I beg to differ, but this is hadly the forum. The VB file attached is
immediately executed upon retrieval from the POP box. The user does not
have to open the message in any fashion, if the preview feature is
enabled.

To make some reasonable use of this bandwidth at least, below you will
find some general rules that can be applied to a 8.9.* or 8.10.* sendmail
configuration, to help eliminate the propogation of the message.

HSubject: $>Check_Subject
F{MPat} /etc/mail/virus_list
D{MMsg} This message may contains a virus.
SCheck_Subject
R$* $={MPat} $*         $#error $: 553 ${MMsg}

Then put lines commonly found in the virus messages, one per line, into
the /etc/mail/virus_list file. In the case of today's virus, a line
containing "ILOVEYOU" would be entered.

- Marc

On Thu, 4 May 2000, Thomas Charron wrote:

> > On Thu, 4 May 2000, Thomas Charron wrote:
> > >   You know, all of this bashing on why Outlook does this and that, not
> one
> > > has mentioned that *IT'S the DUMMIES WHO RAN IT*'s fault.  It didn't run
> > > itself.  Someone had to open it..  This is a question of intelligence,
> which
> > > has *NOTHING* do with Operating systems..  A properly secured NT box..
> > I wish this were true, but it sadly is not. The MS Outlook program has a
> > "feature" which previews messages. Anyone who has that feature turned on,
> > which I believe it is by default, would become infected simply by
> > retrieving messages from theie pop/imap/whatever box.
> 
>   This particular virus was a file *atachment*.  It did not use the
> bug^M^M^Mfeature your speaking of..  :-P
> 


**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to