Re: [CR]OT, Viruses and How We Get 'Em

(Example: Component Manufacturers:Campagnolo)

Date: Thu, 17 May 2001 12:46:54 -0600
From: "M4Campy" <M4Campy@aol.com>
Cc: Classicrendezvous@bikelist.org
Subject: Re: [CR]OT, Viruses and How We Get 'Em
References: <4.3.2.20010517140353.01fe9dd0@mail>


jeffslotkin@home.com wrote:
> So, can someone tell me a good reason to open an attachment you weren't
> expecting and whose origins are unknown?

Can't think of any but the problem with these newer breeds of worms is that they will appear to be _benign_ since they come from a trusted source and have some goody like w32.naked;)

For the most part they are written to take advantage of holes found in M$ Outlook e-mail clients and will propagate by send- ing to people in your personal address book with the subject, or body text that sound important ( a little social engineer- ing) or worse the newer ones morph the subject using a random generator so they are impossible for your ISP to filter based on that.

But, if your ISP filters message using aggressive techniques that can help. No vbs attachments, etc...

The main problem is that the guys in the antidote biz are al- ways going to be a step behind and with the Internet and bits moving so quickly sometimes the damage is done in a click;(

Since this did affect a few bike nuts I think everyone should take a look at the following web site for some excellent tips on practicing safe exe:

http://www.sophos.com/virusinfo/articles/safehex.html

Also, for the morbidly curious check out the following sites:

http://www.cert.org/other_sources/viruses.html#III http://hoaxbusters.ciac.org/

Mike "Cough, why do I sense the Mac guys chuckling" Wilkinson