Frank da Cruz
Columbia University Academic Information Systems
Most recent update:
Wed Sep 11 10:39:54 2002
This page was written for the Columbia University community but might be
useful to a wider audience. It does not represent current Columbia
University Academic Information Systems (AcIS) policy or mainstream AcIS
directions, nor indeed mainstream thinking. It describes a way of using your
Windows PC in combination with central Unix servers and the Internet that
keeps your PC safe from hostile attack as well as from data loss due to
natural disaster or accident, and is offered as an example of one relatively
experienced person's working environment. All opinions herein are mine alone.
Contents . . .
UPnP Buffer Overflows,
. . . What next?
- How Bad Is It?
- Is All of This Inevitable?
- How to Ignore Viruses and Get Your Work Done
- The Junk Mail Plague
In this age of viruses, worms, hackers, crackers, swindlers, and actual
terrorists, computer security has taken on an unprecedented urgency. Although
every platform (and the network itself) has its security holes, the current
rash of incidents is primarily due to the following facts:
- A single platform -- Microsoft Windows on Intel-based PCs -- dominates
the computer market and the Internet;
- This platform is enormously complex and full of bugs;
- In many cases, it is open by default to outside connections;
- Dangerous features are enabled by default (e.g. in the mail, office, and web clients);
- Its users tend to not to be "computer experts", nor do they want to be.
A single attack can affect millions of Internet-attached PCs in the space of a
day. When your PC is infected with a virus, not only can it suffer damage,
but it can also be transformed into a weapon to launch new attacks in
your name or your company's name against your friends, relatives, colleagues,
customers, and the world at large.
network administration, once the province of highly trained professionals, is
suddenly the responsibility of all people who have an Internet-attached PC.
Microsoft Windows comes in two basic varieties (leaving aside the palmtops,
set-tops, etc): Windows 95 and its descendents (Windows 98 and ME), and
Windows NT and its descendents (Windows 2000 and XP). PCs preloaded with
these operating systems attract customers by a combination of low cost, cute
graphics, ease of learning, and market pressure ("it's what everybody uses").
Ease of learning requires that all features be enabled by default so people
don't have to go through confusing technical configuration dialogs, or indeed
know or learn anything at all. Such features include:
- Shared disks and printers.
- A mail client that automatically launches helper applications for incoming
- Applications that automatically run macros and scripts embedded in data.
Each of these is an entry point for attacks. Windows 9x/ME adds to this
list a complete and utter lack of security in the local disk file system.
There is no concept of file ownership, group membership, access control,
protection or read / write / execute / delete permissions. All files are wide
open to anyone who can access your computer, for example in their "Network
Neighborhood". This includes your confidential files, personal information,
financial information, Web browsing history, security keys, and anything
else you might wish to keep private.
In Windows 98, ME, and NT, Personal Web Server (PWS) is installed by default,
and this is carried forward automatically when upgrading to Windows 2000,
where PWS is converted to Internet Information Server (IIS); this, plus the
inevitable bugs in these services, is the basis for buffer overflow attacks
like Code Red.
Every few weeks a new worm or virus plunges the planet into another
panic. Often these viruses can be removed from your PC only by
reformatting your hard disk,
reinstalling the operating system from trusted media, reinstalling all of your
applications, and then patching and upgrading everything before you
reconnect your PC to the network. You can not restore your own data files
(even if you had backed them up) without danger of reintroducing the
virus. Meanwhile, you are expected to constantly patch and upgrade Windows
and your applications, install virus protection and intrusion alert software,
and patch and update that software too, on AT LEAST A DAILY BASIS, to
guard against known viruses. But of course this is no defense against new
viruses exploiting as-yet unknown bugs and loopholes.
Windows started out as a convenience, but now keeping up with all the
patches and security alerts and recovering from attacks can be a full-time
job. The constant struggle against worms and viruses makes every person
and organization that uses Windows PCs less efficient and often a burden to
others. People lose their work, often great amounts of it. Companies lose
vital business information. Credit card info is stolen, altered, or
published. Critical web sites and servers are compromised. Organizations
must install switched networks, firewalls, and filters and hire new security
staff at great expense, driving up costs and prices and/or causing layoffs,
and this still does not solve the fundamental problem.
There is no "last bug" in Windows, no "last patch" to make Windows
safe. (Here we are a year later -- September 2002 -- when you can
freshly posted at the Microsoft website: "Because of the nature of hacking,
there is almost no way to fully certify a computer as 'clean' of all malicious
software or changes that are made during the hack.") Meanwhile a senior
Microsoft executive says,
"We really haven't
done everything we could to protect our customers... Our products just aren't
engineered for security"
(Infoworld 5 Sep 2002).
The worldwide Internet opens your PC up to a virtually limitless
number of hackers who, by the very Law of Large Numbers coupled with the low
price and universality of PCs and the vast complexity of Windows, will find
the next bug or hole, and the next, and the next. The process will only
intensify as time goes on, as long as Windows and Intel dominate the market
and the Internet. (In fairness, the same thing might happen with any other
dominant platform, such as Linux, but at least Unix-based operating systems are
designed from the beginning to be secure if properly administered, so attacks
on them are based more on bugs than on fundamental design deficiencies. In
any case, a better defense against planet-crippling viruses would be the
diversity of platforms we enjoyed prior to the mid-1990s.)
During the Code Red and Nimda onslaught of September and October of 2001, the
following document was researched and written by Jeff Altman of the Kermit
Project, who is also Columbia's resident security expert and Windows
expert, on what it takes to actually use Windows and its applications as
your primary computing environment:
Personally, I find the prospects laid out there both horrifying and sickening.
The amount of time and labor that goes into securing your Windows PC on a
continuing basis plus that required to recover from the inevitable
successful attack is staggering, especially considering that these devices
were bought in the first place to save us time and labor, and even then there
can be no guarantees of safety. And if you noticed that Jeff's article is
somewhat dated... Of course it is. Nobody has time to keep it up to date.
Constantly patching Windows and all its applications, not to mention writing
about how to do this and updating the document on a continuing basis, is far
too labor intensive to be an effective approach to security.
As anyone who used computers
before the Windows-and-Web explosion can tell you, it is quite possible to
get all your work done in a perfectly safe environment without bothering one
bit about viruses, worms, and hackers, even if you have an Internet-attached
Windows PC on your desk, even if it is up and running 24 hours a day. Begin
by closing the following holes:
- Disable File and Printer Sharing
- Control Panel -> Network ->
File and Print Sharing. If "I want to be able to give others access to
my files" and "I want to be able to allow others to print to my printers" are
checked, uncheck them. In every version of Windows the dialog is a bit
different; in XP it's
Control Panel -> Network Connections ->
Local Area Connection -> General ->
Properties, then uncheck the File and Printer Sharing for Microsoft
The initial configuration of a PC that was preloaded with Windows depends
on the PC vendor. We must assume that every vendor enables everything by
default in order to make their products more attractive, but we do not know
this for a fact.
- Don't Use Internet Explorer
- Use some other browser, such as
Netscape, instead. (Personally,
I try to stick with the oldest Netscape version I can get away with -- even if
its security certificates are expired -- since newer browsers are much
bigger, take MUCH longer to start, and are more likely to be full of dangerous
new undebugged features.) You might be able to make your browser safe by
going through all sorts of incomprehensible dialogs and applying many patches,
but you'll never really know. Anyway, since most Web-based attacks are aimed
at IE, it's better not to make yourself a target. In Netscape, Edit
-> Preferences -> Applications to
disable automatic launching of any Microsoft applications (e.g. .XLS
files launching Excel, .DOC files launching Word, etc) -- change each
of these to "Save to file" (go through the whole list, one by one).
websites (such as
However some versions of some browsers (notably IE) have bugs and/or
(e.g. in Netscape Edit -> Preferences
particular trusted site, enable it while you visit the site, then re-disable
it. This is especially important if you use a GUI email client, since people
- Don't Use a Microsoft E-Mail Client
- Same deal as with IE, but moreso. By default, Microsoft e-mail clients
such as Outlook allow anybody who sends you mail to RUN PROGRAMS ON YOUR
COMPUTER. And as with IE, even if you disable "everything", the program is
still potentially full of bugs that present inviting targets to hackers. But
worse, it's your Microsoft Outlook Address Book that is most often used as the
basis for further attacks (at first the attacks were directed against addresses
in your address book; more recently with
Klez, the addresses are used in
forged e-mail bombs, so it appears that not only you, but everybody in your
address book, is spamming and attacking the world). If you must use a GUI mail client, make it
CubMail (Columbia only) or
Netscape. Better yet, use a host-based mail client, explained below.
Avoid "free" Web-based e-mail systems (other than CubMail) for any number of
reasons: they transmit passwords in the clear, they violate your privacy
and/or author rights, etc.
- Don't Use Microsoft Word
- Any time Microsoft Word opens a document your computer can catch a virus.
This can happen if you open the document in Word's File menu, or if you
clicked on the document on your desktop or in a file list, or because Word is
registered as the "helper" application for .DOC files and can be
triggered by visiting a web page or opening an e-mail enclosure. If you need
to read Word files, use WordPad and register it as the helper application for
.DOC files (or else read them on a Unix-based platform with Antiword,
Star Office, or Open Office). If you need to create text files, use Notepad,
Wordpad, or (better yet) a text editor on the central servers (discussed
below) instead of Word.
- Don't Use Other Microsoft Office Applications Either
- Microsoft Word is
not the only package
with the macro language problem.
It's the entire Microsoft Office suite up to and including Office 2000.
Office XP is supposed to be more secure but who knows (and if it is secure, you
probably won't use it because security = inconvenience).
- Watch Out for Applications that Use Helper Applications
- If you use a PC-based email client, Web browser, or other application that
is not from Microsoft, it might still use Microsoft applications as helpers or
viewers for e-mail attachments, Web pages, or other documents. For example,
if a document is tagged as "Content-Type: application/msword;" or has
a name that ends with ".doc", your application software might feed it
to Word. For each application that you use or install, you must go through
its setup configuration to replace all dangerous associations with harmless
ones (you can -- and should -- do this Windows-wide but many applications
override the Windows-wide associations).
- Disable Internet Services
- You probably do not need to have Web servers, FTP servers, and the like
running on your desktop PC. Inviting connections from the outside world to
your own PC is like leaving your house open and posting a big
"rob me" sign on it. If you want to have a Website, put it in your
~/public_html/ directory on Cunix. Departments that are running
production Web servers on Windows (not to mention organizations outside
Columbia that do so) are in constant danger and are guaranteed to be
continuously probed and attacked from all over the world. Columbia departments
should move their websites to secure platforms in secure locations.
On 19 September 2001,
the Gartner Group recommended that
hit by both Code Red and Nimda immediately investigate
alternatives to IIS, including moving Web applications to Web server
software from other vendors, such as iPlanet and Apache."
- Don't Run Peer-to-Peer Software
- If you are serious about computer safety, you won't use your PC as an
entertainment center. Running Internet "peer-to-peer" software --
-- to share commercial music and videos might or might not be legal or
ethical, but it is dangerous because it opens your computer up to
incoming Internet connections and you don't know what the software is
doing (click on the Kazaa link to see what I mean).
You probably don't have the source code, and if you do, you
probably didn't read and understand every line of it, and anyway since there
is no business relationship between you and its authors, you can't hold them
responsible for what happens to your PC. The same is true for games,
expecially Internet-based multiplayer ones. Using this software is also
dangerous because it exposes you and/or your school or employer to possible
criminal prosecution and lawsuits. It's not worth the risk. Support the
artists you like by purchasing their CDs or DVDs.
In summary, don't use any Microsoft applications, don't use any other
applications that automatically execute embedded programs or scripts or macros
in their data files (this can include
viewers and even
and don't open your PC to incoming network connections, including disk or
While you're at it, learn to be a good network citizen. Software
vendors don't make this easy for you because they want you to become hooked on
their products and force others to use them. Some points to keep in mind:
If you can type reasonably well and are willing to give up automatic opening
of e-mail attachments you can work with complete safety and a great deal more
efficiently in a "world of text", just as virtually everyone did prior to 1995
(so how hard can it be?). Consider that AcIS maintains a vast armada of fast,
secure Unix-based Sun servers,
known collectively as
you can access with a terminal emulator. These servers let you:
- If your e-mail consists of only words, send it as plain text. Avoid
fancy formats like HTML and especially proprietary ones like Microsoft Word.
Note that PC-based e-mail clients tend to send fancy formats by default so
you have to go out of your way to make them stop.
- Remember that not everybody on earth has Windows. Some people use
Macintoshes, Linux or other forms of Unix, VMS, IBM mainframes, and all sorts
of other platforms. Don't assume they can handle Windows-specific formats.
- Don't put enclosures in your e-mail without prior agreement. People
who receive unexpected enclosures put themselves at risk whenever they open
them, so if they have any sense they won't open them.
- Don't create websites that take advantage of the very latest feature of
a particular browser or "authoring system". Such pages will almost certainly
not be readable by those who do not have compatible browsers, and in any case
are more likely to present security risks.
- Read and send e-mail with Pine, MM, or EMACS.
- Read and post netnews with Pine, Trn, Slrn, or other text-based newsreader.
- Edit text files with EMACS, Pico, Vi, Vim, or other Unix-based editor.
- Format documents for typesetting with TeX, LaTeX, Scribe, or Troff.
- Write, compile, debug, and execute computer programs in a variety of
languges including C, C++, LISP, Fortran, Java, and Perl.
- Use a number of scientific and statistics packages such as Matlab, SPSS,
SAS, Minitab, S-Plus, etc.
- Share files safely with your friends and colleagues at Columbia using
a flexible system of permisions and group membership.
- Make connections to other computers on the Internet with Telnet, SSH, FTP,
IRC, Lynx, Gopher, you name it.
- Access CLIO and other Columbia information services with ColumbiaNet.
In fact, this is how everybody at Columbia -- students, faculty, and staff --
used computers in the decades prior to Windows and the Web. It takes a little
time to learn text editing with
but the time is well invested, since EMACS is extremely powerful. Not only
can it do anything you can think of, but it is far less labor intensive
than a GUI point-and-click editor, which requires constant hand movement
between keyboard and mouse, endless grovelling through menus, and so forth
(favoring the novice or casual user over the experienced or heavy user). To
get started with EMACS, just type "emacs" at the Cunix shell prompt, then type
Ctrl-h (hold down the Ctrl key and press the "h" key, then let go of the Ctrl
key) and then press the "t" key for a tutorial.
If you need to use Microsoft applications like Outlook, Access, Excel,
Powerpoint, or Word on your PC, you can still do so, but do it with your eyes
open. Don't allow incoming network material (e-mail, web pages) to launch
these applications automatically. Launch them yourself by hand only on
trusted material, and then only after disabling all forms of macro
execution and other dangerous features in these applications (and reading all
the latest CERT security alerts about macro
viruses and vulnerabilities).
But what is trusted material? Good question. You have no way of knowing
in advance that a data file for an MS Office component -- Word, Excel, Access,
etc -- does not contain a virus, even if the file comes from a trusted friend
or colleague or family member, because they might be passing along a virus
without knowing it. You can test the file in advance with a virus scanner,
but the virus might be a new one that the virus scanner doesn't know
Here are some of the benefits of a host-based, text-based work
- The central systems are safe. They are administered by computer
professionals who follow the daily security bulletins and install any
necessary patches immediately. It's their full-time job. Since the patches
are central, everybody benefits from them at once.
- The central file systems are redundant and backed up. Even
in the worst conceivable disaster, you would not lose more than a day's work.
In the normal disaster (a disk fails), a hot standby shadow disk is activated
automatically, transparently to you, and not even one character is lost.
- E-mail viruses scroll past harmlessly in your terminal window. You
are immune to e-mail viruses like Iloveyou, Melissa, SirCam, Nimda,
and all those yet to come.
- Plain-text files do not carry viruses. The mere
act of loading a text file into an editor or displaying it on the screen,
or even just having it in your directory or referring to its name, does not
put you at risk in a text-mode Unix session.
- Plain text is transportable and immortal. "Rich text" such as that
produced by word processors is product-specific and therefore intelligible
only to other people who have the same product. It quickly becomes
undecipherable and useless as products change or expire. Plain-text ASCII
documents, on the other hand, written as long ago as the 1960s are perfectly
legible and valid today, and will remain so into the distant future, unlike
much more recent documents created by now- (or soon-to-be-) defunct word
processors. This applies to HTML and its successors too; not long ago we were
told that HTML 1.0 would be immortal and that everything should be converted
to it; now just a few years later, HTML 4.0 declares everything in HTML 1.0 to
be "legacy" and "deprecated", and HTML itself is increasingly considered
passé in the neverending procession of self-proclaimed standards.
- You aren't distracted by a constant procession of photos, cartoons,
video clips, sound effects, animations, muzak, and pop-up promotions. You
can focus on your work.
- You receive important notices automatically when you log in. You
can also receive emergency broadcast messages while you are logged in. These
valuable services were forgotten when everybody started using the Web instead
of centralized shell accounts , but they still exist. Web users tend not to go
digging throught the AcIS pages every five minutes to find out what's
happening and therefore receive no notification of server or network outages,
modem pool problems, security threats, and so forth.
You can access the central Unix servers securely from Windows by using
Columbia students, faculty, and staff can download Kermit 95 from the
Distribution Center; other universities can get low-cost
ACADEMIC SITE LICENSES; individuals anywhere
can download it from
Kermit 95 is a product of AcIS's own
Kermit Project and is therefore
naturally in tune with the Columbia computing and security environment. Like
EMACS, it has a bit of a learning curve because it has a lot to offer. It's
not just a terminal emulator; it also lets you:
- Make securely authenticated and encrypted SSH, Telnet, or Rlogin
- Transfer files in your terminal session.
- Use languages besides English in your terminal session.
- Write scripts to automate anything you could do by hand.
And lots more. CLICK HERE for a tutorial.
The Kermit 95 command prompt can even be a more powerful and
friendly alternative to the Windows shell.
My time-tested Windows setup is simple: one Netscape window plus
several Kermit 95 windows acting as Kerberized (i.e. secure) Telnet clients to
Columbia or other hosts (and at the moment, I also have one copy of Kermit 95
accepting incoming connections on the HTTP port so I can harmlessly absorb,
log, and automaticaly report Code Red and Nimda attacks via a
script). In the Kermit 95 terminal windows:
- I create and edit files on the Unix host with
This includes program source code, Web pages (like this one), E-Mail,
articles, and any other kind of text. Since I'm a fast touch-typist, EMACS
allows me to work quickly since I never have to move my hands away from the
home keys. Other host-based fullscreen text editors include Pico, Vi, and
Vim. Line or stream oriented editors are available too (such as sed, ed, ex)
but are used mainly in scripts, not by humans.
You don't need a "Web authoring system" to create a web page. Simple pages
like the one you are looking at can be entered easily by typing text plus a
few embedded HTML commands into a text editor. To see how easy this can be,
just tell your browser to "View Source" of this page. Web pages like this one
can be read by any web browser, whereas pages generated by Frontpage or
the like are inevitably designed to work with only one browser and break all
the others. All Cunix users automatically have their own websites: it is the
public_html subdirectory of your Cunix login directory; just make a
publicly-readable index.html file there and you have a home page.
- I read and send mail on the Unix host with MM, a
text-mode prompt-and-command e-mail client written here at Columbia in the
1980s. Viruses arrive constantly, just as they do for everyone else, but with
a text-based e-mail client, you see them rather than catch them.
Simply delete them as you would any other junk mail. Other host-based
text-mode email clients include
(a fullscreen menu-driven client with some support for attachments) and EMACS
Rmail. Pine is easiest to get started with, but MM is easier to use once you
know how, and it's faster and more efficient. (On the other hand, I think
Pine -- unlike MM -- includes some support for non-ASCII character sets.)
A special advantage of host-based text-mode e-mail clients is that they send
e-mail in simple and universal plain text format. An ordinary text message
consisting of a few sentences or paragraphs arrives at its destination in
exactly that form. But when you send e-mail with a Windows- or Web-based
e-mail client, it usually arrives in some hideous, bloated, and often
product-specific format that the recipient might not even be able to read,
often with viruses added. These gratuitous conversions of plain to "rich"
text are wasteful, unnecessary, impolite, and often destructive. Soon you
will find yourself wishing your correspondents sent you plain-text
messages, and perhaps even asking them to do it.
- I read and post netnews with
a text-mode Threaded News Reader.
Others are available, including
(which has an intuitive EMACS-like interface, complete with menus),
(another fullscreen newsreader, but with a Vi-like interface),
EMACS itself (its Rnews command),
and some of the e-mail packages (such as
but not MM). Free Web-based netnews sites are available too, but they tend to
have the same drawbacks as free Web-based e-mail sites: transmission of clear
text passwords, privacy concerns, author rights, . . .
- If I need to produce publication-quality typeset material, I use
TeX, LaTeX, Scribe, Nroff, or Troff on the host.
These are far more powerful and flexible than "what-you-see-is-what-you-get"
word processing, and less labor intensive. Scribe and LaTeX, in particular,
provide for massive and highly structured documents including not just the
expected font selection and control (regular, bold, italic, proportional /
monospace, big, small, etc), but also bibliographies and citations, footnotes,
multilevel index, automatic chapter, section, and page numbering, automatic
generation of the Table of Contents, internal cross references, text in
multiple languages and scripts, change bars, figures, tables, mathematical
equations, and so on, plus the ability to change style elements globally, thus
allowing the same document to be output in many forms and styles, as well as
for many different kinds of printing devices and typesetters. For example,
Scribe includes a built-in database of "style sheets" for a number of
journals, allowing the same article to be submitted to one, then the next and
the next, simply by running it through Scribe again and requesting the
pertinent style. Although Microsoft Word might have begun to approach this
level of usefulness (20 years later), there are big differences. MS Word
files tend to "decay" as Word itself changes out from under them. And MS Word
files themselves are incomprehensible outside of Word, whereas Scribe and
(La)TeX source files are plain text, readable by humans. Even after Scribe
and (La)TeX cease to exist, their source files are legible and easily
convertible to the next thing -- XML or whatever. And host-based editors and
text formatters don't put viruses in your computer or your documents.
- I transfer files back and forth within my terminal session using
C-Kermit on the
Cunix host, which interoperates with Kermit 95 on my PC.
- All my work is backed up automatically
because my files and e-mail reside on a central host.
When reading e-mail:
- Kermit 95 automatically highlights all URLs. If I Ctrl-click on a URL in
the Kermit 95 terminal screen, Kermit sends the URL to Netscape (first
starting the browser if necessary) and the page pops up automatically.
- I can print messages using MM's PRINT command, either on a Unix printer or
on my PC's locally attached (or network) printer via Kermit 95's pass-through
printing feature. You can do this in Pine too.
- I can view attachments before deciding what to do with them. Most of them
are junk and can be deleted and ignored. If something comes that might be
important, but is encoded, I can save it to disk and run it through
or uudecode to decode it and then decide how to handle it. If it's a Word
document, I can ask the person to resend as plain text, or I can view it with
Antiword on Cunix, or I can
download it to my PC with Kermit and look at it with WordPad. If I am certain
the messages contains only picture enclosures (.jpg, .gif,
etc) I can use the somewhat more convenient method of viewing them described
- If mail arrives in some strange character set, I can change Kermit 95's
character-set to match so I can see the message with the correct characters:
Spanish, German, Norwegian, Polish, Czech, Russian,
Greek, Armenian, you name it.
This setup is not necessarily for everybody, but I recommend it for people
- Can type well.
- Use computers more for work or school than for entertainment.
- Don't mind reading documentation.
(The last point might be stated better as, "don't mind investing a little
time to learn tools that improve their productivity for years to come.")
If you fall into this category, perhaps the tradeoffs -- learning curve and
certain limitations, versus time and work lost due to viruses, not to mention
the damage they can do to others -- are worth it.
Remember: if you have a Windows PC connected to the Internet, then even
if you update and patch the OS and applications and antivirus and
intrusion-detection software every day, you're still not safe. Attacks
come first, the patches against them follow later. While you are sleeping,
your PC and/or files could be damaged and your PC could be used as a launchpad
for attacks against thousands of other computers, most likely including those
of your colleagues, friends, family, and business contacts -- the ones in your
Windows address book.
By mid-2002, the
worm had done a fair job of reducing the signal-to-noise ratio of Internet mail
by yet another order of magnitude. Every morning when I arrive at work and
read my e-mail, not only do I have preposterous messages from all over the
world, full of worms, viruses, get-rich schemes, scams, pornography, and
what else (even virus-laden ads for anti-virus products!), but it seems
that I also have been busy sending these messages myself while I slept since
much of my new mail is bounce notifications for e-mail from me to random
addresses all over the planet containing the same assortment of viruses,
worms, get-rich-quick schemes, etc.
Of course I did not send these messages, Klez did. Nor did the messages come
from my computer. Klez puts my address, which it picked out of other
peoples' address books, in the message's From: header; a closer
examination of the headers shows the true origin of the message -- the
person's computer where my address was found (or another one subsequently
infected from there, and so on).
One of the more
bizarre side effects of this phenomenon is that, without knowing it, I am
sending "tech-support requests" to companies all over the globe and
subscribing to every conceivable kind of mailing list, further clogging my
mailbox with automated responses and unwanted mass mailings. At this writing
(Aug 2002) only about 1 in a 100 e-mail messages I receive is legitimate.
Columbia University as a whole receives about a quarter million Klez messages
At least by using a text-based email client, I don't propogate this avalanche
of letter bombs and junk mail. My mailbox is a Klez "sink" and my PC never
becomes another Klez source. I have a full view of each message so I can
easily tell whether it's forged by comparing the sender's address with the
source address added by our local SMTP server.
[ Top ]
[ CERT ]
[ UNIX ]
[ EMACS ]
[ Pine ]
[ MM ]
[ Kermit ]
[ AcIS Documentation ]
[ CU Computing History ]
Safe Computing / firstname.lastname@example.org /
Sep 2001 - Aug 2002