Re: Your bill
Mogelijke Virusbesmetting, gevaarlijke blijlage
Geachte,
Alle bestanden met de extensies die uitermate risicovol zijn voor
virusbesmettingen worden geblokkeerd. Zo zijn BAT, COM, PIF, SCR, VBE
en VBS geblokkeerd.
Voor een volledige (engelse) lijst zie onderin deze mail.
Deze blokkering geldt ook voor de inhoud van ZIP-bestanden!
Tevens zijn enkele risicovolle HTML-commando's niet toegestaan,
te weten: frames, Iframes, layers, embed, en object.
UW MAIL IS DUS NIET AFGELEVERD!
---------------------------------------------------------------------
Wanneer u ervan overtuigd bent dat u het bericht niet gestuurd heeft
is het zeer wel mogelijk dat dit virus onder uw naam verzonden is,
maar niet door u gestuurd! In dat geval kunt u dit bericht negeren.
---------------------------------------------------------------------
Hello,
All files with the extensions that are extremely sensitive to virusses
are blocked. I.e. the extensions BAT, COM, PIF, SCR, VBE and VBS are
blocked. For a complete list of blocked extensions, see below.
This block is also used for the contents of ZIP-files!
Some risky HTML commands are also blocked, they are:
frames, Iframes, layers, embed and object.
Therefore: YOUR MAIL WAS NOT DELIVERED!
---------------------------------------------------------------------
If you are convinced you have not sent the message it is verry likely
that this virus sent the message in your name! In that case you can
ignore this mail.
---------------------------------------------------------------------
Blocked extensions:
.bat Possible malicious batch file script
.bhx Possible malicious BinHex Compressed ASCII Archive
.chm Possible compiled Help file-based virus
.cmd Possible malicious batch file script
.cnf Possible SpeedDial attack
.com Possible malicious self executing DOS file
.cpl Possible malicious control panel item
.exe Possible malicious self executing file
.hta Possible Microsoft HTML archive attack
.ins Possible Microsoft Internet Comm. Settings attack
.js[e]? Possible Microsoft JScript attack
.lnk Possible Eudora *.lnk security hole attack
.ma[dfgmqrstvw] Possible Microsoft Access Shortcut attack
.mim Possible malicious MIME File
.mhtml Possible Eudora meta-refresh attack
.pif Possible MS-Dos program shortcut attack
.reg Possible Windows registry attack
.scf Possible Windows Explorer Command attack
.scr Possible virus hidden in a screensaver
.sct Possible Microsoft Windows Script Component attack
.shb Possible document shortcut attack
.shs Possible Shell Scrap Object attack
.uu[e]? Possible malicious Compressed Archive File
.vb[es] Possible Microsoft Visual Basic script attack
.ws[cfh] Possible Microsoft Windows Script Host attack
.xnk Possible Microsoft Exchange Shortcut attack
.xxe Possible malicious Xxencoded File
.zip Detection dangerous files with the extensions
listed above
Specific detection:
.zip Specific detection on known ZIP-file viruses
.rar & other and other virusses in compressed archives
? = anny character / [es] = character 'e' or 's'
Reply to: