Does anyone know how the latest email worms assemble the email addresses 
they use? I am getting a large amount of junk destined for non-existant 
(never existant) email accounts. So the address cannot be taken from the 
various address books on the compromised PC's.

Adi

Reply via email to