INTERLNG Archives

Discussiones in Interlingua

INTERLNG@LISTSERV.ICORS.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Allan Kiviaho <[log in to unmask]>
Reply To:
INTERLNG: Discussiones in Interlingua
Date:
Wed, 5 Sep 2001 23:02:04 +0300
Content-Type:
text/plain
Parts/Attachments:
text/plain (87 lines)
Ingvar!

Ha tu inviate iste message o ha le virus forsan prendite lo ex tu
libro de adresses?

In iste adresse on trova un description super iste virus.
[log in to unmask]" target="_blank">http:[log in to unmask]

Ingvar!
Ha tu vermente scripte iste lineas?
Qui es "un officiero de SHAPE" qui ama InterlinguJa?
-- Allan

Ingvar Stenström wrote: (Did Ingvar Stenström surely write this? --
Allan)
 Car amicos de INTERLNG,Un officiero de SHAPE, qui es interessate in
Interlinguja,me ha inviate un VIRUS ALERTE, e me permittite re-viar lo a
vos.

Il appare que iste virus pote esser periculose. Illo usa le run-time
version
del Visual Basic, que es usate p.ex. con macros del Microsoft Word.

Salutante

Allan

P.S. Non aperi attachate files "readme.exe"!
-- Allan



> Car amicos de INTERLNG,Un officiero de SHAPE, qui es interessate in
> Interlinguja,me ha inviate un VIRUS ALERTE, e me permittite re-viar lo
> a vos.
>
> ----- Original Message -----
>
> Sent: Wednesday, September 05, 2001 1:10 PMSubject: FW: [alerts] VIRUS
> ALERT
>  Car Amico,
>
> You may send this sanitized version to the Interlingua group.
>
> Gald to help.
>
> Patri?ia
> ____________________________________________
> To All,
>
> We are currently experiencing a VIRUS attack on our email networks.
> This attack is coming from outside of our area and we are working
> diligently to get it stopped.  This is what you will see if you get
> any:
>
> SUBJECT LINE: As per your request!
> ATTACHMENT NAME: readme.e x e (spaces added to prevent filtering)
>
> Just delete all messages with this subject line and then right click
> on your deleted items folder and delete them again.  Below you will
> find a partial explanation of this virus if you are interested.
>
> _________________________________________
> Text
>
> SUBJECT: VIRUS ALERT W32.Apost.Worm@mm
>
> SUBJECT LINE: As per your request!
> ATTACHMENT NAME: readme.e x e (spaces added to prevent filtering)
>
> We have received indicators that our networks have
> been infected with this worm, formerly known as [log in to unmask]
>
> Analysis of the code revealed that IP address 210.169.20.21
> (registered to Japan) is associated with this worm, and it hosts
> the download of various virus components related to the worm.
>
> The body of the e-mail asks you to to review the attachment but once
> viewed, the worm will hook your systems activation routines
> and then spread itself to all persons in your address book.
>
> Also Known As: W32/Apost-mm, W32/Apost-A,
>
> The new Symantec definitions will detect the W32.Qint@mm
> (W32/InvalidSSL@MM)
> and W32.Magistr.39921@mm (W32/Magistr.b@MM) viruses as well.

ATOM RSS1 RSS2