next message in archive
no next message in thread
previous message in archive
Index of Subjects
This is a multi-part message in MIME format. --------------07C06D84589ED11044EED1D8 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit -- Michael W. Posluns, The StillWaters Group, First Nations Relations & Public Policy. Please note new address: mposluns@accglobal.net Phone 416 656-8613 Fax 416 656-2715 36 Lauder Avenue, Toronto, Ontario, M6H 3E3. We offer Canadian parliamentary debates by topics and bills. --------------07C06D84589ED11044EED1D8 Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Return-path: <WordStar-request@cue.com> Envelope-to: MPosluns@accglobal.net Delivery-date: Sun, 28 Mar 1999 21:11:42 -0500 Received: from oolaa.cuenet.com ([207.104.7.119]) by mail2.tor.accglobal.net with esmtp (Exim 2.11 #1) id 10RRWf-0004Et-02 for MPosluns@accglobal.net; Sun, 28 Mar 1999 21:11:42 -0500 Received: (from lists@localhost) by oolaa.cuenet.com (8.9.3/8.9.0) id SAA22047; Sun, 28 Mar 1999 18:13:33 -0800 Resent-Date: Sun, 28 Mar 1999 18:13:33 -0800 Message-ID: <00a101be7989$39e45ba0$1914fea9@concentric.net> Reply-To: "John Logreco" <jonl722@concentric.net> From: "John Logreco" <jonl722@concentric.net> To: "AWordStar" <wordstar@cue.com> Subject: Another virus hoax? Date: Sun, 28 Mar 1999 17:39:51 -0800 MIME-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2014.211 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2014.211 Resent-Message-ID: <"dvWzgB.A.bYF.MHu_2"@oolaa> Resent-From: WordStar@cue.com X-Mailing-List: <WordStar@cue.com> archive/latest/6887 X-Loop: WordStar@cue.com Precedence: list Resent-Sender: WordStar-request@cue.com Resent-Bcc: [Below sent to me by Bennie -- hoax or what?] JL got this Kfwb web-site Bennie A new computer virus can allow documents to be e-mailed to other people without warning, a potential security breach. The "Melissa macro" or W97M_Melissa virus spreads via infected e-mail and attacks computers loaded with Microsoft's widely used Word 97 or Word 2000 programs, according to CERT -- or Computer Emergency Response Team -- Carnegie Mellon's Department of Defense-funded computer security team. CERT first heard of the virus Friday. The virus reproduces and sends so much unwanted e-mail that the volume can overload some mail servers, the computers that distribute e-mail. However, it apparently causes no direct damage to a computer's memory or programs. CERT information about the Melissa virus is available on the Web. Here is a Microsoft patch. ---End--- Dont see any patches. John Logreco --------------07C06D84589ED11044EED1D8--
next message in archive
no next message in thread
previous message in archive
Index of Subjects