SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning -- Ignore unavailable to you. Want to Upgrade?


To: Gottfried who wrote (36481)9/5/2003 10:14:51 AM
From: Sam Citron  Read Replies (1) | Respond to of 110653
 
Yes, I got a reply from Yahoo also, as copied below. I am thinking there is some program in my computer telling it to send out all these unauthorized e-mails and I have no way to stop it from doing so. BTW, I have chosen not to follow up quite yet on:

If you are an individual being impersonated by a Yahoo! Mail account
that is not owned or registered by you, we will need the following
information from you to process a complete investigation:

1. A signed statement from you denying any involvement with the
account. *** PLEASE NOTE: This process pertains only to accounts NOT
registered by you. ***

2. A copy of your photo ID -- If you choose to fax, please make sure
to adjust your copy machine to the lightest setting so that your photo
ID will be visible.

3. Any contact information in case we need to reach you.

4. A copy of the email (including full Internet headers) that is
being sent in your name. If you do not have an actual email message,
please give us a detailed explanation of why you believe you are being
impersonated.


Have you?

Here is the complete response I got from Yahoo:

-> -> ->

Hello,

Thank you for writing to Yahoo! Customer Care.

In order to provide the fastest service possible, we have sent you this
auto-response containing information pertaining to various
impersonation
issues. Please read the following information thoroughly, as it may
contain the answer to your question:

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~
MAIL DELIVERY AND MAILER-DAEMON ERRORS:
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~

If you are receiving "MAILER-DAEMON" errors or "Mail Delivery
Subsystem"
listing your Yahoo! ID as the sender in the original message and you
did
not send the email, it is most likely that the true "sender" of the
message forged the header information to give the impression that it
came from your email address. The sender most likely used your email
address in the "reply-to" and/or the "from" field of the message sent
out and, as a result, misdirected email is being returned to you.

When you receive mail from a "MAILER-DAEMON" or a "Mail Delivery
Subsystem", with a subject equal or similar to "Failed Delivery", this
means that a message which you sent was undeliverable and has been
"bounced" back to you.

These messages are produced automatically by the intended recipient's
email service and usually include a reason for the delivery failure.
Bounced messages normally consist of two parts -- The first contains
the
reason for the bounce, the second contains the original message. The
most common reason for a failed delivery is that the email address
entered is not valid.

To receive the most accurate explanation of a failed delivery error
from
another email service, we suggest you contact their postmaster by
sending an email to "postmaster@thedomain.com" (for example,
postmaster@yahoo.com).

Unfortunately, Yahoo! has no control over messages sent through other
email systems and it's not possible to preempt the misuse of the Yahoo!
name in forged headers. Yahoo! cannot technically prevent its domain
from being forged in the headers of an email message. Individuals are
strongly discouraged from forging the Yahoo! domain in the future and
appropriate action will be taken as necessary.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~
VIRUSES:
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~

There are many viruses in existence today (often times a "worm"), that
propogate by sending messages containing the virus in an attachment to
email addresses found in an infected user's computer (e.g., address
book, local files, etc.). In instances such as these, Yahoo! users may
receive an email with an attachment that indicates the email has been
sent from their own Yahoo! account, when in reality, it most likely did
not. Yahoo! Mail is a web-based email system. Your email messages,
address book and other account information are stored on Yahoo!'s
servers, rather than on your computer. Because most viruses infect your
local computer, it is very unlikely that the virus would propogate
through a Yahoo! Mail account.

Currently, the most reported virus as described above is the
"W32.Klez.H@mm" virus. If you have received a suspicious email that you
think may contain the Klez virus, please compare the subject line of
the
email you have received to those listed at:

securityresponse.symantec.com@mm.ht
ml

Please be aware that because Yahoo! Mail is web-based, simply viewing
your email messages in Yahoo! Mail does not make your computer
vulnerable to computer viruses. In addition, attachments sent along
with
email are not a threat to your system if you do not download them.
However, if you choose to download an attachment by either opening it
or
saving it to your computer, your computer does then become vulnerable
to
computer viruses. The same is true of all files you download to your
computer, whether email attachments or not.

Please note that there is a risk involved whenever downloading email
attachments to your computer or sending email attachments to others. As
stated in the Yahoo! Terms of Service, neither Yahoo! nor its licensors
are responsible for any damages caused by your decision to do so. The
Yahoo! Mail Abuse team recommends that you never download files from an
unknown source.

For this reason, we recommend that you do not download attachments or
other files from any source that you do not know and trust. As a
further
precaution, we recommend that you choose to scan your attachments
whenever this option is available. Following these suggestions will
greatly reduce your likelihood of experiencing trouble from computer
viruses.

If you believe you have a virus on your system, we recommend that you
install an anti-virus program and contact your computer's user support
group for assistance. You can also search the virus encyclopedia at:

symantec.com

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~
IMPERSONATION BY A YAHOO! MAIL ACCOUNT NOT REGISTERED OR OWNED BY YOU:
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~

If you are an individual being impersonated by a Yahoo! Mail account
that is not owned or registered by you, we will need the following
information from you to process a complete investigation:

1. A signed statement from you denying any involvement with the
account. *** PLEASE NOTE: This process pertains only to accounts NOT
registered by you. ***

2. A copy of your photo ID -- If you choose to fax, please make sure
to adjust your copy machine to the lightest setting so that your photo
ID will be visible.

3. Any contact information in case we need to reach you.

4. A copy of the email (including full Internet headers) that is
being sent in your name. If you do not have an actual email message,
please give us a detailed explanation of why you believe you are being
impersonated.

If your company is being impersonated by a Yahoo! Mail account, we will
need a signed statement on company letterhead denying any involvement
with the account, as well as a copy of the email (including full
Internet headers) that is going out with the company name. Please
include any contact information in case we need to reach you.

You may fax your statement to us at:

(408) 349-7398
Attn: Mail Abuse

You may also, if you choose, send your report to us by postal mail at:

Yahoo! Customer Care
Attn: Mail Abuse
701 First Avenue
Sunnyvale, CA 94089

We look forward to receiving this information from you. Yahoo! takes
matters such as impersonation very seriously. We will be happy to
conduct a thorough investigation upon receipt of the necessary
documents
from you.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~
WHO IS IMPERSONATING YOU?
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~

If you are seeking to find out "who" sent the impersonating email, the
email message itself does contain some information relating to the
sender's identity. Yahoo! includes the originating Internet Protocol
(IP) address in the full Internet headers of all messages sent through
Yahoo! Mail so that we will have information regarding the origin of
messages sent through our system. The originating IP address should be
located in the very last "Received" line of the full headers and
corresponds to the sender's Internet Service Provider (ISP).

Please see the following URL for more assistance:

help.yahoo.com

Once you have identified the IP address, you can conduct an IP lookup
to
determine which ISP provides this person with Internet access. One such
lookup tool you may want to try is:

arin.net

You can then attempt to contact that ISP to see if there is any
information they can provide to you.

Thanks again for contacting Yahoo! Customer Care.

Regards,

Yahoo! Customer Care
yahoo.com