L
Lee Bowman
It seems today that it's not raining 'Microsoft Critical Updates'.
It's pouring them!
Yesterday I got about 10. Early today, it was one per hour, and nows
it's closer to two per hour. It raises a few questions with me.
1) Who's sending them? One party or many? If one, why so many? If
they thought they could fool anyone, sending one per hour blows their
cover. I figured that maybe it's because I'm on so many lists. But
two per hour?...
2) What's the point? If it's to open a back door, who will benefit?
If it's just to harrass, then what's the payback? It just makes no
sense.
3) Since they're using not only Microsoft's name and logos, and since
the fraud blatantly degrades their image and reputation (to the naive
ones), why aren't they doing anything about it? With their billions,
there must be some way to trace it. Hell, if it were my company, i'd
put out a contract.
Any insights to motive, method, rationale behind it would be
appreciated!
One more thing. I know I could open the attachment on a safe computer
(one without any other files or programs), rename the attachment, and
analyze it as a text file. Not that that would tell me much, other
than the usual 'packed by UPX', and a bunch of binary data. I assume
this should only be done after terminating any LAN connection, to
avoid having your IP address sent out.
But, is there a way to rename the attachment without executing it? In
other words, how do I get it from the email message, but not execute
it? Thanks for any ideas.
In conclusion, the question remains: Why does Microsoft take this
shit?
Regards,
Lee Bowman
It's pouring them!
Yesterday I got about 10. Early today, it was one per hour, and nows
it's closer to two per hour. It raises a few questions with me.
1) Who's sending them? One party or many? If one, why so many? If
they thought they could fool anyone, sending one per hour blows their
cover. I figured that maybe it's because I'm on so many lists. But
two per hour?...
2) What's the point? If it's to open a back door, who will benefit?
If it's just to harrass, then what's the payback? It just makes no
sense.
3) Since they're using not only Microsoft's name and logos, and since
the fraud blatantly degrades their image and reputation (to the naive
ones), why aren't they doing anything about it? With their billions,
there must be some way to trace it. Hell, if it were my company, i'd
put out a contract.
Any insights to motive, method, rationale behind it would be
appreciated!
One more thing. I know I could open the attachment on a safe computer
(one without any other files or programs), rename the attachment, and
analyze it as a text file. Not that that would tell me much, other
than the usual 'packed by UPX', and a bunch of binary data. I assume
this should only be done after terminating any LAN connection, to
avoid having your IP address sent out.
But, is there a way to rename the attachment without executing it? In
other words, how do I get it from the email message, but not execute
it? Thanks for any ideas.
In conclusion, the question remains: Why does Microsoft take this
shit?
Regards,
Lee Bowman