Folks, FYI, I received the below post from McAfee this morning. Gina **** Dear Eugenia: Two variants of the Melissa virus, Melissa.u and Melissa.v, are being reported in numerous locations. Both viruses arrive in the form of an infected Word document attached to email. When the infected document is opened, the virus infects Word's global template, Normal.dot. Once the global template is infected, all future Word documents will be infected. Because these variants spread rapidly via email, delete data, and are being widely reported, AVERT Labs has placed both viruses on the AVERT Watch List with an initial risk asessment of medium. To identify infected emails, look at the subject line and body text of the message. The subject line for an email infected with Melissa.u is "pictures" and the body tag is "what's up?". The subject line for an email infected with Melissa.v is "My Pictures" and the body tag is blank. If you receive an email with either of these two subject lines, do not open the attachment. Delete the email immediately! Both variants delete data and spread very rapidly. Melissa.U invokes a MAPI email client and sends itself to the first four email addresses in your Address Book (including distribution lists). It then attempts to render your system inoperable by deleting the following system files: c:\io.sys, d:\command.com, d:\io.sys, c:\Ntdetect.com, c:\Suhdlog.dat, and d:\Suhdlog.dat Melissa.v invokes a MAPI client and sends itself to the first forty addresses in your Address Book. It then attempts to delete files and directories in the root of mapped drives with the following letters: M, N, O, P, Q, S, F, I, X, Z, H, and L. An infection of either variant within an organization can cause the loss of numerous files due to the viruses' actions on mapped drives. .... McAfee.com
This PTG archive page provided courtesy of Moy Piano Service, LLC