Administrivia - Virus warningsFrom: Beyond Security Support (email@example.com)
- Previous message: firstname.lastname@example.org: "[NT] DynuFtpServer Security Vulnerabilities"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: "Beyond Security Support" <email@example.com> To: <firstname.lastname@example.org> Subject: Administrivia - Virus warnings Date: Mon, 3 Sep 2001 00:22:08 +0200 Message-ID: <013c01c133fd$b4260ea0$fe01a8c0@aviram>
We received dozens of Virus warnings from various anti virus
applications that complained about 'malicious code' in our article
Please note that the code in the article is not 'live'. That is - it
cannot be activated since it's "quoted". In order to actually run the
code, you would need to intentionally paste it into an HTML file and
open it in a browser. Simply viewing the article or the e-mail message
in an HTML capable mailer application will have no affect.
This is true for all 'exploit code' that sometimes appear in our
articles. Being a security mailing list, our articles occasionally
contain 'malicious code', but it will never be activated by simply
reading the article, but rather it will be 'quoted' or disabled.
-- Beyond Security Ltd. http://www.BeyondSecurity.com http://www.SecuriTeam.com
Know that you're safe: http://www.AutomatedScanning.com
This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.