September 11th, 2002

drink coffee

New Trillian Client

I think I like the "new" Trillian chat client, Trillian Pro 1.0. I received an email from them tonight offering me Trillian Pro for free for a years use, since I have donated to them in the past. Regular price will be $25 a year to become a "Trillian Pro Member". It seems to have all the functionality that each seperate chat client has, including the webcam function in Yahoo! Also has optional "plug-ins" you can download, like News, Weather, a way to manage a WinAmp playlist inside Trillian, a mini-browser, pop-3 email checking and alerts, and more. I went to the site in the email, entered the "members" section with the password they provided, downloaded the new Pro version, and inserted my "key code" they provided to activate it. It's very spiffy! (Did I just use the word "spiffy"?? Ignore that...)
  • Current Mood
    impressed impressed
drink coffee

Viruses,Viruses, and More Viruses....

The past week I've gotten at least one "Klez" attempt in my inbox every day. Today was different, however, got one I hadn't heard of before, "W32.Yaha.F@mm". Luckily, Norton caught it and let me delete it before it could do any harm. It originated from a "@uol.com.br" address. Only one person I've ever emailed to with that ending address, and that is marciawebcam, who is in Brazil. So, I'm just assuming her computer must be infected and she's unknowingly sending the thing out to those in her address book. But, since she hasn't been online in over a week, maybe she already knows...but I'll send her an email anyway. The virus sounds rather nasty. Here is text from Symantec's website....
W32.Yaha.F@mm is a mass-mailing worm that sends itself to all email addresses that exist in the Microsoft Windows Address Book, the MSN Messenger List, the Yahoo Pager list, the ICQ list, and files that have extensions that contain the letters ht. The worm randomly chooses the subject and body of the email message. The attachment will have a .bat, .pif or .scr file extension. Depending upon the name of the Recycled folder, the worm either copies itself to that folder or to the %Windows% folder.

The name of the file that the worm creates consists of four randomly generated characters between c and y.

It also attempts to terminate antivirus and firewall processes.