsspool1.new s.atl.earthlink .net)

Phil Weldon, pw*****@mindspr ing.com
"John Roth" <ne********@jhr othjr.com> wrote in message
news:vm******** ****@news.super news.com...

"Phil Weldon" <pw*****@mindsp ring.com> wrote in message
news:ZC******** ***********@new sread1.news.atl .earthlink.net. ..
It's a worm. Worm.Automat.AG H. This is going to be a bad one. The worm installs, among other things, an SMPT engine, searches an infected system for email address, and sends two types of e-mail: the first is HTML and

is
a fake "security patch" supposedly from Microsoft. It looks very

official,
but the attachment, 104 KBytes long, is infectious. Norton Antivirus
definitions only began to identify it with the 18SEP03 manual definition
update. The worm also posts to usenet newsgroups. The other type of

e-mail
is a fake notification of undeliverable e-mail. This one is a real bear. There seem to be hundreds variations in the body content and thousands of variations in the header. The infectious package is also about 104

KBytes.
I'm getting nearly 100 of the two types per hour. Norton Antivirus does

not
detect the worm in usnet posts read by Outlook Express Newsreader or

Outlook
Newsreader. Only when you attempt to open the attachment or save the
attachment to disk will Norton identify it. Norton will NOT detect the
virus in the newsgroup posts folder NOR will it detect the newsgroup

folder
in a full system scan. It will not remove the infected file from the
newsgroup folder, but it will prevent execution of the vermal payload.

Microsoft Outlook with the SP3 security update when used as your e-mail
reader protects against infection. Prior to 18SEP03 Norton did not.

The worm is also retrieving additional variations, so you can expect the
payload size to begin changing soon. The HTML message is easy to

identify;
it is always the same (so far), and includes the phrase 'Run attached

file'.
The bogus 'Undeliverable e-mail' variations have no commonality but the
payload attachment (that purports to be your bounced e-mail.) This will
likley change soon.

My guess is that the internet will not open on Monday.


So far, I have seen no copies of the worm on usenet. This may be
the result of my paying $$$ to a good usenet provider (Supernews.)
Unfortunately, my e-mail provider got the stupid idea that "delete"
meant "save a complete copy for 14 days just in case you want
to see it." Most of the stuff is going into two mailboxes that I need
to clean out manually every two or three hours (they're not my inbox,
so the POP3 script won't do it.)

It looks like two worms that just happened to hit at one time,
doesn't it?

John Roth

Jul 18 '05 #5
John Roth fed this fish to the penguins on Saturday 20 September 2003
08:11 am:

So far, I have seen no copies of the worm on usenet. This may be
the result of my paying $$$ to a good usenet provider (Supernews.)
Unfortunately, my e-mail provider got the stupid idea that "delete"
meant "save a complete copy for 14 days just in case you want
to see it." Most of the stuff is going into two mailboxes that I need
to clean out manually every two or three hours (they're not my inbox,
so the POP3 script won't do it.)
Sounds like the "suspect spam" folder I had active on Earthlink... I
was getting "mail box full" emails faster than I could empty that
folder (since it is only accessible via HTTP, and I'm on a dial-up).
I've essentially had to leave my home system running 24 hours a day
with email checks every 8 minutes (the dial-up logs off if idle 10
minutes).

One would think with the rather common format of the subject/from
lines (at least for the M$ Patch variations) the ISP could identify
them as known "spam" (which doesn't count against the 10MB mailbox
limit).

I'd sent an email to their support address... only to receive a form
letter saying they don't accept emails that weren't initiated via their
web site form... And the response to /that/ was never viewed by a
person -- some program scanned it, saw the word "spam" and sent another
form letter specifying they need the full headers of the message
(singular) I was complaining about. Almost makes me want to rig a
filter to send ALL of these to their spam evaluation address -- but if
downloading at ~44K is bad, think of the uplink at ~31K...

-- =============== =============== =============== =============== == <
wl*****@ix.netc om.com | Wulfraed Dennis Lee Bieber KD6MOG <
wu******@dm.net | Bestiaria Support Staff <
=============== =============== =============== =============== == <
Bestiaria Home Page: http://www.beastie.dm.net/ <
Home Page: http://www.dm.net/~wulfraed/ <


Jul 18 '05 #6
"Phil Weldon" <pw*****@mindsp ring.com> wrote in message
news:ZC******** ***********@new sread1.news.atl .earthlink.net. ..
My guess is that the internet will not open on Monday.


Yeah, well, death of the Internet's been predicted many times before and
hasn't happened yet.

F-Secure's writeup is pretty good at describing the various attacks and
texts the worm uses:
http://www.f-secure.com/v-descs/swen.shtml

FWIW, for me Bayesian filtering is doing a pretty good job on both the fake
security advisories and the fake bounce messages. (Somewhat ashamedly, I'll
admit to using POPFile (Perl) rather than the SpamBayes (Python) -- as a
POP3 proxy solution it seemed slightly slicker at the time...)

James
Jul 18 '05 #7
On Sat, 20 Sep 2003 14:37:45 +0000, Phil Weldon wrote:
It's a worm. Worm.Automat.AG H. This is going to be a bad one. The worm
installs, among other things, an SMPT engine, searches an infected system
for email address, and sends two types of e-mail: the first is HTML and
is a fake "security patch" supposedly from Microsoft. It looks very
official, but the attachment, 104 KBytes long, is infectious. Norton
Antivirus definitions only began to identify it with the 18SEP03 manual
definition update. The worm also posts to usenet newsgroups. The other
type of e-mail is a fake notification of undeliverable e-mail. This one
is a real bear. There seem to be hundreds variations in the body content
and thousands of variations in the header. The infectious package is also
about 104 KBytes. I'm getting nearly 100 of the two types per hour.
Norton Antivirus does not detect the worm in usnet posts read by Outlook
Express Newsreader or Outlook Newsreader. Only when you attempt to open
the attachment or save the attachment to disk will Norton identify it.
Norton will NOT detect the virus in the newsgroup posts folder NOR will it
detect the newsgroup folder in a full system scan. It will not remove the
infected file from the newsgroup folder, but it will prevent execution of
the vermal payload.

Microsoft Outlook with the SP3 security update when used as your e-mail
reader protects against infection. Prior to 18SEP03 Norton did not.

The worm is also retrieving additional variations, so you can expect the
payload size to begin changing soon. The HTML message is easy to
identify; it is always the same (so far), and includes the phrase 'Run
attached file'. The bogus 'Undeliverable e-mail' variations have no
commonality but the payload attachment (that purports to be your bounced
e-mail.) This will likley change soon.

My guess is that the internet will not open on Monday.

The worm uses newsgroup info from Outlook Express as well.

What's to stop a worm from retrieving header file info, and using the NNTP
posting header to actually hack people's computers?

--
to email me remove underscore _
death to spammers

Jul 18 '05 #8
Inboxer for Outlook is a plugin written with Python that will analyze
collections of what you consider legitimate e-mail and and what you consider
illegitimate e-mail. I downloaded it and ran it against a collection of
1500 messages generated by the Worm.Automat.AH B and 265 the latest
legitimate e-mails I've received. After the analysis, Inboxer has detected
about 250 Worm.Automat.AH B generated messages with no false negatives and no
false positives (granted there were only three new legitimate e-mails.

Phil Weldon

"Alex Martelli" <al***@aleax.it > wrote in message
news:G6******** **************@ news2.tin.it...
All my mailboxes have been filling up with files of about 130k to 150k, no
doubt copies of some immensely popular virus. So, I've no doubt lost lots
of real mail because of "mailbox full" conditions (the proliferating fake
bounce messages more or less ensure nobody knows their mail to me has
bounced, either).

As an emergency response I and Anna developed, over the last half hour, a
small Python script to be run from cron every few minutes and automatically scrub any POP3 mailbox from files in the target size range. I'm saving them to a local file for potential later perusal, but that's obviously easy to
comment out if needed. Here's the tiny script in question...:

import poplib
import time

print 'Start at', time.asctime()

host = 'pop.mail.yahoo .com'
port = 110
user = 'aleaxit'
pasw = 'secret'

logfilename = 'bigjunk'
minsize = 130000
maxsize = 180000
fromtag = 'From al*****@yahoo.c om %s\n'

ps = poplib.POP3(hos t, port)
ps.user(user)
ps.pass_(pasw)

messages = ps.list()
print '%d messages, %d bytes' % (len(messages[1]), messages[-1])

logfile = open(logfilenam e, 'a')

for sms in messages[1]:
sid, ssize = sms.split()
if minsize <= int(ssize) < maxsize:
message = ps.retr(sid)
print 'retrieving and deleting msg#%s, %d bytes, %d lines' % (
sid, message[-1], len(message[1]))
logfile.write(f romtag % time.asctime())
for line in message[1]:
logfile.write(l ine)
logfile.write(" \n")
logfile.write(' \n')
ps.dele(sid)

ps.quit()

print 'Done at', time.asctime()
print
Hope it can come in useful to somebody...!!!

Alex & Anna

Jul 18 '05 #9
Alex Martelli wrote:
All my mailboxes have been filling up with files of about 130k to 150k, no
doubt copies of some immensely popular virus. So, I've no doubt lost lots
of real mail because of "mailbox full" conditions (the proliferating fake
bounce messages more or less ensure nobody knows their mail to me has
bounced, either).

As an emergency response I and Anna developed, over the last half hour, a
small Python script to be run from cron every few minutes and
automatically
scrub any POP3 mailbox from files in the target size range. I'm saving
them to a local file for potential later perusal, but that's obviously

I have made a quick and dirty pop-cleaner, mor configurable with size, regex
to deny and regular pattern match to explicitly allow mails
look at http://www.lunqual.de/popclean.zip (only 3kb)

--
Greetz.... lunqual
http://www.lunqual.de
Jul 18 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
4623
by: F. GEIGER | last post by:
Hi all! As I saw Alex Martelli's post about a mbox cleaner based on POP3, I thought, it could be possible to do that based on IMAP too. That way I could ask the server for mails having attached EXE files and delete all those mails on the server. This would save me a lot of traffic over my phone line connection. But I'm missing one important thing: How do I get the server to tell me about attachments.
1
3305
by: chuck amadi | last post by:
any python script which will parse an email messages into a file to poplulate a database. Im trying with UnixMailbox but I cant figure out howto abstract the all email data messages to a file . ## mailbox-Survey.py #!/usr/bin/env python import mailbox,rfc822 # Open Users Mailbox mb = mailbox.UnixMailbox(open("/var/spool/mail/chucka"))
4
8864
by: Chuck Amadi | last post by:
Has anyone got a simple python script that will parse a linux mbox and create a large file to view . Cheers Chu
6
7751
by: chuck amadi | last post by:
Hi , Im trying to parse a specific users mailbox (testwwws) and output the body of the messages to a file ,that file will then be loaded into a PostGresql DB at some point . I have read the email posts and been advised to use the email Module and mailbox Module. The blurb from a memeber of this list . Im not at work at the moment So I cant test this out , but if someone could take a look and check that im on the write track as this...
10
3692
by: Andrew Dalke | last post by:
Is there an author index for the new version of the Python cookbook? As a contributor I got my comp version delivered today and my ego wanted some gratification. I couldn't find my entries. Andrew dalke@dalkescientific.com
6
1836
by: Kay Schluehr | last post by:
Every once in a while Erlang style message passing concurrency is discussed for Python which does not only imply Stackless tasklets but also some process isolation semantics that lets the runtime easily distribute tasklets ( or logical 'processes' ) across physical processes. Syntactically a tasklet might grow out of a generator by reusing the yield keyword for sending messages: yield_expr : 'yield' ( | testlist 'to' testlist) ...
3
1067
by: rowanbradley | last post by:
I've written a script that uses the mailbox module. It works on my local machine with python 2.5. On loading it onto my web hosting provider's server it doesn't work. They are running Python 2.3.4. Is this likely to be the reason? I've tried loading the 2.5 version of mailbox.py onto the web server - now I get some different errors. When was mailbox introduced? Is there a version that'll run on python 2.3.4? If not, what changes...
1
2078
by: SPJ | last post by:
My previous post was not clear, hence resending this. ------------------------- Hi, I am trying to create new tickets in the ticketing system using python. When I receive new email from a particular address, I have to trigger the python script and parse the mail in required format. The main hurdle here is, how to invoke the script on arrival of new mail? I checked the outlook settings and found that it supports only microsoft VB...
3
7338
by: shalong | last post by:
Hi all, I want to run a python script to create a large number of Exchange mailboxes. I am using the os.system("New-Mailbox.......) method. However if i try to execute the python script in powershell it runs it in simple old cmd prompt (which dosent have cmdlets such as New-Mailbox) Is there any way I can run the python in powershell or will i have to go and write a .ps1 script?? Thanks,
0
10173
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10110
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9967
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8993
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7517
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5399
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5536
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3674
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2894
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.