Benjamin Scott wrote:

> > Customers can avoid being affected by this virus by following standard best
> > practices:
> >
> >      - Never run an executable from someone you don?t know.
> >      - Always have a good-quality virus scanner
> >      - Always keep the virus scanner?s signature files up to date.
>
>   It is interesting to note that the procedures listed above did *NOT* provide
> protection against this virus.

    Though I'd hate it to seem like I'm taking MS's side, the VBS script is as
much an executable as a Perl script would be.  Granted, it likely could have come
from "someone you know", since it propagates through address books.

    Did anyone actually see this on a windows platform?  I'm curious, because the
files extension was '.txt.vbs'.  Since Explorer by default hides the extensions
of known file types, would Outlook have displayed this as '.txt'?  If so, that's
particularly nasty as a semi-educated user could think "This is safe; it's just a
text file."

--
Bob Bell                Compaq Computer Corporation
Software Engineer       110 Spit Brook Rd - ZKO3-3U/14
TruCluster Group        Nashua, NH 03062-2698
[EMAIL PROTECTED]     603-884-0595




**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to