Do any of you block incoming e-mails containing ActiveX references?  I just received a 
spam that tried to instantiate an object at http:// 
%363.2%346.%3130.2%30%31%2F%63g%69%2D%62i%6E%2Fa%2E%63%67%69."  I translated that to a 
real URL (http://63.246.130.201 /cgi-bin/a.cgi) and let the colo NOC know, but that 
only goes so far.

I already have my own Outlook HTML security set to Restricted sites, which protected 
me in this particular case, but I don't have any means of pushing that to the rest of 
the firm's Outlook users (yes, I'm thinking about AutoProf; is there anything else?).  
I suppose I could try to block "< o b j e c t" at my e-mail gateway (mailsweeper), but 
that could be defeated but adding extra spaces between the "<" and "object."  



_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Web Interface: 
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&lang=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to