Read this and weep... Si chiar aveam o parere buna despre GeCad si ce fac ei acolo :(
-------- Original Message -------- Subject: RAV Weekly Newsletter - Issue 75 - 20020318 Date: Tue, 19 Mar 2002 17:33:06 +0200 From: RAV Weekly Newsletter <[EMAIL PROTECTED]> To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]> RAV Weekly Newsletter RAV is developed on Compaq Topics covered in this issue: ----------------------------- 1. The Penguin needs protection? Seven reasons for the non-believers 2. Top 3 Most Dangerous Viruses of the Week 3. RAV Weekly Update - 123 New Viruses Detected ----------------------------------------------- 1. The Penguin needs protection? Seven reasons for the non-believers Linux is said to be invulnerable to virus attacks - so far. Alternatively, a growing number of fellow penguin followers agree: Linux viruses will soon haunt the Internet alongside their Windows brethren. a) Linux began to be used at an institutionalized level worldwide. Enterprises and organizations at every level show increased interest in Linux on their servers and desktops. b) While some argue that there are only a few Linux viruses, others say any system can become infected with a virus if the owner is careless enough to install unchecked binaries as root. c) While it can't become infected with Windows viruses, Linux can act as a "carrier". In this case, you need an anti-virus with a unique engine, such as RAV Anti-Virus, which uses a multi-platform technology, thus detecting all viruses, irrespective of the OS they're made for. d) In the case of unprotected mail servers - regardless of OS - a clients' vulnerability is a fact. The administrator does not know which types of files are going through the server. e) A mass-mailed worm is a threat for all servers, since it doesn't damage a particular system, but fills the server's bandwidth, seriously harming or even totally blocking the communication flow. f) The more people who use Linux, the higher the temptation for the virus makers, thus the higher the probability for increased virus attacks. g) The future belongs to the network communication, so the future says: yes, an anti-virus program is needed to protect the rising star of the open source. Did we arouse your curiosity? Search no further! Just check out RAV Products! (http://www.ravantivirus.com/pages/isp.php). RAV AntiVirus for Mail Servers is just what a Linux mail server needs: Checkmark Certified, per domain licensing, content filtering, group configuration, all running on a multi-platform engine. 2. Top 3 Most Dangerous Viruses of the Week This list contains the top 3 most asked about viruses. Our Technical Support Team is always ready to answer all your questions related to this issue and thus help you improve your defensive strategy against computer viruses. Please beware: the following possible uninvited guests may be very harmful for your system. Still... Worry less: RAV is watching! All these threats are already detected! Please visit http://www.ravantivirus.com/ravmsstats/index.php for new detailed comparative information and statistics concerning virus spreading. I) Win32/Sircam@mm. This worm arrives as an email message with the following content: "Hi! How are you?"......"See you later. Thanks". The message body will be semi-random, but will always contain one of the displayed lines. The subject of the email will be random, and will be the same as the file name of the attachment in the email. Then, this mass-mailing virus will attempt to send itself and the random local documents to all users found in Windows Address Book and to the email addresses found in temporary Internet cached files (web browser cache). Detailed information on our website at: http://www.ravantivirus.com/virus/showvirus.php?v=73 II) Win32/Klez.A@mm This worm is spreading itself as an e-mail with a subject randomly chosen from the following possible ones: "Hi", "Hello", "How are you?", "Can you help me?", "We want peace" "Where will you go?", "Congratulations!!!", "Don't cry", "Look at the pretty", "Some advice on your shortcoming", "Free XXX Pictures", "A free hot porn site", "Why don't you reply to me?", "How about have dinner with me together?", "Never kiss a stranger" The message body is the following: "I'm sorry to do so,but it's helpless to say sorry. I want a good job,I must support my parents. Now you have seen my technical capabilities. How much my year-salary now? NO more than $5,500. What do you think of this fact? Don't call my names,I have no hostility. Can you help me?" The attachment name is randomly chosen. The mass mailing routine is very similar with the one found in Nimda/Sircam - it uses the WAB file to get e-mail addresses and the mass-mail itself using its internal SMTP engine. The mail body is embedded into a HTML. Klez uses the IFRAME vulnerability to execute itself on the victims computer without the user's specific execution of the attachment. See details at http://www.ravantivirus.com/virus/showvirus.php?v=81 III) I_Worm/Hybris.C This worm will be received in an email message which may contain the following information: From: Hahaha [[EMAIL PROTECTED]] Subject: Snowhite and the Seven Dwarfs - The REAL story! Body: Today, Snowhite was turning 18. The 7 Dwarfs always where very educated and polite with Snowhite. When they go out work at mornign, they promised a *huge* surprise. Snowhite was anxious. Suddenly, the door open, and the Seven Dwarfs enter...; Attachment: sexy virgin.scr or joke.exe or midgets.scr or dwarf4you.exe When first executed, this worm tries to infect the WSOCK32.DLL file in the WINDOWS\SYSTEM directory. The modified WSOCK32.DLL file watches all Internet activity and attempts to mail a copy of the worm, in the form of a .EXE or .SCR file, to any valid e-mail address sent over the Internet connection, whether part of an e-mail message, web page, or newsgroup posting. AVERT cautions all users to delete unexpected attachments. W32/Hybris.gen@M is sent unknowingly by the infected user. 3. RAV Weekly Update - 123 New Viruses Detected! Please keep in mind that the number of viruses is continuously growing, and that the only effective prophylactic measure is to periodically update your antivirus program's database. Use the built-in RAV Update engine to automatically download the latest virus signature additions or simply visit http://www.ravantivirus.com to download the weekly update. The update is also available for the trial versions of RAV products! In the current release we added/improved detection for the following viruses, trojans and worms (after this update, the total number of detected viruses should be 65997). Latest virus additions: Win32: Bezil.A@mm(3), Fbound.A@mm, Fbound.B@mm, Fbound.C@mm CorelScript: CST.A(2), CSV.A(2), PVT.A(2) BAT: AntiDN, Arica, Batalia.E, Canner, Cream(3), DelSys.AA, DelTree(2), Delwin.W, Demonic, Dvar, FormatC, HCK, HLLP.5926, Hillar.C, Infosys.A, Killer.A, Ktulu.B, Lame.B, Lol.B, Nightstar.581, Numgame, Placid, Polyh(2), PrisonCamp.718, Psycho.9280, Puglia.A, Puglia.C(2), Puglia.D(4), Rexli, Season.A, Silly.T, Without.A, Without.B(2) VBS: Aleat@mm, Anjulie.A@mm(2), Arica, Cuerpo.A@mm(2), Energ(3), Energ.B(2), Flood, Fraglite(2), Indra.A(2), Kremp, MiniCom, Msnb(2), Noclose, Numgame, Petik(5), Poison.A, Puglia.D, Rexli, Satanik(2), Seeker(2), Seeker.R(2), Stpat(2), Tirb.A@mm, VBSWT, Wargam(2), Without.B JS: DafDaf, DropperAppl, Fakehost, MiniCom, Seeker(3), Winbomb, Yama(4), Yang.A@mm(2) WinREG: AntiReg(2) IRC: Dream.I, Iblis, Jerret.A, Jerret.D, Lazirc.G, Momma.D, Noclose, Youg DOS/Macro: Slacker.F, Veltmar.C SH: Telina Perl: InfoSys Total: 123 database records. Thank you for your time and patience. Please feel free to send us any comments and observations that you might have. Be sure you're helping us to constantly improve our products. RAV Team Worry less! RAV is watching. ------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For personal help, e-mail: [EMAIL PROTECTED] Worry less! RAV is watching. This e-mail was scanned by RAV AntiVirus! on behalf of GeCAD Software. -- Razvan Cosma SysAdmin Telemach SRL Piatra Neamt [EMAIL PROTECTED] Linux Registered User #239230 The New Testament offers the basis for modern computer coding theory, in the form of an affirmation of the binary number system. But let your communication be Yea, yea; nay, nay: for whatsoever is more than these cometh of evil. -- Matthew 5:37 --- Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to unsubscribe from this list.
