~~~~~ ~
More on the Melissa virus and what can be done.

This appears to only affect/infect MS Office 97/2000 users.
                                                     ~~~~~ ~
         --==>> WOW -- WOODY's OFFICE WATCH <<==--
   (your own Microsoft Word & Office guru every week!)
  28 March 1999                           Vol 4 No 14
             MELISSA MACRO VIRUS - SPECIAL EDITION

  First, a word from this weeks sponsor ...

    ** SAVE ON MICROSOFT OFFICE & VBA SOLUTIONS CONF./LONDON
  As a valued WOW reader, receive 50 pounds off the regular
price to
  the world's best conference for Office & VBA. Join
Microsoft
  and the world's leading experts at MOVS99,LONDON April
11-14
  Register now! Discount code "WOWVIP" Tel.+44 (0)181 789
2250
  Fax+44(0)181 789 2249
http://www.vbaconference.com/london99


  IN THIS ISSUE: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  There's a virulent new Office 97 / 2000 virus called
  Melissa out now and it could be waiting in your Inbox
right
  now. So WOW is out early this week so you have all the
  information you need. The Melissa virus is a real problem,
  even at Microsoft! It infects Word and uses Outlook to
send
  itself to other people.

  Here in WOW we've closely examined the virus and have
  details on exactly what it can do plus we stomp on some
  rumors and misinformation that's already spreading.

  HELP! This issue of WOW has help for you on:

  - Protecting yourself from Melissa and other Office
viruses
  - What to do if you get a message from the 'Melissa' virus
  - Step by step advice if you get infected with the Melissa
virus.

  JOIN WOW, hear the latest Office news FREE and FIRST send
  blank email mailto:[EMAIL PROTECTED] or
  http://www.woodyswatch.com/wow/ . And don't forget our
free
  Windows newsletter http://www.woodyswatch.com/www/ or
  mailto:[EMAIL PROTECTED]

      * THE NOT SO LOVELY MELISSA VIRUS
          - THE MAIN WARNING - PLEASE READ THIS
          - A SPECIAL REQUEST FROM WOODY
      * WHAT DOES THE MELISSA VIRUS DO?
      * HOW TO PROTECT YOURSELF FROM MELISSA
          - ANTI-VIRUS PROGRAMS
          - FREE TRIAL ANTI-VIRUS SOLUTIONS
          - ONGOING PROTECTION
          - OPENING EMAIL ATTACHMENTS
          - PROTECTING CORPORATE MAIL SYSTEMS
      * IF YOU ARE INFECTED BY THE MELISSA VIRUS
      * MELISSA RUMOR DEBUNKING
      * KEEPING UP WITH MELISSA
      * CREDITS
      * 'PRANK MACROS' COME HOME TO ROOST
      * ENTERTAINMENT NICHE
      * BACK ISSUES?
      * WOODY's CONTACTS in North America or Australia
      * ADMINISTRIVIA, subscribing, unsubscribing etc

  THE NOT SO LOVELY MELISSA VIRUS ~~~~~~~~~~~~~~~~~~~~~~~
  The bombshell for Friday afternoon (US time) was a new
Word
  97 and Word 2000 (currently being widely tested) virus
that
  uses Microsoft Outlook (not Outlook Express) to send
itself
  out to lots of people very fast and right under your nose.
  As a result it's spread like wildfire in company email
  systems and across the Internet - causing havoc in places
  you would not expect like Microsoft and Intel among many.
  See

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdnn/
stories/news/0,4586,2233030,00.html
  for Fridays report.

  The virus is called 'Melissa' or more properly
  W97M/Melissa.A (there's no official name and you'll also
  see it called W97M_Melissa or W97M.Mailissa.A ) after the
  name of class module that contains the macro virus.  The
  module is set to run each time an infected document is
  opened and sometimes when closed too.

  As usual there has been a lot of panicked and ill informed
  reports about what this virus does so we've worked over
the
  weekend to see what it really does, how you can protect
  yourself and what to do if you've already been infected by
  the Melissa virus.  We'll also squash some of the rumors
  and misunderstandings that are out there.


  THE MAIN WARNING - PLEASE READ THIS ~~~~~~~~~~~~~~~~~~~
  First the main and important warning in brief ...

  If you receive a message from ANYONE at all - it doesn't
  matter who it might be:

  * with the subject line 'Important Message from <name of
sender>'

  * and an Word document attached (of any name but probably
LIST.DOC)

  Then DELETE THE MESSAGE, do NOT open the Word document.

  This simple advice will remove the virus infected document
  and stop it spreading.  If everyone would follow that
  advice the Melissa virus will be stopped dead in its
  tracks.

  See later in this issue of WOW for more detailed tips on
  what to do if you receive any Word document or Melissa
  virus created message.


  A SPECIAL REQUEST FROM WOODY ~~~~~~~~~~~~~~~~~~~~~~~~~
  Please. Take a few seconds to forward this article to
  everyone you know who doesn't subscribe to WOW. Urge them
  in no uncertain terms to read and heed the above advice -
  doing so will save them and many other people trouble.

  All I ask is that you keep this article intact - don't
  change it - and that you send it in its entirety. If there
  are any updates, we'll post them to http://www.wopr.com/
  immediately.

  Peter Deegan is also working with ZDnet on the Melissa
  virus and he'll arrange for any new developments to be
  posted there

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdnn/


               ---->> LEARN FROM THE BEST <<----
  Feel like you're learning Office with a certified guru
helping.
  Make Office an easier and more effective tool for daily
use
          " WOODY LEONHARD TEACHES MICROSOFT OFFICE "
            available from good bookstores worldwide
        >> http://www.wopr.com/books/woodyteaches.htm <<

            ---->> THIS COULD HAVE BEEN YOU <<-----
    You could have told people about your product, web site,
                 event or service here in WOW.
      Advertise in WOW - reach your audience for a few $$$
  >> http://www.mcc.com.au/wow/ad.htm or
mailto:[EMAIL PROTECTED] <<


  WHAT DOES THE MELISSA VIRUS DO?
~~~~~~~~~~~~~~~~~~~~~~~~~~~
  When you open an infected Word document Melissa checks
  which version of Word you have and changes some Word
  settings depending on whether you have Word 97 or 2000.

  WORD 97
      - blocks access to the Tools | Macro menu item. This
        effectively stops you from checking any macro that
        may be present in a document or template.

      - Some Word 97 menu settings are changed to make virus
        spreading easier:

        Tools | Options | General | Confirm Conversion at
Open - OFF
        Tools | Options | General | Macro virus protection -
OFF
        Tools | Options | Save | Prompt to save Normal
template - OFF

  WORD 2000
      - blocks access to the Tools | Macro | Security
        settings. This effectively stops you from raising
        your macro virus security to a level which prevents
        macros from running or being checked before running.

      - Set Word to the lowest macro virus security level -
        then there's no protection from unsafe macros.

  The virus adds a new registry entry
  HKEY_CURRENT_USER\Software\Microsoft\Office\Melissa?\ with
  a value "... by Kwyjibo".  If you have this registry key,
  then that machine has been infected by Melissa at some
  stage.

  If you have Microsoft Outlook (not Outlook Express) the
  virus then grabs the first 50 entries each address list
you
  have and sends a single message with an infected document
  attached directed to each set of 50 addresses. There's a
  separate message for each address book you have. The
  message appears to come from you and even uses your name
in
  the heading:

  FROM:  <shows your email name and address>
  TO: 50 contacts from each address book you have in Outlook
  SUBJECT: Important Message From <then inserts your name,
from Word's settings)
  BODY: Here is that document you asked for ... don't show
anyone else ;-)
  ATTACHMENT: the infected document is added to the outgoing
message.

  This method of distribution only happens the first time
the
  macro is run on a computer.  Most people only have a
single
  address list in Outlook (the Contacts folder), but if you
  have more then the Melissa virus will grab 50 contacts
from
  each of them. A contact can also include a group of email
  addresses in a corporate mail system group or a group of
  addresses created in Outlook 2000, so the infection
message
  could go out to many more than 50 people.

  The message could be sent every time an infected document
  is opened in some cases.  Paranoid (i.e. wisely cautious)
  system administrators who have implemented Windows user
  profiles with stringent security may have prevented write
  access to the HKEY_CURRENT_USER part of the registry. In
  these cases, the registry key will not be set by the
  Melissa virus, so it will always trigger the 'send
infected
  document from Outlook' part of the virus code.

  Whether you have Outlook or not (but do have Word 97 or
  Word 2000):

  - your copy of Word is infected and any documents or
    templates you open will get the virus added to them.
This
    includes your normal template (NORMAL.DOT the basis for
    all Word documents) and active document.

  - On top of all that the virus plays a simple prank each
    time it is run, but only if the minute it's run matches
    the day of the week.  For example if the macro is run
    12:29 on the 29th of the month.  When that happens it
    will type " Twenty-two points, plus triple-word-score,
    plus fifty points for using all my letters.  Game's
over.
    I'm outta here." into your document.

  If the Melissa virus has infected your global template
  (usually NORMAL.DOT) then it run from there each time a
  document is closed as well.


  HOW TO PROTECT YOURSELF FROM MELISSA ~~~~~~~~~~~~~~~~~~~
  If you receive an email message fitting this description
  you should delete it immediately and advise the sender
that
  they have been infected:

  SUBJECT: Important Message From <then inserts your name,
           from Word's settings>

  BODY: 'Here is that document you asked for ... don't show
        anyone else ;-)'
  plus an attached Word document of ANY name.

  The other advice for protection from Melissa is the much
  same as any macro viruses.  It is important and should not
  be ignored.  Since the level of protection supplied by
  Microsoft within their products is rudimentary, you have
to
  take your own precautions.

  Firstly make sure the inbuilt macro guards (such as it is)
  is turned on:

  Word 97, go to the menu option Tools | Options | General |
  Macro virus protection  and check the box ON.

  Word 2000, go to the menu option Tools | Macro | Security
  and make sure the Security Level is set to MEDIUM or HIGH.
  The dialog box explains what each of those settings means.

  But this isn't complete protection - all it does it give
  you a warning that any document or template you open has a
  macro in it.  The macro may, or may not, be a virus.

  Word 97 gives you no idea what they are - just the choice
  to Enable or Disable the macros. Unless you are absolutely
  sure the document doesn't have a virus, you should click
on
  "Disable Macros".  This will open the document but not run
  any macros, good or bad.  Or you can click on the Cancel
  button which closes the document, then run your updated
  anti-virus software over the document to see if it has any
  viruses.

  ANTI-VIRUS PROGRAMS
  Which brings us to anti-virus software - you do have an
  anti-virus program running on all your computers right?
If
  you don't then you're really asking for trouble.  Just as
  bad is having an anti-virus program but don't using it or
  keeping the virus information (sometimes called signature
  files) up to date.  Don't rely on some older version of
  anti-virus software - even with the latest virus updates,
  older anti-virus programs can't recognize or remove the
  newer types of macro viruses present in Office 97 and
  Office 2000.

  Any of the popular anti-virus programs are fine - they all
  make claims about being the best or most comprehensive but
  in reality they all cover the same territory.  In the case
  of Melissa, all the main anti-virus companies have updates
  to their program covering this new virus within hours.
One
  company has made the boast that they have the 'first and
  only' Melissa virus protection - if that claim was true,
it
  was only true by a matter of a few hours at best.

  You can get updates from the anti-virus software's web
sites like:

  Frisk Software / F-PROT
ftp://ftp.complex.is/pub/macrdef2.zip

  Symantec / Norton Anti-Virus
  http://www.symantec.com/techsupp/mailissa.html or choose
  the LiveUpdate option to get the latest update.  Symantec
  calls it W97M_Mailissa.A

  Network Associates / VirusScan
http://vil.mcafee.com/vil/vm10120.asp

  TrendMicro
http://www.antivirus.com/vinfo/security/sa032699.htm

  AVP AntiViral Toolkit Pro
http://www.avp.com/melissa/melissa.html

  There's a comparison of two major anti-virus programs
  (Norton Anti-Virus and McAfee VirusScan) at

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/pccom
p/stories/all/0,6605,383037,00.html

  Whichever software package you use make sure it includes
  the Melissa virus (called W97M/Melissa.A or
  W97M.Mailissa.A) - look in the list of viruses in the
  software or check the web site to ensure that the update
  explicitly includes this latest virus.

  When you have up-to-date anti-virus software then you
must:

  - Make sure it's set to check documents as you save, open
    or download them. Most good anti-virus products offer
    this option (i.e., one which checks files as soon as
they
    are accessed for whatever reason) but you may have to
    explicitly turn this option on.

  - Do a scan over all your hard disk drives (this may take
    sometime, maybe run it overnight or during lunch)

  - Schedule regular automatic checks, most anti-virus
    packages will offer to do this during installation.

  FREE TRIAL ANTI-VIRUS SOLUTIONS
  If you don't have any anti-virus software, this news
should
  prompt you to get something fast.  Here's two options that
  were recommended by PC Computing magazine in their feature
  on the 'Best 1,001 Downloads'.

  Symantec offer a 30 day trial copy of Norton Anti-Virus
  software available for download from

http://chkpt.zdnet.com/chkpt/hud0007500a/hotfiles.zdnet.com/
cgi-bin/texis/swlib/hotfiles/info.html?fcode=000SF4&b=pccomp

  Thunderbyte Anti-Virus is also available from

http://chkpt.zdnet.com/chkpt/hud0007500a/hotfiles.zdnet.com/
cgi-bin/texis/swlib/hotfiles/info.html?fcode=000006&b=pccomp

  F-Prot is a widely respected anti-virus tool and one of
  their experts has kindly helped WOW with information
  towards this issue.
  http://www.complex.is/f-prot/f-prot.html


  ONGOING PROTECTION
  You MUST get regular updates to your virus information
from
  the maker of the anti-virus software.  The Melissa virus
  isn't the first macro virus and it sure won't be the last.
  New viruses are coming out all the time, though most don't
  spread as fast as Melissa has.

  Check your anti-virus software for any automatic updating
  facility that's available.  For example, Norton Anti-Virus
  http://www.symantec.com/avcenter/  has the LiveUpdate
  feature which can grab the latest virus information from
  their web site and automatically update their program on
  your computer.

  You should also make sure you have the latest version of
  Microsoft Word 97.  The latest Service Release 2 for
Office
  97 ( see

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdhel
p/office_help/wow98/wow_sr/091998_01.html
  ) included some largely unheralded features to slow the
  spread of macro viruses.  It didn't stop the Melissa
virus,
  but just having the SR-2 version of Word 97 can stop some
  viral nasties.


  OPENING EMAIL ATTACHMENTS
  The most important protection you can provide for you and
  other computer users (family, workmates etc) is knowing
how
  to safely deal with incoming email attachments so you
don't
  infect your computer or spread nasties to others.

  Reading email usually isn't a problem, but attachments to
  email (like any other document or program you receive) can
  contain a virus.

  Before opening ANY email attachment you should check it
for
  nasties.  That means ANY attachment from ANYONE.  As the
  Melissa virus has shown an innocent message from someone
  you know and trust can be infected, not only because the
  message was sent from their computer without their
  knowledge or consent.

  For ALL attachments you should save them to your disk,
scan
  them for viruses before opening.  Some anti-virus packages
  will do this automatically if you open or save to disk a
  file, but here's the slow, but cautious way if you're not
  sure:

  In Outlook click on the attachment icon and you'll get the
  familiar Opening Mail Attachment dialog.  Choose 'Save it
  to disk' (NOT 'Open it') and select a temporary directory.
  Then open Windows Explorer and locate the file you just
  saved and run the anti-virus program over the file (most
of
  them offer this as an option on the right mouse menu).

  There are more automatic ways, but that's what you can do
  today with any current anti-virus program. A properly
  up-to-date anti-virus package which is properly configured
  to check files as you access them should be enough for
  desktop users. Other options include anti-virus packages
  that integrate with email programs to automatically scan
  incoming messages and attachments for virus nasties.

  Remember that it's not just the Melissa virus you should
be
  worried about. There are plenty of other Word and Office
  macro viruses around that can be carried by any Office
  document or spreadsheet and new ones are certain to appear
  in the future.


  ---> JOIN WOW, hear the latest Office news FREE and FIRST
<---
  Send blank email mailto:[EMAIL PROTECTED] or
http://www.woodyswatch.com/wow/
          And don't forget our free WINDOWS newsletter
  http://www.woodyswatch.com/www/ or
mailto:[EMAIL PROTECTED]


  PROTECTING CORPORATE MAIL SYSTEMS FROM MELISSA
  Corporate mail systems should have anti-virus packages
  running on their mail servers in an effort to block virus
  infected attachments before they reach staff. If your IT
  manager doesn't have such protections in place you can bet
  he/she will be when the story of the Melissa virus gets
  around. Some makers of corporate mail anti-virus solutions
  include: Network Associates http://www.nai.com/, Trend
  Micro http://www.antivirus.com/, Symantec
  http://www.symantec.com/avcenter/, Content Technologies
  http://www.contenttechnologies.com/, Sybari
  http://www.sybari.com/ and Data Fellows
  http://www.datafellows.com/ .

  If the mail system has email scanning software (either at
  the Internet gateway or on a proprietary server) IT
  managers should obtain updates immediately to intercept as
  many of the infected messages as possible before they get
a
  chance to spread.

  Whether your organization has email scanners or not, they
  should get the scanner updates out onto their desktop
  machines right away so there's protection at that level
too
  (remember infection can occur in any document, however
it's
  delivered).

  This is a good time to check that anti-virus scanners are
  configured appropriately to detect the temporary files
  extracted from the email program before opening
  attachments.

  Of course, all servers or workstations that contain shared
  documents should be scanned with the latest anti-virus
  program to make sure there's no virus infection already
  present in other documents.

  If you run Exchange Server, administrators should consider
  disabling users' access to mailing list addresses (i.e.,
  local mailing lists maintained on their servers).  The
  reason for this is that if any of the first 50 addresses
  the Melissa virus pulls from the Global Address Book (eg
  from the server in an Exchange/Outlook setup), you get a
  multiplicative effect.  This is probably what has been
  causing most of the problems resulting in the stories of
  Exchange Servers "crashing".

  Microsoft does have on its ftp site a set of utilities for
  Exchange Server administrators

ftp://ftp.microsoft.com/transfer/outgoing/bussys/mail/meliss
a-virus.zip
  (1.1MB) to remove and guard against Melissa messages.  But
  these utilities have probably not been fully tested and
you
  should probably check with MS Support before using these
  tools on your servers.

  It has been reported that the makers of Sendmail - the
  predominant tool for routing mail across the Internet -
has
  a modification that will remove Melissa created email
  messages.  Check their web site http://www.sendmail.com
for
  any further details.

  There's more advice for network administrators on dealing
  with the Melissa virus at

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdhel
p/stories/main/1,5594,2233123,00.html


  IF YOU ARE INFECTED BY THE MELISSA VIRUS
  Firstly, don't panic.  The Melissa virus is a nuisance but
  it doesn't destroy any documents (some viruses do).  It'll
  take a little time to remove the virus from your computer,
  but there's no lasting damage.

  Second, clean all infected documents from your computers
  hard disk drive.  This is easy to do with any current
  anti-virus program, it will scan all the documents saved
to
  your drives and remove any known viruses it finds (since
  Melissa is very new it's vital that you have the very
  latest anti-virus update).  Make sure the anti-virus
  scanner checks all your disk drives, not just drive C,
  including any folders you share with workmates.  That also
  includes any network / file servers you have access to
  (though your network manager might check them separately).

  Third, remove any infected documents from your email
  program - both the Inbox, Sent Items and any other folder
  you may have moved a message to. You are only concerned
  with messages that have attachments and that normally cuts
  down the possible messages quite a lot. In Outlook you can
  see email messages with attachments by the little
paperclip
  icon. If the message is junk (like a message created by
the
  Melissa virus itself with the subject line "Important
  message from <a name or your name>" ) then just delete it.
  If it's a document you need to keep then save it to your
  hard drive and scan it with anti-virus software to see if
  its infected (if you have anti-virus software that works
  within your email software then use that instead).  Make a
  note of whomever sent you an infected document and advise
  them.

  Fourth, reverse the Word settings that the Melissa virus
  changed.

  In Word 97 check the following menu settings:

  * Switch Tools | Options | General | Confirm Conversion at
Open - ON

  * Switch Tools | Options | General | Macro virus
protection - ON

  * Switch Tools | Options | Save | Prompt to save Normal
template - ON

  In Word 2000 check the following menu settings:

  * Change your macro security level to MEDIUM (meaning you
    can choose to run macros or not) or HIGH.

  You may be tempted to remove the Melissa registry entry to
  totally clean up, but don't because that entry will
prevent
  the virus payload triggering another batch of outgoing
  infected documents in the event of a re-infection and or
  new, trivial variants on the original Melissa virus.

  There are some other changes that are less easy to do.
  Coming soon to ZDnet is a special utility to tidy up after
  a Melissa infection made by our own VBA expert, Claude
  Almer.  Keep an eye on http://www.wopr.com/ or the other
  ZDnet links for this 'Tidy Up' download.

  Lastly, notify anyone who may have received an infected
  document from you.  Look in the 'Sent Items' folder in
your
  email program and see if any documents have been sent out.
  In Outlook you can see email messages with attachments by
  the little paperclip icon.  If any attachments have gone
  out since, say Thursday 25th March 1999 (unless you know
  exactly when you were infected) either sent by you
  personally or part of the message that the Melissa virus
  makes and sends - send a polite message to all the
  receivers notifying them that they may be infected and
  suggesting that they check their systems and delete any
  infected files.  You can point send them a copy of this
  issue of WOW to give them Melissa virus details.

  It's a bit embarrassing to admit that you may have
infected
  others with a computer virus, but it's far better to give
  other people a friendly warning than leave them in the
  dark, at risk of virus infection and spreading a macro
  virus even further. To stop rumors and unnecessary panic
do
  not "broadband" warnings to lots of unaffected people
about
  this or any other virus.  Just warn the person/s who sent
  the virus to you and the people who have received it from
  you.

  If you're on a network don't forget to warn anyone that
you
  share documents with and notify your network administrator
  / IT manager or Help Desk so that know to scan any
  documents on file servers and perhaps update anti-virus
  scanning on the organizations mail system. Only
  appropriately authorized staff should send any kind of
  "security warning" or "alert" message within an
  organization. End-users should only be sending such alerts
  TO the appropriate security managers, Help Desk, IT Staff,
  etc - let them handle passing the news to the rest of the
  company in a systematic way.


  MELISSA RUMOR DEBUNKING TIME
  As usual there's some false stories surrounding the
Melissa
  virus and we'd like to debunk some of these:

  - Any Word 97 / 2000 document can be infected.  Most
    commonly to date the Melissa virus is found in a
document
    called LIST.DOC which has a list of pornographic web
    sites (it came from the alt.sex newsgroup)  Contrary to
    some reports the infected document does not have to be
of
    that name or content.

  - The virus is mainly spread by email (because of the
    action it takes) but you can be infected by ANY Word 97
    or Word 2000 document, however you receive it.  Any
    document you open in Word could be infected - regardless
    of its source or how it's delivered to you.

  - Just reading an email message won't hurt in this case -
    the virus is in the Word document attached to the email
    message and you have to open the document and enable the
    macros to be infected.

  - Not using Microsoft Outlook isn't a protection against
    this virus - Outlook just enables speedy distribution of
    infected Word documents.  Other email programs are just
    as capable of sending infected documents - just not
    automatically and en masse.  Anyone using Word 97 or
Word
    2000 can be infected by this - or anyone of a range of
    macro viruses.

  - The virus does not directly infect corporate mail
systems
    - i.e. Exchange Server, cc:Mail etc are not 'infected'
    directly.  The virus's ability to grab 50 or more
    addresses and send a potentially large document to many
    people quickly (and for the receivers to send the
    infection on to others) acts like a chain reaction. It
    can quickly overload a mail system with so many large
    messages.  Add to that the 'I didn't send that'
follow-up
    messages etc and even the best corporate mail systems
can
    be brought to its knees. If you think it can't happen to
    you, think again.  Already Microsoft, Intel and other
    organizations have been swamped with infected email.

  - The virus doesn't work in Word 95 (Office 95) or Word 6
    (Office 4), this is a virus written in VBA only.

  - The Melissa virus does NOT (repeat NOT) use Outlook
    Express, the email program that comes with Internet
    Explorer or Windows 98, to send out infected documents.
    Contrary to some incorrect media reports, only Microsoft
    Outlook can be called by the Melissa virus.

  - There have been some reports of a Microsoft patch for
    this problem already released.  As at publication there
    had been little comment at all from Microsoft - in fact
    the silence is deafening.  Certainly there's no fully
    tested patch available - the links we've seen to the
    supposed patch have actually been for a known 'Word 97
    Template' problem that, while serious, has nothing to do
    with the Melissa virus.  Keep an eye on
    http://officeupdate.microsoft.com/ for any comments
    from Microsoft.

  - Microsoft does have on its ftp site a set of utilities
    for Exchange Server administrators

ftp://ftp.microsoft.com/transfer/outgoing/bussys/mail/meliss
a-virus.zip
    (1.1MB) to remove and guard against Melissa messages.
It
    includes a small macro to 'clean' up the Melissa virus
    from Word - but the utility doesn't do a complete job
and
    could give users a false sense of security.  None of the
    contents of this file has been publicly announced at the
    time of writing which suggests that it's a temporary
    download that has not been fully tested.

  - Not so much a rumor as Melissa virus trivia.  The
    Scrabble reference in the text inserted by the virus is
    actually a quote from 'The Simpsons' animated TV show.
    In the episode 'Bart the Genius', Bart says those words
    after 'winning' a game by creating the word 'Kwyjibo'.


  KEEPING UP WITH MELISSA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  The best place to keep up with any more news about the
  Melissa virus is on the ZDnet web site.  ZDnet and ZD News
  have been working all through the weekend to provide
  detailed coverage of the problem ready for the potential
  problems of the coming week.
  http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnn.com/

  WOW's own editor, Peter Deegan, was asked to contribute to
  the ZD effort and you'll see his article (based on this
  issue of WOW) already available at

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdhel
p/stories/main/0,5594,2233116,00.html

  There's special advice for network administrators on
  dealing with the Melissa virus

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdhel
p/stories/main/1,5594,2233123,00.html

  WOW editor, Peter Deegan will also be hosting a special
web
  forum on the Melissa Word/Outlook virus on ZDnet this week
  - you can join in at

http://chkpt.zdnet.com/chkpt/hud0007500a/f5.dejanews.com/fra
meset/frameset.cgi?channel=cc&forum=news
  look for the thread called 'ALERT: E-mail virus attacking
  Outlook/Word'.

  Peter Coffee from PC Week explains why we should not be
  surprised at this turn of events. "The result ... has been
  a collection of breakthrough power tools that are notably
  lacking in elementary safety features."

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdhel
p/stories/main/1,5594,2233128,00.html

  Rob Rosenberger's Computer Virus Myths web site is always
a
  good place to look for the straight scoop on the latest
  virus scares. http://kumite.com/myths/

  Of course, Woody's Office Watch will continue to watch the
  situation and let our readers know of any developments
plus
  Microsoft Office news / virus alerts in the future.


  CREDITS
  Many thanks to Vesselin Bontchev from FRISK Software
  International http://www.complex.is/, Nick Fitzgerald from
  Virus Bulletin http://www.virusbtn.com/ and Claude Almer
  (Woody's Office Watch's regular VBA columnist) for their
  help and advice at very short notice.  Of course, any
  errors are WOW's responsibility entirely.


        ---->> WOPR -- SUPERCHARGE WORD -- WOPR <<-----
    Woody's Office POWER Pack is THE way to make Word better
       Better Enveloping, document management, toolbars,
       duplex and other fancy printing - plus lots more!
        Available for Word 2, 6, 95 and 97 (for Windows)
             >> FREE TRIAL: http://www.wopr.com/ <<


  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
              Y O D A  -  Y O D A  -  Y O D A  -  Y O D A  -
Y O D A
  "Your Office Devil's Advocate" is an independent column
  from a long time computer user.  As his pseudonym
suggests,
  Yoda takes a contrary position.


  'PRANK MACROS' COME HOME TO ROOST ~~~~~~~~~~~~~~~~~~~~~~~~
  There's a certain amount of poetic justice in seeing
  Microsoft's own systems being crippled by an Office virus.
  For years Microsoft has done the absolute minimum about
  macro viruses even though the problem is entirely of their
  making in the first place.

  When Redmond first put programming capabilities into Word
  and later Office it totally ignored the possibility of
  malicious use.  Practical measures could have been taken
  from day one, instead Microsoft did nothing.

  Later, macro viruses first appeared for Word 6 and
  Microsoft tried to ignore and belittle the problem.  They
  insisted in calling these viruses 'prank macros' in an
  effort to spin doctor the problem away.  But no amount of
  media management could change the fundamental technical
  problem that Microsoft had created.  Microsoft itself has
  posted infected documents on its web sites and on company
  CD's - WOW has had to publish warnings to the public on
  several occasions!

  It took until Office 97 for Microsoft to put some
so-called
  'Macro Virus Protection' into their products.  But, as WOW
  has mentioned many times, this 'protection' is just a
  warning about the existence of macros with no details
given
  about what the macros are.  You're given a blind choice
  'all or nothing'.

  To make matters worse, Word 97 had a new document format.
  The technical details of that format were not made
  available to anti-virus software makers until months after
  Word 97 was released.  This made it impossible for the
  anti-virus developers to provide proper detection and
  removal tools for Office 97 from the start. And to add
  insult to injury, the Word 97 wide beta test actually
  'evolved' some existing viruses into new forms that worked
  under VBA and Word 97!

  The new 'digital signature' system for 'trusted' macros in
  Office 2000 is so full of holes as to be almost useless.
  In fact it's worse than useless because Microsoft's
foolish
  boasts about the new product could give customers a false
  sense of security.

  If it wasn't such a serious problem, it would be funny to
  watch Microsoft try to spin doctor the Melissa virus in
the
  coming week.  Given the trouble it's caused directly to
  them, it'll be amazing to see how they will try to pretend
  the problem isn't as serious as it really is.

  The staff of companies like Microsoft, Intel and Lucent
  have been caught by this simple virus, presumably these
  people have above average computer skills and they should
  not have been suckered in.  But they were and that shows
  how poor the virus safeguards really are in Microsoft
  Office. If their well trained, knowledgeable staff can get
  caught, what chance does the average user have?

  Microsoft is already saying that people should be
  responsible for what they run on their computer - the
  standard Microsoft cop out - blame the customer.  In
truth,
  Microsoft has provided a loaded gun to their customers,
the
  gun has gone off for thousands of customers and now it has
  blown up spectacularly in Microsoft's own hands.

  Other than that, Microsoft has been conspicuously silent
since
  this problem arose last Friday.  While they may have been
working
  on Exchange Server matters privately -- there's been a
  reprehensible failure by Microsoft to alert their
customers
  quickly.  Presumably we'll see some announcements as the
week
  goes on, but that will be after many more Office customers
have
  been caught in the Melissa trap.  Redmond will probably
wait
  until Monday in the US -- hours after most of the world
has
  returned to work (with Melissa messages waiting for them).

  But don't expect any great change in corporate attitude to
  macro viruses now.  Microsoft will ignore this problem,
  just like they've ignored all the other virus problems.
  They'll keep putting in piecemeal, half-baked fixes aimed
  more at winning the public relations battle instead of the
  anti-virus war.

  Agree? Disagree? Address your responses to
  mailto:[EMAIL PROTECTED]
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


  *** THE FONT PHAROS has packed his bags and moved to
  Woody's WINDOWS Watch - WWW , WOW's companion newsletter
on
  Microsoft Windows. To join at the same address as you use
  for WOW click on this link

http://lists.dundee.net/www/wow2www.cgi?email=RangerTP@bigfo
ot.com


  ENTERTAINMENT NICHE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    As this issue of WOW was prepared we amused ourselves
with:

  Music: 'Island Life' - Grace Jones


  BACK ISSUES? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  Did you miss the first issues of WOW? Drop by
  http://www.wopr.com/wow/wow.htm#SubServ where all back
  issues are stored. You can also download self-extracting
  archives of back issues and search the WOW issues online.

  If you don't have Web access, send mailto:[EMAIL PROTECTED]
  for instructions on how to get back issues via email.


  WOODY's CONTACTS in North America or Australia ~~~~~~~~~

   WOODY products are available from authorized outlets:
   North America:
     Advanced Support Group,
     11900 Grant Place, Des Peres, Missouri  63131
     Ph:(314)965-5630  Fax:(314)966-1833
     mailto:[EMAIL PROTECTED]

   Australia, New Zealand, Asia:
     My Computer Company
     1 Allen St (PO Box 114)
     Glebe NSW 2037 Australia
     Ph:  (02) 9692-9322    mailto:[EMAIL PROTECTED]
     Fax: (02) 9692-9485    http://mcc.com.au/
     All Woody's books and software are available from his
     Aussie outlet.

  Sales of Woody's books and software help support the
  considerable costs of writing and distributing WOW as a
  free bulletin each week.  Help keep WOW alive and free by

  buying Woody's products.


  ADMINISTRIVIA, subscribing, unsubscribing etc ~~~~~~~~~~
  This copy of WOW was originally sent to:
[EMAIL PROTECTED]

  Join, Leave or change address from our Web site
  http://www.woodyswatch.com/wow/

  Note: replying to any issue of WOW to unsubscribe or
comment will NOT work and your message will not be read by a
human.  Use the appropriate address or web page above
instead.

  Back issues  :  http://www.wopr.com/wow/wowarch.shtml  and
  also at the ZDnet Help Channel

http://chkpt.zdnet.com/chkpt/hud0007500a/www.zdnet.com/zdhel
p/filters/office/wow/

  WOW reader comments: to the appropriate columnist or
  mailto:[EMAIL PROTECTED]

  ADVERTISING:
  Reach Office and Windows users throughout the world at
very reasonable rates ... http://www.mcc.com.au/wow/ad.htm
  mailto:[EMAIL PROTECTED]


  WOODY's WINDOWS WATCH
  is our companion FREE newsletter that gives you all the
skinny on Windows. To join at the same address as you use
for WOW

http://lists.dundee.net/www/wow2www.cgi?email=[your_email_ad
dress.com]
  Visit our web site http://www.woodyswatch.com/www/ or
  mailto:[EMAIL PROTECTED]

  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  WOODY's OFFICE WATCH - Copyright 1999, ISSN 1328-1674
  Pinecliffe International and Peter Deegan. All rights
reserved.

  REDISTRIBUTION is allowed only with permission. You may
circulate copies of WOW by _manually_ forwarding it,
providing (1) you forward the issue in its entirety, (2) no
fee is involved, and (3) you forward no more than three
  issues to any one individual.

  After that, please encourage your correspondents to send
  e-mail to [EMAIL PROTECTED] to get their own *free*
  subscription.

  Everyone is welcome!   Tell your friends about WOW!

  =======================================================
           W-O-O-D-Y-S--O-F-F-I-C-E--W-A-T-C-H

---
You are currently subscribed to wow as:
[[EMAIL PROTECTED]]




_______
 To unsubscribe, send "unsubscribe rangernet" to [EMAIL PROTECTED]
 "Eat the hay & spit out the sticks!"     RTKB&G4JC!
 Autoresponder: [EMAIL PROTECTED]   http://rangernet.org

Reply via email to