[Towertalk] Anyone know how to read these headers?

Bill Otten Bill Otten" <res0958z@verizon.net
Fri, 26 Apr 2002 21:23:31 -0400


With all the discussion on the W32 Klez virii around, there was a suggestion
to read the headers in order to see where a post might have come from. I
don't know how to read through all this hieroglyphic header stuff but I
thought perhaps it might serve as a clue for someone. Might lead to helping
someone find out if they've a virus in their system, but I'd need some help
with deciphering.....

I got a message saying this:

--------Message not delivered to the following:

          hsz102    No matches to nameserver query

 --------Error Detail (phquery V4.1):

 The message, "No matches to nameserver query," is generated whenever
 the ph nameserver fails to locate either a ph alias or name field that
 matches the supplied name.


Here's the remainder of the header:
--------Unsent Message below:

Received: from out020.verizon.net (out020pub.verizon.net [206.46.170.176])
by f05n11.cac.psu.edu (8.9.3/8.9.3) with ESMTP id UAA136398
for <hsz102@psu.edu>; Fri, 26 Apr 2002 20:55:24 -0400
Received: from Fjfidcduy ([68.64.226.171]) by out020.verizon.net
          (InterMail vM.5.01.04.05 201-253-122-122-105-20011231) with SMTP
          id <20020427005426.NUVW1765.out020.verizon.net@Fjfidcduy>
          for <hsz102@psu.edu>; Fri, 26 Apr 2002 19:54:26 -0500
From: w5maz <w5maz@uswest.net>
To: hsz102@psu.edu
Subject: Border
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary=J1M8T7V587Rg35I7o46gW21kIAsn2z2kv3r
Message-Id: <20020427005426.NUVW1765.out020.verizon.net@Fjfidcduy>
Date: Fri, 26 Apr 2002 19:54:54 -0500

--J1M8T7V587Rg35I7o46gW21kIAsn2z2kv3r
Content-Type: text/html;
Content-Transfer-Encoding: quoted-printable

<HTML><HEAD></HEAD><BODY>
<iframe src=3Dcid:K16k4r8h1FE height=3D0 width=3D0>
</iframe>
<FONT></FONT></BODY></HTML>

--J1M8T7V587Rg35I7o46gW21kIAsn2z2kv3r
Content-Type: audio/x-wav;
name=name) .pif

Any help would be appreciated.
73,

Bill KC9CS
                                                      .