Dale Botkin wrote: > On Thu, 21 Mar 2002, Milan Pavlica YU7AEC wrote: > > Is there any chances that PIC mail list server get those KAV for > > scanning emails? > > No. Not unless, of course, you want to write one that runs on an IBM > mainframe under VM, and then get a job at MIT and convince your boss to > let you install it. Should only take 15 years or so. > > If Admin is interested, maybe all of us can donate to buy such product > > to save us (our time, projects, HDD data etc etc etc)?!?!?!? > > A much simpler solution would be for all Windows users to take the basic > precaution of using antivurus software, and NOT RUNNING UNSOLICITED > EXECUTABLES rceived via email. This was an old virus sent as a .BAT file, > there's really no reason anyone should have been fooled. Virus scanning > on the current list server simply isn't going to happen. > > Dale It is unfortunate that MIT doesn't have the resources to do virus proofing of MD. As I understand it, Majordomo is a series of Perl scripts that call the various system resources to process the list mail. Our local MD has been modified to trap virus propagation by recognizing key text in the viruses/worm, and bouncing such messages to the list admin (I run a few lists off our local MD, so I've seen this). Our MD also changes the extension of common executables (bat, exe, pif, VBS, etc.) so that they can't be easily executed. The user still gets their attachments, but they really have to want to run them since they are forced to rename the file before they can execute it. If the MIT guys are interested, I can put them in touch with our MD guru who would be quite happy to share the simple? mods that were made. Robert -- http://www.piclist.com#nomail Going offline? Don't AutoReply us! email listserv@mitvma.mit.edu with SET PICList DIGEST in the body