================================================ Subject: Re: Fw: NCR: look out~~! From: To: Date: Tue 2 Oct 2001 06:02:00 +0000 ================================================ thanks for the lesson! Lee -- ~~they laugh at us because we're different; we laugh at them because they're all the same~~Drowning Pool ~~Be careful what you learn, sometimes knowing burns~~Virgos Merlot > I guess it depends on how you look at it. What they do is "reply" to all > the Unread mail in the person's INBOX. If there was no unread mail from you > in his box, then you didn't get the virus. Apparently he didn't see it > necessary to read 5 of my mails... which may have been a mistake on his > part, cause about all I've sent to the list recently are in regards to > virii, virus removal, and anti-virus software. Oops, huh? Heh. > This is another one of those infections that we can't get pissed off at > anyone about really, as he probably doesn't know he even has it (unless he > read the mail I sent strait to him), and it runs his mail program for him, > without him needing to actually be there (it's one of those "smart" > infections... sometimes I wish I had the brains of some of the virii running > around out there, and I wouldn't have the problems with computers that I > do... {;o) of course, it would solve many people's problems as well.) > Just be glad you didn't get one of the mails, and that if you did, that you > never opened it. And if you DID, then get in contact with me if you need > help removing it, and I'll be more than willing to do everything I can. > And to Lee, I now go to the webpage > http://www.net-security.org/text/articles/viruses/pif.shtml for a full > definition (including a brief description of how they are used for virii). > {=o) > > PIF-files (Program Information File) are the standard Windows files that are > used by the operating system to store information about start up properties > for DOS-applications. PIF-files contain the necessary applications' details > such as its name, size, location, creation and modification date, default > screen size, memory usage, idle sensitivity, etc. This Windows feature > enables users to avoid making multiple adjustments to the DOS-application > operating mode each time they are started. It is enough to set up the > program once and save the configuration to a PIF-file. > > Therefore, PIF-files contain only technical details that provide easy of use > for users working with DOS-applications under Windows. It appears as though > there is no need to worry about malicious programs that may be planted > inside PIF-files. This mistaken belief makes users careless over PIF-files. > Some people arbitrary run PIF-files received from untrustworthy sources, > without performing a comprehensive anti-virus check, thinking that no > malicious code can hide inside. In fact, PIF-files can contain hidden > executable modules, for instance, BAT, EXE or COM programs that will be > automatically executed after the host file is run. > > ¤]\[][G}{T§TÖ®]v[¤ > http://www.geocities.com/npicrash > NightStorm_Draco_@hotmail.com > Admin@AmericanPearlFan.cjb.net > NightStorm@isyourgod.cjb.net > I've seen the wicked fruit of your vine, Destroy the man who lacks a strong > mind > Human pride sings a vengeful song Inspired by the times you've been walked > on > My stage is shared by many millions, Who lift their hands up high because > they feel this > We are one We are strong, The more you hold us down the more we press on > What if you did? What if you lied? What if I avenge? What if eye for an eye? To unsubscribe or change your preferences for the Creed-Discuss list, visit: http://www.winduplist.com/ls/discuss/form.asp