Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Education

Journal Saint Aardvark's Journal: Bagle.J 4

Follow the bouncing ball, boys and girls:

A checks an offsite webmail account using Internet Explorer. Within his Inbox he finds an email from staff@[whatever].com explaining that his account has been sending viruses, and that he should use the attached, compressed, password-protected virus scanner to scan his computer. He downloads the attachment, unzips it, and provides the password.

B checks his work mail account using Outlook Express. He finds an email from support@[work].com explaining that the mail server will be shut down for two hours, and he should use the enclosed, compressed, password-protected backup utility to save his email. He unzips the attachment and provides the password.

C is assembling a computer for a new hire when fellow staff member D alerts him to an email he's just received with a virus within. C has looked at the combination of MIMEDefang and ClamAV earlier today, and discovered that ClamAV's signature for this virus depends upon the entire message for efficacy. However, MIMEDefang by design passes separate attachments, one at a time, to ClamAV. He's had a look at it and decided that this will take time that he doesn't have right now, since there's a new guy starting on Monday whose computer has not yet been assembled.

C explains to D the situation. D explains that the headers for the email point to someone within the work LAN. C is doubtful but asks D to forward the messages. Upon checking them using Mutt, mail client of the elder gods, he finds out that D is correct, and runs off to disconnect the virus-infected machine from the LAN.

E opens his work email account using Outlook Express. He finds an email from support@[work].com explaining that there will be a two-hour outage. The style of writing being similar to the sysadmin's, he opens the enclosed, compressed, password-protected zip file.

C, having set up a virus scanner on B's computer, comes back to find similar viruses in Mutt from E. He races off to disconnect E from the network. Upon checking the email headers in the message E got, he finds A's computer mentioned. He disconnects A's computer for good measure, and alerts the rest of the staff as patiently as possible that he rarely sends helpful tools around using password-protected zip files.

This discussion has been archived. No new comments can be posted.

Bagle.J

Comments Filter:

Logic is a pretty flower that smells bad.

Working...