× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: IMPORTANT Update regarding Love Bug and Related Viruses
  • From: "oludare" <oludare@xxxxxxxxxxxxx>
  • Date: Mon, 8 May 2000 13:36:14 -0400
  • Organization: None

Thanks David.

Dare

----- Original Message -----
From: "David Shea" <dshea@arctools.com>
To: <BPCS-L@midrange.com>
Sent: Monday, May 08, 2000 11:26 AM
Subject: IMPORTANT Update regarding Love Bug and Related Viruses


> I know this is way off topic, but it's obviously very important.  The Love
> Bug and it's variants (including _future_ variations) can be beaten by
> disabling the Windows Scripting Host, a very non-essential option in IE5.
> Please read the message below for more details.  I apologize if anyone
gets
> annoyed about my sending this to this list, but I have YET to see any of
> these so-called 'experts' from McAfee, Symantec, etc that have been all
over
> the Today show, etc discuss how easy it is to stop this thing dead in it's
> tracks.  In my opinion, this disaster is largely Micro$oft's fault for
> leaving the 'loaded gun' on the table.  Perhaps you'll agree with me after
> reading the info below.  MS's official position is 'not our fault - people
> shouldn't open attachments like that'.  Duh.
>
>
> > I want to summarize the current status of the 'love bug' and its related
> > variants.  Please read this entire message.  It includes instructions
for
> > protecting your home computers.  Please print this message and take it
> home
> > with you.
> >
> > This 'love bug' virus was obviously very effective and destructive.
There
> > are at least 8 known variants on this bug that are traveling around the
> > internet.  Some of them are far more destructive than the original.
There
> > are two ways to protect yourself from this virus:
> >
> > 1. constantly upgrade our virus protection software to prevent the
> > message from getting in.
> > 2. disable the Windows feature that allows this virus to spread.
> >
> > With each of these variants, an update to our virus protection software
is
> > required in order to stop the incoming message at the Exchange server.
> This
> > is obviously inefficient, since this virus is easily modified and
> > re-distributed.  It also takes time for the software company to create
the
> > 'innoculation', and the download and installation process is manual.
So,
> > there's a window of opportunity for each new variant to do its thing.
> Since
> > Thursday, I have downloaded several updates already.  The actual source
> code
> > for the virus is contained in each copy of the virus, so it's fairly
easy
> > for hackers to 'enhance' this virus and repeat the process.
> >
> > My preferred approach to stopping this virus is to disable the windows
> > feature that allowed this disaster to occur in the first place.  A
feature
> > called the Windows Scripting Host is what makes this virus possible (and
> SO
> > powerful).  This feature is like a Macro language for Windows.  It
allows
> > you to automate things across applications.  So, where Melissa used the
> Word
> > Macro feature to distribute itself, this thing uses the Windows
Scripting
> > Host.  Word and Excel have warnings that come up when you open a
document
> or
> > spreadsheet containing a macro.  So, even if you had no virus protection
> and
> > a Melissa infected document came to you, you would see a warning along
the
> > lines of:
> >
> > "This document contains macros.  Macros can contain viruses.
> > Do you want to disable the macros before opening this file..."
> >
> > So, at least you get one last warning before disaster strikes.
> >
> > The Windows Scripting Host (WSH) has no such warning feature.  It just
> GOES.
> > Since this is a feature of Internet Explorer 5, WSH is automatically
> > included with Win 98 and Windows 2000.  To make things worse, WSH is
> turned
> > on by default.  So... any machine running Win98 or Win2000, or any
machine
> > with Internet Explorer 5 installed has perhaps a 99% chance of be set up
> to
> > propogate this virus AUTOMATICALLY.  This particular virus does also
> > requires Outlook to be installed.
> >
> > The fact that Microsoft decided to turn this feature on by default is,
in
> my
> > opinion, a HUGE mistake by Microsoft.  This feature is powerful, very
> > dangerous, and VERY RARELY NEEDED.  I would be surprised if one in a
> hundred
> > people actually need this feature.  It should either include warning
> > features like Word and Excel, or should require the user to conciously
> turn
> > the feature on.  Had this feature not been the default setting, this
> > multi-billion dollar global DISASTER would have been just another
largely
> > unnoticed annoyance.
> >
> > So - here's how to disable this feature on your PC.  If you ever find
that
> > you need this feature at some point in the future, it is an option
setting
> > in Windows 98 and above, and if you're running Win95 you can simply
> > re-install Internet Explorer 5.  Be aware that if you ever install a new
> > version of Internet Explorer, you should do the steps below again to
shut
> > off this feature.  This procedure will disable the WSH, so even if you
> were
> > to click on the attachment, the virus program would not run.
> >
> > If you are running Windows 95:
> >
> > 1. click on Start
> > 2. click on programs
> > 3. click on MS-DOS Prompt
> > 4. at the C: prompt, type  REN C:\WINDOWS\WSCRIPT.EXE WSCRIPT.XXX
> > 5. if you get a 'file not found' error, then you are safe - you don't
> > have the feature installed
> > 6. type EXIT
> >
> > If you are running Windows 98 (and maybe Win2000):
> >
> > 1. Close all applications on your machine.
> > 2. Click on Start
> > 3. Click on Settings
> > 4. Click on Control Panel
> > 5. Click on Add/Remove Progams.
> > 6. Click on the Windows Setup tab.
> > 7. Double click on Accessories.
> > 8. Scroll down to the bottom of the list.
> > 9. UNCHECK Windows Scripting Host.  If you don't see an item for
> > Windows Scripting Host, try the Win95 procedure (above) just to be safe.
> > 10. Click on OK.
> > 11. Click on OK again.
> > 12. Shut down and reboot your machine.
> >
> > If you are running Windows NT4:
> >
> > 1. Log on to your machine as a user with Administrator rights
> > 2. click on Start
> > 3. click on programs
> > 4. click on MS-DOS Prompt
> > 5. at the C: prompt, type  REN C:\WINNT\SYSTEM32\WSCRIPT.EXE
> > WSCRIPT.XXX
> > 6. if you get a 'file not found' error, then you don't have the feature
> > installed and you should be safe.
> > 7. type EXIT
> >
> > If you don't have virus protection on your home PC, or if you don't
update
> > it regularly (at least monthly), you're playing Russian Roulette.
>
> +---
> | This is the BPCS Users Mailing List!
> | To submit a new message, send your mail to BPCS-L@midrange.com.
> | To subscribe to this list send email to BPCS-L-SUB@midrange.com.
> | To unsubscribe from this list send email to BPCS-L-UNSUB@midrange.com.
> | Questions should be directed to the list owner: dasmussen@aol.com
> +---

+---
| This is the BPCS Users Mailing List!
| To submit a new message, send your mail to BPCS-L@midrange.com.
| To subscribe to this list send email to BPCS-L-SUB@midrange.com.
| To unsubscribe from this list send email to BPCS-L-UNSUB@midrange.com.
| Questions should be directed to the list owner: dasmussen@aol.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.