Hi ,
This is Shivendra and I am working on SNMP interfaces for a optical
network NE.
We are providing row creation mechanism on SNMP tables using SMI v2
directives( using
RowStatus). In the Set Pdu , we want to allow the requests for
multiple row creations over
same/different tables. We
Most of the time when you subscribe to a financial service on the internet,
e.g a digital wallet or peripheral device for charging debit cards, your
money becomes proprietary i.e you spend it only as allowed by the service
provider or charging of financial debit devices can only be under taken
The is an e-mail virus going around. The subject of the e-mail is
ILOVEYOU...I suggest you delete it the moment you receive it.
-Scot Mc Pherson, N2UPA
-Sr. Network Analyst
-ClearAccess Communications
-Ph: 941.744.5757 ext. 210
-Fax: 941.744.0629
-mailto:[EMAIL PROTECTED]
The whole world does not run software which is a good culture medium
for email viruses. I mostly use nice old UNIX software and it would
take a number of extra steps on my part for some embdedded virus to
get a chance to run. If your software automatically executes stuff
in attachments, you
On Thu, 04 May 2000 09:27:19 EDT, Scot Mc Pherson [EMAIL PROTECTED] said:
The is an e-mail virus going around. The subject of the e-mail is
ILOVEYOU...I suggest you delete it the moment you receive it.
Somebody didn't read RFC2046, section 2, where it talks about text/plain
being *TEXT*, and
This is actually genuine for once... it's a vbscript..
On Thu, 4 May 2000, Scot Mc Pherson wrote:
The is an e-mail virus going around. The subject of the e-mail is
ILOVEYOU...I suggest you delete it the moment you receive it.
-Scot Mc Pherson, N2UPA
-Sr. Network Analyst
-ClearAccess
Actually what happened, was I received this virus from a trusted friend who
just so happens would send an e-mail to me with that sort of "literary"
content to me as a joke. So as it happens it was a perfect trojan because it
slipped under my defenses by being something I would normally expect. My
From: [EMAIL PROTECTED]
Subject: THe Value Of Following Standards... (was Re: VIRUS WARNING)
Date: Thu, 04 May 2000 10:46:33 -0400
On Thu, 04 May 2000 09:27:19 EDT, Scot Mc Pherson [EMAIL PROTECTED] said:
The is an e-mail virus going around. The subject of the e-mail is
ILOVEYOU...I
On Thu, May 04, 2000 at 10:46:33AM -0400, [EMAIL PROTECTED] wrote:
On Thu, 04 May 2000 09:27:19 EDT, Scot Mc Pherson [EMAIL PROTECTED] said:
The is an e-mail virus going around. The subject of the e-mail is
ILOVEYOU...I suggest you delete it the moment you receive it.
Somebody didn't read
Donald,
The whole world will not switch over to Unix
- the average user will always be more confortable with Windows
unless Unix will at one point offer the same seamless user-friendliness.
So it will always be a problem, one which cannot be solved by telling
others not to use what they've
Actually what happened, was I received this virus from a trusted friend
but of course you didn't receive the virus from a trusted friend;
you received it from an impostor.
now you know not to trust names that appear in a message header.
Keith
In addition to what has been posted by me earlier and what has been reported
on Symantec's site, I have learned the following.
When the virus is contracted (DONOT shut down the computer or reboot) The
worm is designed to propagate fully during system startup.
It should be noted that you should
From: Lillian Komlossy [EMAIL PROTECTED]
The whole world will not switch over to Unix
- the average user will always be more confortable with Windows
unless Unix will at one point offer the same seamless user-friendliness.
So it will always be a problem, one which cannot be solved by
This discussion is a bad as the virus. Can we take it off this list and
have it individually please?
Mark A. Lipford
-Original Message-
From: Lillian Komlossy [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 04, 2000 11:02 AM
I don't know about deliberate inclusion of the security hole - it looks
more to me like "careless". Feels like it just "was not thought to be
a danger of any kind to security"... (Does the word TITANIC mean anything to
you?)
Lillian Komlossy
Site Manager
On Thu, 04 May 2000 10:41:34 EDT, "Michael H. Warfield" said:
Your mailer may be able to display it as text (mine, Mutt, certainly
can) but it is definitely propagating as type application/octet-stream, not
text/plain. Wish we could lay that one on them, but we can't.
Mea Culpa - seems
At 18:02 2000-05-04 Lillian Komlossy wrote:
The whole world will not switch over to Unix
- the average user will always be more confortable with Windows
The whole world might not be comfortable with Windows but many,
many of my collegues around the world work at companies where
they have
Date: Thu, 04 May 2000 10:48:12 -0400
From: "Donald E. Eastlake 3rd" [EMAIL PROTECTED]
The whole world does not run software which is a good culture medium
for email viruses. I mostly use nice old UNIX software and it would
take a number of extra steps on my part for some
From: "Scot Mc Pherson" [EMAIL PROTECTED]
Actually what happened, was I received this virus from a trusted friend
... I am just glad that I didn't have any e-mail lists in my "address
book"
That's actually an interesting bit of "social engineering" on the part of the
virus
The whole world will use what they are presented with the difference
between Win3.1 and Win95 is far greater than the difference between Win95
and GNOME or KDE... so actually it's only software availability thats
holding back IS departments the world over!
If MS gets split, we could have
This is what happens when a software gient makes up the rules as they go
along, all in the name of making the umm user err happy, Now i will spend
£30.00 on anti-virus software :-)
-Original Message-
From: Magnus Danielson [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 04, 2000 4:24 PM
Clearly, you need report to re-education camps
to learn why it's important to let the government let companies have to
freedom to innovate wonderful things like vbscript. :-)
not to mention gratuitous incompatibilites to Kerberos.
Keith
I agree with you - anything that is happening automatically and without
the chance for the user to say "yes" or "no thank you" is calling for this
kind of attacks. It should be part of ActiveX or any other technology.
Nothing should autoexecute. Unfortunately a lot of e-commerce and software
Office for Unix, Now there's a terrifying thought
(please don't contaminate the purity of my unix system with that filthy
windows software)
Jim
Jim Dunn
Senior Network Engineer
San Francisco NOC
-Original Message-
From: A James Lewis [mailto:[EMAIL PROTECTED]]
Sent: Thursday,
the builders of the titanic didn't know that certain kinds of steel
become brittle at cold temperatures.
otoh, the developers of this user agent knew, or should have known,
the risks of executing code of unknown origin. they have been
understood for a long time. they were
Keith Moore wrote:
Perhaps unfortunately, RFC 2046 doesn't come right out and say
"DON'T EXECUTE CONTENT IN EMAIL MESSAGES".
Then again, it doesn't say DON'T CUT YOUR CUSTOMER'S ARM OFF either.
Don't be silly; a vendor would never cut a customer's arm off. How would
they pull out their
So if the users would save the virus to disk and then run it,
what's the savings?
the virus doesn't propagate as quickly, nor to as many people,
before it is detected and countermeasures are put in place.
yes, this does make a significant difference.
You could have senders
Let's not make it political. We've all been attacked, it is pointless
to bring in the Unix vs Windows debate. Office, Windows, Unix, Linux, Mac
are all great as long as somebody likes to work with them.
I personally like Microsoft products, but I respect those who don't - and
expect the same
"noone ever got fired for buying ibm"
this was ironic coz ibm was expensive, but worked
someone should get fired for buying someone elses prodiucts
irony
no class action
just reality checkpoint time...
for a systemic view,
some stuff is engineered better than other stuff - see mark
In message [EMAIL PROTECTED], Keith Moore writes:
note that it takes a nontrivial user interface to communicate this to
a recipient of email: e.g.
NOTE: this message was signed by someone purporting to be
Keith Moore [EMAIL PROTECTED]. The signature is validated
by a certificate from
On Thu, 04 May 2000 20:39:43 EDT, Keith Moore said:
but sooner or later folks are going to be held liable for poor engineering
or poor implementation of networking software, just like folks today can be
held liable for poor engineering or implementation of bridges or buildings.
Not if the
On Thu, 04 May 2000 11:11:50 EDT, Scot Mc Pherson [EMAIL PROTECTED] said:
In fact to back up your statement, there are exactly 3 virii that infect
UNIX based systems.
Hmm.. the Morris worm of 1988. What are the other 2?
Hmm.. if you count the 2 self-reproducing sample programs that
came
Hmm.. the Morris worm of 1988. What are the other 2?
Piers Dick Lauder and Bob Kummerfeld implemented Mail/sendfile *@*
(yes, wildcards both sides of the user@host name form) in ACSnet prior
to this. It was designed to be used amongst other things, to do s/w updates
to all ACSnet
33 matches
Mail list logo