SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Intel Corporation (INTC) -- Ignore unavailable to you. Want to Upgrade?


To: Tony Viola who wrote (127272)2/12/2001 11:01:45 PM
From: Jim McMannis  Read Replies (2) | Respond to of 186894
 
Can't just reading an e-mail run an executable file?

Jim

PS...I recently contracted the KAK@40 virus through an e-mail attachment. Very clever little virus. After you clean it with McAffee, it just reinfects. More drastic measures were needed...

Jim



To: Tony Viola who wrote (127272)2/13/2001 9:49:22 PM
From: dan pearson  Respond to of 186894
 
Thought I would just jump in here and add that many viri come in thr form of 'scripts', snippets of code that run very much in the format of 'batch' files of the old DOS days.

Watch our for any attachments with the extension of JS and VBS in particular - they indicate JavaScript and Visual Basic Scripts. Often the virus author will try and fool you by giving the attachment a phony extension that makes you thing its a picture....i.e. they'll name it

filename.jpg.vbs

and you'll assume that JPG is the extension, so, it looks like a Jpeg file, but, in actual fact, when you open it, it executes a script that can access your hard disk, your email address book (especially if using outlook) etc. The "I love you" virus, another script, actually went through your entire drive and replaced every jpeg file you had with a copy of itself!! Very nasty!

...dan...

ginnunggap.com