question

W

W. K. Mahler

question


if your personal life has something conflicting and then you are expecting
results from your own efforts in life,
if you have been expecting a document of any kind via email and then it
seems that your antivirus comes up
with an infected document, then what?

my question is, if netsky was the virus that came in, you found that the
file was labled a .exe but yet
you could rename it to .rtf and it would be an .rtf yet you could not
execute it for the antivirus said it was a virus,
was it really a virus or but a way of saying 'cause there is confliction in
your life, those keywords like "your name"
or "contract" are targeted by the antivirus for it is catered to your
personal and or professional life , what can you do?
if the sender did not send you a virus at all, proof positive the sender has
no virus outgoing or in their system, the email
gets to you unhindered except by the antivirus, what can you do?
you go out saying this or that about your circumstances in your life, work
to attain living and or working with those
you have and have not confliction with, wonder why the internet has not been
a direct financial boon for you, is it because
the "big brother" (for lack of better word) or your inner conience is
looking out for you, your interests until the resolve
to your course in life is decided by you, you keep getting those emails that
had no virus until the antivirus made it so.
what do you do?
call someone? the sender?

this opens up a plethora of questions.

in todays age, that person might be on the other side of the world and might
not believe you are you over the phone, video conference
etc simply cause the ability to copy someone is that easy. could be next
door too, its that easy.
yet the simplicity of emial knowing that it is sent to and fro with some
sense of traceability is so easy to work with.
regular mail can be opened and sealed, sent elsewhere.
what can you do?

all i know is that for sure, im not the only person asking this same
question

wondering why it is so many have yet to get out of that economic standstill,
that personal standstill..

what can you do?

remove the antivirus?



.....seriously...


william k.mahler
www.mahlers.com
 
D

David W. Hodgins

if you have been expecting a document of any kind via email and then it
seems that your antivirus comes up
with an infected document, then what?
my question is, if netsky was the virus that came in, you found that the
file was labled a .exe but yet
you could rename it to .rtf and it would be an .rtf yet you could not
execute it for the antivirus said it was a virus,

Don't open the file by double clicking it. Use the open file function in
a text only viewer, or better yet, a hex editor.
was it really a virus or but a way of saying 'cause there is confliction in
your life, those keywords like "your name"
or "contract" are targeted by the antivirus for it is catered to your
personal and or professional life , what can you do?

It depends on how much you want to see the document. Normally, documents
are not sent as executable files. If attempts to view the file using a text only
viewer, or a hex editor, didn't work, I'd either ask the sender to resend it,
as a text only document, or try running the executable on a computer that
is not connected to the net, or a lan, and reformat the hard drive, after extracting
the document.
if the sender did not send you a virus at all, proof positive the sender has
no virus outgoing or in their system, the email
gets to you unhindered except by the antivirus, what can you do?

As above, if a document is stored in an executable file, either use a viewer
that will not execute it, or execute it on a "safe" computer, where any damage
can be undone, by a simple reformat/reinstall.

what can you do?

Learn safe hex.

You seem to understand the problem, which is the first step toward being
able to avoid having your computer get infected. Safe hex basically means
you don't let your computer execute anything that comes from an untrusted
source. See http://www.claymania.com/safe-hex.html for some starting
information.

Regards, Dave Hodgins
 
F

FromTheRafters

W. K. Mahler said:

I'll try to answer.
if your personal life has something conflicting and then you are expecting
results from your own efforts in life,
if you have been expecting a document of any kind via email and then it
seems that your antivirus comes up
with an infected document, then what?

Have the file scanned by other scanners to help you to determine if it is
a false positive detection on a legitimate (expected) attached document.
Without some foreknowledge of what a malware "looks like" it is unlikely
that you could figure it out for yourself. If you have the ability to determine
what it *really* is just by looking at it - look at it with an editor program.
my question is, if netsky was the virus that came in, you found that the
file was labled a .exe

If you weren't expecting an executable program, then it is probably, indeed,
the malware that the AV alerted to.
but yet you could rename it to .rtf and it would be an .rtf

Renaming a file does not change anything but the name. The OS does
sometimes make assumptions about what a file is by the name it has
however. Changing from .exe. to .rtf may make it difficult to for you to
execute it, but it is not impossible. It is better to use the editor program
to open the file than it is to rely on the OS to make a proper association
based on the name's extension.
yet you could not execute it

With .exe and .rtf as examples, it would probably be difficult to execute
the malware using such a scheme - but not impossible. Using .doc and
..rtf as examples is quite a different matter. Even renaming some .doc's to
..xxx or any unregistered (or perhaps missing) extension could result in
malware execution when 'double-clicked'. Using an editor to open the
file and not relying on the OS's filetype association (by extension) is by
far safer than double-clicking on a suspect file's icon.
for the antivirus said it was a virus, was it really a virus or but a way of
saying 'cause there is confliction in your life, those keywords like "your
name" or "contract" are targeted by the antivirus for it is catered to your
personal and or professional life , what can you do?

Sorry, you lost me there...
if the sender did not send you a virus at all, proof positive the sender has
no virus outgoing or in their system, the email gets to you unhindered except
by the antivirus, what can you do?

The purported sender of the attachment usually isn't the actual sender
of the attachment, so your "proof positive" isn't worth much. Unless
you knew how to find the *real* sender and ascertain that that real
sender's computer is indeed clean - you can't rely on "proof". If my
system sends you a malware e-mail and pretends to be from your
lawyer, finding your lawyer's computer free of malware is no indication
that it is safe to execute the malware on your machine.
you go out saying this or that about your circumstances in your life, work
to attain living and or working with those
you have and have not confliction with, wonder why the internet has not been
a direct financial boon for you, is it because
the "big brother" (for lack of better word) or your inner conience is
looking out for you, your interests until the resolve
to your course in life is decided by you, you keep getting those emails that
had no virus until the antivirus made it so.
what do you do?
call someone? the sender?

Are you getting inundated with such e-mails? Perhaps you could filter
them out somehow?
this opens up a plethora of questions.

in todays age, that person might be on the other side of the world and might
not believe you are you over the phone, video conference
etc simply cause the ability to copy someone is that easy. could be next
door too, its that easy.

PGP is (as the full name would indicate) pretty good. You can authenticate
that a recieved e-mail actually came from a person with the correct key set.
yet the simplicity of emial knowing that it is sent to and fro with some
sense of traceability is so easy to work with.

....but not as traceable as it at first seems.
regular mail can be opened and sealed, sent elsewhere.
what can you do?

E-mail can be sent from remotely accessed machines too. Some spam
e-mails are actually sent from the compromised machines of unaware
users.
all i know is that for sure, im not the only person asking this same
question

What question? Are you saying it is a productivity issue to be getting
flooded by virus ridden e-mails - and having your AV jump up and
down *each* and *every* time one arrives?
wondering why it is so many have yet to get out of that economic standstill,
that personal standstill..

what can you do?

remove the antivirus?

Set it to silently quarantine what it finds (if that option is available),
or use a filter that stops the e-mails from getting to the point where
the AV can see them. Some filters can delete the e-mail from the
server so that you won't even have to download them.
 
W

W. K. Mahler

FromTheRafters said:
I'll try to answer.


Have the file scanned by other scanners to help you to determine if it is
a false positive detection on a legitimate (expected) attached document.
Without some foreknowledge of what a malware "looks like" it is unlikely
that you could figure it out for yourself. If you have the ability to determine
what it *really* is just by looking at it - look at it with an editor program.

If you weren't expecting an executable program, then it is probably, indeed,
the malware that the AV alerted to.


Renaming a file does not change anything but the name. The OS does
sometimes make assumptions about what a file is by the name it has
however. Changing from .exe. to .rtf may make it difficult to for you to
execute it, but it is not impossible. It is better to use the editor program
to open the file than it is to rely on the OS to make a proper association
based on the name's extension.


With .exe and .rtf as examples, it would probably be difficult to execute
the malware using such a scheme - but not impossible. Using .doc and
.rtf as examples is quite a different matter. Even renaming some .doc's to
.xxx or any unregistered (or perhaps missing) extension could result in
malware execution when 'double-clicked'. Using an editor to open the
file and not relying on the OS's filetype association (by extension) is by
far safer than double-clicking on a suspect file's icon.


Sorry, you lost me there...


The purported sender of the attachment usually isn't the actual sender
of the attachment, so your "proof positive" isn't worth much. Unless
you knew how to find the *real* sender and ascertain that that real
sender's computer is indeed clean - you can't rely on "proof". If my
system sends you a malware e-mail and pretends to be from your
lawyer, finding your lawyer's computer free of malware is no indication
that it is safe to execute the malware on your machine.


Are you getting inundated with such e-mails? Perhaps you could filter
them out somehow?


PGP is (as the full name would indicate) pretty good. You can authenticate
that a recieved e-mail actually came from a person with the correct key set.

...but not as traceable as it at first seems.


E-mail can be sent from remotely accessed machines too. Some spam
e-mails are actually sent from the compromised machines of unaware
users.


What question? Are you saying it is a productivity issue to be getting
flooded by virus ridden e-mails - and having your AV jump up and
down *each* and *every* time one arrives?


Set it to silently quarantine what it finds (if that option is available),
or use a filter that stops the e-mails from getting to the point where
the AV can see them. Some filters can delete the e-mail from the
server so that you won't even have to download them.


ya know the idea of pretty good protection, great and all


yet the virus itself, considered an attack, not a peaceful way of
communication so overlooked
but an attack, to destroy your computer, your efforts
or is it so
how bout another way of attention to a new way of communication, a better os
remember bread and mold? ya wouldn 't eat that stuff but someone made
penicillin out of it.
yet at the same time, the new communication, the bread/mold to penicilliin
mental health, the perceived illness by someone else, the virus itself
the fix
when in itself, the perception of illness for other means have and have not
been tried
like instead of the assumption of illness, how bout that assumed ill is
quite fine
yet after awhile, the daily assumptions, determiniations back and forth with
the
im not ill
it adds up as if it aint all going to stop
but then the realization that computers, communication, viruses, illnesses
or no illnesses
its what its all about..

still

your making good sense


but isn't that all like what made "hal" the puter from 2001 behave like it
did?
hal, the buddy that was really all you but sooner or later you decided its
not
then you walked away and hal got as hal was?
that entity all unto its own that no one could stop..
puters, net etc...


just thinkin....
 
W

W. K. Mahler

You seem to understand the problem, which is the first step toward being
able to avoid having your computer get infected. Safe hex basically means
you don't let your computer execute anything that comes from an untrusted
source. See http://www.claymania.com/safe-hex.html for some starting
information.

Regards, Dave Hodgins

david hodkins
hodgkins disease....

nomial, as in no replies to much of what ive written..to others and that
shouldve been with direct replies to the original messages by the masses,
not new ones that are like but spin offs to the original, the core of why
the original was made but
yet...its like no email responded to my own original stuff, but new email
entirely what it is that i write about, as if made out in response but never
directly sent specifically to me.
yet someone is "afraid"...

rogers.

rogers guardian

*in massachusetts, a rogers guardian is someone that is assigned to look
out for the best interests of someone deemed mentally ill, decides if that
person needs meds or not, how their best interests are going and usually its
a complete stranger picked by the courts and agreed upon (willingly or not)
by the ill.


....and yet ive been seeking a manager for my musical career

and it would be that guardian that DOES NOT legally exists and NOR DO I WANT
ONE too.
nobody gets singularly financially rich from hollywod hollywood equals
america, america supports each american
democracy like communism like democracy, not liked but the same
nomail.afraid.org set up for use in usenet
and the usenet is like a freedom of info source, nothing really private,
shared info
in itself a way to ...
and even if you are using the usenet, got that rogers guardian
wtf, if it is a relative who also holds your $$$ and or emotial best
interests
get nowhere fast or when ya tell em enoughs enough, ya get more of the same

and to this day, im telling ya, ive got no rogers guardian

but the perception is m schizo and got one

i don't care what document out there that may exist that says i do, its a
forgery and not one that i agreed to.
so peace be to you who understands that and all this, cause there is no real
peace around here.
if there were, the email wouldn't have these virus conflictions

and that, kinda sums up everybody around here...
one classic example that may or may not be your story, but the relations of
it all, you kind of understand..for you can relate, even if your story is
diffferent than this man



and man to be out there on the stage with the screaming raising the rafters
too...




wkmahler
 
W

W. K. Mahler

viruses, perspecitves.....

....11/07/04

the day the internet and puter voting went "poof"..

till then

hopefully, not...


wkmahler






it may be a financially huge hit after all the ads and all...low and or high
cost

but for it to have been a bonafide monster gargantuan hit, he never
interviewed me...


then again, after interviewing myself, where the heck are the written
responses?


----- Original Message -----
From: "aline dinoia" <[email protected]>
To: <[email protected]>
Sent: Monday, June 21, 2004 12:32 AM
Subject: Re: [NewMovieMakers] RE: Help Make Fahrenheit 9/11 a Huge Hit
 
F

FromTheRafters

W. K. Mahler said:
ya know the idea of pretty good protection, great and all

"Pretty Good Privacy" actually - but it also serves to authenticate.
yet the virus itself, considered an attack, not a peaceful way of
communication so overlooked
but an attack, to destroy your computer, your efforts
or is it so
how bout another way of attention to a new way of communication, a better os
remember bread and mold? ya wouldn 't eat that stuff but someone made
penicillin out of it.

The "Trusted Computing" paradigm attempts to add authentication to
executables. Malware shouldn't run on a computer running in "trusted"
mode. It remains to be seen if we will be seeing "trusted malware" if
this paradigm is adopted.
yet at the same time, the new communication, the bread/mold to penicilliin
mental health, the perceived illness by someone else, the virus itself
the fix
when in itself, the perception of illness for other means have and have not
been tried
like instead of the assumption of illness, how bout that assumed ill is
quite fine
yet after awhile, the daily assumptions, determiniations back and forth with
the
im not ill
it adds up as if it aint all going to stop

Yep, they say that recognizing a problem for what it is, is halfway to
the solution.

....but that doesn't mean that the second half of the journey isn't more
difficult than the first.
but then the realization that computers, communication, viruses, illnesses
or no illnesses
its what its all about..

still

your making good sense


but isn't that all like what made "hal" the puter from 2001 behave like it
did?

Hal's priorities were quite different than the humans'. No sickness was
involved as far as I can remember. The mission was critical - Hal was
an essential part of the missions successful completion - the humans
were an unnecessary complication. The error was human error - one
shouldn't place machines (or software) in charge.
hal, the buddy that was really all you but sooner or later you decided its
not
then you walked away and hal got as hal was?

If I remember the story correctly, Hal was saving itself because
the mission was critical, and Hal was essential to its ultimate success.

Priorities:

Mission
Self preservation
Life support (for the cargo)
that entity all unto its own that no one could stop..
puters, net etc...

Well, it *was* stopped ... just not as easily as it should have been.

....in the movie, Hal sang a song as it (he?) was losing its mental faculties.
IIRC that song was the earliest *real* demonstration of computer
generated speech. The speech program itself also had a graphical
display of what a throat would be doing to shape that emanating sound.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top