"Michael M. Butler" wrote:
> FYI to the list: it might be making the rounds again. Don't open .exe
> attachments from anyone you wouldn't accept a transfusion from... :| :)
I don't know, I always open .exe attachements. Unfortunately, they don't
run on my system ;P
As to authentication by sender, that's bogus, as many worms send themselves
on automatically, and morever, headers are easily forged, so ackphtphtphtpht.
I suggest using a mailer written in a buffer-overrun-free language, running
on an OS with decent security, and accept only executables from a trusted
source, as verified by having a good signature. Though a worm could snarf a
PGP/GPG passphrase, that threat model is strictly theoretical.
This archive was generated by hypermail 2b30 : Mon May 28 2001 - 09:59:39 MDT