lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: smenard at nbnet.nb.ca (Steve Menard)
Subject: Dig SCO?

they have moved to

www.thescogroup.com

Here is their Partner Alert  from Monday AM  ;-)

 From - Mon Feb  2 10:00:48 2004
X-UIDL: -==-=-=-=-=-=-=-=-=-=-=-
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <TeamSCO@....rsc01.com>
Received: from om-thescogroup.rgc3.net ([66.35.244.29])
           by simmts1-srv.bellnexxia.net
           (InterMail vM.5.01.06.05 201-253-122-130-105-20030824) with 
ESMTP       id 
<20040202130902.PTTS5069.xxxxx.xx.x.x.x@...thescogroup.rgc3.net>
           for <XXXX@....XX>; Mon, 2 Feb 2004 08:09:02 -0500
Received: by om-thescogroup.rgc3.net id XXXXXX; Mon, 2 Feb 2004 05:09:02 
-0800 (envelope-from <TeamSCO@....rsc01.com>)
MIME-Version: 1.0
Content-Type: text/plain;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 2 Feb 2004 05:09:02 -0800
From: "SCO Partner Program" <TeamSCO@....rsc01.com>
Reply-To: "SCO Partner Program" <partners@....com>
Subject: SCO Partner Alert - MyDoom and Novarg Work-Arounds
X-cid: caldera.XXXX.X
To: XXXXX@...X.XX
Message-Id: <20040202130902.PTTSXXX9.XXXXX@...thescogroup.rgc3.net>



SCO Partner Alert:

* Mydoom or Novarg Virus Work-arounds
* Mirrored availability of SCO Web site at http://www.thescogroup.com

As you are probably aware, on Monday, January 26, a computer virus 
called Mydoom (Network Associates' name) or Novarg (Symantec's name) 
spread quickly across the Internet. Antivirus companies have determined 
that this worm is coded such that computers infected with the Mydoom 
variant are set to conduct a distributed denial of service (DDOS) attack 
against www.sco.com from February 1 - 12.

In short, the virus is activated when users open an innocent-looking 
e-mail message that contains an attached program file (with a .bat, 
.cmd, .exe, .pif, .scr, or .zip extension) which then accesses the 
user's e-mail address book and sends itself to all of that user's 
contacts. The offending e-mail message usually arrives with a subject 
line such as "Test," "Hi," or "Mail Transaction Failed."

The SCO Group boldly condemns this latest action, and is taking several 
active steps to fight against acts of cyber-terrorism such as that 
launched by the creator(s) of the Mydoom virus.

* On January 27, SCO announced that we are offering a reward of up to a 
total of $250,000 for information leading to the arrest and conviction 
of the individual(s) responsible for creating the Mydoom virus.

* SCO is working closely with U.S. law enforcement authorities including 
the U.S. Secret Service and the Federal Bureau of Investigation (FBI) to 
determine the identity of the Mydoom creator(s)

* SCO is launching a "mirrored" Web site (which will provide all of the 
information currently available at www.sco.com) to continue business as 
usual with partners and customers - see http://www.thescogroup.com

As a valued SCO Solution Provider, your uninterrupted, successful SCO 
UNIX business is important to us. If you are unable to connect to the 
information or resources that you need during the targeted dates of the 
Mydoom virus, please contact SCO right away. For general issues, you can 
call 1-800-SCO-UNIX or e-mail SCO at partners@....com.  For sales 
specific concerns, you can call our Inside Sales team at 1-800-726-6561.

Thank you for your continued support,

Darl McBride
President & CEO
The SCO Group


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ