[P1] virus

Joost van de Griek joost at jvdg.net
Wed Jun 4 00:00:09 PDT 2003


On 2003-06-04 08:00, don hinkle wrote:

> I hadn't heard about a computer user being able to hijack someone else's
> email address...how is this done?
> Or...wha?

Easy as pie.

You can fill in whatever you want as the "from:" address, as long as you get
the SMTP server right. And that is what the Klez virus does; it lifts
addresses from the email client of the infected computer and uses them as
from: addresses.

To find out where the virus actually did come from, look at the source of
the message for the "Received:" headers. They might contain some information
on the originating SMTP server. If that server belongs to an ISP anyone you
know has internet access from, bingo. It will be someone who has both you
and the person you wrongly accused in his address book.

,xtG
.tsooJ
-- 
Good qualities are easier to destroy than bad ones, and therefore
uniformity is most easily achieved by lowering all standards.
 - Bertrand Russell
-- 
Joost van de Griek
<http://www.jvdg.net/>



More information about the iBook mailing list