Some Help Locators
DISCLAIMER
A few sites to go to
This page is to point you to the Websites mentioned with in and in no way to take the place of the enclosed locations.
Just to help you seek help and to locate plenty to read by going to the websites we have found.
The Cited Sources Below are only short clips to stear you to a variety of web sites to help with the learning and solving of this virus, these URLS and clips have been sent by several members just so we can have a collection index of where there is help !!
Only short clips are here to avoid copyrights .
This page that gives the entire story. It outlines the history
and the problems. It also gives the .dat files necessary to get rid of
it, but, unfortunately, they are only for McAfee Scan AntiVirus
http://www.avertlabs.com/public/datafiles/valerts/vinfo/melissa.asp
CITING SOURCE
Subject: Virus Update! Please read this message!
Importance: High
Virus Update!
Further information about the "Melissa" mail virus
We have learned more details about the spread of a malicious new macro
virus called "Melissa". This is a serious virus threat and is definitely
not a hoax.
According to antivirus resource sites, the virus primarily effects users
with Microsoft Outlook mail client and Word 97. However, in order to be
safe, all e-mail users should pay close attention to this issue.
The following article from InfoWorld magazine online describes the virus'actions
Posted at 4:43 PM PT, Mar 26, 1999
A crippling and embarrassing virus has spent the day marauding countless
e-mail inboxes around the world, replicating itself to end-user address
books and sending an exhaustive list of pornographic Web sites to
everyone therein.
Dubbed the "Melissa" virus, the culprit has hampered -- and in some cases
entirely shut down -- e-mail systems for companies the world over. For
example, Microsoft has put a halt to all outgoing e-mails throughout the
company.
================
Snipped for brevity
================
Listed below are several articles about the Melissa virus if you would
like to learn more about it.
InfoWorld
http://www.infoworld.com/cgi-bin/displayStory.pl?990326.wcvirus.htm
Symantec
http://www.symantec.com/avcenter/venc/data/mailissa.html
CITING SOURCE
Carnegie Mellon University and the Software Engineering Institute
http://www.cert.org/advisories/CA-1999-04.html
CERTr Advisory CA-99-04-Melissa-Macro-Virus
Original issue date: Saturday March 27 1999
Last Revised: Sunday March 28, 1999
Systems Affected
Machines with Microsoft Word 97 or Word 2000
Any mail handling system could experience performance problems or a denial of
service as a result of the propagation of this macro virus.
CERT/CC Contact Information
Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Using encryption
We strongly urge you to encrypt sensitive information sent by email. Our
public PGP key is available from http://www.cert.org/CERT_PGP.key. If you
prefer to use DES, please call the CERT hotline for more information.
CITING SOURCES
Systems Could Be Hit by 'Melissa' Virus
By CHRIS ALLBRITTON
.c The Associated Press
NEW YORK (March 29) -- The e-mail might be smiling but the danger is real.
Security experts are warning computer users to be on guard today for
''important'' e-mail messages that carry a damaging computer virus called
''Melissa.''
Melissa, heralded by symbols that form a winking smiley face, usually contains
the subject line, ''Important message,'' and the body says ''Here is that
document you asked for ... don't show it to anyone else.''
===============
sniped for brevity
===============
NOTE: CERT information about the Melissa virus is available on the Web at
http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html .Microsoft has a patch available at
http://www.microsoft.com/security/bulletins/ms99-002.asp.Related Sites
CERT Coordination Center, Carnegie Mellon University: Melissa Macro VirusNetwork Associates: Melissa Virus Alert
McAfee Online : Melissa Virus Profile
Trend Micro: Melissa Virus Alert
Microsoft Security Bulletin: Patch for Word Macro Problem
Webmaster: