<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
   <channel>
      <title>Making Light :: Spoofed :: comments</title>
      <link>http://nielsenhayden.com/makinglight/archives/007752.html#comments </link>
      <description>Language, fraud, folly, truth, history, and knitting. Et cetera.</description>
      <language>en</language>
      <lastBuildDate>Tue, 18 Jul 2006 15:39:07 -0500</lastBuildDate>
      <generator>http://www.sixapart.com/movabletype/?v=4.34-en</generator>
      
      <item>
      <title>Spoofed</title>
      <description>You know those computer viruses that take over a machine, then send out email with spoofed &quot;from&quot; addresses they've lifted...</description>
      <content:encoded>You know those computer viruses that take over a machine, then send out email with spoofed "from" addresses they've lifted...</content:encoded>
      <link>http://nielsenhayden.com/makinglight/archives/007752.html</link>
      </item>

      
      <item>
         <title>Spoofed -- comment #1 from xeger</title>
         <description>comment from xeger on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>My empathies on being joe jobbed.  It sucks.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  3:39 PM by xeger&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134116</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134116</guid>
         <pubDate>Tue, 18 Jul 2006 15:39:07 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #2 from Laurie Mann</title>
         <description>comment from Laurie Mann on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>Oh, the joy of Outlook!  I believe that's still the only software that lets hackers do that...</p>]]>
	 &lt;p&gt;Posted July 18, 2006  3:40 PM by Laurie Mann&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134117</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134117</guid>
         <pubDate>Tue, 18 Jul 2006 15:40:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #3 from Edward Oleander</title>
         <description>comment from Edward Oleander on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>So who did I just send my life savings and the title to my car to?</p>]]>
	 &lt;p&gt;Posted July 18, 2006  3:51 PM by Edward Oleander&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134121</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134121</guid>
         <pubDate>Tue, 18 Jul 2006 15:51:51 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #4 from Harry Connolly</title>
         <description>comment from Harry Connolly on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>Who did I just send a copy of my Spacewrecked-Adam-and-Eve story to?  </p>]]>
	 &lt;p&gt;Posted July 18, 2006  4:05 PM by Harry Connolly&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134125</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134125</guid>
         <pubDate>Tue, 18 Jul 2006 16:05:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #5 from Sean Bosker</title>
         <description>comment from Sean Bosker on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>"Who did I just send a copy of my Spacewrecked-Adam-and-Eve story to?"</p>

<p>Hey, that's my idea!</p>]]>
	 &lt;p&gt;Posted July 18, 2006  4:41 PM by Sean Bosker&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134138</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134138</guid>
         <pubDate>Tue, 18 Jul 2006 16:41:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #6 from murgatroyd</title>
         <description>comment from murgatroyd on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>Well, it wasn't me -- I have a Mac at home and we use Lotus Notes mail on PC at work, and believe me, *nobody* cares enough to hack into Notes mail.</p>

<p>We also have Norton antivirus, and it's installed so that every time I open a Word document it scans for a virus even if it's a file I just opened 5 minutes ago.</p>

<p>This ranks right up there with seven levels of safety packaging on the bottle of vitamin C in terms of frustration.<br />
</p>]]>
	 &lt;p&gt;Posted July 18, 2006  4:45 PM by murgatroyd&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134139</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134139</guid>
         <pubDate>Tue, 18 Jul 2006 16:45:59 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #7 from TomB</title>
         <description>comment from TomB on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>I got 21 messages from "tnh" starting yesterday. More might have been blocked by my ISP's spam filters. I looked at one of the attachments and it's got the classic "This program cannot be run in DOS mode." string near the front. No worries in my case because I'm on a Mac. The one with the subject "Fwd: Crazy illegal Sex!" looked possibly interesting, but if they just want to have illegal sex with my computer then never mind. </p>]]>
	 &lt;p&gt;Posted July 18, 2006  4:50 PM by TomB&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134140</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134140</guid>
         <pubDate>Tue, 18 Jul 2006 16:50:32 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #8 from Jarsto</title>
         <description>comment from Jarsto on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>I once received spam (though not a virus) that actually listed my own e-mail address as the sender, and also as one of about twenty recipients. For a moment I was tempted to file a complaint against me with my own ISP just to see what would happen.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  5:03 PM by Jarsto&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134142</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134142</guid>
         <pubDate>Tue, 18 Jul 2006 17:03:52 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #9 from Jeffrey Smith</title>
         <description>comment from Jeffrey Smith on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>I got one of those last week. All I could do was stare at the screen and say, "That's just not right!"</p>]]>
	 &lt;p&gt;Posted July 18, 2006  5:22 PM by Jeffrey Smith&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134146</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134146</guid>
         <pubDate>Tue, 18 Jul 2006 17:22:10 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #10 from E-mart</title>
         <description>comment from E-mart on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>If the email address is "tnh@panix.com", then the virus might have just culled it from the cache of someone who visited the Making Light homepage, not necessarily someone with your address in their address book.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  5:27 PM by E-mart&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134147</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134147</guid>
         <pubDate>Tue, 18 Jul 2006 17:27:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #11 from Lizzy L</title>
         <description>comment from Lizzy L on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>As Nero Wolfe would say, "Pfui!" Stupid Stuff to do with computers...</p>]]>
	 &lt;p&gt;Posted July 18, 2006  5:33 PM by Lizzy L&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134149</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134149</guid>
         <pubDate>Tue, 18 Jul 2006 17:33:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #12 from abi</title>
         <description>comment from abi on 18.Jul.06</description>
         <content:encoded><![CDATA[<p><em>"Who did I just send a copy of my Spacewrecked-Adam-and-Eve story to?"</em></p>

<p><em>Hey, that's my idea!</em></p>

<p>Who did I send my telepathic aliens on the internet stole my spacewrecked-Adam-and-Eve story idea to?</p>]]>
	 &lt;p&gt;Posted July 18, 2006  5:36 PM by abi&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134150</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134150</guid>
         <pubDate>Tue, 18 Jul 2006 17:36:18 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #13 from Christopher B. Wright</title>
         <description>comment from Christopher B. Wright on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>The ones I hate are when someone sends me suspicious looking files with *my* email address in the header.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  5:53 PM by Christopher B. Wright&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134155</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134155</guid>
         <pubDate>Tue, 18 Jul 2006 17:53:55 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #14 from nalo</title>
         <description>comment from nalo on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>Yes, I got a ton of these yesterday from your imposter.  Deleted them all unopened.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  6:44 PM by nalo&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134166</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134166</guid>
         <pubDate>Tue, 18 Jul 2006 18:44:28 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #15 from Kip W</title>
         <description>comment from Kip W on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>Oh, sure, promise me US$13M and then as soon as you have my bank info, it's all a "hoax" and "someone else" is using your name. </p>

<p><i>Won't get fooled again!</i></p>]]>
	 &lt;p&gt;Posted July 18, 2006  7:03 PM by Kip W&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134168</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134168</guid>
         <pubDate>Tue, 18 Jul 2006 19:03:52 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #16 from Annalee Flower Horne</title>
         <description>comment from Annalee Flower Horne on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>ick, that sucks.</p>

<p>Stupid Outlook. You'd think the bad PR that comes from every single virus on the web exploiting the program would have made a dent in its ubiquity by now.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  7:32 PM by Annalee Flower Horne&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134171</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134171</guid>
         <pubDate>Tue, 18 Jul 2006 19:32:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #17 from Randolph Fritz</title>
         <description>comment from Randolph Fritz on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>Nah; the ubiquity of MS Windows is positive proof of the stupidity of business management.</p>

<p>...still waiting for <a href="http://cm.bell-labs.com/plan9/" rel="nofollow">Plan 9</a> to succeed, here.</p>]]>
	 &lt;p&gt;Posted July 18, 2006  7:49 PM by Randolph Fritz&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134173</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134173</guid>
         <pubDate>Tue, 18 Jul 2006 19:49:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #18 from Stefan Jones</title>
         <description>comment from Stefan Jones on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>We use a variant of Plan 9 on our video servers.</p>

<p>It is imaginatively named "Transit."</p>]]>
	 &lt;p&gt;Posted July 18, 2006  7:51 PM by Stefan Jones&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134175</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134175</guid>
         <pubDate>Tue, 18 Jul 2006 19:51:40 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #19 from Seth Breidbart</title>
         <description>comment from Seth Breidbart on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>xeger, that isn't a joe job.  A joe job is intentional targetting of the forgery victim.  This is just a virus forging an arbitrary email address in the hopes that the recipient will recognize it and open the message.<br />
</p>]]>
	 &lt;p&gt;Posted July 18, 2006  9:06 PM by Seth Breidbart&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134183</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134183</guid>
         <pubDate>Tue, 18 Jul 2006 21:06:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #20 from John M. Ford</title>
         <description>comment from John M. Ford on 18.Jul.06</description>
         <content:encoded><![CDATA[<p>"Plan 9?  Ah, yes, Plan 9 involves me forgetting my line and picking up my conveniently placed script for a cue.  And while these Earth people are, as you will say in twenty more pages, idiots, their carbon-based-paper and stapling technology is far in advance of our own."</p>]]>
	 &lt;p&gt;Posted July 18, 2006  9:23 PM by John M. Ford&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134184</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134184</guid>
         <pubDate>Tue, 18 Jul 2006 21:23:17 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #21 from Ayse</title>
         <description>comment from Ayse on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I always wonder how many people those scams catch.  I never see them unless I'm slumming in the spam filter looking for good lines of poetry.  At this point I've stopped reading any e-mail, statistically speaking: I read less than .01% of e-mail that arrives at the server addressed to me.</p>

<p>I no longer answer the phone, either, because even if it rings it is spam, and I have no adequate filters for spam on the phone (being unwilling to pay for caller ID).</p>

<p>The mail carrier keeps deciding I have moved out and for reasons unknown to me refuses to deliver mail addressed to me at my alleged home address.</p>

<p>As far as I can tell, technology and infrastructure improvements have made me as hard to get hold of as my 18th century ancestors who spent most of their time at sea.</p>

<p>(Except, of course, none of them had a cell phone and wireless internet everywhere they go.  But still.)</p>]]>
	 &lt;p&gt;Posted July 19, 2006  1:02 AM by Ayse&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134196</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134196</guid>
         <pubDate>Wed, 19 Jul 2006 01:02:42 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #22 from Simon Haynes</title>
         <description>comment from Simon Haynes on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>It's bad enough someone using your email, but I had someone report one of my software programs as a virus. (It was just a false positive.) Next thing you know a bunch of people are writing to ask why I'm hacking their machines.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  6:31 AM by Simon Haynes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134212</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134212</guid>
         <pubDate>Wed, 19 Jul 2006 06:31:25 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #23 from Bryan</title>
         <description>comment from Bryan on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Spacewrecked'em, hell space damn near destroyed 'em.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  7:13 AM by Bryan&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134213</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134213</guid>
         <pubDate>Wed, 19 Jul 2006 07:13:46 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #24 from John Hawkes-Reed</title>
         <description>comment from John Hawkes-Reed on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>If anyone's been in receipt of a handful of the bogus emails, it might be worth grovelling through the headers to see if there's a common source.</p>

<p>A while ago, I was slightly troubled by a spate of virus-ridden mail from a handful of addresses. Five minutes digging showed a common source, and that together with some educated guessing on who else might be in someone's address-book led pretty quickly to the poor unfortunate with the festering computer.</p>

<p>(Ok, so I cheated a bit and posted to LJ along the lines of 'Is this your ISP? Are these people in your address-book? If so, your A-V is out of date')</p>]]>
	 &lt;p&gt;Posted July 19, 2006  8:58 AM by John Hawkes-Reed&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134223</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134223</guid>
         <pubDate>Wed, 19 Jul 2006 08:58:30 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #25 from John Stanning</title>
         <description>comment from John Stanning on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>It's depressing that after all the publicity about viruses, there are still people dumb enough to run a PC without working, current anti-virus. Nyxem.D is six months old and should be picked up by every AV software with even moderately recently updated patterns.</p>

<p>This virus is *stupid*. It sent me not just one, but *twenty* messages from "tnh", all at the same time, with unlikely subjects; that ought to make anyone suspicious (not the tnh-ness of them, I mean, but the multipliciy and improbability).</p>

<p>By the way, I don't think I have the honour of being in the address book of any of tnh's correspondents (AFAIK). Therefore, the virus is probably using victim addresses culled from this blog.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:00 AM by John Stanning&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134224</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134224</guid>
         <pubDate>Wed, 19 Jul 2006 09:00:01 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #26 from Suzanne</title>
         <description>comment from Suzanne on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Not really you? Does that mean you don't want my decology "The Passion of Mary-Sue" after all?</p>

<p>Drat!</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:06 AM by Suzanne&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134225</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134225</guid>
         <pubDate>Wed, 19 Jul 2006 09:06:03 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #27 from Giacomo</title>
         <description>comment from Giacomo on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>In all this, it makes me sad to note that Outlook is still the best PIM program around. </p>

<p>Thunderbird is fine for "just email", but for everything else it falls horribly short, even with several extensions (this sentence is strangely and accidentally appropriate on several levels). Lotus Notes is a slow elephant, best-suited for managing distributed databases. Evolution on linux is, well, don't let me start. Kontact (linux/KDE) is getting there but the developers work with very limited resources.</p>

<p>So at the office we are still stuck with Outlook, and every day a new crack comes around...</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:08 AM by Giacomo&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134226</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134226</guid>
         <pubDate>Wed, 19 Jul 2006 09:08:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #28 from Scorpio</title>
         <description>comment from Scorpio on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I am on the verge of trying to use Linux -- although I have only been hit by one small virus that had almost no consequences about 5 years ago.</p>

<p>One more thing John Brunner came very close to describing.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:14 AM by Scorpio&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134227</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134227</guid>
         <pubDate>Wed, 19 Jul 2006 09:14:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #29 from John Stanning</title>
         <description>comment from John Stanning on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>John Hawkes-Reed: I think this one may be less traceable. All my messages apparently came from a machine named "sat-eb6dqyeu7zs", with IP address 62.12.102.18 which seems to belong to a network in Egypt. Quite likely that's spoofed too.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:24 AM by John Stanning&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134230</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134230</guid>
         <pubDate>Wed, 19 Jul 2006 09:24:22 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #30 from JulieB</title>
         <description>comment from JulieB on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I got hit with another joe job yesterday. The originating IP was - surprise! - at AOL. </p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:31 AM by JulieB&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134232</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134232</guid>
         <pubDate>Wed, 19 Jul 2006 09:31:12 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #31 from Kip W</title>
         <description>comment from Kip W on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>What an insidious virus that would be, if it just went out under a publisher's name and said, "We want your manuscript." How many do you suppose would respond to that at velocities normally only approached by certain tiny particles?</p>

<p>And it would be worse, in many cases, if it actually published them.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:31 AM by Kip W&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134233</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134233</guid>
         <pubDate>Wed, 19 Jul 2006 09:31:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #32 from Fragano Ledgister</title>
         <description>comment from Fragano Ledgister on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>My sympathies, TNH. I just had my credit card cloned (I suspect because someone was snooping on my brother's wireless connection). Definitely not fun.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:34 AM by Fragano Ledgister&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134234</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134234</guid>
         <pubDate>Wed, 19 Jul 2006 09:34:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #33 from Greg London</title>
         <description>comment from Greg London on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I am getting so sick of these insecurities.<br />
I think my next computer will be a Mac.<br />
The mac-pc ads by Apple going around lately<br />
have been hilarious and effective in getting <br />
me to consider their brand. I will still need<br />
to figure out how to run Linux. Probably will<br />
just keep my old dual boot PC/Linux box and<br />
use it for Linux stuff and for the odd occaision<br />
that I need windows.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:26 AM by Greg London&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134239</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134239</guid>
         <pubDate>Wed, 19 Jul 2006 10:26:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #34 from Mike Kozlowski</title>
         <description>comment from Mike Kozlowski on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Why are people blaming Outlook and Windows?  This has nothing to do with Outlook (it uses its own SMTP engine), and -- as far as I can tell -- doesn't exploit any Windows vulnerabilities.  It appears to require people to run attachments from email -- attachments, incidentally, that Outlook 2003 won't even allow you to run (as it blocks .pif attachments).</p>

<p>From what I'm seeing, it'd be virtually impossible for a person running modern Microsoft software to be infected without really trying.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:33 AM by Mike Kozlowski&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134240</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134240</guid>
         <pubDate>Wed, 19 Jul 2006 10:33:17 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #35 from John Hawkes-Reed</title>
         <description>comment from John Hawkes-Reed on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>John Stanning: Bother. It wouldn't surprise me if yon virus forged the first one or two Received: lines, which probably meanders into Advanced Email Divination and away from the scope of this rather compact text-box.</p>

<p>Hey, and indeed, ho.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:43 AM by John Hawkes-Reed&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134245</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134245</guid>
         <pubDate>Wed, 19 Jul 2006 10:43:22 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #36 from Leslie B</title>
         <description>comment from Leslie B on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>*coughs*</p>

<p>Because somebody has to do it - </p>

<p>http://www.ctrlaltdel-online.com/comic.php?d=20060513</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:43 AM by Leslie B&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134246</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134246</guid>
         <pubDate>Wed, 19 Jul 2006 10:43:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #37 from theophylact</title>
         <description>comment from theophylact on 19.Jul.06</description>
         <content:encoded><![CDATA[<p><i>The ones I hate are when someone sends me suspicious looking files with *my* email address in the header.</i></p>

<p>My e-mail client, Mozilla Thunderbird, automatically directs those to my junk folder, so when I actually send myself mail from my office to my home, I have to remember to look for it in "Junk".</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:56 AM by theophylact&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134251</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134251</guid>
         <pubDate>Wed, 19 Jul 2006 10:56:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #38 from Terry Karney</title>
         <description>comment from Terry Karney on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I've avoided about 30 submissions from it.  They are all from TNH, and they looked a tad suspisions, so I  didn't even open them, much less any attachements.</p>

<p>TK</p>]]>
	 &lt;p&gt;Posted July 19, 2006 11:08 AM by Terry Karney&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134255</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134255</guid>
         <pubDate>Wed, 19 Jul 2006 11:08:09 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #39 from Randolph Fritz</title>
         <description>comment from Randolph Fritz on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Mike, what are you talking about?  Windows comes from the factory with some settings open and every month or two a new security, ah, "feature" is discovered.  Normal users run as administrator (this may change in Vista), so any malware one accidentally runs has the full run of the machine.  The MS Office suite will happily run scripts from any files they are given without a second thought or any sandboxing, meaning that opening any mail attachment makes you vulnerable--surely two clicks in error ought not be disaster?</p>

<p>Feh.  The solutions to these problems were all known at least 25 years ago.  But MS sells the ability to remotely control their systems to developers, that's why the Office suite will automatically run scripts.  MS also wants to be able to nose through systems for DRM purposes, and they sell that, too.  Besides, securing Windows would cost, and cut into the revenue of the anti-virus software vendors.  The back doors in Windows and the Office suite are there for  reasons, and I don't see MS ever closing them entirely--they like them too much.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 11:12 AM by Randolph Fritz&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134256</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134256</guid>
         <pubDate>Wed, 19 Jul 2006 11:12:39 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #40 from Scott H</title>
         <description>comment from Scott H on 19.Jul.06</description>
         <content:encoded><![CDATA[<p><i>"Why are people blaming Outlook and Windows?"</i></p>

<p>Because it's easy, fun, and stands a good chance of being the correct root cause of any problem.</p>

<p>Scott H, M.C.S.E.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 12:22 PM by Scott H&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134264</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134264</guid>
         <pubDate>Wed, 19 Jul 2006 12:22:52 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #41 from Xopher</title>
         <description>comment from Xopher on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Just read the addendum. Shit!  Does this damn thing infect you only if you open an attachment?</p>]]>
	 &lt;p&gt;Posted July 19, 2006 12:48 PM by Xopher&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134265</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134265</guid>
         <pubDate>Wed, 19 Jul 2006 12:48:27 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #42 from C.E. Petit</title>
         <description>comment from C.E. Petit on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Kip W asked:<br />
What an insidious virus that would be, if it just went out under a publisher's name and said, "We want your manuscript." How many do you suppose would respond to that at velocities normally only approached by certain tiny particles?</p>

<p>Ever been to PublishAm3rica's website? Or read <a href="http://www.lulu.com/content/102550" rel="nofollow"><i>Atlanta Nights</i></a>?</p>]]>
	 &lt;p&gt;Posted July 19, 2006 12:49 PM by C.E. Petit&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134266</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134266</guid>
         <pubDate>Wed, 19 Jul 2006 12:49:29 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #43 from Jules</title>
         <description>comment from Jules on 19.Jul.06</description>
         <content:encoded><![CDATA[<p><i>Mike, what are you talking about? Windows comes from the factory with some settings open and every month or two a new security, ah, "feature" is discovered.</i></p>

<p>That may be true.  This particular worm, however, is just one of the old-fashioned 'lets attach an executable program to an e-mail and rely on user stupidity to get it to run' ones.</p>

<p>AFAIK, there hasn't been an automatic execution of e-mail content bug found for a few years now.  Almost everything recent requires user interaction in some form at least.</p>

<p><i>Normal users run as administrator (this may change in Vista), so any malware one accidentally runs has the full run of the machine.</i></p>

<p>Not true.  When I set up users on my XP Pro machine, the setup program made the first one an administrator and the rest were not automatically admin users.</p>

<p><i>The MS Office suite will happily run scripts from any files they are given without a second thought or any sandboxing, meaning that opening any mail attachment makes you vulnerable--surely two clicks in error ought not be disaster?</i></p>

<p>When I've tried to do this in Office97, I always get a message that says something like "The document you are opening contains macros ... blah ... danger of nasty things happening if you say yes ... Do you want to run them?".  And besides, if you can get enough people to open executable attachments to build your botnet, why would you bother with such elaborate techniques as using attacks hidden in documents?  You want the idiots' machines more, because they're less likely to notice what you're doing.</p>

<p>Yes, MS software is buggy and insecure.  But other people's software is also buggy and insecure.  The biggest difference is that there are more idiots using MS software.<br />
</p>]]>
	 &lt;p&gt;Posted July 19, 2006 12:53 PM by Jules&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134267</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134267</guid>
         <pubDate>Wed, 19 Jul 2006 12:53:54 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #44 from Christopher Davis</title>
         <description>comment from Christopher Davis on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Some of these may have arrived at my mail server, but I wouldn't have seen them. Since I run my own server, I just set up the mail filters to discard any exe/com/bat/pif/scr files and save CPU by not needing to run a virus checker on the messages....</p>]]>
	 &lt;p&gt;Posted July 19, 2006  1:37 PM by Christopher Davis&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134275</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134275</guid>
         <pubDate>Wed, 19 Jul 2006 13:37:56 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #45 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I don't want to brand myself with a "Microsoft Fellow Traveler" sticker on my virtual forehead, but Randolph's information is a little bit old. Copies of Windows XP shipped by OEM vendors, such as Dell and HP, come with Service Pack 2 installed and the software firewall pre-enabled.</p>

<p>A default installation of Microsoft Office 2003 sets  the Macro security level at "high" for all the applications, including MS Outlook. This blocks most malware targeted at Office applications from running.  The Outlook default now prohibits users from opening executable attachments.  (You can still open a bogus ZIPfile attachment or HTML script, if your AV software lets you get away with that.) According to the description that Teresa linked to, this particular worm gets activated by someone stupidly opening a strange attachment on a Windows PC that lacks appropriate up-to-date antivirus software.   The description doesn't specify whether the activated worm harvests email addresses only from Outlook or by systematic searches of other files on the hard disk.</p>

<p>Randolph's criticism of the default administrator privilege level in Windows XP is valid. But the weakest link in the operating system is still Internet Explorer, which is the gateway of choice for most current Windows malware. My experience is that the built-in Windows firewall, a <a href="http://www.free-av.com" rel="nofollow">good free AV utility</a> and use of a properly-configured alternate web browser will now eliminate most malware threats in Windows XP. </p>

<p>Spending an extra $30 for <a href="http://www.webroot.com" rel="nofollow">Webroot Spysweeper</a> will even let you continue use of Internet Explorer in relative safety, despite its vulnerabilities.   (If you are a Windows user, I can't recommend Spysweeper too highly.  In addition to being a preventative agent, it has amazing rescue and cleanup abilities on machines that have already been infected.  No reading logs or manual file deletions involved, it just scans and expunges malware, restoring system defaults.)</p>]]>
	 &lt;p&gt;Posted July 19, 2006  3:26 PM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134289</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134289</guid>
         <pubDate>Wed, 19 Jul 2006 15:26:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #46 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>An afterthought.  </p>

<p>Teresa probably knows this and decided it would be an ineffective use of time. But you can sometimes reduce the flow of bogus email messages sent under your name by examining mail headers and alerting administrators of legitimate source domains for the mail servers. (Telephone calls work better than emails to abuse@xxx.net.) I've seen this work when the source is an accidentally-infected computer with an account on a small, responsible ISP. When the real mail server IPs belong to criminals, indifferent large ISPs, or sleazeballs, you can optionally publicize that fact.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  3:52 PM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134291</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134291</guid>
         <pubDate>Wed, 19 Jul 2006 15:52:36 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #47 from Mark DF</title>
         <description>comment from Mark DF on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Has anyone else received MicroSoft's most recent Windows "update"? It's a little program that does an ID check on registered computer software before it will allow you the pleasure of Windows patches. On the one hand, I kind of understand Microsoft wanting to force unregistered users or pirates to raise their hands. On the other, given the ubiquity of Windows, just how many illegal copies can they possibly be worried about (at least in the US) that I have to show my papers for them to fix their software? I feel like I shouldn't be annoyed about this, but at the same time it feels like the ol' "If you've done nothing wrong, what's yer problem."</p>

<p>I haven't installed it yet, but I know I will be forced to when terrorists try to steal my Spacewrecked Adam-and-Steve-Are-Happy-In-Eden-As-Immortals-Cause-There-Ain't-No-Chicks-Stealing-Apples story.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  3:52 PM by Mark DF&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134292</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134292</guid>
         <pubDate>Wed, 19 Jul 2006 15:52:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #48 from rhandir</title>
         <description>comment from rhandir on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Antivirus tip: AVG is free for personal use, and is less system intensive than Norton.*</p>

<p>Ayse, if you don't pick up your mail daily, some postal delivery people decide that it is an abandoned address. Filing complaints at the local post office fixes this, though catching the mail deliverer is usually simpler. You could experiment with filing a permanent change of address form to your current address.</p>

<p>Giacomo wrote:<br />
<i>So at the office we are still stuck with Outlook, and every day a new crack comes around...</i><br />
Literally true - there's a fellow releasing exploits at the rate of one a day this month. Hope he only has thirty.</p>

<p>Jules wrote'<br />
<i>AFAIK, there hasn't been an automatic execution of e-mail content bug found for a few years now. Almost everything recent requires user interaction in some form at least.</i><br />
Not quite true. The <a href="http://en.wikipedia.org/wiki/2005_WMF_vulnerability" rel="nofollow">WMF</a> vulnerability <a href="http://isc.sans.org/diary.php?storyid=994" rel="nofollow">doesn't necessarily</a> require user intervention - just having a downloaded infected file on your hard disk AND have it be scanned by the indexing service or a vulnerable antivirus program is sufficent. That was new in January.(So if you reinstall a computer that was shipped with a windows install from before January '06, you need a copy of the patch for that.)</p>

<p>Christopher Davis wrote <br />
<i>Since I run my own server, I just set up the mail filters to discard any exe/com/bat/pif/scr files and save CPU by not needing to run a virus checker on the messages....</i><br />
Unless you dump all attachments, this is likely a false savings. The WMF exploit's magic bits can be in any file - windows does not rely on extensions to determine if something is a WMF, it parses the headers, triggering the exploit. Compute cycles are cheap, lost data is expensive.</p>

<p>Lenny Bailes' advice is excellent, particularly the bit about using virtually any other browser than Internet Explorer. </p>

<p>Advice to switch to another operating system is being bandied about. There is no right choice, but Mac OS and Linux are less vulnerable to attacks than XP, and can be better secured without breaking important stuff. If you have a way out, take it.</p>

<p>I have become quite disheartened at the current increase in the number of patches XP requires - I am trapped behind a dialup connection.</p>

<p>-r.</p>

<p><br />
*at least the Norton home version. I'm not as sure about the enterprise version.<br />
</p>]]>
	 &lt;p&gt;Posted July 19, 2006  4:39 PM by rhandir&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134296</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134296</guid>
         <pubDate>Wed, 19 Jul 2006 16:39:46 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #49 from Larry Brennan</title>
         <description>comment from Larry Brennan on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Ayse - re Phone Spam, you can register your home phone with the <a href="https://www.donotcall.gov/default.aspx" rel="nofollow">National Do Not Call Registry</a>. I used to get a lot of junk calls, now I don't.</p>

<p>YMMV, but I think it's great.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  4:49 PM by Larry Brennan&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134297</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134297</guid>
         <pubDate>Wed, 19 Jul 2006 16:49:04 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #50 from Christopher Davis</title>
         <description>comment from Christopher Davis on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>rhandir: when Mac OS X or FreeBSD become susceptible to the WMF bug, I'll worry. (There are no Windows machines involved.) The dump-bogus-extensions behavior just keeps the mail spools smaller....</p>]]>
	 &lt;p&gt;Posted July 19, 2006  4:58 PM by Christopher Davis&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134301</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134301</guid>
         <pubDate>Wed, 19 Jul 2006 16:58:38 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #51 from Lucy Kemnitzer</title>
         <description>comment from Lucy Kemnitzer on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>I got that windows "update" and it insists that our windows is pirated. It's not, not really: I mean we paid Microsoft for a new copy when the one that came with the machine, and with no backup disk available or makeable (you could only make a truncated boot disk specific to the one computer), was burnt up when the power supply went amok.  But there were installation problems and Microsoft was no help so a clever friend installed a serial number hack for us.  There is no way to prove or disprove the truth, though.</p>

<p>So we're ignoring the nagging.  We'll deal with it later if they try to melt our computer or something.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  5:43 PM by Lucy Kemnitzer&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134320</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134320</guid>
         <pubDate>Wed, 19 Jul 2006 17:43:15 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #52 from rhandir</title>
         <description>comment from rhandir on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Christopher Davis,<br />
sorry, that was my bias showing.<br />
You're right, that is an excellent way to trim the size of the mail spool. Thank God for *nix based kernels, and their general lack of undocumented "features."<br />
-r.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  5:50 PM by rhandir&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134324</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134324</guid>
         <pubDate>Wed, 19 Jul 2006 17:50:51 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #53 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>In re the Windows WMF vulnerability:  it was  really an alarming IT concern for about a week.  That's about how long it took for all the major Windows antivirus vendors to release updates that detected it. After that, it took Microsoft another few weeks (under community pressure) to release an official Windows update patch (ahead of their normal schedule).   Fortunately, the distribution curve for infected WMF files in that first week was so low that there were very few reported incidents of successful attacks.   Additionally, news networks and user-geeks spread the word about the WMF exploit all over the Internet within a day or two, thus alerting IT managers of strategies that could be employed to protect business networks.   </p>

<p>The comparitive safety that Mac and Linux users enjoy, right now, may be due in significant portion to presenting a lower profile for malware designers.  Any Mac geek can tell you that there's stuff out there aimed at OSX and Safari.  But the distribution curve for that is orders of magnitude lower than for stuff aimed at Windows and Internet Explorer.   (I know that's not the whole issue, statistically.  There are default security precautions built into Linux and OSX that aren't defaults in Windows.  This increases the attractiveness of Windows PCs to malware authors as targets.)</p>

<p>Windows PCs present a larger target and distribution vector for malware.  But the probability of being attacked by *brand new* malware that defeats all the existing countermeasures is still low enough that most individual Windows users escape each time--assuming they have the existing, recommended countermeasures installed.</p>

<p>From a serious security standpoint, I think that news networks and initially low in-the-wild distribution for malware are the only things that really safeguard large Windows networks.  Fortunately for Windows IT managers, so far, the news networks usually beat the distribution curve on the malware.  That could change. </p>]]>
	 &lt;p&gt;Posted July 19, 2006  6:01 PM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134327</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134327</guid>
         <pubDate>Wed, 19 Jul 2006 18:01:53 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #54 from joann</title>
         <description>comment from joann on 19.Jul.06</description>
         <content:encoded><![CDATA[<p><i>re Phone Spam, you can register your home phone with the National Do Not Call Registry. I used to get a lot of junk calls, now I don't.</i></p>

<p><i>YMMV, but I think it's great.</i></p>

<p>It's helpful, but not perfect. I get any number of cold calls from charitable organizations, way too many political calls, and a lot of wrong-numbers for a security firm that's one digit off from our number. None of those can be prevented by the Do Not Call thing. It is, however, extremely satisfying to be able to say to the very occasional actual violator, "Now what was your exact business name again? And your address? Ah. And you *do* realize you are in complete violation of the Do Not Call rules, seeing as how I've registered with both the state and national databases?" and then hear the "Mrrfle."</p>]]>
	 &lt;p&gt;Posted July 19, 2006  6:34 PM by joann&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134332</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134332</guid>
         <pubDate>Wed, 19 Jul 2006 18:34:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #55 from Kip W</title>
         <description>comment from Kip W on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>C.E. Petit, I was talking about something that shows up in your mailbox, not a web site you go to. And it would have the name of a publisher on it -- someone reputable, like, say, TNH.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  8:02 PM by Kip W&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134354</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134354</guid>
         <pubDate>Wed, 19 Jul 2006 20:02:23 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #56 from Magenta Griffith</title>
         <description>comment from Magenta Griffith on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Re phone spam: this is why I have an answering machine. I can listen to what the person on the other end is saying. My friends all know to start leaving a message, and I usually pick up. My mother hasn't figured this out yet, so I can avoid her if I can't deal with her at the time. Sales and political calls get recorded, and either deleted unheard, or played at my leisure. All for $30 spent several years ago.</p>

<p>I also use rotary dial phones. I don't acidentally dial people with my chin, and they last forever.</p>]]>
	 &lt;p&gt;Posted July 19, 2006  9:17 PM by Magenta Griffith&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134361</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134361</guid>
         <pubDate>Wed, 19 Jul 2006 21:17:05 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #57 from rhandir</title>
         <description>comment from rhandir on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Lenny Bailes,<br />
You said all the stuff I wanted to, but more fluently. Are you sure I'm not your psychic sockpuppet or something?</p>

<p>Everyone else,<br />
What he said.<br />
-r.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:04 PM by rhandir&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134371</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134371</guid>
         <pubDate>Wed, 19 Jul 2006 22:04:12 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #58 from Seth Breidbart</title>
         <description>comment from Seth Breidbart on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Simon, if you want bogus complaints, try running an NTP or DNS server.  ("Hey, your Port 53 is attacking me!")</p>

<p>There's a reason such complaints are referred to as "GWF".<br />
</p>]]>
	 &lt;p&gt;Posted July 19, 2006 10:59 PM by Seth Breidbart&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134382</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134382</guid>
         <pubDate>Wed, 19 Jul 2006 22:59:56 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #59 from Larry Brennan</title>
         <description>comment from Larry Brennan on 19.Jul.06</description>
         <content:encoded><![CDATA[<p>Yeah, those Port 53s are perceived as being so dangerous that it's getting hard to find an apartment where you're allowed to have one. And forget about taking them out on the street without a muzzle.</p>]]>
	 &lt;p&gt;Posted July 19, 2006 11:24 PM by Larry Brennan&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134389</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134389</guid>
         <pubDate>Wed, 19 Jul 2006 23:24:13 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #60 from Ayse</title>
         <description>comment from Ayse on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>rhandir:<br />
<i>Ayse, if you don't pick up your mail daily, some postal delivery people decide that it is an abandoned address. Filing complaints at the local post office fixes this, though catching the mail deliverer is usually simpler.</i></p>

<p>That's an excellent idea.  I will set the trap tonight.  I'm sure a simple drop-net will work well; she's kind of a slow mover.</p>

<p>...<br />
GABYAW:  I ended up filing a complaint with the postmaster a couple months ago, who gave me the inexplicable argument that the fact that I receive so little mail must mean I don't live there.  "You don't get a utility bill, so of course we assumed you had moved out," he said, as if by getting bills online I have ceased to have an earthly presence.  </p>]]>
	 &lt;p&gt;Posted July 20, 2006 12:27 AM by Ayse&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134400</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134400</guid>
         <pubDate>Thu, 20 Jul 2006 00:27:45 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #61 from Christopher Davis</title>
         <description>comment from Christopher Davis on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Seth Breidbart: my favorite was the guy who sent security@mywork a snort log showing that we were attacking him, because snort said "possible Mutated IA32 NOP Sled detected".</p>

<p>We were "attacking" him from port 80 of our web server, to some ephemeral port on his box. Gene sequence files that contain nothing but strings like "GTTTTCATTCTAAATT" look like possible attacks to spp_fnord...who knew?</p>]]>
	 &lt;p&gt;Posted July 20, 2006 12:52 AM by Christopher Davis&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134403</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134403</guid>
         <pubDate>Thu, 20 Jul 2006 00:52:41 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #62 from Larry Brennan</title>
         <description>comment from Larry Brennan on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Ayse: <i>as if by getting bills online I have ceased to have an earthly presence.</i></p>

<p>I'm reminded of the Bloom County where Oliver Wendel Jones makes his father disappear by deleting his records from the IRS database.</p>]]>
	 &lt;p&gt;Posted July 20, 2006  1:35 AM by Larry Brennan&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134407</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134407</guid>
         <pubDate>Thu, 20 Jul 2006 01:35:02 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #63 from Randolph Fritz</title>
         <description>comment from Randolph Fritz on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>For those of you who think MS Windows security is not so bad, this news today: "An online banner advertisement that ran on MySpace.com and other sites over the past week used a Windows security flaw to infect more than a million users with spyware when people merely browsed the sites with unpatched versions of Windows, according to data collected by iDefense, a Verisign company."</p>

<p>(http://blog.washingtonpost.com/securityfix/2006/07/myspace_ad_served_adware_to_mo.html)</p>

<p>First two comments on /.:</p>

<p>"Darwinism works!" "Well, it surely wasn't Intelligent Design that did it."</p>

<p>(http://it.slashdot.org/article.pl?sid=06/07/20/042253)</p>

<p>Nyah!</p>]]>
	 &lt;p&gt;Posted July 20, 2006  2:28 AM by Randolph Fritz&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134412</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134412</guid>
         <pubDate>Thu, 20 Jul 2006 02:28:48 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #64 from Andrew  Brown</title>
         <description>comment from Andrew  Brown on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>I have (touch wood) run windows 2k without a virus scanner for five years now and never been caught out. The trick is to use a good firewall (kerio personal firewall in this case) a good spam filter, and to shun Outlook and IE even if outlook is a good pim. Common sense also helps.<br />
</p>]]>
	 &lt;p&gt;Posted July 20, 2006  4:06 AM by Andrew  Brown&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134420</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134420</guid>
         <pubDate>Thu, 20 Jul 2006 04:06:31 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #65 from J Thomas</title>
         <description>comment from J Thomas on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>I am not an expert on this topic and I believe there are fewer experts than there are people who think they're experts.</p>

<p>My personal experience has been that the more free AV setups I tried out, the more viruses I found and also the more viruses I got. Some AV software is malware itself, and paying for it is no protection. </p>

<p>I eventually found a keylogger that everything had missed. I found it by monitoring my traffic.</p>

<p>I was reasonably sure there were other things I didn't find, that had replaced some essential Windows files. But I couldn't download and run the correct versions because they wouldn't let me. Or maybe I was being paranoid. But I had no good way to tell. Were the occasional inexplicable events because of somebody's backdoor, or were they just Windows?</p>

<p>It wasn't hard getting rid of the obvious stuff. But when the internet connection just slowed down, and the router indicated we were getting a whole lot of traffic that none of us noticed, and I couldn't reset the router's connections because it said I didn't have the password....</p>

<p>I switched to linux just out of FUD. My wife refuses to switch because it's too inconvenient. So OK, I run Firefox. Firefox exploits are potentially just as bad as linux exploits. Sometimes I turn the javascript plugin on. Javascript exploits are potentially as bad as linux exploits. Very occasionally I load the flash extension. Flash exploits are potentially as bad as linux exploits.</p>

<p>People send me Word documents and I try to look at them in my linux Word viewer. Sometimes they work and sometimes they don't. When they don't, is it that my Word viewer is flawed or is it that the document was infected in a way that messes up the viewer? Maybe if I had Word it would get infected but would display the document correctly anyway.</p>

<p>It's no problem to run a Windows machine and keep it going at 40% efficiency. Buy fast enough hardware and you won't notice the difference. The malware that causes you obvious problems is incompetent malware. </p>

<p>But if you want to get rid of the subtle things, the things that make some effort to hide themselves like that keylogger, you'll never know whether you got them all.</p>

<p>It's a little comfort that I can boot linux from a CD-ROM and get nothing from the hard disk until I want to. And I can re-install the OS to hard disk in 3 minutes, leaving all my data. So if I have something bad on that disk outside the OS it will only show up when I run an application from the hard disk, or when I let the OS read an updated file from the hard disk, or, well, most any time. It's a little comfort though. </p>

<p>Not like having system files that the system couldn't read the MS signature on, and download the files from MS and install them and somehow afterward the system still can't read the MS signature and the old files are back.</p>

<p>But the kids' DVDs don't work right with the current linux DVD-readers, and they complain. Some of their online games need shockwave and there isn't any. Every now and then I have a hard disk crash or something, and I have to play with the system to get it running again. (It hasn't happened since I stopped using the old hard disk, I hope it was hardware.) My wife carefully refrains from saying she told me so. Her machine with Windows has its performance degrade so gracefully that she doesn't notice. Just every now and then she notices the internet has slowed down. <br />
</p>]]>
	 &lt;p&gt;Posted July 20, 2006  8:45 AM by J Thomas&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134433</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134433</guid>
         <pubDate>Thu, 20 Jul 2006 08:45:40 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #66 from Martyn Drake</title>
         <description>comment from Martyn Drake on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Viral infections are the result of (unwillingly educated) computer users who will click on everything and anything and then after a few days wonder why their machines are so slow; and that suddenly all those pop-ups are showing up causing them much annoyance.  Even worse is that these people just ACCEPT it and close all the pop-ups and continue working - thinking "it's just one of those things".  Aghh!</p>

<p>And you'd be surprised just where the viruses are launched/ originate from. Over the recent months I've tracked down the origins of the type of virus that Theresa mentions from peers in the film industry and the advertising/PR industries.  The IT departments of those responsible for spreadng it should be shot. </p>

<p>I've given enough warning to people in my charge about opening dodgy attachments from people they do not know. The worse culprits, however, are usually our own parents (or parents in-law) in which they buy a new computer, start using it, and then find that keep getting viruses and other malware and wonder why it's happening.  You go over and spend the weekend fixing it - only for it to happen again.</p>

<p>Ironically, I've just been reading about MySpace.com with has unwittingly been responsible for dishing out malware via a SINGLE banner ad!  See the <a href="http://blog.washingtonpost.com/securityfix/2006/07/myspace_ad_served_adware_to_mo.html" rel="nofollow">Washington Post</a> for more information.</p>

<p>I'm now running OS X both at work and at home and don't have any anti-virus software.  At work we run Linux and OS X (we're a visual effects company - Linux/UNIX is King here) and those that usually have to run Windows (producers, important folk, etc.) are heavily fortified against virii and then there's the network anti-virus and firewalls on top of that.  And we do educate our users.</p>

<p>Windows is the main culprit in all of this, and if what I'm reading about Vista is true, it's really not going to get that much better.  </p>

<p>Technology (and the Internet) is wonderful, at the right hands ;)</p>]]>
	 &lt;p&gt;Posted July 20, 2006  9:25 AM by Martyn Drake&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134437</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134437</guid>
         <pubDate>Thu, 20 Jul 2006 09:25:34 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #67 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Randolph, the problem referred to in that Washington Post article is the WMF flaw that was discussed here, upstream.  I won't swear to this in blood, but I believe you can only get infected by clicking on the graphic file with Internet Explorer--under a copy of Windows that lacks either the February Microsoft security patch or a currently-updated real-time antivirus blocker. </p>

<p>I'm not trying to saying that Windows' susceptibility to vulnerabilities like this is trivial -- who knows what new flaws will be discovered, next week?  I'm only saying that this particular one is known and was neutralized for "responsible" Windows users before it had a chance to inflict much damage.  The fact that some widely-accessed websites are now infection vectors for unprepared Windows users is still a public nuisance.  Again, the news networks may be ahead of the distribution curve, as far as the number of real infection incidents experienced by end users of MySpace.  The Washington Post article doesn't have much information on that.</p>]]>
	 &lt;p&gt;Posted July 20, 2006  9:58 AM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134445</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134445</guid>
         <pubDate>Thu, 20 Jul 2006 09:58:08 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #68 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Correction to above:  unprepared Windows users can get infected simply by visiting a site that has a hacked WMF file as a banner ad with Internet Explorer.  Using Internet Explorer under Windows to visit websites that you've never been to before is not really a good idea. </p>]]>
	 &lt;p&gt;Posted July 20, 2006 10:04 AM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134446</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134446</guid>
         <pubDate>Thu, 20 Jul 2006 10:04:21 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #69 from Rob Rusick</title>
         <description>comment from Rob Rusick on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Randolph Fritz: <i>For those of you who think MS Windows security is not so bad, this news today: "An online banner advertisement that ran on MySpace.com and other sites over the past week used a Windows security flaw to infect more than a million users with spyware when people merely browsed the sites with unpatched versions of Windows, according to data collected by iDefense, a Verisign company."</i></p>

<p><i>Link to Washington Post <a href="http://blog.washingtonpost.com/securityfix/2006/07/myspace_ad_served_adware_to_mo.html" rel="nofollow">Windows WMF exploit article</a> by Brian Krebs.</i></p>

<p>I wasn't (<i>very</i>) worried about the Windows WMF exploit; we have automated Windows patching running on our XP and Win2000 machines, and <b>AVG</b> too. </p>

<p>Don't know whether anti-virus would have helped in that instance, but it shouldn't hurt. <b>J Thomas</b> is right to warn that some anti-virus apps are malware in disguise, but <a href="http://free.grisoft.com/doc/1" rel="nofollow">AVG</a> has a good rep, so I'm trusting it (<i>so far</i>). It also has a system of automatic updates.</p>

<p>But <a href="http://blog.washingtonpost.com/securityfix/2006/07/macromedia_flash_update_prompt.html" rel="nofollow">this article</a> by Brian Krebs was the first I'd heard of a Flash exploit, and (<i>as described in one of the articles</i>) Flash does not have a system of automated patches. Apparently this security hole has already been used (<i>also on MySpace sites</i>) <a href="http://blog.washingtonpost.com/securityfix/2006/07/myspace_pages_defaced_using_fl.html" rel="nofollow">to spread a worm</a>.</p>

<p>After reading that, I had to spend some time making sure that both Firefox and IE had this patch installed on all the machines used here (<i>fortunately, a <b>small</b> lab</i>).</p>

<p>AFAIK, Linux and Mac machines would also have been vulnerable to this Flash hack.</p>

<p>You can take that last statement with a grain of salt; I am not an expert in computer security, and don't aspire to become one.</p>]]>
	 &lt;p&gt;Posted July 20, 2006 10:38 AM by Rob Rusick&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134452</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134452</guid>
         <pubDate>Thu, 20 Jul 2006 10:38:50 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #70 from Randolph Fritz</title>
         <description>comment from Randolph Fritz on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>"Viral infections are the result of (unwillingly educated) computer users who will click on everything "</p>

<p>Or just don't download the huge number of patches that MS puts out.  Or use legitimate documents that happen to be infested.</p>

<p>The bridge fell down because you walked on it--it's your fault.  Feh.  I'm outta this one!</p>]]>
	 &lt;p&gt;Posted July 20, 2006 10:56 AM by Randolph Fritz&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134454</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134454</guid>
         <pubDate>Thu, 20 Jul 2006 10:56:33 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #71 from Skwid</title>
         <description>comment from Skwid on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>99.9% of malware can be easily avoided by the combination of a hardware router, a software firewall, and non-MS Mail and Browser apps.</p>

<p>And Mike is wrong in one aspect about how this is almost certainly Outlook's fault: most viruses of the sort that harvest addresses for spoofing and destinations target the Outlook address book.  Use of a non-Outlook address book would probably have prevented this.</p>]]>
	 &lt;p&gt;Posted July 20, 2006 11:43 AM by Skwid&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134467</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134467</guid>
         <pubDate>Thu, 20 Jul 2006 11:43:24 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #72 from Christopher Davis</title>
         <description>comment from Christopher Davis on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Rob Rusick: <i>AFAIK, Linux and Mac machines would also have been vulnerable to this Flash hack.</i></p>

<p>Yup. Apple shipped an updated Flash player in Security Update 2006-003. Macs aren't magically immune by a long shot.</p>]]>
	 &lt;p&gt;Posted July 20, 2006 12:10 PM by Christopher Davis&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134477</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134477</guid>
         <pubDate>Thu, 20 Jul 2006 12:10:09 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #73 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Randolph (if you're still reading): I sympathize with your basic irritation at Windows.</p>

<p>It wouldn't displease me, if someone succeeded in slapping Microsoft with a class action suit, indemnifying them for any and all documented claims by Windows or non-Windows users of financial damage traceable to the WMF flaw in unpatched user copies of Windows.   (And while they're at it, compel Microsoft to pay for a mass mailing to all registered Windows users, informing them that *unpatched versions aren't safe.*)<br />
</p>]]>
	 &lt;p&gt;Posted July 20, 2006 12:24 PM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134482</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134482</guid>
         <pubDate>Thu, 20 Jul 2006 12:24:59 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #74 from J Thomas</title>
         <description>comment from J Thomas on 20.Jul.06</description>
         <content:encoded><![CDATA[<p><b>99.9% of malware can be easily avoided by the combination of a hardware router, a software firewall, and non-MS Mail and Browser apps.</b></p>

<p>This reminds me of a discussion I used to occasionally have with caving buddies, which went "There are 5000 known caves in georgia. how many unknown caves are there?" </p>

<p>There was a related question that actually had a statistical answer. There were a number of known caves with 6 entrances, and a number with 5, and 4, and 3, and so on, and that fit a poisson distribution so you could reasonably estimate the number of caves with zero entrances.</p>

<p>I'd figure that smart crackers would have learned by now. Make something that infects a computer and immediately starts making millions of calls to every computer it can find, and it will spread pretty fast for a little while and then it will stumble over somebody who's ready for it, it gets reported and a fix is put out, and very soon it turns into just an annoyance, a few copies will be making millions of calls that mostly don't get anywhere.</p>

<p>Far better to spread carefully. Infect one machine, have it call home. Upload a collection of tools that will call home occasionally, that are very hard to get rid of. Don't call attention to yourself. Check which AV software is present and don't upload anything that isn't resistant to that software. Why get a million computers to do something stupid for a few days when you can have ten thousand for as long as you want? </p>

<p>If you find out about an intrusive virus spreading, you might do what you can to protect your machines. Ideally you'd want the nominal owners to think they've never gotten a virus and they don't really need protection. But their machines are 100% working for you while their users aren't using them, and 10% working for you when they are.</p>

<p>If a virus preferentially spreads to people who don't have sophisticated defenses, why would it be discovered at all?</p>

<p>Oh well. I downloaded Antivir for linux today after Lenny recommended it. I'd used Antivir for Windows and liked it, although some experts complained about it calling home too much etc. But it insists on installing in /usr/lib and that's read-only on my system, even for root. I'll have to burn a new CD. before I can try it.<br />
</p>]]>
	 &lt;p&gt;Posted July 20, 2006  1:14 PM by J Thomas&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134496</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134496</guid>
         <pubDate>Thu, 20 Jul 2006 13:14:21 -0500</pubDate>
      </item>
      
      <item>
         <title>Spoofed -- comment #75 from Lenny Bailes</title>
         <description>comment from Lenny Bailes on 20.Jul.06</description>
         <content:encoded><![CDATA[<p>Indemnify Microsoft ==> substitute: "compel them to compensate plaintiffs."  I always get the meaning of "indemnify" backwards until I look it up--possibly because my brain associates it with "damn."</p>]]>
	 &lt;p&gt;Posted July 20, 2006  4:59 PM by Lenny Bailes&lt;/p&gt;</content:encoded>
         <link>http://nielsenhayden.com/makinglight/archives/007752.html#134547</link>
         <guid isPermaLink="true">http://nielsenhayden.com/makinglight/archives/007752.html#134547</guid>
         <pubDate>Thu, 20 Jul 2006 16:59:25 -0500</pubDate>
      </item>
      
   </channel>
</rss>