Email viruses - Page 2
Page 2 of 2 FirstFirst 12
Results 11 to 18 of 18

Thread: Email viruses

  1. #11
    In short- dont download stuff you aren't expecting, Update everything regulary AntiV, op sys, Turn off preview/view as webpage options in your email software, and dont read obvious spam.

  2. #12
    Banned
    Join Date
    Apr 2003
    Posts
    1,147

    Unhappy

    wow...its going to take me 3 hours to open an email if i have to check for all of that shiznit that you all posted above!
    Actually, your anti-virus program will perform a lot of those tasks if it is up to snuff.

    Symantec and McAfee both will scan the mail on the way in and on the way out, and they will protect you from the majority of the problems. They won't protect you from yourself. That's up to you.


  3. #13
    rebmeM roineS enilnOitnA steve.milner's Avatar
    Join Date
    Jul 2003
    Posts
    1,018
    To make life simpler you could only accept mail in plain text.

    If you are using outlook I'm sure you can set up the filters to remove HTML and all file attachments

    Then, if you need someone to send you a file you can arrange it with them and add a filter for their name that allows the file through, and the remove it afterwards.

    HTH
    Steve
    IT, e-commerce, Retail, Programme & Project Management, EPoS, Supply Chain and Logistic Services. Yorkshire. http://www.bigi.uk.com

  4. #14
    Banned
    Join Date
    Oct 2003
    Posts
    170
    wow...thnx guys

  5. #15
    Junior Member
    Join Date
    Apr 2004
    Posts
    10

    Post

    All I have to say here is just one of my rules (Rule no. 11) :" Prepare your computer for the a specific purpose and not for a general one"

    This is just to say that I make use of different machines, for instance, for programming and developing stuff I have a computer for such operations.
    For testing the strengths of malicious codes/scripts (viruses in this case) I have another one (specifically designed, administered, and modified for such tasks)

    If for ****my private data***, I have one that never go online or on a network.

    Well, it all depends on you. Note as far as security is concerned, never depend on say antiviruses, security experts....just make sure that you run programs on a computer mearnt just for it!
    HackerFromHeaven ,
    The Anti-Hacker...http://www.geocities.com/hacker4heaven

  6. #16
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,192
    Hi Intellihacker,

    I would firstly like to point out that this is a very old thread...........if the date at the top flashes, this tells you

    Secondly, you are quite correct.............I agree entirely, and have said so a number of times: I work this way:

    1. "labrat" a laboratory rat machine.........for any experimentation..........be prepared with a mirror..........you will be formatting and re-installing a lot............in fact you SHOULD do this to get a valid test environment each time?.......you need several of these with different operating systems.

    2. "ARV" armoured reconnaisance vehicle..........to go to bad places or examine bad stuff..........all the defence mechanisms that you have on this one

    3. "Reference Box" this has a mirror of various user departments' systems and is used to verify updates and new software compatibility.

    4. "sheep dip" This is purely a malware detection box..............full range of malware detection software on this one.

    5. "sacrificial goat" this is a deliberately weak and unprotected machine, so that you can trace what happens when something bad gets loose.

    6. "normal machine" this is what you use for your day-to-day activities.

    7. "game box".........could be merged with #6? but you do need the better components.

    8. "Museum" old stuff that people give you.......very useful for showing youngsters what things were like back then................?


    Well, that's the way I look at it

    Cheers
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

  7. #17
    Senior Member therenegade's Avatar
    Join Date
    Apr 2003
    Posts
    400
    kinda paranoid dont you think tho nihil?I mean..8 machines?(or atleast 7)?makes for difficult buying if you're low on cash lol..but yes...the idea's fundamentally sound

  8. #18
    The Doctor Und3ertak3r's Avatar
    Join Date
    Apr 2002
    Posts
    2,744
    8. "Museum" old stuff that people give you.......very useful for showing youngsters what things were like back then................?
    Interesting you say that.. I have a 2Mhz Z80 C/PM box that I am trying (for the past year as time permitts) to give access via a 486 dos/win3.1 box to my network.. this is more for file storage.. .. The problem is when ever i stsrt to work on this project all I can do is remember the phreaking (old) days..


    BTW therenegade, give it a couple of years, and a collection builds up.. besides what I use for repair work and training, I have two cel 400's on Seti@home, 4 more pIII -600-800's on BOINC/S@H and a box each for RH9 and Slackware9.. ALL of these as well as the Crash test dummy, and the "file recovery" box were all built from recovered parts from dead or written off machines.. (bigest hassel here is getting a good Mobo and CPU).

    cheers
    "Consumer technology now exceeds the average persons ability to comprehend how to use it..give up hope of them being able to understand how it works." - Me http://www.cybercrypt.co.nr

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides