Tuesday, March 31, 2009

[PSP-Snags] Fw: nite

 
 
 
 
  Stat & Animation by Carol MH
Font Chinacat
 
June 2004
Used with permission of Precious Moments, Inc.©

--~--~---------~--~----~------------~-------~--~----~
PSP-Snags Google group: http://groups.google.com/group/PSP-Snags
Send to: psp-snags@googlegroups.com
Uunsubscribe: psp-snags-unsubscribe@googlegroups.com

http://groups.google.com/group/Cartoon-PSP * http://groups.google.com/group/Disney-Tubes * http://groups.google.com/group/PSP-Snags-Adult * http://I-Love-Tutorials.com/chat * http://I-Love-PSP.com * http://PSP.I-Love-Disney.com * http://I-Love-Cartoons.com * http://I-Love-Disney.com *  http://KTimothy.com * http://Disney-Stationary.com * http://Disney-Kingdom.com * http://Disney-Clipart.com

This is a private email and is covered by TITLE 18, PART I, CHAPTER 47, Sec. 1030 and Internet Privacy Law. Sharing done, within this group, is for personal use only - NOT FOR PROFIT
NO COPYRIGHT INFRINGEMENT IS INTENDED.
Group owner is not responsible for the sends/opinions of its members
-~----------~----~----~----~------~----~------~--~---

[PSP-Snags] Looking for these Alphas Please

 
 
I had all these at one time but Last December my computer crashed and I am trying to replace Everything.
I would be so grateful if some one would help me out
Thank You Carolyn





__,_._,___

--~--~---------~--~----~------------~-------~--~----~
PSP-Snags Google group: http://groups.google.com/group/PSP-Snags
Send to: psp-snags@googlegroups.com
Uunsubscribe: psp-snags-unsubscribe@googlegroups.com

http://groups.google.com/group/Cartoon-PSP * http://groups.google.com/group/Disney-Tubes * http://groups.google.com/group/PSP-Snags-Adult * http://I-Love-Tutorials.com/chat * http://I-Love-PSP.com * http://PSP.I-Love-Disney.com * http://I-Love-Cartoons.com * http://I-Love-Disney.com *  http://KTimothy.com * http://Disney-Stationary.com * http://Disney-Kingdom.com * http://Disney-Clipart.com

This is a private email and is covered by TITLE 18, PART I, CHAPTER 47, Sec. 1030 and Internet Privacy Law. Sharing done, within this group, is for personal use only - NOT FOR PROFIT
NO COPYRIGHT INFRINGEMENT IS INTENDED.
Group owner is not responsible for the sends/opinions of its members
-~----------~----~----~----~------~----~------~--~---

adobe.photoshop.macintosh - 25 new messages in 11 topics - digest

adobe.photoshop.macintosh
http://groups.google.com/group/adobe.photoshop.macintosh?hl=en

adobe.photoshop.macintosh@googlegroups.com

Today's topics:

* 2009 Macs and Peripherals :: General Discussion :: Chapter III - 2 messages,
2 authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/c2f0ebcc850b85d0?hl=en
* Photoshop into Web (all 3 questions) - 3 messages, 2 authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/c3140cfa14d3a977?hl=en
* Photoshop CS4 Extended Graphics Error - 1 messages, 1 author
http://groups.google.com/group/adobe.photoshop.macintosh/t/6a579f6030ac676e?hl=en
* iMac 24 in. OK for Photoshop/Desktop Publishing? - 2 messages, 2 authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/5a7ef9a1d90844ca?hl=en
* Tool bar incomplete - 1 messages, 1 author
http://groups.google.com/group/adobe.photoshop.macintosh/t/230fe6989f1a843b?hl=en
* OpenGL not working on Mac OSX 10.5.6 Intel 2 Duo - 3 messages, 2 authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/e84c12f51b132208?hl=en
* CS2 to CS4? - 1 messages, 1 author
http://groups.google.com/group/adobe.photoshop.macintosh/t/5f0890b5abca2308?hl=en
* Keyboard zoom functionality has changed?? Can I change it back?? - 4
messages, 3 authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/c0c1f3d9ef85cd99?hl=en
* 3D Transform filter for PS CS3 not extended - 3 messages, 3 authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/f19f08a8872e82a7?hl=en
* How to get default full screen mode in CS4 - 1 messages, 1 author
http://groups.google.com/group/adobe.photoshop.macintosh/t/c91dd63a471804ac?hl=en
* Help? Colour Mismatch between Photoshop & Apple screenshot - 4 messages, 3
authors
http://groups.google.com/group/adobe.photoshop.macintosh/t/f865eb0eb6bc47f3?hl=en

==============================================================================
TOPIC: 2009 Macs and Peripherals :: General Discussion :: Chapter III
http://groups.google.com/group/adobe.photoshop.macintosh/t/c2f0ebcc850b85d0?hl=en
==============================================================================

== 1 of 2 ==
Date: Tues, Mar 31 2009 4:18 pm
From: Neil_Keller@adobeforums.com


Buko,

Jumper placement can determine whether it is a 1.5 or 3.0 SATA drive.

===

Linda,

A jumper is a tiny "strap" that bridges two of the terminal pins you'll see on the end of the drive adjacent to where the power and signal cables connect, and change certain drive characteristics. You probably don't need it, but you should verify.

The options for formatting don't seem to include HSF+. I'm writing the
drive to zeros using Mac OS Extended (Journaled).


HFS+ is Mac OS Extended.

Neil


== 2 of 2 ==
Date: Tues, Mar 31 2009 5:03 pm
From: Ramón_G_Castañeda@adobeforums.com


Jumper: <http://www.hardwaresecrets.com/imageview.php?image=11110>

==============================================================================
TOPIC: Photoshop into Web (all 3 questions)
http://groups.google.com/group/adobe.photoshop.macintosh/t/c3140cfa14d3a977?hl=en
==============================================================================

== 1 of 3 ==
Date: Tues, Mar 31 2009 4:28 pm
From: Neil_Keller@adobeforums.com


[First question was answered in previous post.]


== 2 of 3 ==
Date: Tues, Mar 31 2009 4:33 pm
From: Neil_Keller@adobeforums.com


The word is meant to be part of the graphic unit--it is not meant to be
text that search engines might find. Can that word be any typeface in
the world, as part of a graphic element, or must it be a typeface found
on most computers?


If the type is converted to a graphic element (just pixels, not live type), you can use any font in the world or anything you make up.

Does it matter in any way whether that graphic unit above


You have some flexibility here -- but why not just create the graphic in Photoshop?

Neil


== 3 of 3 ==
Date: Tues, Mar 31 2009 4:37 pm
From: Buko


you can use any font you want as long as you own it.

==============================================================================
TOPIC: Photoshop CS4 Extended Graphics Error
http://groups.google.com/group/adobe.photoshop.macintosh/t/6a579f6030ac676e?hl=en
==============================================================================

== 1 of 1 ==
Date: Tues, Mar 31 2009 4:39 pm
From: Chandler_Moss@adobeforums.com


this fixed the program error for me, at least for the time being. i do use the opengl drawing thing quite a bit though, i hope they fix this. i also hope its not my machine (1 year old macbook pro). i also speeded things up on my machine by having a separate scratch disk that i plug in (a firewire 800 drive) which i thought was the program error problem at first. some of the files that were not able to open i was able to initially open by duplicating them and then opening them. but not today--i haven't been able to open anything until i turned off the opengl drawing preference. good luck whoever you are! i know how frustrating this is--believe me, i almost slammed my computer on the ground today when it wouldn't open my files!

note that overall the opengl feature, i feel, is pretty rad though--i love being able to draw and rotate the entire canvas to match the orientation of my drawing capabilities!

==============================================================================
TOPIC: iMac 24 in. OK for Photoshop/Desktop Publishing?
http://groups.google.com/group/adobe.photoshop.macintosh/t/5a7ef9a1d90844ca?hl=en
==============================================================================

== 1 of 2 ==
Date: Tues, Mar 31 2009 4:43 pm
From: PShock@adobeforums.com


Just a note about the 8GB RAM limitation of the 2009 Mac Pro Quad Core.
That was Apple's stated limit all right but OWC has just released 4 GB
Modules for that model which increases the limit to 16 GB.


Thanks for that Welles. I suspected this would be the case eventually.

Hey Allen - hate to be one to say I told you so, but ... I told you so! :)

Yeah, I know - a 16GB RAM (4x4GB) 4-Core box would only be about $100 cheaper than a 16GB (8x2GB) 8-core box so not much point. But the moral of the story is Apple's limit ain't always the limit. 4GB chips will get cheaper too.

-phil


== 2 of 2 ==
Date: Tues, Mar 31 2009 5:16 pm
From: Lundberg02@adobeforums.com


The last company I worked for in-house was a defense contractor and they experienced laptop thefts every month, along with cel phones and chargers, you couldn't leave them out. Some sonofabitch on the night shift even stole my wife's father's big magnifier that was over 100 yrs old. Cost me 80 bucks to replace. You couldn't hide it, I guess they just walked out carrying it at midnight.

==============================================================================
TOPIC: Tool bar incomplete
http://groups.google.com/group/adobe.photoshop.macintosh/t/230fe6989f1a843b?hl=en
==============================================================================

== 1 of 1 ==
Date: Tues, Mar 31 2009 4:46 pm
From: Buko


first thing I would do is trash prefs.

this is covered in the FAQs if you don't know how.

==============================================================================
TOPIC: OpenGL not working on Mac OSX 10.5.6 Intel 2 Duo
http://groups.google.com/group/adobe.photoshop.macintosh/t/e84c12f51b132208?hl=en
==============================================================================

== 1 of 3 ==
Date: Tues, Mar 31 2009 4:51 pm
From: Ramón_G_Castañeda@adobeforums.com


Steve,

Actually, only 128 MB VRAM on board


Just curious: Could one drive two monitors off one single card with only 128 MB VRAM? The thought of running Photoshop with a single monitor often escapes my mind.


== 2 of 3 ==
Date: Tues, Mar 31 2009 6:08 pm
From: Buko


Could one drive two monitors off one single card with only 128 MB VRAM?


Yes.

I did this with the 6600LE that came stock with the G5


== 3 of 3 ==
Date: Tues, Mar 31 2009 6:10 pm
From: Ramón_G_Castañeda@adobeforums.com


I did this with the 6600LE that came stock with the G5


And you had OpenGL in CS4 with that card?

==============================================================================
TOPIC: CS2 to CS4?
http://groups.google.com/group/adobe.photoshop.macintosh/t/5f0890b5abca2308?hl=en
==============================================================================

== 1 of 1 ==
Date: Tues, Mar 31 2009 4:58 pm
From: Ramón_G_Castañeda@adobeforums.com


Tiffany,

If you have Photoshop 9.0.2 ("CS2") installed and running, you should be able to register it online through its Help menu,

==============================================================================
TOPIC: Keyboard zoom functionality has changed?? Can I change it back??
http://groups.google.com/group/adobe.photoshop.macintosh/t/c0c1f3d9ef85cd99?hl=en
==============================================================================

== 1 of 4 ==
Date: Tues, Mar 31 2009 4:59 pm
From: Ramón_G_Castañeda@adobeforums.com


Yes, it has. I can confirm that.


== 2 of 4 ==
Date: Tues, Mar 31 2009 5:42 pm
From: "Vee S"


Yes it has, zoom resizes windows is on by default.

This was the case in previous versions of Photoshop? I assumed the OP was coming from a previous version so this preference may be entirely new, no?


== 3 of 4 ==
Date: Tues, Mar 31 2009 5:52 pm
From: Buko


Zoom resizes the Windows in CS4 too.

Zoom has always resized windows as a default setting.

the OP at some point changed that pref and forgot.


== 4 of 4 ==
Date: Tues, Mar 31 2009 6:18 pm
From: "Vee S"


Zoom resizes the Windows in CS4 too.

Zoom has always resized windows as a default setting.

the OP at some point changed that pref and forgot.

Ok, I don't remember this being on by default in other previous versions but maybe that's because they were PC (which is where the OP might've been coming from).

==============================================================================
TOPIC: 3D Transform filter for PS CS3 not extended
http://groups.google.com/group/adobe.photoshop.macintosh/t/f19f08a8872e82a7?hl=en
==============================================================================

== 1 of 3 ==
Date: Tues, Mar 31 2009 5:03 pm
From: ELLEN_LAND@adobeforums.com


CAN SOMEONE PLEASE SEND ME THE PLUG IN FOR 3D TRANSFORM FOR MAC CS3 PHOTOSHOP?

MY E-MAIL ADDRESS IS AVANTNY@AOL.COM

MUCH APPRECIATED


== 2 of 3 ==
Date: Tues, Mar 31 2009 5:06 pm
From: Ramón_G_Castañeda@adobeforums.com


First of all, stop shouting, Ellen. All caps are rude and hard to read on screen.

Second, your request is illegal.

Third, please come back to the forum to look for replies. Email communications are strongly discouraged.

Email responses would defeat the purpose of the forum, which is for everybody to benefit from all questions and answers, not just the original poster.


== 3 of 3 ==
Date: Tues, Mar 31 2009 6:06 pm
From: Buko


the question is will a Photoshop 7 filter work in CS3?

keep in mind Adobe updates the filters for every version and do not recommend using old filters as they will cause problems.

==============================================================================
TOPIC: How to get default full screen mode in CS4
http://groups.google.com/group/adobe.photoshop.macintosh/t/c91dd63a471804ac?hl=en
==============================================================================

== 1 of 1 ==
Date: Tues, Mar 31 2009 5:09 pm
From: Ramón_G_Castañeda@adobeforums.com


I'm confused here


Yup.

==============================================================================
TOPIC: Help? Colour Mismatch between Photoshop & Apple screenshot
http://groups.google.com/group/adobe.photoshop.macintosh/t/f865eb0eb6bc47f3?hl=en
==============================================================================

== 1 of 4 ==
Date: Tues, Mar 31 2009 5:24 pm
From: Lundberg02@adobeforums.com


Where do you set screenshots to be jpg, in Preview? I don't see it anywhere.


== 2 of 4 ==
Date: Tues, Mar 31 2009 5:50 pm
From: Ramón_G_Castañeda@adobeforums.com


I do it through "Screenshots", a third-party preference panel accessible through Apple menu > System Preferences > Screenshots.

<http://www.pixentral.com/show.php?picture=1hjdSszuV8cyh9MvShsDRQ6iseuTF>

It can also be done through Cocktail and other utilities.


== 3 of 4 ==
Date: Tues, Mar 31 2009 5:55 pm
From: Buko


I use cocktail. Preview has nothing to do with screenshots being saved.


== 4 of 4 ==
Date: Tues, Mar 31 2009 6:08 pm
From: Ramón_G_Castañeda@adobeforums.com


If you're comfortable with the Terminal, that's all you need.


==============================================================================

You received this message because you are subscribed to the Google Groups "adobe.photoshop.macintosh"
group.

To post to this group, visit http://groups.google.com/group/adobe.photoshop.macintosh?hl=en

To unsubscribe from this group, send email to adobe.photoshop.macintosh+unsubscribe@googlegroups.com

To change the way you get mail from this group, visit:
http://groups.google.com/group/adobe.photoshop.macintosh/subscribe?hl=en

To report abuse, send email explaining the problem to abuse@googlegroups.com

==============================================================================
Google Groups: http://groups.google.com/?hl=en

[fnftwo] Fw: Photo Shop Sale

Adobe Photo Shop Elements 7 on sale at Nothing But Software for $59.95.  http://www.nothingbutsoftware.com/clk.asp?P=48615&U=1&ai=3648
 

[ellenspsp_sharing] SEACHELL'S_SPEED



resend of scrap kit link worked at time of sending

 
 
 

 

YOU CAN SHARE SAFELY

 

 

 

http://rapidshare.com/files/212055517/S_Spe.rar.html

 
FREE Animations for your email - by IncrediMail! Click Here!




__._,_.___


Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___

[ellenspsp_sharing] SEACHELL'S_SPEED



Link worked at time of sending


 
 
 

 

YOU CAN SHARE SAFELY

 

 

 

http://rapidshare.com/files/212055517/S_Spe.rar.html

 
FREE Animations for your email - by IncrediMail! Click Here!




__._,_.___


Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___

[fnftwo] Scrap Tuesday - Bling Sapphire

Hello friends ............. Here is my "Tuesday Scrap Day" contribution for this week.
 
The kit is called "Bling - Blue Sapphire" and can be found at the following link if anyone is interested.
 
http://sophisticatedscraps.blogspot.com/              
 
Click on the "Here" near the top-right where it says "My Older Kits"
This will take you to Lisa's "4-Shared" page where she has a lot of goodies for free.
 
In the meantime, I am attaching the flower and the heart-shaped gem for anyone who may want them.
 
Thanks for looking.
 
Hugs, Judy
___________________________________________
 
 
 
 
 

Re: [photoshop-beginners] Re: Can anyone recommend a CD or DVD on Photoshop training?

photoshop top secret is the best!!!i have  a copy of this dvd..

also best of photoshop user magazines - 8th year tutorial

if u want a copy email me if your from the philippines.


From: William Callahan <wpcallahan@yahoo.com>
To: photoshop-beginners@yahoogroups.com
Sent: Monday, March 30, 2009 6:39:08 AM
Subject: [photoshop-beginners] Re: Can anyone recommend a CD or DVD on Photoshop training?

You are not the only "Ole Dog" here, I too grew up on Tri X, although I stuck to medium format, and not 4x5. I quit shooting about 25 years ago, and just started again, so understand your learning curve problem. The Deke McClellan books are excellent, the Photoshop for Dummies being the best for your case, I believe. Another source you might want to try is is Lynda.com.

Lynda.com offers online learning in all the areas, Photoshop, digital photography, all the software for anything from "Picasa" and easy software to "Illastrator" . They have all the major DVD libraries to teach these, and you can access them online and learn anything at your own pace. It's good for guys like us, because we can see it over and over, and watching video gets me past the all the things tech savvy people assume I know but don't. Check them out, you can try some of the lessons first before you decide. I think it's $25/MO, but you can learn a lot in 1 month, a lot more than you would for a $25 book. You can also download lessons I believe, but not sure. So, basically you can learn everything and anything there, and then ask specific questions and tips here. Ansel Adams was a master, but he might have committed suicide if he had to learn CS4.

I am new at modifying digital photos. I grew up with a 4x5 camera and old Tri-X black-and-white film, so you know I'm a dinosaur. No exposure meters, no autofocus. Had to set the shutter speeds and F-stops manually, and reload the sheet-film holders in total darkness.

Now, can anyone point me to a good training or tutoring program on CD or DVD so that I can learn Photoshop or GIMP?



HOTMAIL, GMAIL, ….ACCOUNTS?
Invite your friends from Hotmail, Gmail to Yahoo! Messenger today!

__._,_.___


Please check out our sister group, attachments allowed-Photoshop by Example http://groups.yahoo.com/group/ps-by-ex/ =========Members Map http://www.frappr.com/photoshopbeginners ========




Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___

[The_Ultimate_Tut_Site] New tut - PTU Scrapkit - NO AC - Animated

on my blog http://kaystutorials.blogspot.com/

Purple Swirls



__._,_.___


Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___

[PSP-Snags] Re: Just forwarding this

Yep just read this from msnbc
 
 
 
-------Original Message-------
 
From: muse to u
Date: 3/31/2009 8:17:33 PM
Subject: [PSP-Snags] Re: Just forwarding this
 
Yes, it is true:

Here is the info I have:
Don't expect your virus program to pick it up...
 
Here is what I have:
 

This is serious....  Beware.  Make sure your virus programs, malware programs, and Windows updates are all up to date before April 1.  And don't wait until the last minute on March 31; the servers will be busy.

 
                               
 
 

http://tech.yahoo.com/blogs/null/128643/beware-conficker-worm-come-april-1/

 

and

 

http://coolonline.wordpress.com/2009/03/31/secure-against-conficker-worm/

Clicker worm

If your computer is infected with this worm, you may not experience any symptoms, or you may experience any of the following symptoms:

    * Account lockout policies are being tripped.
    * Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender, and Error Reporting Services are disabled.
    * Domain controllers respond slowly to client requests.
    * The network is congested.
    * Various security-related Web sites cannot be accessed.

For more information about Win32/Conficker.b, visit the following Microsoft Malware Protection Center Web page:
http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker (http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker)
Back to the top
Propagation methods
Win32/Conficker.B has multiple propagation methods. These include the following:

    * Exploitation of the vulnerability that is patched by security update 958644 (MS08-067)
    * The use of network shares
    * The use of AutoPlay functionality

Therefore, you must be careful when you clean a network so that the threat is not reintroduced to systems that have previously been cleaned.
Back to the top
Prevention
Stop Conficker from spreading by using Group Policy
Notes

    * This procedure does not remove the Conficker malware from the system. This procedure only stops the spread of the malware. You should use an antivirus product to remove the Conficker malware from the system. Or, follow the steps in the "Manual steps to remove the Conficker.b variant" section of this Knowledge Base article to manually remove the malware from the system.
    * Please carefully read and understand the note in step 4 of this procedure.

Create a new policy that applies to all computers in a specific organizational unit (OU), site, or domain, as required in your environment.

To do this, follow these steps:

   1. Set the policy to remove write permissions to the following registry subkey:
      HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Svchost
      This prevents the random named malware service from being created in the netsvcs registry value.

      To do this, follow these steps:
         1. Open the Group Policy Management Console (GPMC).
         2. Create a new Group Policy object (GPO). Give it any name that you want.
         3. Open the new GPO, and then move to the following folder:
            Computer Configuration\Windows Settings\Security Settings\Registry
         4. Right-click Registry, and then click Add Key.
         5. In the Select Registry Key dialog box, expand Machine, and then move to the following folder:
            Software\Microsoft\Windows NT\CurrentVersion\Svchost
         6. Click OK.
         7. In the dialog box that opens, click to clear the Full Control check box for both Administrators and System.
         8. Click OK.
         9. In the Add Object dialog box, click Replace existing permissions on all subkeys with inheritable permissions.
        10. Click OK.
   2. Set the policy to remove write permissions to the %windir%\tasks folder. This prevents the Conficker malware from creating the Scheduled Tasks that can re-infect the system.

      To do this, follow these steps:
         1. In the same GPO that you created earlier, move to the following folder:
            Computer Configuration\Windows Settings\Security Settings\File System
         2. Right-click File System, and then click Add File.
         3. In the Add a file or folder dialog box, browse to the %windir%\Tasks folder. Make sure that Tasks is highlighted and listed in the Folder: dialog box.
         4. Click OK.
         5. In the dialog box that opens, click to clear the check boxes for Full Control, Modify and Write for both Administrators and System.
         6. Click OK.
         7. In the Add Object dialog box, click Replace existing permissions on all subkeys with inheritable permissions.
         8. Click OK.
   3. Set AutoPlay (Autorun) features to disabled. This keeps the Conficker malware from spreading by using the AutoPlay features that are built into Windows.

      To do this, follow these steps:
         1. In the same GPO that you created earlier, move to one of the following folders:
                * For a Windows Server 2003 domain, move to the following folder:
                  Computer Configuration\Administrative Templates\System
                * For a Windows 2008 domain, move to the following folder:
                  Computer Configuration\Administrative Templates\Windows Components\Autoplay Policies
         2. Open the Turn off Autoplay policy.
         3. In the Turn off Autoplay dialog box, click Enabled.
         4. In the drop-down menu, click All drives.
         5. Click OK.
   4. Disable the local administrator account. This blocks the Conficker malware from using the brute force password attack against the administrator account on the system.

      Note Do not follow this step if you link the GPO to the domain controller's OU because you could disable the domain administrator account. If you have to do this on the domain controllers, create a separate GPO that does not link the GPO to the domain controller's OU, and then link the new separate GPO to the domain controller's OU.

      To do this, follow these steps:
         1. In the same GPO that you created earlier, move to the following folder:
            Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
         2. Open Accounts: Administrator account status.
         3. In the Accounts: Administrator account status dialog box, click to select the Define this policy check box.
         4. Click Disabled.
         5. Click OK.
   5. Close the Group Policy Management Console.
   6. Link the newly created GPO to the location that you want it to apply to.
   7. Allow for enough time for Group Policy to update to all computers. Generally, Group Policy replication takes five minutes to replicate to each domain controller, and then 90 minutes to replicate to the rest of the systems. A couple hours should be enough. However, more time may be required, depending on the environment.
   8. After the Group Policy has propagated, clean the systems of malware.

      To do this, follow these steps:
         1. Run full antivirus scans on all computers.
         2. If your antivirus software does not detect Conficker, you can use the Malicious Software Removal Tool (MSRT) to clean the malware. For more information, visit the following Microsoft Web page:
            http://www.microsoft.com/security/malwareremove/default.mspx (http://www.microsoft.com/security/malwareremove/default.mspx)
            Note You may still have to take some manual steps to clean all the effects of the malware. To clean all the effects that are left behind by the malware, follow the steps that are listed in the "Manual steps to remove the Conficker.b variant" section of this Knowledge Base article.

Back to the top
Recovery
Run the Malicious Software Removal tool
The Microsoft Malware Protection Center has updated the Malicious Software Removal tool (MSRT). This is a stand-alone binary that is useful in the removal of prevalent malicious software, and it can help remove the Win32/Conficker malware family.

You can download the MSRT from either of the following Microsoft Web sites:
http://www.update.microsoft.com (http://www.update.microsoft.com)
http://support.microsoft.com/kb/890830 (http://support.microsoft.com/kb/890830)

For more information about specific deployment details for the MSRT, click the following article number to view the article in the Microsoft Knowledge Base:
891716  (http://support.microsoft.com/kb/891716/ ) Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment
Note The Stand-Alone System Sweeper tool will also remove this infection. This tool is available as a component of the Microsoft Desktop Optimization Pack 6.0 or through Customer Service and Support. To obtain the Microsoft Desktop Optimization Pack, visit the following Microsoft Web site:
http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx (http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx)
If Windows Live OneCare or Microsoft Forefront Client Security is running on the system, these programs also block the threat before it is installed.
Back to the top
Manual steps to remove the Conficker.b variant
The following detailed steps can help you manually remove Conficker.b from a system:

   1. Log on to the system by using a local account.

      Important Do not log on to the system by using a Domain account, if it is possible. Especially, do not log on by using a Domain Admin account. The malware impersonates the logged on user and accesses network resources by using the logged on user credentials. This behavior allows the malware to spread.
   2. Stop the Server service. This removes the Admin shares from the system so that the malware cannot spread by using this method.

      Note The Server service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on production servers because this step will affect network resource availability. As soon as the environment is cleaned up, the Server service can be re-enabled.

      To stop the Server service, use the Services Microsoft Management Console (MMC). To do this, follow these steps:
         1. Depending on your system, do the following:
                * In Windows Vista and Windows Server 2008, click Start, type services.msc in the Start Search box, and then click services.msc in the Programs list.
                * In Windows 2000, Windows XP, and Windows Server 2003, click Start, click Run, type services.msc, and then click OK.
         2. Double-click Server.
         3. Click Stop.
         4. Select Disabled in the Startup type box.
         5. Click Apply.
   3. Remove all AT-created scheduled tasks. To do this, type AT /Delete /Yes at a command prompt.
   4. Stop the Task Scheduler service.
          * To stop the Task Scheduler service in Windows 2000, Windows XP, and Windows Server 2003, use the Services Microsoft Management Console (MMC) or the SC.exe utility.
          * To stop the Task Scheduler service in Windows Vista or in Windows Server 2008, follow these steps.

            Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
            322756  (http://support.microsoft.com/kb/322756/ ) How to back up and restore the registry in Windows
               1. Click Start, type regedit in the Start Search box, and then click regedit.exe in the Programs list.
               2. Locate and then click the following registry subkey:
                  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule
               3. In the details pane, right-click the Start DWORD entry, and then click Modify.
               4. In the Value data box, type 4, and then click OK.
               5. Exit Registry Editor, and then restart the computer.
   5. Download and manually install security update 958644 (MS08-067). For more information, visit the following Microsoft Web site:
      http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx (http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx)
      Note This site may be blocked because of the malware infection. In this scenario, you must download the update from an uninfected computer, and then transfer the update file to the infected system. We recommend that you burn the update to a CD because the burned CD is not writable. Therefore, it cannot be infected. If a recordable CD drive is not available, a removable USB memory drive may be the only way to copy the update to the infected system. If you use a removable drive, be aware that the malware can infect the drive with an Autorun.inf file. After you copy the update to the removable drive, make sure that you change the drive to read-only mode, if the option is available for your device. If read-only mode is available, it is typically enabled by using a physical switch on the device. Then, after you copy the update file to the infected computer, check the removable drive to see whether an Autorun.inf file was written to the drive. If it was, rename the Autorun.inf file to something like Autorun.bad so that it cannot run when the removable drive is connected to a computer.
   6. Reset any Local Admin and Domain Admin passwords to use a new strong password. For more information, visit the following Microsoft Web site:
      http://technet.microsoft.com/en-us/library/cc875814.aspx (http://technet.microsoft.com/en-us/library/cc875814.aspx)
   7. In Registry Editor, locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
   8. In the details pane, right-click the netsvcs entry, and then click Modify.
   9. Scroll down to the bottom of the list. If the computer is infected with Conficker.b, a random service name will be listed. For example, in this procedure, we will assume the name of the malware service is "gzqmiijz". Note the name of the malware service. You will need this information later in this procedure.
  10. Delete the line that contains the reference to the malware service. Make sure that you leave a blank line feed under the last legitimate entry that is listed, and then click OK.

      Note All the entries in the following list are valid. Do not delete any of these entries. The entry that must be deleted will be a randomly generated name that is the last entry in the list.

      AppMgmt
      AudioSrv
      Browser
      CryptSvc
      DMServer
      EventSystem
      HidServ
      Ias
      Iprip
      Irmon
      LanmanServer
      LanmanWorkstation
      Messenger
      Netman
      Nla
      Ntmssvc
      NWCWorkstation
      Nwsapagent
      Rasauto
      Rasman
      Remoteaccess
      Sacsvr
      Schedule
      Seclogon
      SENS
      Sharedaccess
      Themes
      TrkWks
      TrkSvr
      W32Time
      WZCSVC
      Wmi
      WmdmPmSp
      winmgmt
      wuauserv
      BITS
      ShellHWDetection
      uploadmgr
      WmdmPmSN
      xmlprov
      AeLookupSvc
      helpsvc
      axyczbfsetg

  11. Restrict permissions on the SVCHOST registry key so that it cannot be written to again. To do this, follow these steps.

      Notes
          * You must restore the default permissions after the environment has been fully cleaned.
          * In Windows 2000, you must use Regedt32 to set registry permissions.
         1. In Registry Editor, locate and then click the following registry subkey:
            HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost
         2. Right-click the Svchost subkey, and then click Permissions.
         3. In the Permissions Entry for SvcHost dialog box, click Advanced.
         4. In the Advanced dialog box, click Add.
         5. In the Select User, Computer or Group dialog box, type everyone, and then click Check Names.
         6. Click OK.
         7. In the Permissions Entry for SvcHost dialog box, select This key only in the Apply onto list, and then click to select the Deny check box for the Set Value permission entry.
         8. Click OK two times.
         9. Click Yes when you receive the Security warning prompt.
        10. Click OK.
  12. In a previous procedure, you noted the name of the malware service. In our example, the name of the malware entry was "gzqmiijz". Using this information, follow these steps:
         1. In Registry Editor, locate and then click the following registry subkey, where BadServiceName is the name of the malware service:
            HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BadServiceName
            For example, locate and then click the following registry subkey:
            HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gzqmiijz
         2. Right-click the subkey in the navigation pane for the malware service name, and then click Permissions.
         3. In the Permissions Entry for SvcHost dialog box, click Advanced.
         4. In the Advanced Security Settings dialog box, click to select both of the following check boxes:
            Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here.

            Replace permission entries on all child objects with entries shown here that apply to child objects
  13. Press F5 to update Registry Editor. In the details pane, you can now see and edit the malware DLL that loads as "ServiceDll" To do this, follow these steps:
         1. Double-click the ServiceDll entry.
         2. Note the path of the referenced DLL. You will need this information later in this procedure. For example, the path of the referenced DLL may resemble the following:

             %SystemRoot%\System32\emzlqqd.dll

            Rename the reference to resemble the following:

             %SystemRoot%\System32\emzlqqd.old

         3. Click OK.
  14. Remove the malware service entry from the Run subkey in the registry.
         1. In Registry Editor, locate and then click the following registry subkeys:
            HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
            HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
         2. In both subkeys, locate any entry that begins with "rundll32.exe" and also references the malware DLL that loads as "ServiceDll" that you identified in step 13b. Delete the entry.
         3. Exit Registry Editor, and then restart the computer.
  15. Check for Autorun.inf files on any drives on the system. Use Notepad to open each file, and then verify that is a valid Autorun.inf file. The following is an example of a typical valid Autorun.inf file.

      [autorun]

      shellexecute=Servers\splash.hta *DVD*

      icon=Servers\autorun.ico

      A valid Autorun.inf is typically 1 to 2 kilobytes (KB).
  16. Delete any Autorun.inf files that do not seem to be valid.
  17. Restart the computer.
  18. Make hidden files visible. To do this, type the following command at a command prompt:
      reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 0x1 /f
  19. Set Show hidden files and folders so you can see the file. To do this, follow these steps:
         1. In step 13b, you noted the path of the referenced DLL file for the malware. For example, you noted a path that resembles the following:
            %systemroot%\System32\emzlqqd.dll
            In Windows Explorer, open the %systemroot%\System32 directory, or the directory that contains the malware.
         2. Click Tools, and then click Folder Options.
         3. Click the View tab.
         4. Select the Show hidden files and folders check box.
         5. Click OK.
  20. Select the DLL file.
  21. Edit the permissions on the file to add Full Control for Everyone. To do this, follow these steps:
         1. Right-click the DLL file, and then click Properties.
         2. Click the Security tab.
         3. Click Everyone, and then click to select the Full Control check box in the Allow column.
         4. Click OK.
  22. Delete the referenced DLL file for the malware. For example, delete the %systemroot%\System32\emzlqqd.dll file.
  23. Enable the BITS, Automatic Updates, Error Reporting, and Windows Defender services by using the Services Microsoft Management Console (MMC).
  24. Turn off Autorun to help reduce the effect of any reinfection. To do this, follow these steps:
         1. Depending on your system, install one of the following updates:
                * If you are running Windows 2000, Windows XP, or Windows Server 2003, install update 967715. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
                  967715  (http://support.microsoft.com/kb/967715/ ) How to correct "disable Autorun registry key" enforcement in Windows
                * If you are running Windows Vista or Windows Server 2008, install security update 950582. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
                  950582  (http://support.microsoft.com/kb/950582/ ) MS08-038: Vulnerability in Windows Explorer could allow remote code execution
            Note Update 953252 and security update 950582 are not related to this malware issue. These updates must be installed to enable the registry function in step 24b.
         2. Type the following command at a command prompt:
            reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 0xff /f
  25. If the system is running Windows Defender, re-enable the Windows Defender autostart location. To do this, type the following command at the command prompt:
      reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Defender" /t REG_EXPAND_SZ /d "%ProgramFiles%\Windows Defender\MSASCui.exe –hide" /f
  26. For Windows Vista and later operating systems, the malware changes the global setting for TCP Receive Window Auto-tuning to disabled. To change this setting back, type the following command at a command prompt:
      netsh interface tcp set global autotuning=normal

If, after you complete this procedure, the computer seems to be reinfected, either of the following conditions may be true:

    * One of the autostart locations was not removed. For example, either the AT job was not removed, or an Autorun.inf file was not removed.
    * The security update for MS08-067 was installed incorrectly

This malware may change other settings that are not addressed in this Knowledge Base article. Please visit the following Microsoft Malware Protection Center Web page for the latest details about Win32/Conficker.b:
http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker (http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker)
Back to the top
Verify that the system is clean
Verify that the following services are started:

    * Automatic Updates (wuauserv)
    * Background Intelligent Transfer Service (BITS)
    * Windows Defender (windefend) (if applicable)
    * Windows Error Reporting Service

To do this, type the following commands at the command prompt. Press ENTER after each command:

Sc.exe query wuauserv
Sc.exe query bits
Sc.exe query windefend
Sc.exe query ersvc

After each command runs, you will receive a message that resembles the following:
SERVICE_NAME: wuauserv
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE,NOT_PAUSABLE,ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
In this example, "STATE : 4 RUNNING" indicates that the service is running.

To verify the status of the SvcHost registry subkey, follow these steps:

   1. In Registry Editor, locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
   2. In the details pane, double-click netsvcs, and then review the service names that are listed. Scroll down to the bottom of the list. If the computer is reinfected with Conficker.b, a random service name will be listed. For example, in this procedure, the name of the malware service is "gzqmiijz".

If these steps do not resolve the issue, contact your antivirus software vendor. For more information about this issue, click the following article number to view the article in the Microsoft Knowledge Base:
49500  (http://support.microsoft.com/kb/49500/ ) List of antivirus software vendors
If you do not have an antivirus software vendor, or your antivirus software vendor cannot help, contact Microsoft Consumer Support Services for more help.
Back to the top
After the environment is fully cleaned
After the environment is fully cleaned, do the following:

    * Re-enable the Server service.
    * Restore the default permissions on the SVCHOST registry key.
    * Update the computer by installing any missing security updates. To do this, use Windows Update, Microsoft Windows Server Update Services (WSUS) server, Systems Management Server (SMS), System Center Configuration Manager (SCCM), or your third-party update management product. If you use SMS or SCCM, you must first re-enable the Server service. Otherwise, SMS or SCCM may be unable to update the system.

Back to the top
APPLIES TO

    * Windows Server 2008 Datacenter without Hyper-V
    * Windows Server 2008 Enterprise without Hyper-V
    * Windows Server 2008 for Itanium-Based Systems
    * Windows Server 2008 Standard without Hyper-V
    * Windows Server 2008 Datacenter
    * Windows Server 2008 Enterprise
    * Windows Server 2008 Standard
    * Windows Web Server 2008
    * Windows Vista Service Pack 1, when used with:
          o Windows Vista Business
          o Windows Vista Enterprise
          o Windows Vista Home Basic
          o Windows Vista Home Premium
          o Windows Vista Starter
          o Windows Vista Ultimate
          o Windows Vista Enterprise 64-bit Edition
          o Windows Vista Home Basic 64-bit Edition
          o Windows Vista Home Premium 64-bit Edition
          o Windows Vista Ultimate 64-bit Edition
          o Windows Vista Business 64-bit Edition
    * Microsoft Windows Server 2003 Service Pack 1, when used with:
          o Microsoft Windows Server 2003, Standard Edition (32-bit x86)
          o Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
          o Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
          o Microsoft Windows Server 2003, Web Edition
          o Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems
          o Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
    * Microsoft Windows Server 2003, Datacenter x64 Edition
    * Microsoft Windows Server 2003, Enterprise x64 Edition
    * Microsoft Windows Server 2003, Standard x64 Edition
    * Microsoft Windows XP Professional x64 Edition
    * Microsoft Windows Server 2003 Service Pack 2, when used with:
          o Microsoft Windows Server 2003, Standard Edition (32-bit x86)
          o Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
          o Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
          o Microsoft Windows Server 2003, Web Edition
          o Microsoft Windows Server 2003, Datacenter x64 Edition
          o Microsoft Windows Server 2003, Enterprise x64 Edition
          o Microsoft Windows Server 2003, Standard x64 Edition
          o Microsoft Windows XP Professional x64 Edition
          o Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems
          o Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
    * Microsoft Windows XP Service Pack 2, when used with:
          o Microsoft Windows XP Home Edition
          o Microsoft Windows XP Professional
    * Microsoft Windows XP Service Pack 3, when used with:
          o Microsoft Windows XP Home Edition
          o Microsoft Windows XP Professional
    * Microsoft Windows 2000 Service Pack 4, when used with:
          o Microsoft Windows 2000 Advanced Server
          o Microsoft Windows 2000 Datacenter Server
          o Microsoft Windows 2000 Professional Edition
          o Microsoft Windows 2000 Server

Back to the top
Keywords:
 kbregistry kbexpertiseinter kbsecurity kbsecvulnerability kbsurveynew KB962007
Back to the top
 
Provide feedback on this information
Did this information solve your problem?
 Yes
 No
 I don't know
Was this information relevant?
 Yes
 No
What can we do to improve this information?
To protect your privacy, do not include contact information in your feedback.
  
Thank you! Your feedback is used to help us improve our support content. For more assistance options, please visit the Help and Support Home Page.
  
 
 
Get Help Now
Contact a support professional by E-mail, Online, or Phone
Article Translations
   
Related Support Centers

    * Windows Server 2008
    * Windows Vista
    * Windows Vista Enterprise
    * Windows Server 2003
    * Windows XP Professional x64 Edition
    * Windows XP
    * Windows XP Service Pack 2
    * Windows 2000

Page Tools

    * Print this page

------------------
block sites

hgetmyip.org
getmyip.co.uk
checkip.dyndns.org
whatsmyipaddress.com
ahayw.info
ajcminmqpeu.com
anosb.biz
aqgcurmt.net
bdfbobhuls.com
bjmqxoxbmyq.org
bszeu.info
cfcpreiwtgx.net
cpfgbuwqv.biz
cukpubgb.net
dconkp.com
dpxzsrjhsn.org
dtyqryfi.biz
dviwvh.net
dwmpveim.info
dxnlypjjxp.biz
eaguzulxdr.org
ekrohmqa.info
eoblibwqaig.info
epvzvuah.info
ethogxkt.net
euwqeixq.biz
exxcpxm.net
eyjayqmwxxo.org
ezhvnjlvuk.org
fdzwsak.net
gatkcy.org
gceqy.info
ggcnqnr.info
gkmdbporqmp.biz
gmtgpb.org
guiahproe.info
gxepchol.net
gztql.net
haqrcz.com
hkqrhqev.com
hndrijmu.org
hvxmlcc.org
idahdfyojhz.com
ipbdwihw.info
iquvtfhm.net
irhtphctgn.com
ivouyvxaf.net
jfvyipo.info
jhhwydtk.com
jjbuafs.info
jptplynb.org
jutsyu.com
kagvjo.com
kfzksydrct.org
khvdkdjnrhr.biz
ktivtbse.net
lbori.com
ltxbrwfosrg.net
mhjhb.com
mtqcpiwod.biz
nsjmewgdb.com
ntshnjyxfh.net
nxphotp.com
ocykqj.biz
oenjrcaly.net
oororgpkbp.com
ozlqvnkiq.net
palrw.org
pmotqmf.com
pvuxb.info
qffszcfgyzn.org
qfoilcqp.com
qjafgfp.net
rfduzjbztg.biz
riuvunis.info
rlbidexd.org
rntbogfz.biz
rtkrhxsp.biz
ruolomicarp.org
rxytvgkapvw.biz
safxg.net
sdxkcnzcvhd.org
shbyxebiec.biz
srsoeggve.org
tbkmloh.net
tezjm.net
tilazlfn.com
tqlxquy.org
trxho.org
uiiwmmgr.com
upyuqxpmlxt.net
vdunf.net
vtewiyny.info
vuahzmvf.biz
vweoof.org
wkjhjr.com
xehlydgan.net
xmmzcsqm.biz
xtjejduc.org
xxwoteojg.biz
xytbvkrqhu.info
ybhufq.net
yenhbrt.biz
yfczve.info
ylfamhcgn.net
ylzbgyorfy.org
ysxbkquj.info
ythekdrar.net
yudxsol.org
yzbvrteij.biz
yzpjvpkdtq.biz
zjxuw.org
zpqhr.biz
zuuroktw.biz
zzkjecmf.com

The attached file is supposed to get rid of it:

 

I think that is it if not search for the Bit Torrent remover by Trend Micro, it is free.




On Tue, Mar 31, 2009 at 3:10 PM, SadMouse <wtubes@gmail.com> wrote:
If you've kept your Windows and virus/internet protection up to date, you are probably safe and uninfected. However.... if you're just now hearing about Conficker...
 
 
 
Please note... one of the symptoms of (almost any malware) infection is being unable to connect to your Windows updates, and/or virus software support websites, etc. In that case... you would need to go to a clean computer and download the Malware removal tool from Microsoft to a USB flash drive to use on your infected PC.
 
~SadMouse


On Tue, Mar 31, 2009 at 2:25 PM, Inyri Forge <inyri_lujayne@yahoo.com> wrote:
Yes, it's very much true!

http://tech.yahoo.com/blogs/null/132464

--- On Tue, 3/31/09, Dorry Hadler <Dorry.Hadler@att.net> wrote:

From: Dorry Hadler <Dorry.Hadler@att.net>
Subject: [PSP-Snags] Just forwarding this
To: undisclosed-recipients@yahoo.com
Date: Tuesday, March 31, 2009, 3:10 PM

ANYONE ELCE HEAR ABOUT THIS?, JUST WOUNDERING IF IT WAS TRUE OR NOT.
 
 
 
Hi,  I was watching the local news here.  And it came on as an alert. They say that the worm starts tomorrow. And that  hackers have come up with this new worm to access thousands of computers.  They said they had no idea what all could happen tomorrow but that they expect it to be devestaing for a lot of people.  I hate this stuff.  What can we do except pray that our virius protection is good enough to block it.  Are you all doing anything special to get ready for that worm?  They said it should start tonite April 1st. 
They said even the secure web sites such as banks and stores and stuff like that would fall victim to it also.  I guess we just gotta pray. 




F


 



__._,_.___


Gmail would not let me send the file even though it was zipped, just google Trend Micro
--
Margaret

Sorry for repeats!

 
Free Animations for your email - by IncrediMail! Click Here!
--~--~---------~--~----~------------~-------~--~----~
PSP-Snags Google group: http://groups.google.com/group/PSP-Snags
Send to: psp-snags@googlegroups.com
Uunsubscribe: psp-snags-unsubscribe@googlegroups.com

http://groups.google.com/group/Cartoon-PSP * http://groups.google.com/group/Disney-Tubes * http://groups.google.com/group/PSP-Snags-Adult * http://I-Love-Tutorials.com/chat * http://I-Love-PSP.com * http://PSP.I-Love-Disney.com * http://I-Love-Cartoons.com * http://I-Love-Disney.com *  http://KTimothy.com * http://Disney-Stationary.com * http://Disney-Kingdom.com * http://Disney-Clipart.com

This is a private email and is covered by TITLE 18, PART I, CHAPTER 47, Sec. 1030 and Internet Privacy Law. Sharing done, within this group, is for personal use only - NOT FOR PROFIT
NO COPYRIGHT INFRINGEMENT IS INTENDED.
Group owner is not responsible for the sends/opinions of its members
-~----------~----~----~----~------~----~------~--~---