hort.net Seasonal photo, (c) 2006 Christopher P. Lindsey, All Rights Reserved: do not copy
articles | gallery of plants | blog | tech blog | plant profiles | patents | mailing lists | top stories | links | shorturl service | tom clothier's archive0
Gallery of Plants
Tech Blog
Plant Profiles
Mailing Lists
    Search ALL lists
    Search help
    Subscription info
Top Stories
sHORTurl service
Tom Clothier's Archive
 Top Stories
New Trillium species discovered

Disease could hit Britain's trees hard

Ten of the best snowdrop cultivars

Plant protein database helps identify plant gene functions

Dendroclimatologists record history through trees

Potato beetle could be thwarted through gene manipulation

Hawaii expands coffee farm quarantine

Study explains flower petal loss

RSS story archive

Re: [aroid-l] virused emails

  • Subject: Re: [aroid-l] virused emails
  • From: MossyTrail@cs.com
  • Date: Tue, 8 Oct 2002 21:49:45 EDT

In a message dated 10/8/2002 8:54:19 AM Pacific Daylight Time, 
SelbyHort@aol.com writes:

> That unknown person may indeed have the linking 
> individual's email address on their computer. The virus picks up a random 
> address on the infected machine and uses it to send out its message so that 
> it looks like your trusted friend was the person who sent it to you. This 
> is 
> the hacker's way of covering the viruses trail and it is very effective 
> since 
> it is most difficult to determine who actually has the virused machine when 
> there is a high degree of spoofing going on.

Tip: Unless your friend specifically mentions an attachment somewhere in the 
body of the email, assume it is a virus.  (We learned this lesson with the 
"happy99" virus of several years ago.)  And even if the text does mention an 
attachment, be alert for something "not right," for example, we once got a 
message, supposedly from a friend, with a message claiming the attachment was 
a game the friend had created -- the problem was, the message was in very bad 
English, whereas the friend was a native speaker.  It never hurts to ask your 
friend to verify whether the attachment was authorized, as I attempted to do 
with the two from Aroid-L members.  (When all I got in reply was 
Mailer-Daemon, that told me to play it safe and trash them.)

Jason Hernandez

 © 1995-2017 Mallorn Computing, Inc.All Rights Reserved.
Our Privacy Statement
Other Mailing lists | Author Index | Date Index | Subject Index | Thread Index