{"id":1837,"date":"2004-03-02T20:45:31","date_gmt":"2004-03-03T04:45:31","guid":{"rendered":"http:\/\/www.kith.org\/journals\/jed\/2004\/03\/02\/1837.html"},"modified":"2004-03-02T20:45:31","modified_gmt":"2004-03-03T04:45:31","slug":"important-notify-about-your-em","status":"publish","type":"post","link":"https:\/\/www.kith.org\/jed\/2004\/03\/02\/important-notify-about-your-em\/","title":{"rendered":"Important notify about your e-mail account"},"content":{"rendered":"\n<p>The emails you're getting with the above subject line?  The ones that appear to come from your system administrator?  They're fakes.<\/p>\n<p>The attachments contain a worm (like a virus) called <a href=\"http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.beagle.j@mm.html\">W32.Beagle.J<\/a>. Don't open the attachments.<\/p>\n<p>More generally: if you get an email you're not expecting, and it has an attachment, be very suspicious.  If the attachment is a .pif, .exe, .scr, .cmd, .bat, or .zip file, be extremely suspicious.  Never open such attachments unless you're quite certain they're not viruses.<\/p>\n<p>The latest set of viruses (and there've been a bunch of these lately) all have one thing in common: they attempt to fool you into opening an attachment.  They do this by claiming to be bouncing mail (MyDoom), or by insulting you (Netsky.D), or by claiming you're a spammer (Beagle.J), or by any other means the virus writers can come up with.  As ballot measure arguments like to say: Don't be fooled!<\/p>\n<p>(If you're on a Mac or UNIX, this is much less of a big deal than if you're on Windows.  But you should still be wary of opening unexpected attachments.)<\/p>\n<p>Oddly, this virus apparently takes the trouble to fake both the From line and the Return-Path line as different addresses.  Weird.  Anyway, as with most such viruses, you can't assume that the message really came from who it claims to have come from.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>The emails you&#8217;re getting with the above subject line? The ones that appear to come from your system administrator? They&#8217;re&#8230;<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1837","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/posts\/1837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/comments?post=1837"}],"version-history":[{"count":0,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/posts\/1837\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/media?parent=1837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/categories?post=1837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/tags?post=1837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}