[26729] in North American Network Operators' Group
Re: Shock news - NANOG likely to carry less operational content
daemon@ATHENA.MIT.EDU (Chris Josephes)
Fri Jan 14 14:14:49 2000
Date: Fri, 14 Jan 2000 13:12:09 -0600 (CST)
From: Chris Josephes <cjoseph@mr.net>
To: Alex Bligh <amb@gxn.net>
Cc: Kai Schlichting <kai@pac-rim.net>, nanog@merit.edu
In-Reply-To: <E129BSR-0004dK-00@sapphire.noc.gxn.net>
Message-ID: <Pine.GSO.4.02.10001141307250.2092-100000@riogrande.mr.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
On Fri, 14 Jan 2000, Alex Bligh wrote:
>
>
> > I never received any of those mailings. Never ever.
> > Are specific people being targeted?
>
> Has anyone virus checked these for worms? I care not, reading
> email on UNIX, but I suspect that's the cause of it. Possibly
> some innocent(s) on NANOG has an infected Windows machine
> that is spewing using an address book built from mails
> it has received - & you see more than one source as some
> people have now run the program.
FWIW,
I received an email from a Windowz machine spread from a virus a while
back. The behavior of the virus and the headers of the message suggested
that for every message in the affected user's inbox, the virus would
create a new message with the From: and To: headers transposed, and send
it back to the originator.
So, only people that posted to Nanog would get this from infected
machines.
-- _______________
Chris Josephes __/ MRNet/Onvoy \
chrisj@mr.net __/ www.onvoy.com /
\________________/