Be careful, a friend of mine told me recently that SirCam worm for instance
a .VBS (visual basic script) file disguised as a .XLS attachment. To make
this worm will probably come from somebody you know since it likes to get into
outlook express address book and mails itself to all the email address's in the
guess there is a way to view the hidden file attributes (the suppressed .vbs
but I am not sure how you do it.
73 de Mike, W4EF..............
----- Original Message -----
From: "Jon Ogden" <email@example.com>
To: "Jim Smith" <firstname.lastname@example.org>; <email@example.com>
Sent: Sunday, July 29, 2001 5:52 AM
Subject: Re: [AMPS] about one of the latest v's
> on 7/28/01 10:20 AM, Jim Smith at firstname.lastname@example.org wrote:
> > Even that doesn't work. I was waiting for someone to send me a file at
> > work. I received the e-mail with an attachment as expected, however I
> > recognized the name of the attachment as a well known w-o-r-m. I used Norton
> > to verify that the file was infected. It had booted out the intended
> > attachment, and put itself in its place.
> > I don't know why Norton didn't catch it on it's own, but we dropped
> > Norton like a hot potato in our office after that.
> The key is to look at the filename extension. It it's an EXE or a PIF or an
> SCR when you are expecting DOC, XLS, PDF, etc. then you know you have a
> Jon Ogden
> NA9D (ex: KE9NA)
> Member: ARRL, AMSAT, DXCC, NRA
> "A life lived in fear is a life half lived."
> FAQ on WWW: http://www.contesting.com/FAQ/amps
> Submissions: email@example.com
> Administrative requests: amps-REQUEST@contesting.com
> Problems: firstname.lastname@example.org
FAQ on WWW: http://www.contesting.com/FAQ/amps
Administrative requests: amps-REQUEST@contesting.com