473,609 Members | 1,871 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Email Policy Violation`

The following message sent by this account has violated system policy:

Connection From: 64.253.55.90
From: py*********@pyt hon.org
To: te*****@birdsal l.com, q4**********@bi rdsall.com, zS************* **@birdsall.com, rQ******@birdsa ll.com, 20************* *****@birdsall. com, Gs*******@birds all.com, ch********@bird sall.com, ms******@birdsa ll.com, SJ******@birdsa ll.com, Pu********@bird sall.com, Fr********@bird sall.com, db********@bird sall.com, jr*@birdsall.co m, gr***@birdsall. com, pa***********@b irdsall.com, Ei************* ************@bi rdsall.com, tE************* *****@birdsall. com, DX************* ************@bi rdsall.com, dQ*******@birds all.com, pf******@birdsa ll.com, AL************* @birdsall.com, de**@birdsall.c om, 1c************* ******@birdsall .com, Ki********@bird sall.com, ra********@bird sall.com, IF***@birdsall. com, hs***@birdsall. com, la***********@b irdsall.com, me************* **@birdsall.com, as************@ birdsall.com, ma************* @birdsall.com, md*****@birdsal l.com, jk****@birdsall .com, ch***********@b irdsall.com, be**********@bi rdsall.com, ca********@bird sall.com, bj****@birdsall .com, mb******@birdsa ll.com, Ma*********@bir dsall.com, ch************* ***@birdsall.co m, cs********@bird sall.com, ju************* **@birdsall.com, dj***@birdsall. com, ja***@birdsall. com, dm*******@birds all.com, jd*******@birds all.com, pb******@birdsa ll.com, er**@birdsall.c om, ex************* *@birdsall.com, js******@birdsa ll.com, jb*******@birds all.com, ju****@birdsall .com, je****@birdsall .com, jl****@birdsall .com, ko************* @birdsall.com
Date: Fri, 16 Dec 2005 12:40:29 -0500
Subject: hi, ive a new mail address
The following violations were detected:

--- Scan information follows ---

Virus Name: W32.Sober.X@mm! zip
File Attachment: mailtext.zip
Attachment Status: deleted

--- File name Block information follows ---

File Attachment: mailtext.zip
Matching file name: Message is considered to be a mass-mailer.


Dec 16 '05 #1
2 2216
Jay
wat is the question that your asking??

Dec 17 '05 #2
Jay
wat is the question that your asking??

Dec 17 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
2715
by: Steven Reddie | last post by:
In article <slrnbnj19j.av.juergen@monocerus.manannan.org>, Juergen Heinzl wrote: >In article <f93791bd.0309282133.650da850@posting.google.com>, Steven Reddie wrote: >> I understand that access violations aren't part of the standard C++ >> exception handling support. On Windows, a particular MSVC compiler >> option enables Microsoft's Structured Exception Handling (SEH) in C++ >> EH so that a catch (...) will catch an access violation. ...
0
1042
by: andrew.noel | last post by:
I have a publisher policy setup that consists of the following two files: policy.0.0.assembly.dll policy.config The policy.config file contains the following: <configuration> <runtime> <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">
6
5894
by: varlagas | last post by:
We disabled the antivirus software but the problem persists. Any clues? Many thanks in advance! Panagiotis Varlagas ======================================================================= 2005-07-28-10.39.02.015001 Instance:DB2 Node:000 PID:1568(db2syscs.exe) TID:2440 Appid:0A00153A.C90B.050728083720
8
3726
by: stirrell | last post by:
Hello, One problem that I had been having is stopping email injections on contact forms. I did some research, read up on it and felt like I had created a working solution. I hadn't gotten any suspicious bouncebacks in quite some time and got many custom alerts I had set up for notifying me of injection attempts. However, just the other day, I got a bounceback from an AOL address which leads me to believe that an injection attempt was...
9
2214
by: favor08 | last post by:
Can someone look at my code and tell me why my looping is not working? Dim rst As DAO.Recordset Dim strSQL As String Dim db As Database Dim rec As Database Dim olApp As Outlook.Application Dim objMail As Outlook.MailItem Set olApp = Outlook.Application Dim strToWhom As String
1
4392
by: favor08 | last post by:
I'm have automated the creation of an email from Access; whic works fine, but the new email doesn't have the user's default signature on it. Is there any way to either have it find the user's default signature and add it to the bottom of the email. Here is my code for sending the emails: Function SendEmail() Dim rst As DAO.Recordset
4
1998
n8kindt
by: n8kindt | last post by:
ok, i've done quite a bit of research on my problem here. random "! " will appear in my email that i'm sending thru cdo. i've learned that this problem occurs when there are long lines of html (or rich text in my case) of 512 characters or more. i've found multiple places that state the following: "We have identified errors occurring in Outlook where the HTML message contains a long line of code of over 512 characters without a line break....
39
4266
by: Martin | last post by:
I have an intranet-only site running in Windows XPPro, IIS 5.1, PHP 5.2.5. I have not used or changed this site for several months - the last time I worked with it, all was well. When I tried it just now, I am getting the subject error message (specifically: PHP has encountered an access violation at 00F76E21). The error is NOT occurring on every page request (but it is on most of them) and, when I get the error, simply pressing <F5to...
0
8130
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8076
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
8573
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8406
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7002
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6057
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5510
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
1
2531
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
0
1389
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.