hort.net Seasonal photo, (c) 2006 Christopher P. Lindsey, All Rights Reserved: do not copy
articles | gallery of plants | blog | tech blog | plant profiles | patents | mailing lists | top stories | links | shorturl service | tom clothier's archive0
Gallery of Plants
Tech Blog
Plant Profiles
Mailing Lists
    Search ALL lists
    Search help
    Subscription info
Top Stories
sHORTurl service
Tom Clothier's Archive
 Top Stories
Disease could hit Britain's trees hard

Ten of the best snowdrop cultivars

Plant protein database helps identify plant gene functions

Dendroclimatologists record history through trees

Potato beetle could be thwarted through gene manipulation

Hawaii expands coffee farm quarantine

Study explains flower petal loss

Unauthorized use of a plant doesn't invalidate it's patent

RSS story archive

Iris Virus - and fixer-upper

On AOL member services they have an "online safety & 
security"/Virus/chatboard.  I asked about the iris virus(so to speak).  Here 
is what they said. 

Current virus engines can detect and remove this worm.  Here are the 

Virus name: WScript.Kak.worm.  Added 12/31/99, Characteristics:  Virus patrol 
continues to identify more occurrences of this Internet worm in newsgroup 
postings which is an indication that this is spreading further.  This worm 
was first discovered by AVERT in December and added detection for it within 
4051 DAT updates.  AVERT rercommends ADDING ".HTA" to file extensions scanned 
for protection, and also ensure users have INSTALLED THE SECURITY PATCH FROM 

Another dangerous aspect of this internet worm is the ability to continuously 
re-infect yourself if the PREVIEW PANE IS ENABLED and you browse between 
folders specifically the "sent" folder which happens to contain the Internet 
worm within a message.  This is another strong reason to UPDATE TO THE SECURIT
Y PATCH, if not already*

This is an Internet worm which uses ActiveX and Windows Scripting Host to 
propogate itself through email using MS Outlook Express 5.  This worm 
consists of 3 components, an HTA file (HTML for Applications), a REG file 
(Registration Entries Update) and a BAT file (MS-DOS Batch).

The method used to integrate these components is to have first composted an 
email message in HTML which supports scripting.  Using an ActiveX exploit 
known as "Scriptlet TypeLib", the script writes an HTA file to the local 
machine, typically in the startup folder.  This will launch the code embedded 
in the HTA file at the next Windows startup.  Microsoft has published a 
security update which addresses this ActiveX exploit and users are encouraged 
to update their systems with this component.  With this update installed, 
users aer questioned if they wish to run the ActiveX control which is marked 
"safe for scripting".

Okay, now, I got the expert's advice.  Somebody tell me in plain English what 
I'm supposed to do here to fix the problem???.  Elaine Ferris, filling in for 

Get a NextCard Visa, in 30 seconds!  Get rates 
as low as 2.9% Intro or 9.9% Fixed APR and no hidden fees. 
Learn more at:

 © 1995-2015 Mallorn Computing, Inc.All Rights Reserved.
Our Privacy Statement
Other Mailing lists | Author Index | Date Index | Subject Index | Thread Index