[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Your bill



Mogelijke Virusbesmetting, gevaarlijke blijlage

Geachte,

Alle bestanden met de extensies die uitermate risicovol zijn voor
virusbesmettingen worden geblokkeerd. Zo zijn BAT, COM, PIF, SCR, VBE
en VBS geblokkeerd.
Voor een volledige (engelse) lijst zie onderin deze mail.

Deze blokkering geldt ook voor de inhoud van ZIP-bestanden!

Tevens zijn enkele risicovolle HTML-commando's niet toegestaan,
te weten: frames, Iframes, layers, embed, en object.

UW MAIL IS DUS NIET AFGELEVERD!

---------------------------------------------------------------------
Wanneer u ervan overtuigd bent dat u het bericht niet gestuurd heeft
is het zeer wel mogelijk dat dit virus onder uw naam verzonden is,
maar niet door u gestuurd! In dat geval kunt u dit bericht negeren.
---------------------------------------------------------------------

Hello,

All files with the extensions that are extremely sensitive to virusses
are blocked. I.e. the extensions BAT, COM, PIF, SCR, VBE and VBS are
blocked. For a complete list of blocked extensions, see below.

This block is also used for the contents of ZIP-files!

Some risky HTML commands are also blocked, they are:
frames, Iframes, layers, embed and object.

Therefore: YOUR MAIL WAS NOT DELIVERED!

---------------------------------------------------------------------
If you are convinced you have not sent the message it is verry likely
that this virus sent the message in your name! In that case you can
ignore this mail.
---------------------------------------------------------------------

Blocked extensions:

.bat            Possible malicious batch file script
.bhx            Possible malicious BinHex Compressed ASCII Archive
.chm            Possible compiled Help file-based virus
.cmd            Possible malicious batch file script
.cnf            Possible SpeedDial attack
.com            Possible malicious self executing DOS file
.cpl            Possible malicious control panel item
.exe            Possible malicious self executing file
.hta            Possible Microsoft HTML archive attack
.ins            Possible Microsoft Internet Comm. Settings attack
.js[e]?         Possible Microsoft JScript attack
.lnk            Possible Eudora *.lnk security hole attack
.ma[dfgmqrstvw] Possible Microsoft Access Shortcut attack
.mim            Possible malicious MIME File
.mhtml          Possible Eudora meta-refresh attack
.pif            Possible MS-Dos program shortcut attack
.reg            Possible Windows registry attack
.scf            Possible Windows Explorer Command attack
.scr            Possible virus hidden in a screensaver
.sct            Possible Microsoft Windows Script Component attack
.shb            Possible document shortcut attack
.shs            Possible Shell Scrap Object attack
.uu[e]?         Possible malicious Compressed Archive File
.vb[es]         Possible Microsoft Visual Basic script attack
.ws[cfh]        Possible Microsoft Windows Script Host attack
.xnk            Possible Microsoft Exchange Shortcut attack
.xxe            Possible malicious Xxencoded File
.zip            Detection dangerous files with the extensions
                listed above
Specific detection:
.zip            Specific detection on known ZIP-file viruses
.rar & other    and other virusses in compressed archives

  ?    = anny character      /      [es] = character 'e' or 's'



Reply to: