JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for WELSH-TERMAU-CYMRAEG Archives


WELSH-TERMAU-CYMRAEG Archives

WELSH-TERMAU-CYMRAEG Archives


WELSH-TERMAU-CYMRAEG@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

WELSH-TERMAU-CYMRAEG Home

WELSH-TERMAU-CYMRAEG Home

WELSH-TERMAU-CYMRAEG  June 2001

WELSH-TERMAU-CYMRAEG June 2001

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: URGENT - Virus alert - I really do suggest you read the instructions below and carry them out - experience suggests your PC may well have this Virus

From:

Colin Jones <[log in to unmask]>

Reply-To:

Discussion of Welsh language technical terminology and vocabulary including <[log in to unmask]>

Date:

Fri, 1 Jun 2001 09:06:05 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (362 lines)

 Symantec AntiVirus Research Center (SARC)
http://www.symantec.com/avcenter

SULFNBK.EXE Warning
Reported on: April 17, 2001
Last Updated on: May 31, 2001 at 12:49:29 PM PDT

The following hoax email has been reported in Brazil. The original email is
in Portuguese; it is followed by an English translation.

CAUTIONS:

This particular email message is a hoax. The file that is mentioned in the
hoax, however, Sulfnbk.exe, is a Microsoft Windows utility that is used to
restore long file names, and like any .exe file, it can be infected by a
virus that targets .exe files.
The virus/worm W32.Magistr.24876@mm can arrive as an attachment named
Sulfnbk.exe. The Sulfnbk.exe file used by Windows is located in the
C:\Windows\Command folder. If the file is located in any other folder, or
arrives as an attachment to a email message, then it is possible that the
file is infected. In this case, if a scan with the latest virus definitions
and with NAV set to scan all files does not detect the file as being
infected, quarantine and submit the file to SARC for analysis by following
the instructions in the document How to submit a file to SARC using Scan and
Deliver.
If you have deleted the Sulfnbk.exe file from the C:\Windows\Command folder
and want to know how to restore the file, see the How to restore the
Sulfnbk.exe file section at the end of this document.
Original Portuguese version:

Vocês acreditam que uma amiga da lista enviou um alerta e os procedimentos
que deveriam ser tomados para a possível detecção do maledeto SULFNBK.EXE. e
eu fui conferir só por desencargo de consciência. Pois é...O bichinho tava
lá, escondidinho até da McAfee e do Norton, talvez esperando algum gatilho
prá começar a trabalhar, né?
Aí vão, moçada, as orientações que eu segui à risca e que me levaram ao tal
coisinha ruím:

1 - Iniciar/Localizar Pastas. Digite o nome do "mardito": SULFNBK.EXE
2 - Se for encontrado, abra o Windows Explorer, vá até a pasta onde ele se
encontra alojado e delete-o de lá ou do próprio ambiente do Localizar; - Não
click com o botão esquerdo sobre ele e não abra o arquivo nem em caso de
incêndio, ok?
3 - Apenas delete o bichinho.
4 - O meu estava em Windows/Command.
5 - O vírus da pessoa que passou o aviso estava em Windows/Config.

Sim, o Norton e nem o McAfee não detectou.
Não sabemos se ele faz algum estrago na máquina, mas acho que ninguém aqui
vai querer testar para saber, né?
Gente, sem brincadeiras, já tirei o meu daqui....
E nem imaginava que tivesse hóspedes no PC.
Minha vacina está super-atualizada!!!
Façam o mesmo, ok?


Translated English version:

Do you believe that a friend of mine sent me an alert and the procedure that
we have to follow for the possible infection of SULFNBK.EXE. And I had
checked, just to make sure. An then... the file was there, hidden even of
McAfee and Norton, maybe waiting something to start work.
Well, see bellow the procedure that I followed step by step, and I found the
file:

1. Start/Find Folders. Type the file name: SULFNBK.EXE
2. If it find, open Windows Explorer, browse into the folder where the file
is and delete it. Do not click with left button on the file and do not open
it.
3. Just delete it
4. Mine was on Windows/Command
5. The virus from the person who gave the alert was on Windows/Config

Yes, Norton and McAfee do not detect it.
We do not know if it makes some damage on the machine, but I think that
anybody will not want to test it to know, will it?
Folks, this is not fun, I deleted it from my computer.
And my definitions are updated.
Do the same, ok?

A new version of this hoax has additional text stating that the virus will
activate on June 1st:

It was brought to my attention yesterday that a virus is in circulation via
email. I looked for it and to my surprise I found it on mine. ..
Please follow the directions and remove it from yours TODAY!!!!!!!

No Virus software can detect it.  It will become active on June 1, 2001.
It might be too late by then. It wipes out all files and folders on
the hard drive. This virus travels thru E-mail and migrates to the
'C:\windows\command' folder.

The bad part is: You need to contact everyone you have sent ANY
E-mail to in the past few months. Many major companies have found this virus
on
their computers. Please help your friends !!!!!!!!

DO NOT RELY ON YOUR ANTI-VIRUS SOFTWARE. McAFEE and NORTON CANNOT
DETECT IT BECAUSE IT DOES NOT BECOME A VIRUS UNTIL JUNE 1ST.

WHATEVER YOU DO, DO NOT OPEN THE FILE!!!




How to restore the Sulfnbk.exe file
If you have deleted this file, restoration is optional. Sulfnbk.exe is a
Microsoft Windows utility that is used to restore long file names. It is not
needed for normal system operation. If you want to restore it, there is more
than one way to do this. See the information that follows.

NOTE: The instructions in this document are provided for your convenience.
The extraction of Windows files uses Microsoft programs and commands.
Symantec does not provide warranty support for or assistance with Microsoft
products. If you have any questions, please see you Windows documentation or
contact Microsoft.

Windows Me
If you are using Windows Me, you can restore the file using the System
Configuration Utility.

1. Click Start and then click Run.
2. Type msconfig and then press Enter.
3. Click Extract Files. The "Extract one file from installation disk" dialog
box appears.
4. In the "Specify the system file you would like to restore" box, type the
following, and then click Start:

c:\windows\command\sulfnbk.exe

NOTE: If you installed Windows to a different location, make the appropriate
substitution.

The Extract File dialog box appears.

5. Next to the "Restore from" box, click Browse, and browse to the location
of the Windows installation files. If they were copied to the hard drive,
this is, by default, C:\Windows\Options\Install. You can also insert the
Windows installation CD in the CD-ROM drive and browse to that location.
6. Click OK and follow the prompts.
Windows 98
If you are using Windows Me, you can restore the file using the System File
Checker.

1. Click Start and then click Run.
2. Type sfc and then press Enter.
3. Click "Extract one file from installation disk."
4. In the "Specify the system file you would like to restore" box, type the
following, and then click Start:

c:\windows\command\sulfnbk.exe

NOTE: If you installed Windows to a different location, make the appropriate
substitution.

The Extract File dialog box appears.

5. Next to the "Restore from" box click Browse, and browse to the location
of the Windows installation files. If they were copied to the hard drive,
this is, by default, C:\Windows\Options\Cabs. You can also insert the
Windows installation CD in the CD-ROM drive and browse to that location.
6. Click OK and follow the prompts.
Windows 95 (or alternative method for Windows 98/Me)
If you are using Windows 95, you need to use the extract command. This can
also be used on Windows 98/Me.


1. Click Start, point to Find or Search, and then click Files or Folders.
2. Make sure that "Look in" is set to (C:) and that Include subfolders is
checked.
3. In the "Named" or "Search for..." box, type:

precopy1

4. Click Find Now or Search Now. If it does not exist on the hard drive,
then insert the Windows installation CD and repeat the search on that drive.
5. When you find the file, write down the location of Precopy1, for example,
C:\Windows\Options\Cabs. This is your Source Path.
6. The general form of the Extract command is:

extract <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command

So if the source path is C:\Windows\Options\Cabs, then the Extract command
becomes:

extract c:\windows\options\cabs\precopy1.cab sulfnbk.exe /L
c:\windows\command

NOTE: If you installed Windows to a different location, make the appropriate
substitution.

7. Click Start and then click Run.
8. Type the following, making the appropriate substitutions as previously
noted

extract <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command

9. Click OK.
For more information on how to use the Microsoft Extract command, see the
Microsoft Knowledge Base document, How to Extract Original Compressed
Windows Files, Article ID: Q129605



Category: Hoax

Please ignore any messages regarding this hoax and do not pass on messages.
Passing on messages about the hoax only serves to further propagate it.





Write-up by: Patrick Martin



-----Original Message-----
From: Discussion of Welsh language technical terminology and vocabulary
including [mailto:[log in to unmask]]On Behalf Of
catrin alun
Sent: 01 June 2001 08:32
To: [log in to unmask]
Subject: Fw: URGENT - Virus alert - I really do suggest you read the
instructions below and carry them out - experience suggests your PC may
well have this Virus
Importance: High


I found it on my hard drive - please check!

Catrin
----- Original Message -----
From: "Tony O'Neill" <[log in to unmask]>
To: "Wendy Holt" <[log in to unmask]>; "Vicky Allen"
<[log in to unmask]>; "Tony O'Neill" <[log in to unmask]>;
"Tony Cooke" <[log in to unmask]>; "Steve Cowley - WSA IT"
<[log in to unmask]>; "Sandra Pearson (Pearson Insurance Services)"
<[log in to unmask]>; "Roger Monksummers" <[log in to unmask]>;
"RCS" <[log in to unmask]>; "Rachel Adkin" <[log in to unmask]>;
"Philipson, Jane" <[log in to unmask]>; "Peter Gammie"
<[log in to unmask]>; "Nigel Beard" <[log in to unmask]>; "Nicola
Hadley" <[log in to unmask]>; "Nicky Maxted"
<[log in to unmask]>; "Nick Bell" <[log in to unmask]>; "Min
Maxey" <[log in to unmask]>; "Marcus Taylor"
<[log in to unmask]>; "Lisa Leach"
<[log in to unmask]>; "Kathy Dudding"
<[log in to unmask]>; "John Ogbourne" <[log in to unmask]>; "John
Day" <[log in to unmask]>; "Jeff Billinger" <[log in to unmask]>; "Ingela
Persson" <[log in to unmask]>; "Helen O'Neill" <[log in to unmask]>;
"Gerry Harvey" <[log in to unmask]>; "Evelyne van Vliet"
<[log in to unmask]>; "English Self Cavy Club" <[log in to unmask]>;
"Doreen Petherick" <[log in to unmask]>; "Christine Fort"
<[log in to unmask]>; "Cavies" <[log in to unmask]>; "Catrin Alun"
<[log in to unmask]>; "Carol Sharp" <[log in to unmask]>; "Bryan
Mayoh" <[log in to unmask]>; <[log in to unmask]>; "Aylesbury
Flooring" <[log in to unmask]>; "Andre Theophilus"
<[log in to unmask]>
Sent: Thursday, May 31, 2001 7:02 PM
Subject: Fw: URGENT - Virus alert - I really do suggest you read the
instructions below and carry them out - experience suggests your PC may well
have this Virus


>
>
> ----- Original Message -----
> From: Wendy Holt <[log in to unmask]>
> To: Frances Holt <[log in to unmask]>; Gill Hood
> <[log in to unmask]>; John Berry <[log in to unmask]>; Steve Barrett
> <[log in to unmask]>; Rachel & David Betancourt <[log in to unmask]>; Beth
> Brown <[log in to unmask]>; Peter Gammie <[log in to unmask]>;
Tom
> and Roz Cunliffe <[log in to unmask]>; Nikolas Koll <[log in to unmask]>;
> Bryan Mayoh <[log in to unmask]>; Tony O'Neill <[log in to unmask]>; Graham
> Smith <[log in to unmask]>; Carol Tuxford <[log in to unmask]>;
> Peter Wilson <[log in to unmask]>; Geoff Wilson <[log in to unmask]>
> Sent: 31 May 2001 18:15
> Subject: Fw: URGENT - Virus alert - I really do suggest you read the
> instructions below and carry them out - experience suggests your PC may
well
> have this Virus
>
>
> >
> > > > Sent: Wednesday, May 30, 2001 4:57 PM
> > > > Subject: Fw: URGENT - Virus alert - I really do suggest you read the
> > > > instructions below and carry them out - experience suggests your PC
> may
> > > well
> > > > have this Virus
> > > >
> > > >
> > > > > URGENT. A VIRUS could be in your computer files now, dormant but
> will
> > > > > > > become
> > > > > > > > active on June 1. FOLLOW DIRECTIONS BELOW TO CHECK IF
> > > > > > > > YOU HAVE IT AND TO REMOVE IT NOW.
> > > > > > > >
> > > > > > > > It was brought to my attention yesterday that a virus is in
> > > > > circulation
> > > > > > > via
> > > > > > > > email. I looked for it and to my surprise I found it on
mine.
> > > > > > > > please follow the directions and remove it from yours
> > TODAY!!!!!!!
> > > > > > > >
> > > > > > > > No Virus software can detect it. It will become active on
June
> > 1,
> > > > > 2001.
> > > > > > > > might
> > > > > > > > be too late by then. It wipes out all files and folders on
the
> > > hard
> > > > > > drive.
> > > > > > > > This virus travels thru E-mail and migrates to the
> > > > > 'C:\windows\command'
> > > > > > > > folder. To find it and get rid of it off of your computer,
do
> > the
> > > > > > > following.
> > > > > > > >
> > > > > > > > Go to the "START" button.
> > > > > > > > Go to "FIND" or "SEARCH"
> > > > > > > > Go to "FILES & FOLDERS"
> > > > > > > > Make sure the find box is searching the "C:" drive.
> > > > > > > > Type in; SULFNBK.EXE
> > > > > > > > Begin search.
> > > > > > > > If it finds it, highlight it.
> > > > > > > > Go to 'File' and delete it.
> > > > > > > > Close the find Dialog box
> > > > > > > > Open the Recycle Bin
> > > > > > > > Find the file and delete it from the Recycle bin
> > > > > > > > You should be safe.
> > > > > > > >
> > > > > > > > The bad part is: You need to contact everyone you have sent
> ANY
> > > > E-mail
> > > > > > to
> > > > > > > in
> > > > > > > > the past few months. Many major companies have found this
> virus
> > on
> > > > > their
> > > > > > > > computers. Please help your friends !!!!!!!!
> > > > > > > >
> > > > > > > > DO NOT RELY ON YOUR ANTI-VIRUS SOFTWARE. McAFEE and NORTON
> > CANNOT
> > > > > > > > DETECT IT BECAUSE IT DOES NOT BECOME A VIRUS UNTIL JUNE 1ST.
> > > > > > > >
> > > > > > > > WHATEVER YOU DO, DO NOT OPEN THE FILE!!!
> > > > > > > >
> > > > > > >
> > > > > > >
> > > > > > >
> >
> >
> >
>
>

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
July 2005
June 2005
May 2005
April 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
June 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000
October 2000
September 2000
August 2000
July 2000
June 2000
May 2000
April 2000
March 2000
December 1999
November 1999
September 1999
August 1999
December 1998
November 1998
October 1998
September 1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager