{"conf": "software", "generated_at": "2026-04-26T08:00:02.954878Z", "threads": [{"num": 168, "subject": "Introductions", "response_count": 27, "posts": [{"response": 1, "author": "terry", "date": "Thu, Jul 11, 1996 (07:05)", "body": "This conference is being replaced by the 'apps' conference. You'll find the discussion of the Forrest Stroud Consummate Winsock Apps site there."}, {"response": 2, "author": "terry", "date": "Tue, Nov 10, 1998 (16:22)", "body": "This topic is being re opened! As is this conference."}, {"response": 3, "author": "stacey", "date": "Sat, Jan 16, 1999 (08:35)", "body": "so get to chatting guys!"}, {"response": 4, "author": "terry", "date": "Sat, Jan 16, 1999 (18:57)", "body": "... or get a whuppin' from the Stacemistress."}, {"response": 5, "author": "stacey", "date": "Thu, Feb  7, 2036 (04:50)", "body": "okay... got a question for you Paul, or whoever can answer it... (I'm expecting varied responses of course) We are trying to set ourselves up here to integrate some digital video into our AuthorWare CBTs. Previously, we've converted over from Beta into digital and manipulated the video with Adobe Premiere. Now, while this method was effective, we're looking to film in digital and bring it straight on to our system that way. I am so open to suggestions on digital video cameras, hardware, software, etc. to best accomplich this feat. I've wandered around on several web sites and into a few conferences (that were WAY over my head) but the information is overwhelming. More often than not, I hear about just getting a FireWire with a camera and the necessary software to run it through our existing Mac system. I'd like to get more ideas from how we can soup up the workstations we have now (Mac, 95 and NT) to accomodate our needs all the way to integrated systems, plug and play with a dedicated workstation for vidoe editing. Pricing would be nice and I'm actually looking for a large range of quotes... inexpensive to \"money is no object\" All right guys... gimme what you got! (oh, for got to add, I'd also be willing to vary from our usual QT format into an MPEG format with a little more info!) \\."}, {"response": 6, "author": "terry", "date": "Thu, Feb  7, 2036 (01:43)", "body": "I'd go with any camera, Hi 8 or Digital (esp. the Canon Optura) and the All in Wonder Pro board for video capture. This is a low end, inexpensive solution that would work fairly well. There are much more expensive and higher quality capture boards, if that's what you need. What, in more detail, is the product you're trying to produce?"}, {"response": 7, "author": "stacey", "date": "Thu, Feb  4, 1999 (11:57)", "body": "We've been developing training modules in AuthorWare and are looking to increase the amount of video in each module. I want to continue using a video format that is stored externally (QT, MPEG) so as not to limit the size/length of our video. With the solution you mentioned above, what kind of hardware capability do I need? Is this a Mac and PC solution? Low end is great but we're also creating a wish list so completely integrated systems that may be just a bit more expensive are also welcome. What type of software do you recommend for the editing?"}, {"response": 8, "author": "aschuth", "date": "Thu, Mar 11, 1999 (08:28)", "body": "I've been looking all over the Spring, but didn't really find anybody who seems to share interest in Lotus Notes (or, rather Lotus Domino). Is there anybody out there?"}, {"response": 9, "author": "stacey", "date": "Thu, May  6, 1999 (10:21)", "body": "Hey guys... I gots a question. To create a login screen for a web-based application... do I need a software package or can this be written in html?"}, {"response": 10, "author": "KitchenManager", "date": "Thu, May  6, 1999 (10:46)", "body": "like the login on here?"}, {"response": 11, "author": "stacey", "date": "Thu, May  6, 1999 (14:56)", "body": "that'd be an example, yes. But I'm also looking for something that would record users login and possibly restrict logins to a particular number of sessions..."}, {"response": 12, "author": "KitchenManager", "date": "Thu, May  6, 1999 (18:12)", "body": "do all users have to register? (the restricting number of sessions is a super-easy cgi script...)"}, {"response": 13, "author": "stacey", "date": "Fri, May  7, 1999 (10:27)", "body": "yes, all users have to register restricted access can I get the logins to write to somesort of database or file that can be reviewed?"}, {"response": 14, "author": "KitchenManager", "date": "Fri, May  7, 1999 (12:32)", "body": "yeah...if I understand the workings of the server software... have you ever just gone poking around inside of the Yapp stuff here? (where's Terry and/or Ray when you need them?!?)"}, {"response": 15, "author": "stacey", "date": "Fri, May  7, 1999 (18:00)", "body": "haven't gone poking too deeply... there's actually a software package that would meet our needs pretty well however, cost prohibitive... looking for alternative solutions... Speaking of solutions... we're trying to eliminate the need for a Mac here and moving everything over to PC. One question... we've been using Toast as out CD burn software, it's SO easy... is there anything comparable on the PC side (in its user friendliness??)"}, {"response": 16, "author": "KitchenManager", "date": "Fri, May  7, 1999 (23:44)", "body": "don't know myself, but I can't figure out why any CD burn software should be complicated...there's only three formats, right?"}, {"response": 17, "author": "stacey", "date": "Mon, May 10, 1999 (12:02)", "body": "but some are easier than others allowing you to burn even audio files as data as oppposed to track by track..."}, {"response": 18, "author": "KitchenManager", "date": "Mon, May 10, 1999 (12:28)", "body": "even so, a technogeekgirl such as yoself shouldn't be havin no problems nohow..."}, {"response": 19, "author": "stacey", "date": "Mon, May 10, 1999 (15:51)", "body": "but i thrive off of recommendations from others!"}, {"response": 20, "author": "KitchenManager", "date": "Mon, May 10, 1999 (16:42)", "body": "most of my recommendations for you might be somewhat strange at work..."}, {"response": 21, "author": "stacey", "date": "Mon, May 10, 1999 (17:51)", "body": "*laugh* and those would be???"}, {"response": 22, "author": "KitchenManager", "date": "Mon, May 10, 1999 (19:03)", "body": "when you're my coworker, I'll let you know..."}, {"response": 23, "author": "aschuth", "date": "Tue, May 11, 1999 (07:26)", "body": "Oh, Stacey, go for it! Remember: None of that while you're engaged, so if anything happens, YOU COULD SUE THE COMPANY!!!! Now all I need is to find a company that would employ both of you kidders, a lawyer who doesn't throw me out when I explain the game, and contract guaranteeing a solid percentage of Stacey's profits (incl. from any talkshow appearances and the book deal)! This may become a nice day after all."}, {"response": 24, "author": "stacey", "date": "Tue, May 11, 1999 (16:30)", "body": "better than frauding your life insurance company!"}, {"response": 25, "author": "aschuth", "date": "Wed, May 12, 1999 (07:21)", "body": "(Especially if you tried and failed, 'coz some girl on the web talked you into it, and they told you you never signed up with them to start with. My lawyer says, as first offender, I might stay out on parole...)"}, {"response": 26, "author": "sprin5", "date": "Thu, Feb  3, 2000 (08:41)", "body": "How's Stacey's book deal progressing?"}, {"response": 27, "author": "aschuth", "date": "Thu, Feb  3, 2000 (12:46)", "body": "*grin* software conference Main Menu"}]}, {"num": 169, "subject": "Lotus Domino", "response_count": 0, "posts": []}, {"num": 171, "subject": "virus", "response_count": 53, "posts": [{"response": 1, "author": "terry", "date": "Mon, Mar 29, 1999 (12:01)", "body": "Feds issue warning as email virus spreads By Stephen Shankland and Kim Girard Staff Writers, CNET News.com March 29, 1999, 7:40 a.m. PT update A tricky new computer virus spreading across the Internet continued to paralyze corporate email systems across the globe this morning as experts grappled with how to stop it. Network managers moved quickly over the weekend to control the virus, called W97M Melissa, which takes advantage of users' email address books to replicate extremely quickly. As reported previously by CNET News.com, once activated, W97Melissa, uses a combination of Microsoft Word macros and Microsoft Outlook on a user's PC to send copies of a list of 80 pornographic Web sites. It works with either Word 97 or Word 2000, according to antivirus companies TrendMicro, McAfee, and Network Associates. The program is somewhat devious in that it sends itself from the email addresses of people who are likely to be familiar contacts, arriving as email with the subject line \"Important message from...\" followed by the sender's name. The body says \"Here is that document you asked for...don't show anyone else ;-).\" The email includes an attached Word file \"list.doc,\" which includes the porn sites' addresses. It could take more than several days to get the virus under control, experts said. TrendMicro is warning that 20 to 30 variants of the virus could show up by tomorrow, making filtering the virus at the email server level even more difficult. \"This has the potential to get worse before it gets better,\" said Jeff Carpenter, team leader of Carnegie Mellon's Computer Emergency Response Team (CERT). As of last night, more than 100 organizations had called CERT for help, he said. \"We've never seen something spread like this before.\" Carpenter said companies are taking steps to combat the virus by posting warnings for employees on their front-door entrances, rolling out new versions of antivirus packages to protect PCs, advising employees not to open email attachments from users they do not know, and disabling macros in Microsoft Word. Over the weekend, CERT issued an advisory detailing how users can combat Melissa. Carpenter said companies such as law firms and accounting firms are particularly wary about the risk, as confidential information from a word document can leak out via email as a result of the virus. The virus doesn't appear to cause any damage to infected computers except in rare cases when the minutes of the current time match the date--for example at 4:26 p.m. on March 26. In this instance, the virus will insert the Bart Simpson quotation, \"Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game's over. I'm outta here,\" into a user's active document. Because the virus sends itself to potentially thousands of contacts contained in a user's address distribution list, however, there's a possibility that the virus could overwhelm mail servers. Users won't get the virus by opening up a message, only by opening the attached document. Experts are warning people not to open documents attached to messages from people they don't know. Even the FBI and the National Infrastructure Protection Center have issued an unprecedented public warning about the virus. Michael Vatis, director of the NIPC, stated in a memo, \"Email users have the ability to significantly affect the outcome of this incident. I urge [them] to exercise caution when reading their email over the next few days and to bring unusual messages to the attention of their system administrator.\" The virus first was spotted last Friday, according to TrendMicro and others. It is believed to have originated in Western Europe and was first discovered on the alt.sex newsgroup. \"We've been swamped all day with customers calling in with this,\" said Dan Schrader, director of product marketing at TrendMicro, when contacted last Friday. \"It's spreading extremely quickly. Twenty major corporate sites have called us.\" Melissa is similar to an \"autospam\" virus called \"Share Fun\" that emerged in March 1997, Schrader said, but that virus was buggy and not as effective. There have been viruses that spread through the address books in the past, \"but never this effectively,\" Schrader said. Network Associates estimated the virus has already hit hundreds of thousands of computers. Microsoft shut down outbound mail so it wouldn't impact customers or partners last Friday. However, after installing filtering software the company resumed outbound mail service. Waggener Edstrom, Microsoft's public relations agency, also got hit by Melissa, which brought the agency's email system down. Intel was hit internally as well. Twenty of Network Associate's largest clients were infected; one firm alone said it had reached 60,000 computers. \"The propagation rate has been alarming,\" a company spokesperson said. Tom Moske, a network administrator at USWeb/CKS, ran into the virus this afternoon when the virus spread itself from people in his company who ha"}, {"response": 2, "author": "terry", "date": "Fri, Apr  2, 1999 (08:08)", "body": "Date: Tue, 30 Mar 1999 16:51:23 -0800 From: Rob Slade Subject: Melissa macro virus A report prepared by Robert M. Slade The following is an attempt to bring together the information about the Melissa virus. It is taken from the most reliable available sources. Additional sites have been listed at the end of the article. I have not added a copyright line to this message in order to allow it to be used as needed. I will be posting the latest updated version of this article at http://sun.soci.niu.edu/~rslade/melissa.txt and http://victoria.tc.ca/techrev/melissa.txt . The virus, generally referred to as W97M.Melissa.A (with some variations: Symantec, in a rather strained effort to be cute, seems to be calling it \"Mailissa\"), is a MS Word macro virus. This means that, if you don't use Word, you are safe. Completely safe. (Except for being dependent upon other people who might slow their/your mail server down. More on that later.) If you need to look at MS Word documents, there is a document viewer available (free, as it happens) from Microsoft. This viewer will not execute macros, so it is safe from infection. In the messages about Melissa, there have been many references to the mythical and non-existent \"Good Times\" virus. Note that simply reading the text of a message still cannot infect you. However, note also that many mailers, in the name of convenience, are becoming more and more automated, and much of this automation concerns running attached files for you. As Padgett Peterson, author of one of the best macro virus protection tools, has stated, \"For years we have been saying you could not get a virus just by \"opening E-Mail. That bug is being fixed.\" Melissa does not carry any specifically damaging payload. If the message is triggered there will be text added to the active document. The mailout function can cause a large number of messages to be generated very quickly, and this has caused the shutdown of a number of corporate mail servers. If you have Word set with macros disabled, then the virus will not active. However, relying on this protection is a very dangerous proposition. Previous macro viruses have also killed macro protection in Word, and this one does as well. The name \"Melissa\" comes from the class module that contains the virus. The name is also used in the registry flag set by the virus. The virus is spread, of course, by infected Word documents. What has made it the \"bug du jour\" is that it spreads *itself* via e-mail. We have known about viruses being spread as attachments to e-mail for a long time, and have been warning people not to execute attachments (or read Word documents sent as attachments) if you don't know where they came from. Happy99 is a good example: it has spread very widely in the past month by sending itself out as an e-mail attachment whenever it infects a system. Melissa was originally posted to the alt.sex newsgroup. At that time it was LIST.DOC, and purported to be a list of passwords for sex sites. I have seen at least one message theorizing that Melissa is someone's ill-conceived punishment for viewers of pornography. This hypothesis is extremely unlikely. Sending a virus to a sex related newsgroup seems to be a reliable way to ensure that a number of stupid people will read and/or execute your program, and start your new virus off with a bang. (No pun intended.) If you get a message with a Melissa infected document, and do whatever you need to do to \"invoke\" the attachment, and have Word on your system as the default program for .doc files, Word starts up, reads in the document, and the macro is ready to start. If you have Word's \"macro security\" enabled (which is not the default) it will tell you that there is a macro in the document. Few people understand the import of the warning, and there is no distinction between legitimate macros and macro viruses. Because of a technical different between normal macros and \"VBA objects,\" if you ask for a list of the macros in the document, Melissa will not show up. It will be visible if you use the Visual Basic Editor, but only after you have loaded the infected file. Assuming that the macro starts executing, several things happen. The virus first checks to see if Word 97 (Word 8) or Word 2000 (Word 9) is running. If so, it reduces the level of the security warnings on Word so that you will receive no future warnings. In Word97, the virus disables the Tools/Macro menu commands, the Confirm Conversions option, the MS Word macro virus protection, and the Save Normal Template prompt. It \"upconverts\" to Word 2000 quite nicely, and there disables the Tools/Macro/Security menu. Specifically, under Word 97 it blocks access to the Tools|Macro menu item, meaning you cannot check any macros. It also turns off the warnings for conversion, macro detection, and to save modifications to the NORMAL.DOT file. Under Word 2000 it blocks access to the menu item that allows you to raise your security level, and sets your macro virus detection t"}, {"response": 3, "author": "KitchenManager", "date": "Sun, May  2, 1999 (12:32)", "body": "'tis probably true..."}, {"response": 4, "author": "MarciaH", "date": "Mon, Dec 13, 1999 (12:58)", "body": "COMPUTER VIRUSES STAR TREK VIRUS Invades your system in places where no virus has gone before. MR. SPOCK VIRUS You can only access logical files. MOTHER VIRUS Generally harmless, but does not allow access to your SVGA graphics; \"They're too sharp and could poke an eye out!\" MOTHER-IN-LAW VIRUS When you try to run a file, a message appears: \"You're not good enough to run this program.\" THE TEENAGER VIRUS Your PC stops every few seconds to ask for money. THE CHILD VIRUS It constantly does annoying things, but is too cute to get rid of. HEALTHCARE VIRUS Tests your system for a day, finds nothing wrong, and sends you a bill for $4500. QUANTUM LEAP VIRUS One day your PC is a laptop, the next day it is a Macintosh, then a Nintendo. THE PRISON VIRUS It locks up your system. CENSOR'S VIRUS It decides what you're allowed to run. AIRLINE VIRUS You're in Dallas, but your data is in Singapore. PBS VIRUS Your PC stops every few minutes to ask for money. TEXAS VIRUS Makes sure that it's bigger than any other file."}, {"response": 5, "author": "sprin5", "date": "Fri, May  5, 2000 (06:37)", "body": "Dateline: 5/4/00 The \"I Love You\" worm is spreading world-wide at an extremely rapid pace, slipping past firewalls and antivirus programs. Discard emails with the subject \"I Love You\" and attachments titled \"LOVE-LETTER-FOR-YOU.TXT.VBS.\" Because variants are likely to occur fairly soon, be very careful about opening any attachments - especially with a VBS extension. Reports of massive infections world-wide are rampant. Public relation and investment banks in Asia have been hit particularly hard with this outbreak. After infection users are not able to send and receive email. Many servers are crashing because of all the traffic generated by the worm. Antivirus developers are being pounded with calls and requests for information. Many sites have a server to busy error on the Internet because of all the users attempting to reference online information about the I Love You worm. The I Love You worm uses multiple methods for infecting and spreading through computer systems. The name of the attachment, \"LOVE-LETTER-FOR-YOU.TXT.VBS,\" is designed to fool users into thinking the attachment is a harmless text (.txt) file. This worm attempts to send only one email to each user of a Microsoft Outlook address book on an infected computer. Because this worm is spreading so quickly, individuals may see 100 or more I Love You emails from 100 or more associates (different computers) infected with the worm! -------------------------------------------------------------------------------- TECHNICAL DETAILS Virus Type Worm, Trojan Origin may be from the Philippines, as indicated by text at the beginning of code for this malware: rem barok -loveletter(vbe) rem by: spyder / ispyder@mail.com / @GRAMMERSoft Group / Manila,Philippines Email Subject I Love You Email Attachment LOVE-LETTER-FOR-YOU.TXT.VBS Email Body kindly check the attached LOVELETTER coming from me. Files Created or Modified Following infection MSKERNAL32.VBS, LOVE-LETTER-FOR-YOU.TXT.VBS, and LOVE-LETTER-FOR-YOU.HTM are created in the Windows System directory. WIN32DLL.VBS is copied into the Windows directory. If the WinFAT32 subkey is not found on the infected machine the worm creates it and copies itself to the Windows Systems directory as WINFAT32.EXE to run a Trojan each time the computer is booted. The following registry keys are modified to boot the malware each time the computer is booted: HKEY_LOCAL_MACHINE\\Software\\MicrosoftWindows\\CurrentVersion\\Run\\MSKernel32 HKEY_LOCAL_MACHINE\\Software\\MicrosoftWindows\\CurrentVersion\\RunServices\\Win32DLL The start page for Internet Explorer is set to download WIN-BUGSFIX.EXE. If WINFAT32.EXE does exist the following registry key is created, \"HKLM\\Software\\Microsoft\\WindowsCurrentVersion\\Run\\WIN-BUGSFIX\". The Trojan part of this worm creates a hidden window \"BAROK...\", which runs in memory following a successful Trojan infection of a machine. The Trojan also attempts to delete the following registry keys: Software\\Microsoft\\Windows\\CurrentVersionPolicies\\Network\\HideSharePwds Software\\Microsoft\\Windows\\CurrentVersionPolicies\\Network\\DisablePwdCaching .DEFAULT\\Software\\Microsoft\\WindowsCurrentVersion\\Policies\\Network\\HideSharePwds .DEFAULT\\Software\\Microsoft\\WindowsCurrentVersion\\Policies\\Network\\DisablePwdCaching Infection Attempts This worm infects immediately after the VBS attachment is run by a user. Following infection the worm attempts to infect VBS and VBE files on local and network computers. This worm also searches for files with extensions JS, JSE, CSS, WSH, SCT, HTA, JPG, JPEG, MP2, and MP3. When found, the worm creates a file with the same name but with a VBS extension. For example, cool.jpg becomes cool.jpg.vbs Within mIRC the worm creates a script.ini file in the mIRC program directory to send the LOVE-LETTER-FOR-YOU.HTM to others in a chat room. Using MAPI, the worm also calls Microsoft Outlook applications to send an email with the worm to each user in the address book. Damage May disable sending and receiving of email and crash email servers. Overwrites infected files. Removal Instructions 1. Download an update to your current antivirus program, or download and update a new antivirus program, and run a scan for ALL files. In an idea situation this will remove malware from your computer. If not, follow instructions below. 2. See Files Created or Modified section above to locate and remove files from infected drives. Also scan all email files and delete \"I Love You\" messages and emails with a LOVE-LETTER-FOR-YOU.TXT.VBS attachment. 3. Use REGEDIT to edit the registry, fixing areas noted in Files Created or Modified above. Use REGEDIT with extreme care - for expert users only. To run REGEDIT select \"Run...\" from the start menu, enter REGEDIT, and press return. 4. Reset Internet Explorer start page to desired start location. Select \"Internet Options...\" from the View menu to enter desired changes. 5. Delete overwritten files and restore with backup copies. Prevention Many antivirus developers have already prov"}, {"response": 6, "author": "sprin5", "date": "Fri, May  5, 2000 (06:48)", "body": "I got one of these and promptly deleted it."}, {"response": 7, "author": "sprin5", "date": "Fri, May  5, 2000 (08:07)", "body": "http://www.zdnet.com/zdnn/stories/news/0,4586,2562032,00.html A new e-mail worm is rapidly spreading across the globe affecting users of Microsoft Windows running Microsoft Outlook. The ILOVEYOU worm (a.ka., VBS.LoveLetter.A) infects VBScripts, mIRC users and files on your hard drive (namely .jpg and .mp3 files). The worm makes changes to the Windows registry and copies the Outlook address book and e-mails itself to all of your contacts. (Previously, viruses such as Melissa and its variants only chose the first 50 addresses.) This new worm has been overloading e-mail servers around the world. ILOVEYOU arrives as e-mail with the subject line \"I Love You\" and an attachment named \"Love-Letter-For-You.txt.vbs.\" Opening the attachment infects your computer. The infection first scans your PC's memory for passwords, which are sent back to the virus's creator (a Web site in the Philippines which has since been shut down). The infection then replicates itself to everyone in your Outlook address book. Finally, the infection corrupts files ending with .vbs, .vbe, .js, .css, .wsh, .sct, .hta, .jpg, .jpeg, .mp2, .mp3 by overwriting them with a copy of itself."}, {"response": 8, "author": "sprin5", "date": "Fri, May  5, 2000 (08:14)", "body": "A good central source for information: http://www.zdnet.com/zdnn/special/lovebites.html"}, {"response": 9, "author": "sprin5", "date": "Fri, May  5, 2000 (08:15)", "body": "Authorities close in on 'ILOVEYOU' suspect Clues provided from chat rooms lead Filipino police to suspect the 'ILOVEYOU' author may be a young man living in a Manila suburb. By Sharon Buan, Reuters May 5, 2000 5:27 AM PT MANILA, Philippines -- The \"Love Bug\" virus wreaking havoc on computer systems worldwide appears to have originated in the Philippines, and the author may be a young man living in a Manlia suburb, police and local Internet firms said Friday. Police sources said the local National Bureau of Investigation was investigating the case following a request from the U.S. Federal Bureau of Investigation. A Manila Internet service provider (ISP) had earlier said the virus appeared to have first spread from two of its e-mail addresses. \"What happened is the author of the virus used two e-mail addresses through Supernet -- spyder@super.net.ph and mailme@super.net.ph,\" Jose Carlotta, chief operating officer of Access Net Inc., a Manila Internet company, told Reuters."}, {"response": 10, "author": "sociolingo", "date": "Fri, May  5, 2000 (13:03)", "body": "Latest variant I heard of on UK news this afternoon has 'joke' in the subject line. The ILOVEYOU virus brought the House of Commons to a stand still yesterday, and has caused widespread damage to most major UK companies. Thanks for all the good advice above."}, {"response": 11, "author": "MarciaH", "date": "Fri, May  5, 2000 (14:47)", "body": "You may add \"veryfunny\" and \"jokes\" to the files to delete. They showed up this morning."}, {"response": 12, "author": "sprin5", "date": "Fri, May  5, 2000 (15:41)", "body": "And who knows what else?"}, {"response": 13, "author": "MarciaH", "date": "Fri, May  5, 2000 (16:00)", "body": "Exactly! If these evil little minds are enjoying the chaos they are creating (and isn't that why they are doing it?!) they will continue to spawn more and more until they are arrested and their computers confiscated. Good point!!"}, {"response": 14, "author": "MarciaH", "date": "Fri, May  5, 2000 (17:33)", "body": "Friday - 16:30 05/05/2000, EST 'Love Bug' Takes New Forms to Smite Users NEW YORK (Reuters) - Copycat variants of the ``Love Bug'' virus labeled ``Joke'' and ``Mother's Day'' infected computers around the world on Friday, a day after the most widespread cyberattack ever wreaked havoc on business and government operations. Tens of millions of computers have been disabled so far, as the virus, first detected in Asia, spread around the globe, forcing network administrators to shut down e-mail systems at major companies and penetrating the Pentagon, the Central Intelligence Agency and Britain's Parliament. Security experts said the virus was far more devastating than last year's Melissa bug, with losses now counting in the billions from damaged data and the distractions of fighting the software scourge, and warned that it could take a while to stem the invasion. By one estimate, approximately 45 million computers around the world have been infected by various strains of the virus, according to Computer Economics, a research firm in Carlsbad, Calif. ``We estimate $2.61 billion of damage has been done,'' said Samir Bhavnani, a research analyst with Computer Economics. ``By Wednesday, the total can reach $10 billion. We see damages growing by $1 billion to $1.5 billion a day until the virus is eradicated.'' Other experts said actual damage estimates would be harder to pin down. Sal Viveros, group manager for Network Associates' (NETA.O) Total Virus Defense, told a conference call of reporters that his researchers have found as many of five different variants of the virus, although he didn't yet have details of the specifics of the variants. Business software maker Computer Associates International said it was relatively easy to create new strains of the virus. ``There's a potential that anyone who receives this virus can go to the Internet and (find) tools to change codes within the virus program that can give the e-mail or the attachment a new name,'' said Simon Perry, vice president for security products at Computer Associates International Inc. (CA.N). The Islandia, N.Y. is a leading maker of anti-virus software such as InoculateIT. For the time being, most of the virus variants are only cosmetically different from the original virus. ``Based on our research, we believe that the variants are coming from a number of different people,'' Perry said. LOVE BUG TAKES NEW FORMS TO TRICK USERS Technically, the software scourge is known as a worm, not a virus. ``Worms have the ability to self-replicate; viruses do not,'' said Jeff Carpenter, a security expert with the Computer Emergency Response Team, a Defense Dept.-funded clearinghouse at Carnegie-Mellon University in Pittsburgh. The original worm ``ILOVEYOU,'' works by enticing e-mail recipients to open an attached letter, only to cripple their e-mail systems. This so-called Love Bug continued to pop up in e-mail systems on Friday, even as variants appeared to pose new tricks for computer users. But the effect is unchanged: Upon opening the attachment using Microsoft software such as the Outlook program, it sends a copy of the worm to everyone in the user's address book and seeks to destroy a variety of files throughout a computer network, including picture and music files. The worm is being sent as an e-mail attachment and many sites are experiencing significantly increased electronic mail traffic. The worm can spread through network disk drives, Web pages, and via IRC (Internet Relay Chat), a communications system popular with computer aficionados, experts said. The damage is limited to users of the Microsoft Windows operating system, said Gene Hodges, president of McAfee, a maker of anti-virus software and a unit of Network Associates. ``We've seen no evidence of affected users of Apple, Linux or Unix operating systems,'' he added. In one new version designed to spoil the upcoming ``Mother's Day'' holiday that will be celebrated in the United States on May 14, a variant of LoveLetter sends e-mails which appear to be a confirmation of an electronic gift order. ``The Mother's Day version of this worm is quite cunning,'' said Mikko Hypponen, manager of anti-virus research at computer security firm F-Secure Corp.'s laboratories in Helsinki, Finland. ``The e-mail appears to be a confirmation of an order for 'Mother's Day diamond special,' and the attached file mothersday.vbs is portrayed as if it were an invoice. With only eight days to go until Mother's Day, this attack is quite credible,'' he said. F-Secure has identified five variants so far in its efforts to keep pace with the worldwide assault. Another variant appears to have originated in Lithuania, in which the subject line reads, ``Susitikem shi vakara kavos puodukui.'' In Lithuanian, the sentence translates into: ``Let's meet this evening for coffee.'' And still another has ``fwd: Joke'' in the subject line and an attached file called ``Very Funny.vbs,'' which when opened has a similar impact as the ``Love Bug"}, {"response": 15, "author": "MarciaH", "date": "Fri, May  5, 2000 (19:18)", "body": "'Love Bug' Hits Secret U.S. Military Computers WASHINGTON (Reuters) - The international ``Love Bug'' virus contaminated at least two classified U.S. military computer systems but the problems were quickly isolated and no damage was done, the Defense Department said on Friday. Pentagon spokesman Ken Bacon released a statement which did not directly identify the systems. But U.S. officials, who asked not to be identified, told Reuters that at least one of them belonged to the super-secret National Security Agency. Among NSA's tasks is to monitor millions of pieces of intelligence information gathered from around the world by U.S. spy satellites in space. Bacon said the electronic bug, which emerged Thursday and has infected millions of computers worldwide, had ``contaminated a classified internal e-mail system'' early on Thursday. He said the agency using the system reported that less than one percent of the network was contaminated and it was quickly isolated and cleaned by technicians. ``In addition, the Joint Task Force on Computer Network Defense reported this morning that one other classified system was infected by the 'Love Bug.' The virus was quickly detected and contained,'' he said. ``Because of protections built into classified computer systems, the impact of the virus was minimal'' and had no impact on military operations, the statement said, adding that the task force was investigating how the virus entered the classified systems."}, {"response": 16, "author": "MarciaH", "date": "Fri, May  5, 2000 (20:00)", "body": "nvestigators in the Philippines have traced the source of the 'Love' worm virus to a 23-year-old male in a Manilia suburb. But experts warn that the clues found in the source of the program may be false. Meanwhile, new copycat versions of the virus are spreading throughout e-mail systems around the world today."}, {"response": 17, "author": "MarciaH", "date": "Sun, May  7, 2000 (23:57)", "body": "Virus Hoax -- Elf Bowlers Get an Attitude Among the hundreds of so-called viruses that want to do horrible and evil things to your computer is a chain letter that says that the famous \"Elf-Bowl\" game contains a virus that will erase your hard drive. This is not true. The \"Elf-Bowl\" game is perfectly safe. HOWEVER, it is possible that a Trojan horse-type virus could attach itself to an EXE file. So, here are the specs on \"Elf-Bowl.\" Length: 1130496, CRC-32 : ae35e713. So, Bowl away! Watch out for the mooning!"}, {"response": 18, "author": "MarciaH", "date": "Tue, May 16, 2000 (13:07)", "body": "News / Bugs & Breaches High risk of virus spreading without attachments being opened (05/10/2000) As if security experts didn't have enough worries yet, reports are coming in that in the aftermath of the already numerous LoveLetter variants, new email viruses are now spreading without the intervention of the user. That's correct, the attachments carrying the payload, seem to auto-execute without the user opening them. The range of vulnerable machines also broadens as not only machines running Internet Explorer (IE) version 5.0 and/or Microsoft Office 2000 are vulnerable, but a user is now seemingly also vulnerable when the user has IE simply installed with the default security settings, without even using it. Needless to say this is a major flaw and could lead to enormous computer & network mayhem. Sources of the likes of Network Associates http://www.nai.com and SANS http://www.sans.org/newlook/home.htm all agree that this is by far the fastest growing virus distribution problem potent enough to cause a hugely destructive event - at least as large as the ILOVEYOU virus. Updating one's virus detection software, while important, is apparently not an effective solution for this problem. This additional hole needs also to be closed. Windows systems that have not yet been fixed for MS99-032 should be fixed ASAP, whether one does or does not use MSIE (Internet explorer) or Office 2000,even if you never open attachments of emails. The problem is allegedly caused by a programming bug in an Internet Explorer ActiveX control called scriptlet.typelib. Tools at Microsoft's security site http://www.microsoft.com/security/bulletins/ms99-032.asp are available though to close this initial hole at: http://www.microsoft.com/security/bulletins/ms99-032.asp The correction script may be run directly from: http://www.microsoft.com/msdownload/iebuild/scriptlet/en/scriptlet.htm SecurityWatch will of course keep a close eye on this alarming news, updates will be published as we receive them. Jimmy Kuo of Network Associates and Nick FitzGerald of Computer Virus Consulting Ltd. raised the visibility of this dangerous problem. _____"}, {"response": 19, "author": "MarciaH", "date": "Tue, May 16, 2000 (15:45)", "body": "Microsoft Adds New Security Features to Outlook May 15, 2000 (Tech Web - CMP via COMTEX) -- Microsoft said Monday it will offer new security features for its Outlook e-mail program in the wake of the destructive \"Love\" virus. The Outlook Email Security Update, scheduled to be available for free download the week of May 22, will offer three security features designed to combat viruses. One prevents users from accessing several file types when sent as e-mail attachments, including executables and batch files that contain executable code used to spread viruses. Another feature prompts customers with a dialog box when an external program tries to access their Outlook address books or send e-mail on their behalf. The third increases the default Internet security zone setting within Outlook from \"trusted\" to \"restricted,\" which disables most automatic scripting and ActiveX Controls from opening without the users permission. Microsoft (stock: Copyright (C) 2000 Cmp Media Inc. Tech Web on May 15, 2000"}, {"response": 20, "author": "MarciaH", "date": "Fri, May 19, 2000 (14:33)", "body": "********** VIRUS ALERT - VBS/Newlove.a ********** VBS/Newlove.a is a VB Script worm with virus qualities. McAfee AVERT has assessed it as a HIGH-risk threat. This worm searches all drives connected to the host system and replaces all files with copies of itself and it adds the extension .VBS to the original filename. The original file is then deleted. The worm uses Microsoft Outlook to send copies of itself to all entries in the address book. When this worm is first run, it places a copy of itself in the Windows folder and gives itself a name from either the Recent Documents folder, or uses a random name with a random extension. This worm will arrive in an email message with this format: Subject: Starts with \"FW: \" and is either a name from the Recent Documents folder or a random name Message: Empty Attachment: Is the randomly-selected VBS filename from the Windows folder This virus will run if Windows Scripting Host is installed. Running the email attachment received either accidentally or intentionally will install to the local system."}, {"response": 21, "author": "sprin5", "date": "Sat, May 20, 2000 (06:01)", "body": "I got an empty email body the other day and promptly deleted it. The outlook for Outlook is not that great these days."}, {"response": 22, "author": "MarciaH", "date": "Sat, May 20, 2000 (17:51)", "body": "Let's try this again. I just had a long post evaporate. Sumthin is not quite right, yet... Amyway, I downloaded and installed the Norton antivirus which froze my computer. That was yesterday. I could not boot it at all. It would shut down as soon as it tried to load my taskbar. So, I entered in safe mode and uninstalled the Norton program but saved the downloaded .exe file to reinstall it if their techies can figure it out. I think it may have to do with the fact that I enabled it to scan all drives for viruses at startup. There is an imbedded program (non-removable)which is the first to open on the taskbar. That is what would appear just before it closed down the entire system. But, until I hear agreement from others who know more than I do, my PC will continue tobe protected by my vigilance and Iris anti-virus (anyone hear of it?) which came installed on the computer."}, {"response": 23, "author": "vibrown", "date": "Tue, May 23, 2000 (12:29)", "body": "I'm glad you finally got your PC to boot. I use the virus scanner that comes with Norton Utilities at home, so I guess it doesn't behave the same way as Norton Antivirus. I never heard of Iris, but I'd stick with it for now. Does Iris update their data files, like McAfee and Norton?"}, {"response": 24, "author": "vibrown", "date": "Tue, May 23, 2000 (12:49)", "body": "I posted this in Geo 34, as well: Do you know the name of the embedded program? If it's in your Startup folder, you should be able to delete it from the Startup folder to keep it from running. If it's not there, it might be in the win.ini or system.ini file; at least I think Windows 95/98 still has those files...they would be in the c:\\windows or c:\\windows\\system directory. The only other place I can think of would be the Windows Registry, but you'd have to hunt through the Registry keys for it. There should be a Registry Editor program (regedit.exe or regedt32.exe) in the c:\\windows or c:\\windows\\system directory. (I'm not sure exactly where it is on Windows 95/98, and I'm on and NT system right now.)"}, {"response": 25, "author": "MarciaH", "date": "Tue, May 23, 2000 (12:58)", "body": "It is NEC Assistant and the computer is a NEC. There is a regedit but I wonder what else it would make unworkable if I removed it. Does it have its tentacles into the dial-up system or other things which might make it very nasty to deal with? It is a really complete program with internal libraries and program installers and wallpaper changer and all that - very much like the control panel windows supplies and which is what I use. How perilous is it to remove such a program?"}, {"response": 26, "author": "MarciaH", "date": "Tue, May 23, 2000 (13:01)", "body": "There is no option for doing so, but I am going to do a Google search for Iris to see if I can get to their website and talk to them about updates. So far I have just been V e r y careful....and lucky!"}, {"response": 27, "author": "vibrown", "date": "Tue, May 23, 2000 (16:54)", "body": "The Registry Editor (regedit.exe) is a program that allows you to add/delete/modify Windows registry keys. You don't want to delete regedit.exe; you would use it to search through the various registry keys for NEC, and try to figure out which was the program that was causing problems. I wouldn't try that unless you are sure of what the name of the NEC program is, and have some idea of what registry keys it sets. Can you find any way to uninstall the NEC assistant, either from some kind of NEC program folder, or through \"Add/Remove Programs\" in the Control Panel? Maybe NEC's web site would have some information or trouble-shooting tips."}, {"response": 28, "author": "MarciaH", "date": "Tue, May 23, 2000 (17:29)", "body": "Oh, I know better than to delete regedit.exe ... Yikes!!! No uninstall no showing up on the add/delete programs in the control panel, no getting it off the task bar, either! There is simply no way to rid of it without deleting the thing piece by piece. I think I will check with both NEC and Symantec and McAfee about this. One of them should know what to do - especially NEC. I'll go there first. Thanks for that suggestion. Did not think of it..."}, {"response": 29, "author": "vibrown", "date": "Tue, May 23, 2000 (17:40)", "body": "Sorry...just wanted to make sure you knew what I meant. :-) Deleting the program files without a proper \"uninstall\" might simply cause a new error to the effect of \"Can't find program *whatever*\", since there could still be some registry setting somewhere that is looking for that program at bootup. Trying to catch program conflicts is a real pain. That's the down side of having so many third-party software vendors selling Windows programs...no one can possibly test the millions of combinations of software products to find all interactions and side-effects."}, {"response": 30, "author": "MarciaH", "date": "Tue, May 23, 2000 (17:49)", "body": "Well, if I had had my druthers it would not have come with this stuff on it. However, it was the replacement for the W3.1 PC which was stolen, and it is so much superior that I dared not complain! NEC will be told and asked for suggestions other than \"Live With It\" which I just might have to do! Yeah, I know about picking pieces out and have boxes popping up telling you whatever is missing. What a pain!"}, {"response": 31, "author": "sprin5", "date": "Tue, May 23, 2000 (18:13)", "body": "Holy Cow Marcia, you may end up having to do a re-install from scratch."}, {"response": 32, "author": "MarciaH", "date": "Tue, May 23, 2000 (18:19)", "body": "Then I will need to be walked through it - might need to enlist my geek son... I got rid of IE that way and it was a huge pain but it was not as entwined in the entire system as this one is. It is supposed to run your computer if you are a mindless idiot who is clueless to boot. I resent its intrusiveness but it has not interfered with any other programs until I tried to install the \"alien\" anti-virus programs. If I could only get out of the startup file...but it does not show up there. How can I prevent something from loading when I cannot find where it is lodged and what is loading it at startup. Most peculiar."}, {"response": 33, "author": "MarciaH", "date": "Tue, May 23, 2000 (18:21)", "body": "Never did a reinstall on w95, but got so good at doing w3.1 I can do it in my sleep and nitpick the stuff out I don't want loaded. That's how I did the little laptop I was using when this one froze. I really don't want to do reinstall.....sheesh!"}, {"response": 34, "author": "sprin5", "date": "Tue, May 23, 2000 (18:27)", "body": "Maybe you can bump up the memory to 32mbs and put Win 98 on it. Have your geek son do it and take notes so you can do it yourself next time. And put CRT on it and some cool apps, except for the offending anti-virus program. Or better yet, *you* do the install with him talking you through it so you could do it yourself next time. That way doing a re-install will become what it should be, routing, painless and time consuming. (no way to do it fast)."}, {"response": 35, "author": "sprin5", "date": "Tue, May 23, 2000 (18:35)", "body": "And maybe the anti-virus program will work with 98."}, {"response": 36, "author": "MarciaH", "date": "Tue, May 23, 2000 (18:47)", "body": "Perhaps! I don't have 98 on disks. I have the equivalent with downloads and upgrades now running on this PC, however. Not thinking about 2000... Not sure they have it right, yet. The anti-virus will work as soon as I negate NEC Assistant. You can bet I will NOT include that program when / if I do reinstall."}, {"response": 37, "author": "MarciaH", "date": "Tue, May 23, 2000 (18:54)", "body": "Hey, I bought CRT long time ago at the last provider when I telnetted a lot. It is still on here with 5 different graphics viewers, media enablers and dozens of weather, and other earthly updaters... plus three different IM and an ICQ. I have more plugins than Central Texas Power and Light (or whatever your utility company is called). I will do the installing myself with David talking me through it and taking notes too. It is the only way I will learn it, and how I learned to do W3.1 Btw, David asked me how to login on Spring so I sent him the new user URL. Gotta behave myself here now...*sigh*"}, {"response": 38, "author": "sprin5", "date": "Wed, May 24, 2000 (08:16)", "body": "How much memory do you have in it and how much can you add?"}, {"response": 39, "author": "MarciaH", "date": "Wed, May 24, 2000 (14:49)", "body": "I have most of my 6.4 Gigs of memory and 64k Ram. It is expandable but not sure of the amount. I have zip drives for storage, as well."}, {"response": 40, "author": "MarciaH", "date": "Wed, May 24, 2000 (14:53)", "body": "More precisely, on my C drive I have 3.91GB free space and have used 2.47 MB (Where did the rest of the 6.4GB go?)"}, {"response": 41, "author": "sprin5", "date": "Wed, May 24, 2000 (16:32)", "body": "What processor is it running, sounds like it could run Windows 98."}, {"response": 42, "author": "MarciaH", "date": "Wed, May 24, 2000 (17:02)", "body": "266 MHz Pentium II with MMX technology"}, {"response": 43, "author": "sprin5", "date": "Wed, May 24, 2000 (18:16)", "body": "Yep, that's a pretty powerful little notebook."}, {"response": 44, "author": "MarciaH", "date": "Wed, May 24, 2000 (18:20)", "body": "No, that is the big PC. I'm gonna get me a little laptop for just me to use when this one behaves improperly. There is much to love about this computer with all the power to multitask that others apparently don't have. I am hesitant to mess with it too much. It has brought me joy I cannot imagine any other way of obtaining."}, {"response": 45, "author": "MarciaH", "date": "Wed, May 24, 2000 (23:44)", "body": "Security experts and federal government authorities warn that offspring of the dangerous e-mail virus are now on the loose. As a public service, we present the following list of \"I Love You\" variations and how to recognize them: - The \"I Love You, But I'm Shy\" virus never actually invades your computer but collects data about it worshipfully from afar. - The \"Unrequited Love\" virus causes your computer to be so obsessed with a virus-a virus that it can never have-that it can no longer function. - The \"Love The One You're With\" virus hangs around your computer, but the whole thing is just temporary until it can find the computer that it really wants to invade. - The \"Can't We Just Be Friends\" virus makes your computer think it's interested in invading. Then, just when your computer is getting excited about the invasion, it breaks off the connection with your computer, dashing its hard drive against the rocks. - The \"One Night Stand\" virus invades your computer, turns its hard drive upside down, then disappears after promising to come back sometime. But it leaves a twenty in your online bank account. - The \"Happily Married\" virus invades only one computer and stays with it for life. - The \"Unhappily Married\" virus spends a long time negotiating with a computer, finally invades it, and then strays to other computers from time to time. - The \"I Can't Commit\" virus hangs around a computer for a long time and frequently sends messages that it intends to invade, but is really just interested in playing with your computer's data. - The \"It's Just A Physical Thing\" virus invades your computer on a regular basis, but no meaningful data is ever exchanged. - The \"I Want A Divorce\" virus sends repeated, hard-to-read messages that your computer is never turned on, then finally leaves. But it returns some time later and takes half of your computer's best data in an ugly network session. - The \"Little Virus Of The Evening\" virus will do anything to your computer--if you're willing to pay the right price. - The \"Stalker\" virus spends unnatural amounts of time monitoring your computer, collecting data your computer has thrown away and trying to record its most intimate functions. - The \"Forever Single\" virus causes your computer to focus solely on other computers that are totally incompatible with it. - The \"Deadbeat Dad\" virus invades your computer, spawns an entirely new database, then refuses to help update it as it grows. - The \"Married Too Long\" virus splits your PC into two partitions that never interface-one that does too much online shopping and one that never does anything except monitor espn.com."}, {"response": 46, "author": "MarciaH", "date": "Sat, May 27, 2000 (11:30)", "body": "Here's new one - beware! I was talking on ICQ with someone in Honolulu last night and it crashed his computer: RESUME' Virus Saturday, May 27, 2000 WASHINGTON, D.C. -- A new and dangerous computer virus dubbed \"Killer Resume\" is spreading through e-mail systems using the Microsoft Outlook e-mail program, the FBI and computer industry sources said Friday night. Anti-virus industry sources reported that some corporate e-mail systems had already been infected, and some shut down, the FBI's National Infrastructure Protection Center said. The virus is carried in a file attached to an e-mail with the subject \"Resume -Janet Simons.\" The attachment is a Microsoft Word file called \"EX PLORER.DOC\" or \"RESUME.DOC,\" according to an alert posted on the Web site of Network Associates, a computer security company. If a computer user opens the attachment, the virus will spread itself by sending an e-mail to everyone in the user's e-mail address book, the company said. When the user closes the Word document, the virus will then delete important files on the user's computer. The FBI advised computer users to open no e-mail with this subject line, to deactivate the executive summary feature in Microsoft Outlook, and then delete the e-mail without opening it. The anti-virus industry was working on software patches to stop the virus, the FBI said. The government warning said the Memorial Day weekend could allow the virus to spread over the next three days with a potentially rapid surge in activity as business opens overseas on Monday and in the United States on Tuesday. Santa Clara, Calif.-based Network Associates said the virus was known as the \"Killer Resume\" because it arrives pretending to be a resume from a potential job applicant. Symantec AntiVirus Research Center of Cupertino, Calif., said the virus was \"extremely fast-spreading.\" The text of the message reads: \"To Director of Sales/Marketing, Attached is my resume with a list of references contained within. Please feel free to call or e-mail me if you have any further questions regarding my experience. I am looking forward to hearing from you. Sincerely, Janet Simons.\" Earlier this month, the spread of a computer virus that could have done more damage than the \"Love Bug\" was slowed by U.S. companies that had strengthened their defenses against attacks from the Internet. That virus, dubbed \"NewLove,\" infected thousands of computers around the world but failed to become an epidemic like the Love Bug, which reached millions three weeks ago. Safeguards put in place on corporate e-mail systems against the earlier virus stopped NewLove's spread. The FBI said the virus shared some characteristics with the Love Bug and have launched a search for the creator. The Love Bug arrived in e-mails with an \"ILOVEYOU\" subject line that enticed millions of recipients to open the attachment that activated the virus. Once news spread of the threat, infected e-mails were easily detected and deleted. Estimates of the damage caused by that virus go as high as $10 billion, mostly in lost work time."}, {"response": 47, "author": "sociolingo", "date": "Sat, May 27, 2000 (15:55)", "body": "I guess this can go in here: I downloaded a free firewall program for individual PCs which seems to be working really well and got a good write up in Internet magagzine. It's monitoring my ports while I'm online, and also monitors unautorised applications use of internet. anyway, have a look and see what you think http://www.zonelabs.com program is ZoneAlarm 2.1 and is free for personal use."}, {"response": 48, "author": "MarciaH", "date": "Sat, May 27, 2000 (18:35)", "body": "I thought firewalls were for NT computers who share programs and stuff... Terry????"}, {"response": 49, "author": "MarciaH", "date": "Sat, May 27, 2000 (22:36)", "body": "Guess not - at the bottom of the following is a firewall for pc's ******* VIRUS ALERT - W97M/Resume.a@mm ******** Dear McAfee.com Dispatch Subscriber: W97M/Resume.a@mm is a variant of the W97M/Melissa family with a very dangerous payload. McAfee AVERT has given it a risk assessment of MEDIUM--ON WATCH. This is a worm and it spreads through email with an attachment in this format: ------------------------------------------------------------ SUBJECT: Resume - Janet Simons TO: Director of Sales/Marketing, MESSAGE: Attached is my resume with a list of references contained within. Please feel free to call or email me if you have any further questions regarding my experience. I am looking forward to hearing from you. Sincerely, Janet Simons. ATTACHMENT: Explorer.doc ------------------------------------------------------------ If the file EXPLORER.DOC is opened, it forwards itself to everyone in your address book. When you close the attachment, it deletes files on your hard-drive. Please do not open the attachment. For more information about this worm, go to McAfee.com Virus Information Library. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1568 --McAfee.com _______________________Virus Fixes__________________________ Find out more about this virus. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1568 Become a McAfee.com Clinic subscriber and check your system online. To use VirusScan Online, click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1569 Purchase the latest copy of VirusScan, please click here. http://store.mcafee.com/category.asp?CatID=3&CategoryLevel=1&rfr=VSCALRT Upgrade to the latest VirusScan. Purchase the VirusScan Maintenance Plan which entitles you to 12 months of upgrades, click here. http://store.mcafee.com/category.asp?CatID=18&CategoryLevel=1&rfr=VRSPLN Download the latest DAT files, click here. http://download.mcafee.com/updates/updates.asp ____________________Clinic Subscribers______________________ If you are an ActiveShield user, get the latest update. Click here. http://clinic.mcafee.com/clinic/virusscan/activeshield/start.asp Surf the Web safely. Get McAfee.com Personal Firewall. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1458"}, {"response": 50, "author": "MarciaH", "date": "Wed, Jun 21, 2000 (22:47)", "body": "******* VIRUS ALERT - IRC/Stages.worm ******** Dear McAfee.com Dispatch Subscriber: IRC/Stages.worm is an Internet worm that began spreading rapidly on 6/19. McAfee AVERT has assessed it as a HIGH-RISK threat. McAfee.com Clinic users who used VirusScan Online after 6/16 have protection against this worm. The worm uses Microsoft Outlook to send copies of itself to all entries in the address book and through installations of Pirch, ICQ and mIRC.* It also spreads to all available mapped drives on your system. This worm will arrive in an email message with this format: SUBJECT: \"Funny\", \"Jokes\", or \"Life Stages\", sometimes followed by \"Text\" CONTENT: \"The male and female stages of life\" ATTACHMENT: \"LIFE_STAGES.TXT.SHS\" (the suffix \".SHS\" may be hidden) If the attachment is run, the user sees a list of jokes while the worm infects the system and attempts to send copies of itself to all addresses in Outlook address book, as well as through the other channels mentioned above. * Pirch is an internet relay chat client for Microsoft Windows 95/98/NT, mIRC is a shareware IRC chat client for Windows and ICQ lets you initiate IRC style chat sessions - it alerts you when your friends are online and lets you chat with them. --McAfee.com _______________________Virus Fixes__________________________ Find out more about this virus. Click here to go to the IRC/Stages.worm Help Center. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1585 Become a McAfee.com Clinic subscriber and check your system online. To use VirusScan Online, click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1586 Purchase the latest copy of VirusScan, please click here. http://store.mcafee.com/category.asp?CatID=3&CategoryLevel=1&rfr=VSCALRT Upgrade to the latest VirusScan. Purchase the VirusScan Maintenance Plan which entitles you to 12 months of upgrades, click here. http://store.mcafee.com/category.asp?CatID=18&CategoryLevel=1&rfr=VRSPLN Download the latest DAT files, click here. http://download.mcafee.com/updates/updates.asp ____________________Clinic Subscribers______________________ If you are an ActiveShield user, get the latest update. Click here. http://clinic.mcafee.com/clinic/virusscan/activeshield/start.asp Surf the Web safely. Get McAfee.com Personal Firewall. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1458 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"}, {"response": 51, "author": "MarciaH", "date": "Wed, Jul  5, 2000 (14:52)", "body": "****NEW VIRUS ALERT**** Description: This worm spreads via Microsoft Outlook email and over IRC using mIRC or Pirch. Via email, the worm sends a message whose subject is constructed from the following terms: \"Fw:\", \"Life Stages\", \"Funny\", \"Jokes\" and \" text\". The body of the message may contain the text \"The male and female stages of life.\" The worm itself is attached as a file called LIFE_STAGES.TXT.SHS. When it runs, the worm displays some long humourous text about life. It then attempts to create copies of itself on all available network drives. It also moves the regedit.exe to the recycled folder and changes its name to recycled.vxd. Geoff Aldridge Conferencing Team Leader On-Line Applications Learning and Teaching Services The Open University"}, {"response": 52, "author": "MarciaH", "date": "Fri, Aug  4, 2000 (22:48)", "body": "YOU HAVE BEEN INFECTED WITH THE HONOR VIRUS! Since I'm too lazy to program a real virus, this virus works on the honor system. Please delete all the files on your hard disk drive. Then forward this message to everyone you know... Thank you for your cooperation."}, {"response": 53, "author": "MarciaH", "date": "Wed, Aug 23, 2000 (21:49)", "body": "ALERT: Internet Explorer and Netscape Vulnerabilities CatchUp Security Alert A message from CNET CatchUp.com August 23, 2000 ________________________________________________________________ Patch Available for Internet Explorer Vulnerabilities Microsoft has released a patch that eliminates two security vulnerabilities in Microsoft Internet Explorer. The weaknesses could allow a malicious Web site to read files on your computer. The Scriptlet Rendering vulnerability and Frame Domain Verification vulnerability affect Internet Explorer versions 4.0, 5.0, and 5.5. Click here to run CNET CatchUp Security Fixes: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0CIwp Click here to read the Microsoft Security Bulletin: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0DOii ________________________________________________________________ Update Available for Netscape Brown Orifice Vulnerability Netscape Communications has released Netscape Communicator 4.75, which patches a security hole that made computers vulnerable to file theft. The bug, dubbed Brown Orifice, concerns Netscape's implementation of Java. Without the update, Netscape lets an unsigned Java applet read and distribute files from a user's PC by acting as a Web server. This vulnerability has been identified in Netscape Communicator versions 4.0 through 4.74 on Windows, Macintosh, and Unix operating systems. This vulnerability does not affect Netscape 6 Preview Releases. Click here to update your browser with CNET CatchUp: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0CIun Click here to read the CERT Security Bulletin: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0DOjj ________________________________________________________________ software conference Main Menu"}]}, {"num": 173, "subject": "Palm Pilot software", "response_count": 25, "posts": [{"response": 1, "author": "MarciaH", "date": "Thu, Jun 22, 2000 (19:54)", "body": "Shall I continue to post the comments on the Palm Pilot in Computer where I have been posting it so far?"}, {"response": 2, "author": "sprin5", "date": "Fri, Jun 23, 2000 (07:26)", "body": "Sure!"}, {"response": 3, "author": "MarciaH", "date": "Fri, Jun 23, 2000 (17:12)", "body": "Palm OS Tip of the Day Changing Text In A Repeating Event If you try to change the text in a repeating event (in DateBook), you end up changing it in all the repeats. To get around this, you have to \"break\" the one event out of the repeat list. Do this by changing anything in the details window. When you click OK, you'll be asked if you want this change to affect All or Current. Selecting Current will create a record that doesn't exist in the \"list\" of repeats, and you can now change it (or even delete it) without affecting the other repeated events. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 4, "author": "MarciaH", "date": "Mon, Jun 26, 2000 (17:15)", "body": "Get Back To Today Quickly A quick way to return to Today in the DateBook app is to press the DateBook button. This will return you to the daily view for Today. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 5, "author": "MarciaH", "date": "Tue, Jun 27, 2000 (15:07)", "body": "Is Desktop Getting The Wrong Date? If the Palm is set to display day/month/year and the desktop computer is set to month/day/year, then the following problem will occur. When you pick a date from the little calendar, such as the 3rd of April, the calendar will show 3/4/2000 in the date field on the entry box. When you hit add, however, it will immediately place the entry in the 4th of March. To correct this problem, make sure your desktop computer and the Palm are set to the same date format. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_palm.txt.hp"}, {"response": 6, "author": "MarciaH", "date": "Wed, Jun 28, 2000 (21:37)", "body": "Frozen Buttons? If you're using a Palm V and suddenly notice your unit isn't reacting to buttons or screen presses, check the contrast button at the top to make sure it's not stuck. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 7, "author": "MarciaH", "date": "Thu, Jun 29, 2000 (12:15)", "body": "Mask Private Records The Security application in Palm OS 3.5 now lets you \"mask\" private records in addition to hiding them completely. This is useful when searching for the important memo that you forgot you had made private, or if you want to keep an appointment in your datebook private. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 8, "author": "MarciaH", "date": "Fri, Jun 30, 2000 (13:21)", "body": "Find The Desktop Credits Easter Egg This Easter Egg works in both Desktop 1.0 and 2.0. -Open the Desktop. -Go to the Address List. -Click New to bring up a new entry. -Enter as the last name (without quotes): \"Who Wrote This?\" Make sure you capitalize the first letter of each word. -Mark this entry as Private. You'll see on the right, \"Shh...it's a secret.\" -Add a category called \"secret\". -Set the new entry to this category. You'll now see a list of credits for the Desktop application. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 9, "author": "MarciaH", "date": "Tue, Jul  4, 2000 (15:54)", "body": "Try The Taxi Cab Easter Egg The Taxi Cab appears as a small taxi that goes across your PalmPilot screen under certain conditions. Here's how to get it. -Go to Preferences/General Tab. -Draw a small circle counter-clockwise on the screen right above the calculator silk-screen button. If done properly, you should see an Easter Egg appear. -Now hold down the Page Down button in any application (some users have reported that you might need to exit the Prefs app) and draw a line from the middle of the Graffiti input area to the left edge of the screen right between the applications and menu silk-screen buttons. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 10, "author": "MarciaH", "date": "Wed, Jul  5, 2000 (14:30)", "body": "Is The Web Page Still Loading? If you're surfing the Web and nothing seems to be happening, check the nearly microscopic vertical bar in the upper right corner of the screen. If it's blinking, your Web page is still loading. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 11, "author": "MarciaH", "date": "Thu, Jul  6, 2000 (13:14)", "body": "Decorate the Interiors of Your Folders Wallpaper your folders any way you want. Double-click My Computer and click through to the folder you want to customize. From the View menu, select Customize this Folder. Choose the radio button labeled \"Choose a background picture.\" Then click the Browse button and choose the graphics file you want to use to wallpaper your folder. Should you only want to choose a solid color, check the Background box located under the heading Icon caption colors. Then click the existing color and choose a new one from the pop-up palette. Tip provided by CNET Help.com"}, {"response": 12, "author": "MarciaH", "date": "Thu, Jul  6, 2000 (15:09)", "body": "Scroll With Your Stylus While Web surfing with ProxiWeb, get into the habit of dragging your stylus up and down the screen. This method of scrolling is smoother and more controlled than whacking the plastic scroll buttons. This tip was submitted by Handango.com. Click here to download ProxiWeb http://download.cnet.com/downloads/0-10126-108-41607.html - Tip provided by CNET Help.com"}, {"response": 13, "author": "MarciaH", "date": "Fri, Jul  7, 2000 (16:24)", "body": "Use Duplicate Email Accounts For Your Palm And PC If you use one of the direct-dial-to-Internet email programs, consider establishing a separate email account just for your PalmPilot. Otherwise, you may get into the nightmare of having duplicate messages on your PalmPilot and PC, and you may never be quite clear on which ones you've answered or where you read something. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 14, "author": "MarciaH", "date": "Sat, Jul  8, 2000 (20:13)", "body": "If anyone wants to read the Honolulu Star-Bulletin online on their PalmPilot http://starbulletin.com/indext.html"}, {"response": 15, "author": "MarciaH", "date": "Mon, Jul 10, 2000 (12:18)", "body": "Stop The Auto-Shutdown If you don't want your PalmPilot to shut off automatically to save battery power, use one of the secret Dot Commands: Draw the ShortCut symbol (a lowercase cursive L), a period, and then the number three. Now the Palmtop will only turn off when you actually do it yourself. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 16, "author": "MarciaH", "date": "Tue, Jul 11, 2000 (13:47)", "body": "Trigger Menu Commands With The Command Stroke Menu commands can be easily triggered without tapping them. Learn to use the faster Graffiti menu shortcuts: Draw a slash (bottom to top) and write the initial of the command you want. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 17, "author": "MarciaH", "date": "Wed, Jul 12, 2000 (13:11)", "body": "Search Quickly With The File Command If text is highlighted at the moment you tap the Find icon, that text is automatically copied into the Find blank. This tip was submitted by Handango.com. - Tip provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_palm.txt.hp Top Tech News from CNET's NEWS.COM Software company sues Oracle in patent dispute http://news.cnet.com/news/0-1003-200-2241023.html?tag=st.ne.1003.thed.ni"}, {"response": 18, "author": "MarciaH", "date": "Fri, Jul 14, 2000 (12:20)", "body": "Fast Datebook Entry When entering a timed event, go to the right side of the Palm graffiti area and enter a time and the datebook will open to the \"set time\" page and highlight the time. Sometimes you may have to enter an \"A\" or a \"P\" if the event is AM or PM. If your Palm's internal clock is in the PM and the event is in the PM, you just have to enter the time. This tip was submitted by Palm Gear H.Q.. - Tip provided by CNET Help.com"}, {"response": 19, "author": "MarciaH", "date": "Tue, Jul 18, 2000 (19:01)", "body": "Email Distribution Lists In Address Book, set up a category called Email lists (this step is not actually necessary--just more neat). Create a new entry with the Last Name field called, for example, \"Email Friends.\" Enter (or copy in) your distribution list (a series of email addresses separated by a comma and then a space) in the Email field. Do the same for other distribution lists you want to create (e.g. \"Email Office,\" \"Email Clients,\" and so on) all prefixed with \"Email\" so they will be grouped together. Then, when you are creating a new message in Mail, just enter \"email\" (or part thereof) in the \"To\" field, do a Lookup, and all the distribution lists are there to choose from. This tip was submitted by Palm Gear H.Q.. - Tip provided by CNET Help.com"}, {"response": 20, "author": "MarciaH", "date": "Tue, Aug 15, 2000 (19:47)", "body": "PocketPyro MP3 Player Here's one hot portable MP3 player! The PocketPyro plugs into any Palm PDA to turn that boring digital planner of yours into a musical travel companion. This mighty-mini device also offers enhancements for file storage, voice recording, database server and text-to-speech. Check it out now! http://hardware.mp3.com/hardware/individual/pda/3001.html?cp=pocketpyro_title"}, {"response": 21, "author": "MarciaH", "date": "Tue, Aug 15, 2000 (19:58)", "body": "Eudora for Palm Pilot Palm Computing Platform Sync your email fast with Eudora 4.3.2. Manage your incoming and outgoing email, and browse the Web anytime, anywhere. Eudora Internet Suite\ufffd (EIS) bundles three components and offers them in one easy download. With EIS\ufffd, a Palm OS\ufffd device and a wireless/wired Internet connection, you can now:"}, {"response": 22, "author": "MarciaH", "date": "Tue, Aug 15, 2000 (19:59)", "body": "The URL for the Eudora above: http://www.eudora.com/internetsuite/"}, {"response": 23, "author": "MarciaH", "date": "Mon, Aug 21, 2000 (15:17)", "body": "Today's Palm Tip: Get the Latest Version of HotSync Check CNET Download.com for the latest version of the Palm HotSync app. If you've got Palm tips of your own that you'd like to share, submit them here. Get more Palm how-tos and tips here. Get answers to your Palm questions here. Looking for more help with Palm? Try our Palm Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 24, "author": "MarciaH", "date": "Tue, Aug 22, 2000 (21:03)", "body": "1. This Week's Top 10 Handheld Downloads IN PALM: 1. TetrisV 4,312 downloads 2. Noah Lite English dictionary 2,499 downloads 3. DopeWars 1,944 downloads 4. FireViewer (PC only) 1,881 downloads 5. BDicty 1,329 downloads 6. Blocks 1,305 downloads 7. 4T Personal 1,263 downloads 8. Palm Bar 1,256 downloads 9. Casino 1,105 downloads 10. SilverScreen 1,068 downloads Find all of CNET Download.com's most popular Palm files for PCs here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0DJDG Find all of CNET Download.com's most popular Palm files for Macs here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0DJEH IN WINDOWS CE: 1. GigaBar 1,668 downloads 2. Windows Media Player (CE Palmtop) 942 downloads 3. PocketTV 742 downloads 4. StarTap (CE Palmtop) 700 downloads 5. Primer PDF Viewer 679 downloads 6. ActiveSync 607 downloads 7. Resco Password LITE 497 downloads 8. JIS Game Pack (CE handheld, MIPS) 485 downloads 9. Drop 4 369 downloads 10. Blocks (CE Handheld, MIPS) 364 downloads Find all of CNET Download.com's most popular Windows CE files here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0DJFI _______________________________________________________________ 2. Palm Pick of the Week GALACTIC REALMS Version 2.1 File size: 102k License: Shareware ($20) Minimum requirements: PC, Mac, Palm OS 2.0 Galactic Realms is a real-time strategy game set in outer space. Throughout your journey, you must mine asteroids to finance your mission, build bases and factories, and effectively manage your star fleet in order to destroy your enemy. Version 2.0 now features color support for the Palm IIIc, speedier gameplay, and an overhaul of many previous game features. Blast off: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7N6 Find all of our latest Palm picks for the PC here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0DJIL Find all of our latest Palm picks for the Mac here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0DhU2 _______________________________________________________________ 3. New Releases and Updates for Palm Programs IN HOME AND PERSONAL: - AMY REILY'S POCKET VINEYARD 1.0 License: Shareware ($19.95) Minimum requirements: PC, Mac, Palm OS 3.0 Try out Amy Reily's Palm-based wine guide: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7O7 IN GAMES: - CRAZY 8'S 3.1 License: Shareware ($5) Minimum requirements: PC, Mac, Palm OS 1.0 Play crazy eights on your Palm: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7P8 IN APPLICATIONS: - SYNCTALK 1.01 License: Demo ($19.95) Minimum requirements: PC, Mac, Palm OS 3.0 Exchange information between your Palm OS, Windows CE, Pocket PC and EPOC32 devices: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0veP IN APPLICATIONS: - QUESTBASE2000 1.0 License: Shareware ($1) Minimum requirements: PC, Mac, Palm OS 3.0 Study for your IS/IT-related exams on your Palm: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7QA IN INTERFACE ENHANCEMENTS: - SYSTEMSOUNDSPLUS 1.0 License: Freeware Minimum requirements: PC, Mac, Palm OS 2.0 Check out this free alarm sound replacement for Palm OS 3.x. http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7RB Looking for more Palm downloads? Find all of the latest PC updates here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0UKQ Find all of the latest Mac updates here: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0DuL6 _______________________________________________________________ 4. Windows CE Pick of the Week HPC SPELL Version: 2.4 File size: 3.6MB License: Demo ($19.95) Minimum requirements: Windows CE 2.0 or Pocket PC HPC Spell 2.4 is a spell checker for Microsoft Windows- powered Pocket PC, Handheld PC, and Palm-Size PC. The spell checker features its own interface designed to resemble the Windows Notepad. In addition to the basic notepad functionality, you can check your spelling, set spell- checking options, and send email using any default mail service. HPC Spell includes a large English dictionary containing over 90,000 words. Spell it out: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7L4 Find all of our latest Windows CE picks here: http://download.cnet.com/downloads/0,10151,0-10003-105-0-1-4,00.html _______________________________________________________________ 5. New Releases and Updates for Windows CE Programs IN UTILITIES: - DEVELOPER ONE TASKVIEW TODAY (Pocket PC) 3.01 License: Shareware ($19.95) Minimum requirements: Pocket PC Add a Task screen to help you better organize the to-do list on your Pocket PC: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7TD IN INTERNET: - Klondike WAP Browser for Pocket PC 1.0 License: Demo ($39.95) Minimum requirements: Pocket PC Browse the web from your wireless Pocket PC: http://1.digital.cnet.com/cgi-bin1/flo?y=eu70BxpGz0Lq0D7UE IN UTILITIES: - Resco Password Lite 1.0 License: Free Minimum requirements: Windows CE 2.11 Unlock your Windows CE devices using your own signature as a password: http://1.d"}, {"response": 25, "author": "MarciaH", "date": "Thu, Aug 24, 2000 (12:26)", "body": "1. CHECK YOUR CELL PHONE'S RADIATION LEVEL The FCC requires manufacturers to file and test the radiation levels of their cell phones. The only problem is that the info is buried on the FCC's site. Well, with the help of DoMode, we tracked down the numbers for many models. Check out our chart and see how your phone rates. http://1.digital.cnet.com/cgi-bin1/flo?y=eva0BxpG10KS0EAff __________________________________________________________ 2. THE MATING GAME Remember Qualcomm's pdQ smart phone, the Palm/cell hybrid? Seen anybody carrying it? Probably not. But Executive Editor David Carnoy says next-generation smart phones due this fall will have more appeal. Click below to get the inside scoop. http://1.digital.cnet.com/cgi-bin1/flo?y=eva0BxpG10KS0EAgg ___________________________________________________________ 3. RETURN OF HYBRID With the next generation of smart phones due to arrive this fall, we got an early look at LG's TP3000, an impressive new touch-screen model that has PDA functionality, Web access, and email--all for less than $400. Click below for full review. http://1.digital.cnet.com/cgi-bin1/flo?y=eva0BxpG10KS0EAhh ____________________________________________________________ 4. TEN TO WATCH As businesses try to keep pace with the wireless revolution, some will make the next round, and some won't. We take a look at 10 companies to keep your eye on. Click below to find out who they are. http://1.digital.cnet.com/cgi-bin1/flo?y=eva0BxpG10KS0EAii _____________________________________________________________ 5. INSTANT SERVICE SELECTOR Picking the right cell service plan can be a nerve-racking decision. But we cut through all the mumbo-jumbo and break down your choices by what type of user you are. Click on the link below to see if you match one of our 5 user profiles. http://1.digital.cnet.com/cgi-bin1/flo?y=eva0BxpG10KS0EAjj _ software conference Main Menu"}]}]}