Re: Rumor about US disaster

2001-09-13 Thread Meritt James

Geeze, give me a break.  I hope you are not spreading rumors everywhere
you can get to.

War on who?  Now, what was  done has been classified as an act of war,
but that is against us, not by us.

Draft?  Get real.  That has to work its way through Congress.  A
response against what?

 Don McMorris wrote:

[snip]

 Second of all, there is a rumor that war WILL BE DECLARED.  Supposedly
 all males between 18 and 40 will be drafted.  At this time, as far as
 I know, they do not have a definite answer about who dun it.

[snip]


-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: onlyphones.com

2001-09-07 Thread Meritt James

Apparently, everyone on the ietf mailing list, right next to the one
that says infect me

[EMAIL PROTECTED] wrote:
 
 big snip
 
 ok, who's wearing the sign that says spam me?

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: MANZAOLI

2001-09-05 Thread Meritt James

Another double-dot attachment?  Geeze...  From a microsoft site?  uh
oh...

CESAR HERNANDEZ wrote:
 
Part 1.1Type: Plain Text (text/plain)
Encoding: quoted-printable
 
   Name: MANZAOLI.doc.com
MANZAOLI.doc.com   Type: unspecified type (application/octet-stream)
   Encoding: base64
Download Status: Not downloaded with message

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: Mailing Lists

2001-08-14 Thread Meritt James

Why should a firewall or virus protection be necessary?  It should
be intuitively obvious just looking at the attachment name.

 James K. Murray (AMSS Domain) wrote:
 
 There can be nothing more irritating than receiving several dozen
 Emails with attachments, each containing a virus!  Fortunately, both
 my firewall and virus protection software trapped the little bugger.
 
 PLEASE REMOVE ME FROM YOUR MAILING LIST !!!
 
 James
 
  - Original Message -
  From: AMSS Hotmail
  To: [EMAIL PROTECTED]
  Sent: Thursday, August 02, 2001 5:49 PM
  Subject: Mailing Lists
 
  Please remove me from the [EMAIL PROTECTED] mailing list.  It is
  really becoming quite burdensome, 2MB attachments and
   hundreds of Emails daily.
 
  The Email address to be removed is [EMAIL PROTECTED]
 
  Thank You!
 
  Best Regards,
 
  James K. Murray
  President
  A. M. Software Services, Inc.
  (718) 978-3956
 
  [EMAIL PROTECTED]
  http://AMSoftwareServices.com

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: Microsoft, please protect your stacks (was Re: [ih] ...stack?)

2001-08-06 Thread Meritt James

And you expect them to save us from ourselves?  Interesting.

David P. Reed wrote:
 
 Not sure why I got this(I'm not on ietf.org), but probably I was
 bcc'ed.  It calls for a response, though, if only to oppose a burgeoning
 meme that somehow Microsoft could save us all from hackers if it only did
 one or two simple things.  Those things being techniques that bar perfectly
 sensible coding practices and techniques in order to save us from hackers.

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: Attachment Stripped in Transaction

2001-08-01 Thread Meritt James



Works nicely.  Seems that there may be active content in the templates
used.  Check
http://support.microsoft.com/support/kb/articles/Q288/2/66.ASP


Robert Moskowitz wrote:
 
 At 08:42 PM 7/24/2001 -0400, [EMAIL PROTECTED] wrote:
 
 On the other hand, I could live with the filtering of active content and
 executables (which is what the *real* problem is, right?)
 
 any attachments.  there is proof of concept now for rtf trojans.

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: Production Feb 7

2001-07-31 Thread Meritt James

You realize, of course, that there is no way I am going to open an
attached Shortcut to MS-DOS Program (double dot file).  I suspect a
viral infection.

Robert Shelton wrote:
 
Part 1.1Type: Plain Text (text/plain)
Encoding: quoted-printable
 
   Name: Production Feb 7.xls.pif
Production Feb 7.xls.pif   Type: Shortcut to MS-DOS Program 
(application/x-unknown-content-type-piffile)
   Encoding: base64
Download Status: Not downloaded with message

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: Production Feb 7

2001-07-31 Thread Meritt James

In particular,
http://antivirus.about.com/library/weekly/aa071801a.htm?iam=dpileterms=%2BSirCam


   Documents' folders is one of the most
   accessible, whether from the desktop,
   Windows Explorer, or the default save to
   location in many programs. As a result,
   many use it as a repository for all their
   data files - even those which contain
   sensitive or confidential information. This
   practice has never been a good idea as it
   gives ill-intentioned intruders a virtual
   roadmap to your personal and work output. The
SirCam worm takes
   the vulnerability one step further, using the
contents of the folder
   to package and disguise itself to others. 

   Sircam, (a.k.a. I-Worm.Sircam, W32.Sircam, and
W32/SircCam)
   mass mails itself using addresses found in the
Windows Address
   Book and in cached email addresses found on the
system. The
   attachment it sends is a compilation of its
infection routine and a
   file found in the My Documents folder. The
original name of the file
   is left intact, with an executable extension
appended to it. For
   example, .PIF, .COM, or .EXE would be added to
the orginal
   filename, thus myphoto.jpg would become
myphoto.jpg.exe. Users
   who did not have file extension viewing enabled
would see only the
   original extension and in the example above,
could be tricked into
   believing an executable file was actually a
harmless image file. 

   The worm then mails itself in an email with
following message body: 

Hi! How are you? 

I send you this file in order to have your
advice 

See you later! Thanks 

   The subject line of the email is the name of the
orginal file. When
   the infected attachment is executed, whatever
file was lifted from
   the sender's My Document folder is displayed,
thus disguising the
   SirCam worm's actions. This is particularly
risky, as an infected user
   who stores confidential data in the My Documents
folder could
   easily find proprietary and sensitive data
mass-mailed to others. 

   SirCam then copies itself to the Recycle Bin,
   C:\recycled\SirC32.exe, in an attempt to avoid
detection by some
   antivirus scanners. The worm modifies the
registry,
   [HKEY_CLASSES_ROOT\exefile\shell\open\command],
so that the
   worm is run first when any .EXE on the system is
run. This method
   makes improper removal of the worm a dangerous
proposition. If the
   worm is deleted before the registry modification
is corrected, no
   .EXE on the system will run. 

   Complete removal instructions, either manually or
via an automated
   tool can be found at: 
  
http://antivirus.about.com/library/weekly/aa072301a.htm.



Meritt James wrote:
 
 You realize, of course, that there is no way I am going to open an
 attached Shortcut to MS-DOS Program (double dot file).  I suspect a
 viral infection.
 
 Robert Shelton wrote:
 
 Part 1.1Type: Plain Text (text/plain)
 Encoding: quoted-printable
 
Name: Production Feb 7.xls.pif
 Production Feb 7.xls.pif   Type: Shortcut to MS-DOS Program 
(application/x-unknown-content-type-piffile)
Encoding: base64
 Download Status: Not downloaded with message
 
 --
 James W. Meritt, CISSP, CISA
 Booz, Allen  Hamilton
 phone: (410) 684-6566

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566




Re: Any value in this list ?

2001-07-31 Thread Meritt James

How about the ones who have the problem doing a bit towards solving
THEIR problem?  

You think there is one-and-only-one cause for everything?  Perhaps you
didn't notice that the patch to repair the vulnerability that Red Code
exploits was released back in June?

Keith Moore wrote:
 
  I especially don't like the way one
  company is lynched for every software problem in the world.
 
 you'd rather put the burden of responsibility for solving the
 problem on somebody besides the folks who caused it?

-- 
James W. Meritt, CISSP, CISA
Booz, Allen  Hamilton
phone: (410) 684-6566