Content-Transfer-Encoding: |
7bit |
Sender: |
|
Subject: |
|
From: |
|
Date: |
Thu, 20 Apr 2000 12:15:06 -0700 |
Content-Type: |
text/plain |
MIME-Version: |
1.0 |
Reply-To: |
|
Parts/Attachments: |
|
|
Dear Stephen,
Thanks a heap for your note.
I have other e-mail accounts that I use with Microsoft Outlook where,
unbenownst to me, a month ago, I sent an e-mail to one of our docents
with this same virus definition! He called me up and told me he'd
quarantined the file but, goodness, did I know I was sending infected
files! Well certainly not. I took off later that same hour and
purchased the Norton's Anti-Virus program which I swiftly installed! No
more problems with Outlook sending or receiving viruses. It all started
with communications with our new webmaster trying to set up our T1 line
and other work being done to set up our website. I guess we don't
realize how "open" the internet really is, and how things (or viruses)
can slip undetected. Everytime I pulled up one of his old e-mails I got
the "Virus Alert" screen! I told him about it so he's cleaned up his act
and taking further precautions 'cuz he hasn't sent anything infected
since.
I altogether accept your apology because I know exactly how you feel!
O
Olivia S. Anastasiadis, Curator
Richard Nixon Library & Birthplace
18001 Yorba Linda Blvd.
Yorba Linda, CA 92886
(714) 993-5075 ext. 224; (714) 528-0544
On Thu, 20 Apr 2000 08:44:37 -0400 Stephen Pober <[log in to unmask]>
writes:
> Please accept my sincere apology to the list for having transmitted
> the virus known as WScript.Kakworm. Please excuse the latenes of my
> apology as I was hesitant to post to the list until I was sure I
> would not reinfect the group.
>
> A description of this virus is available at:
>
> http://www.symantec.com/avcenter/venc/data/wscript.kakworm.html
>
> The virus is spread through Microsoft Outlook Express and infects
> only those machines running this program. It "utilizes a known
> Microsoft Express security hole so that a viral file is created on
> the system without having to run any attachment. Simply reading the
> received email message will cause the virus to be placed on the
> system. It attaches itself to all outgoing messages via the
> Signature feature of Outlook Express and Internet Explorer newsgroup
> reader."
>
> Microsoft has patched the security hole. The patch is available from
> Microsoft's website at:
>
> http://www.microsoft.com/technet/security/bulletin/ms99-032asp
>
> Thank you all for your forbearance.
>
> Stephen E. Pober
>
>
Olivia S. Anastasiadis, Curator
Richard Nixon Library & Birthplace
18001 Yorba Linda Blvd.
Yorba Linda, CA 92886
(714) 993-5075 ext. 224; (714) 528-0544
________________________________________________________________
YOU'RE PAYING TOO MUCH FOR THE INTERNET!
Juno now offers FREE Internet Access!
Try it today - there's no risk! For your FREE software, visit:
http://dl.www.juno.com/get/tagj.
=========================================================
Important Subscriber Information:
The Museum-L FAQ file is located at http://www.finalchapter.com/museum-l-faq/ . You may obtain detailed information about the listserv commands by sending a one line e-mail message to [log in to unmask] . The body of the message should read "help" (without the quotes).
If you decide to leave Museum-L, please send a one line e-mail message to [log in to unmask] . The body of the message should read "Signoff Museum-L" (without the quotes).
|
|
|