Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Chuck, Evan....have you heard anything? Has to be some reason for the big dump today. I'll keep you posted if I find out anything.
no doubt...I'll keep you posted.
No doubt the cast of characters will show up on some other scam
I agree. Not much going on on the other board at all. I think everyone, including the staunch supporters have finally given up on this shell/scam. Have a good weekend. I may spend some time tracing down the known factors here, just to kill time, and see if anything shows up elsewhere....litiagtions, new company, etc. This is the longest they've gone without saying anything.
Seems to be a dead dog, not much of a scam this time around.
chucka...glad to see you got smart...I think....I'll go look at tpii
Even Chucka: There just is nada to say, I researched MAZAMA, I ate ANNADAMMA BREAD as toast, now join me in my SPICE JOB and get all the Guy Cooking Buds you know over there, egads you probably have 7 a week u know LOL I mean... Ugg ...LOL.
http://www.investorshub.com/boards/read_msg.asp?message_id=314140
TPII ...OTCBB not a PINKY STINKY LOL Tippi Canoe and Hadesdog2
looks like everyone has abandoned ship...even some of the loyal longs...including our creator of this board...even Chuck is silent. Could the lack of any action be because the Feds are finally getting involved? Rather suspicious that there was a flurry of action then nothing for over a week....as Whyisit says....the only trading being done is on those 500,000 shares of issued shares (that were issued to the stockholder....Smith, Swarzman, etal.)
looking at the activity on both boards I would say this company is dead. I did some research and found all the active companies (from my last research) are now listed as inactive. A search for all officers, agents, etc. comes up negative or inactive. A search for any of the offshoots in Canada also now come up negative. Even a search for MTN comes up dead in NV. There has been no activity for days on the stock or RB board, even by the strong supporters. IMHO...the last flurry of trading was by the particulars to get out with some cash....
What's their latest plan to mine in WA state?
not that many...today 3 traders spend an average of only $400. Maybe Kozo heard another rumor...or will try to spread one again...or maybe Stock, Daisy, etal decided to have some fun. They probably spent the month's rent on this one....
They seem to be able to attract new suckers without doing much.
nothing about this POS surprises me anymore...I've been here too long....
It's strange he is still flogging a dead horse
what do you think about Koza on the other board...not seen for 4 days, stock goes up, and then he plants that thing about Sovereign on the board....very interesting....
Hi, what is upppppppppppppppppp.
Be real funny if all these claims we had given up had Nanostuff there, egads we had near few dozens claims there at 160 acres each. As Cher Said, "In Failure somehow makes you fabulious!" or some such on that show a few days ago.
http://www.geocities.com/hopa_0/
I thought I found gold HERE above but did not...
PS- I taught I taw a puddy cat and it scratched the dogs nose!
PPS- Some Movie Pix so here is some old stills of Chuca Butte( ash ) What a pain in the ash the search was.:
http://www.powernet.net/~icecold/ash2/" target="_new">http://web.archive.org/web/20020302172230/http://www.powernet.net/~icecold/ash2/
How is IAMR doing, any Gold finds?
Stop missing me and BUY some shares I smell GOLD rising in my bathtub. I am clean all over. I jimped back in the water as it rose yesterday soon I will own a million again.
Chucka600K and rising. See Trade 3:48 PM yesterday a MILLION SHARE DAY and OTC has them still on watch:
http://www.otcelitegroup.com
Last week when u posted I was only 500,000 degrees, now I am HOTTER. HOTTUB with me - my tub is going off my Big Deck with Nantucket Sound View:
http://www.community.webshots.com/photo/30297215/30297294zSzUeghlCD
I just found out that the guy who did this assay mill run, selective sampling at one of my first 19997 gold claims went out and sold his mill next to my AZ Claims and thatw as after I was there in Sept in AZ in a phone call to AZ last night:
http://ragingbull.lycos.com/mboard/boards.cgi?board=BHMNF&read=11213
http://mywebpage.netscape.com/Chucalo/DCRS1_77OPTAUWhiteRockOreSelectiveSamplingBasisofSourceRock.jp....
This book was signed to me by the author in 1998 I think JBA has a MODEL for what we all seek HERE:
http://mywebpage.netscape.com/Chucalo/JabasJohnGuilbertandHisUnderstandingOfBelowSurfaceISTHISreson.....
This is the Front of the BOOK I have:
http://mywebpage.netscape.com/Chucalo/JabaChairsBook.jpg
Oops it was 1998 "High Hopes for Continued DISCOVERY!"
http://mywebpage.netscape.com/Chucalo/JabasGuilbertandMyAZMapsNext2itwithcards.jpg
The Mill sold out was in Flores 30 above our 31 and 6 AREA we still HOLD ...like IAMR we hold LONG:
http://mywebpage.netscape.com/Chucalo/HobbyInterests/myinventionuseofplacticoverlaystolocatewhereonm....
From 50,000 acres to 500 acres we are able to hold in each state LOL: I don't GIVE UP I reduce in size and I rebuild UP :
http://web.archive.org/web/19991118012618/www.auctionbuy.com/wma8/who.htm
Look at my MAZAMA thoughts in Chucka Album and look at WATER in my Seashell ALBUM I see the HOT TUB veiews so clearly now:
http://www.community.webshots.com/user/chuckapr
Chucka COMMON IAMR don't let us down ads GOLD and COPPER rizzzzzeeeee. XAU RISE ...$3 an ounce a day now! GOLD!
IAMR is not this guy: IS HE or HER:
http://huckac.tripod.com/peatie2.jpg
hey JM...no news? No tirades? Did you finally get the point about this POS? Or are you just laying low?
thanks for the warning. I really do suggest you go and down load "Tiny Personal Firewall"
New Virus going arround today Caption READS LIST 2, yet some say that it was a month old VERY innocent looking.
SEE paste also do now confuse with my site paste lower:
In a message dated 1/14/02 2:06:50 PM Eastern Standard Time, Chucalo writes:
In a message dated 1/14/02 2:16:42 PM Eastern Standard Time, Chucalo writes:
value = '1';}else {frm.bodyPart.value = '';frm.DataName.value = '';frm.AttName.value = '';frm.VirusName.value = '';frm.download.value = '';}frm.submit();}
Scan Result
Name of File: LIST2.doc.pif
Type of File: application/mixed
Scan Result: Virus W32.Sircam.Worm@mm found. File NOT cleaned.
This file contains a computer worm, a program that spreads very quickly over the Internet to many computers and can delete files, steal sensitive information, or render your machine unusable.
-----------------
Forwarded Message:
Subj: LIST2
Date: 1/14/02 1:36:16 PM Eastern Standard Time
From: @fuse.net (Russ M
To: @aol.com
Hi! How are you?
I send you this file in order to have your advice
See you later. Thanks
----------------------- Headers -------------------------------
http://www.chucka.i8.com/
http://www.chucka.i8.com/index.html
Chucka my site above
OT: Chucka...remember that "virus" you got tricked into during the holidays? Article in the paper today about it...seems it caught a lot of people...including people who should have known better...including my daughter. Apparently she got the message before I got mine to her about the "fraud" virus.
As I said on the other board, I think IAMR is a dead issue. They will probably appear as another entity. I will keep you posted.
Chucka is knowledgable about the industry...not that knowledgable about this stock (sorry Chucka...). DD's show this company to be a possible scam...They go with the flow, changing directions from mining, meds, e-commerce, mining...all companies have same people, addresses, etc. Read posts of Cerberus, Hadesdog, Spylady, dharmacist, whyisit, Wildbill, e_looj, and a few others who have been involved with this company since Henly. Check RB boards for HNLY, CISI, and IAMR.
Chucka
You seem to be knowledgeable concerning this stock, why is the volume nothing...only 7,000 shares traded ($35)...has this company died?
Thanks
Charlie T
Chucka...I use Firewall. Seems to work fine. It was recommended to me by a friend who dabbles in all the little toys available. He hasn't steered me wrong yet.
As to aliases...I don't have any. Hard enough to keep track of my e-mail addresses, chat room names and passwords between here and at work. At work I have to change my password monthly...senior moments coming all too often lately as work load increases ~ As they say..."I may be getting older, but I refuse to grow up...and off all the things I miss, I miss my mind the most."
Strange. I have not heard. I wonder if you hit on something. Probably not, ur record is about as good as mine weaving the pieces all together LOL, tears and jears ! U can't say that either of us hasn't tried to understand it all ! LOL Speaking of which at the COMPANY I work at now: NEWS JUST OUT:( and with Old IAMR CISI ...the metals are there, The Mountain was climbed because it was there and as I posted at ETEN at RB, Necessity is the MOTHER of ALL invention.)( Gold is that an invention? I hope so ! )( In the MEAN TIME, ur muiple alais (ez) are soon to be INVISIBLE! ) ( Whereas I only use one!)( now that Chucka 7 and 24-7 are dead LOL at RBull )
EnterNet Inc. Signs Letter of Intent to Acquire a Revolutionary Internet Firewall and Virus Blocker
EnterNet Inc. Signs Letter of Intent to Acquire a Revolutionary Internet
Firewall and Virus Blocker
SCOTTSDALE, Ariz., Jan 8, 2002 (BUSINESS WIRE) -- EnterNet Inc. (OTCBB:ETEN) is
pleased to announce today that it has signed a Letter of Intent with Preferred
Internet Technology, Inc. of Scottsdale, Ariz., to acquire, for restricted stock
and cash, all rights, title and interest in their patent pending Router /
Firewall / VirusBlock hardware device, known as netMind.
The netMind product -- three years in the market -- essentially makes a user
network invisible to the Internet (via any method of connection) effectively
blocking any unauthorized or unwanted source of intrusion such as "hackers",
worm or executable (`exe' attachments) Trojan Horse viruses. The plug and play
software/hardware solution provides a proven secure firewall and virus block
protection (complete with "Packet Filtering and Stateful Inspection") and is not
only the smallest product of its type on the market today, but is also the only
such product with a patent pending. Its optional Secure Virtual Private Network
(SVPN) also offers a 512 byte-encrypted tunnel for data and packet handling.
In addition to its vast business application, netMIND --
www.netmind-firewall.com -- is also attractively priced offering a significant
discount to its competitors, with base prices starting at under $700.00/unit
compared to that of almost $3,000.00/unit for its nearest competitor's product.
And as there are no updates to download or additional (future) software
purchases required to keep the product current, the one time purchase price
further adds to its overall cost efficiency.
The closing of the netMIND acquisition completes two important steps regarding
EnterNet's corporate objectives:
-- 1. netMIND is natural external hardware compliment, "hand in
glove" add-on to the Company's iCyberdata Court Manager Suite
of products, previously announced by EnterNet (November 19,
2001)
-- 2. The product's standalone market potential will be a
lucrative revenue source for EnterNet.
During the three years that netMIND has been marketing and installing their
proprietary product, it has become dramatically obvious that the market
potential is vast. According to recent Nielsen/Net ratings, there are currently
over 400 Million Internet users globally, 162 Million of those in the United
States alone. That measure combined with Internet security experts -- as quoted
by CNN.com and Reuters -- stating that 2001 was the worst year for computer
viruses with an estimated $2.6 Billion in damages, to some 300,000 computers,
and an estimated $12.3 Billion to actually fix the damage, it is no surprise
that there is a (2002) potential market of $32 Billion for Internet related
products, with firewalls and virus protection making up a substantial portion of
that.
As such, it is EnterNet's goal -- and Management believes it to be an attainable
one -- to become the key industry supplier of such Internet security products to
small, midsize and home-based businesses.
Note: Please watch for further details regarding a Hackers Challenge to be
sponsored by EnterNet. This challenge will prove the security of not only the
firewall but also VirusBlock and will offer a significant cash price to the
hackers of the world.
Forward-looking Statement
This release contains forward-looking statements within the meaning of Section
27A of the Securities Act of 1933, as amended, and section 21 B of the
Securities and Exchange Act of 1934, as amended. Readers are cautioned not place
undue reliance on these forward-looking statements, which are only predictions
and only speak as of the date hereof. Forward-looking Statements usually contain
the words "estimate", " anticipate", "believe", "plan", "expect", or similar
expressions and are subject to numerous known and unknown risks and
uncertainties. These risks and uncertainties could cause the Company's actual
results to differ materially from those indicated in the forward-looking
statements.
CONTACT: EnterNet Inc., Phoenix
Craig Robson, 602/953-7703
URL: http://www.businesswire.com
Today's News On The Net - Business Wire's full file on the Internet
with Hyperlinks to your home page.
Copyright (C) 2002 Business Wire. All rights reserved.
-0-
KEYWORD: ARIZONA
INDUSTRY KEYWORD: ELECTRONIC
GAMES/MULTIMEDIA
INTERNET
NETWORKING
TELECOMMUNICATIONS
PRODUCT
SOURCE:
EnterNet
Inc.
STOCK SYMBOLS: [(eten)]
Not much better here. It was cold, gray, windy, and wet. Those of us who know say it reminds us of up north.
You are probably right about the service. It was a fluke that I found that particular post, as I can't find it now without spending a whole day reviewing all of his posts.
See my post on RB to Kingbuzz...what do you think? ITCN=IRAC=IAMR off shoot?
WE GOT RAIN, maybe snow the morrow. Wish I was in Florida. On grey days like this.
Chucka
PS- I really think he pasted some Service THING if such was available free at Yahoo I would be amazed. I don't pay $50 a month for such info.
Sorry Chucka...in RB post 2573 you mentioned Barry ALlen do good for the board in his post. The you said something about a guy...thought you were referring to Allen. Sorry about that...would still love to know the site at yahoo that lists the stock trader.
As to the snow...I had ice on my car this morning and they say they had flurries in Tallahassee the other day! Snow and ice where you are is expected...but this is Florida!
Snow in nearby Mtns I have no clue if I hit it: Sure looks like the Middle od NOWHERE, why would any neighbors complain about Mining Activities LOL:
http://terraserver.homeadvisor.msn.com/image.asp?T=1&S=15&X=98&Y=841&Z=10&W=2
Chucka T 1 South Range West 2
This is it- That 5$ sign poster is not a chat bud, just for what it is worth:
http://ragingbull.lycos.com/mboard/boards.cgi?board=IAMR&read=2568
Chucka
Chucka...your friend BarryAllen posted a Yahoo link on one of his other boards that showed who had traded stock on a certain day. I can't find the post, and Yahoo doesn't show any info on IAMR other that PR's. Do you remember or know the link?
Chucka....talk about screw ups....seems reminiscent of CIS.com....RB board all screwed up. Can't post a message, can't respond to messages, don't get any answers regarding same...even got a message saying that i couldn't post unless i was a member, yet my member name appears when I try to post.....
Go GAtors....
Same to u ...left overs, left over long; me.Left Over Otherwisearch, you. LOL
Chucka2TheNewYear
On Edit:
Same to you ...left overs, left over long; me. Left Over Otherwise a rsh, you. LOL
Chucka2TheNewYearSEARCHINGstill a wise AZ SEARCH
P.S. Your me over here at ETEN, research this TECH: Afterall, if I had those tools in mining I wouldn't be doing PR THERE for $5K a quarter, speaking of that quarter; Did I ever say the taget sell I had on my IAMR was actaully a QUATER, twentyfive cents! Not so, I sold at some penny talk LOL In Part, notall.
http://216.63.13.30/boards/board.asp?board_id=858
Didn't watch any games, but the Gators are on tonight and Miami tomorrow. The Ohio/NC game was a disappointment...wanted Ohio to win. May we all have a healthy and prosperous year. We need a good year after last year.
Thanks, am watching South Fla on the Rose Bowl, just chechecked email, nice retropect oon my old Favorite written by Kathy:
http://www.investortoinvestor.com/dcforum/NewsletterDiscussion/74.html#2
Chucka wish I had written up such on MAZAMA had it made me a Million, LOL. Think big - deposit small. I remember when NPCT and Baby 2 Cent NPCT rode up from Intercell CPII is it now ..to like a 50 bagger LOL, wish IAMR coulda woulda dudda. LOL
PPS- here is the Archanglearcheive of a MultiBagger of my past, STILL LONG just the same as my IAMRs:
http://www.investortoinvestor.com/dcforum/NewsletterDiscussion/66.html
BANG, be aware be very aware og baggers, backpacks and weirdaus.
Have a happy and safe New Year's Eve. Tonight should be interesting....perfect chance for Imashmuck Bin Ladin or Sodamned Insane to try to pull something in NYC. All those people in Times Square...hope nothing happens.
Heads up NITE is all day at .006 Bid NITE and .007 ASK NITE, good night Gracie good morning Mazama. We gunna BURNS, George & Gracie? Hot lines mean something. Happy NEW YEAR.
Chucka
PS Last news:
nterAmerican Resources, Inc. Announces High-Grade Surface Mineralization Discovered At Mazama
MIAMI--(BUSINESS WIRE)--Dec. 6, 2001--InterAmerican Resources, Inc.'s (OTC:IAMR) wholly-owned subsidiary Sovereign Resources, Inc.
("Sovereign Resources") reports that recent surface sampling has discovered previously-unrecognized high-grade copper and silver mineralization at the company's Mazama porphyry Cu-Mo project.
Samples were collected by Sovereign Resources geologists across areas where significant alteration and copper (sulfide + oxide) mineralization was observed. Results were as follows:
Copper Molybdenum Silver
Sample Number (% Cu) (% Mo) oz/ST
-----------------------------------------------------------
8-1 1.19% 0.001% 0.029
9-1 0.83% 0.013% 0.058
9-2 0.29% 0.001% 0.015
9-5 0.60% 0.006% 0.015
9-6 0.75% 0.008% 0.044
F-1 0.20% (trace) 0.015
F-2 0.10% (trace) 0.015
Average: 0.57% Cu 0.004% Mo 0.027 oz Ag/ST
Whew, half a year on file systems. I get that same feelig here. Or on the Boards in general. LOL
Chuckamynewnamefor MAZAMA: from below: Mt~iotis
MY OLD files scanned into WORD par example :
und salt in
caLL
CeLL
[97
for, by NoI tnt red dila
doll
dollay!
[ml frem ess
C AR BC
~t in tea ta
will, respect to be precipitathg that dolomite
its in sea saner
- In sea-easer revel,e reacItalt equahbna tnt, i.e. ted by contact
and theoretic a] ~rux of alias hat the most up-to)~ The inability must be catLqed lank factor- In skit to misc from be (Pig. 29-13). na, CD> iotts. and Mt~iotis
[.06 A~ Mg
eaiLe is Lacar41+ 151 tsycr-hyit from the onion
5e~rIm1tnxto&o&/ (Jo ccxl a’
,4~’y~o,’ A% 9
~t/4~9Lt&voL42
tired for the face-by-face groosiD —
· - 29-! 31’). These are Thought to jticlude slow
4>6C~’n’
growLs ann -
dfiute lank acIuLIons (see helow).
A tIem pta to precipit ate 101am ites under laboratory conditions at Earth Cu face temperal nrc, [sad to The formation of m apsesian ealeites which lack the ordering of the true dolomite lattice- Under certain conditions. howecer. a n,etastahle form of dokimite may be produced by primary precipitation or by the alteration at’ pmexisl kg aragonite or calcite. The vrc.edolondlcs thus funned me best defined forntafly as nietactable sinslephase rhombeshedral carbonatcs which deviate from [lie composition of the dolomite that is stable in a given en vtrn ament. or are tiaperfeetly ordcred or both, hut which possess a high degree of cation order as witnessed by the unambiguous rresence of order reflections in Xray dilYr action patter” a’ (Gaines I 977). Protodoloiiiite appears as a precurace to dolomite in replacement reacLIOnS. Protndolomites are in elfect calcia n dolosnites tel fit an excess of Ca’~ hi their lattices (Cat4 Mgt~ (CO,).. High temper at ares &.- C) are nee&d to precipitate pure dolomite iti the labiiratory.
Having discussed the various them ical difficulties ‘ivolved in d isec I dolomite precipitat io,i from sea water. let us turn to discuss the Thrce major secondary sic Iorttttsatton mechanisni 5 wIll eli have been proposed in rcctmt YearS. These are conveniently referred to as the evalicrite brine-residue model the frcsh phres tic/tn silas groundwater mising model, and the formation water model.
The exaporite hajoc-snidue nodal is based ILpoII die observ~l C bent ical and mineralog [cal changcs taking plain just ti osler die surfaee of the broad supratidal pla his around the Artst~ an U ulf k nowit as ssbkhas (see also Cbs 23 & 30). Very widespread dolontit isa, kin It as taken place In ‘tess sediment. ins. otv ing the replacement of
mtlgoni tic sediment by a very ‘tie grained petit odol ottiTte modroets (111th9 scat 1965. Kinsman [966). Analysis eaf the pore waters (Fig 29.14) at cartons points over ole
Cu rfaee of the sable It a (froln the lagoon niand) raveals stem atie ehem leal changes indicative of large- sc~e
remosal of Ca2~ and SO> ions as gypsum. followed by massive dolomitisation of ara~on itie sediment grains of fite former tagoon sediments. The gypsum ia precipi toted as nods les cii II in tite dolomitised carNin ates (C h. 30). The chemical changes reaultiitg in dolorolt earon are caused by progressive eoneenftation of sea water by Cs aporation ~51O 3 to 7) from pores at tite sahkha rfaee (Kin ate an [966)- Pore-water replant 55 ment
—o ot~
P
lagoon
alas1 flat
MODELS FOR DOLOMI
sahkha
P C
2 to
Concentrstioo I Is sea water)
rtgne~ 2~. 4 Rels’ lons t~cese” molar eonvcetraLioa of iono. tiw mole, ratis M& - : C end h.i.,e eon~ntrstttm [a be Aba litiahi catilehe (sites K ins man 19661
occurs by poritylic storm flood evenls. aress fiathesi from the lagoon being replen shed less frequently and hence showing greatest coneentraiiott 5 of Mg³+.
Prom the shove evidence it seems that the kinetic cnn stsainta upon dolomite pteeipitation are overcome La systensa Than contain a high order ratio of Mg Ca, th as faciti toting replainment dolom itisation of a C aCO, pry-en sor. The Mg: Ca ratio reaches a value of over I 0 on so me portions of The sabk ha. Increased Mg Ca ratios of this magnitude are only possible by massive removal of Ca2 — as gy psu ni and anhydrite evaporites- It is likely that SO> re Inoval is esseli Li al it any ease since dokajite is
rafrdtv dissolved in the lace of S05-6ch ground waters
(see below).
mom pIes of sahkha brine dolotnitisatia U are widespread tn the geological record but kes4tahtv after the ins roductioti of the model in The early E 960a it was applied wilt v-ti i [ly to aneient dolomite oceurrences Ii at hardly fitted the ntin,ate constraints demanded by lie nt ode I (see Zenger 1972)- A particular ruse was to appesi to The subsurface sin king or tel) ux of Mg), Mg ;Cn ratio brines wli ich could Iheti dolomitise vast ‘areas of the vadose and parLo of the phreatie zoaes~ Such models were applied eveLt in the face of the relatively feeble presence of a few e vaporitie hands very tltick, regionaflj extensive dolomites.
The gaonadntes mIxIng model for dolontitisatioti has revoltitionised the field, providing a reedy and rational explanat ion hr th~ numerous examples of sticieat
Good thing I know a bit about computers. This was a big inovation for Microsoft that screwed up a lot of people use to Word Perfect, especially at work. We have so many files save as name.name.wpd (trying to get file names in so that people could understand them and not get confused with other files of similar names) and Word doesn't recognize this. Have spent the better part of the last 6 months helping people convert files and change names.
I looked for the virus...it was created, or added tot his computer in 5/98....so much for 14 days....
Here is a funny exchange on that VIRUS as I got this in after telling him it was a hoax DON'T FORGET to RE INSTALL it LOL:
Subj: Re: Fw: VIRUS
Date: 12/21/2001 9:22:26 PM Eastern Standard Time
From: (Bernard )
To: Chucalo@aol.com
Hi,
I don't even know how you got in my address book. I sent the virus notice to my entire address book thinking it was
a geniune virus. I'm sorry for the false alarm and I will remove you from my address book.
Bernard
----- Original Message -----
From: Chucalo@aol.com
and:
Thank you. I reinstalled it :o)
Bernard
----- Original Message -----
From: Chucalo@aol.com
To:.com
Sent: Thursday, December 20, 2001 10:54 PM
Subject: Re: Fw: VIRUS
SULFNBK.EXE Warning
Reported on: April 17, 2001
Last Updated on: December 19, 2001 at 07:01:06 PM PST
Printer-friendly version Tell a Friend
Symantec Security Response encourages you to ignore any messages regarding this hoax. It is harmless and is intended only to cause unwarranted concern. Type: Hoax Description:
The following hoax email was first reported in Brazil, and the original email was in Portuguese. Other language versions are in circulation. Currently, the English language versions are most common.
CAUTIONS:
This particular email message is a hoax. The file that is mentioned in the hoax, however, Sulfnbk.exe, is a Microsoft Windows utility that is used to restore long file names, and like any .exe file, it can be infected by a virus that targets .exe files.
The virus/worm W32.Magistr.24876@mm can arrive as an attachment named Sulfnbk.exe. The Sulfnbk.exe file used by Windows is located in the C:\Windows\Command folder. If the file is located in any other folder, or arrives as an attachment to a email message, then it is possible that the file is infected. In this case, if a scan with the latest virus definitions and with NAV set to scan all files does not detect the file as being infected, quarantine and submit the file to SARC for analysis by following the instructions in the document How to submit a file to SARC using Scan and Deliver.
If you have deleted the Sulfnbk.exe file from the C:\Windows\Command folder and want to know how to restore the file, see the How to restore the Sulfnbk.exe file section at the end of this document.
English versions
Version 1
This is very real, and I may have passed it on to you. Check it out as below right now. Your drive may crash!!
"I had a virus which apparently attaches itself to everyone in my address book. I deleted it successfully. you may have it as well. Follow these instructions to see if you have it. It transfers to whomever is in your address book. It lies dormant for 14 days, then kills your hard drive. If you've got it send these instructions to everyone in you address book. Otherwise, it may be sent back to you by somebody else.
1. go to start-then to "find or search" 2. in the "search for files or folders" type in sulfnbk.exe - this is the name of the virus. 3. in the "look in" make sure you're searching drive C
4. hit "search" button ))or find_
5. if this file shows up (it's an ugly blackish icon that will have the name sulfnbk.exe) DON'T OPEN IT
6. right click on the file - go down to delete and left click
7. It will ask if you want to send it to the recycle bin - yes
8. go to your desktop (where all your icons are) and double-click on the recycle bin
9. right click on sulfnbk.exe and delete again or just empty the recycle bin
IF YOU FIND THIS.....SEND IT TO EVERYONE IN YOUR ADDRESS BOOK, BECAUSE THAT'S HOW IT IS TRANSFERRED.
Version 2
Do you believe that a friend of mine sent me an alert and the procedure that we have to follow for the possible infection of SULFNBK.EXE. And I had checked, just to make sure. An then... the file was there, hidden even of McAfee and Norton, maybe waiting something to start work.
Well, see bellow the procedure that I followed step by step, and I found the file:
1. Start/Find Folders. Type the file name: SULFNBK.EXE
2. If it find, open Windows Explorer, browse into the folder where the file is and delete it. Do not click with left button on the file and do not open it.
3. Just delete it
4. Mine was on Windows/Command
5. The virus from the person who gave the alert was on Windows/Config
Yes, Norton and McAfee do not detect it.
We do not know if it makes some damage on the machine, but I think that anybody will not want to test it to know, will it?
Folks, this is not fun, I deleted it from my computer.
And my definitions are updated.
Do the same, ok?
Version 3
This one has additional text stating that the virus will activate on June 1st.
It was brought to my attention yesterday that a virus is in circulation via email. I looked for it and to my surprise I found it on mine. ..
Please follow the directions and remove it from yours TODAY!!!!!!!
No Virus software can detect it. It will become active on June 1, 2001.
It might be too late by then. It wipes out all files and folders on
the hard drive. This virus travels thru E-mail and migrates to the
'C:\windows\command' folder.
The bad part is: You need to contact everyone you have sent ANY
E-mail to in the past few months. Many major companies have found this virus on
their computers. Please help your friends !!!!!!!!
DO NOT RELY ON YOUR ANTI-VIRUS SOFTWARE. McAFEE and NORTON CANNOT
DETECT IT BECAUSE IT DOES NOT BECOME A VIRUS UNTIL JUNE 1ST.
WHATEVER YOU DO, DO NOT OPEN THE FILE!!!
French
Bonjour à tous, Hello everyone!
Ceci est une alerte au VIRUS assez sérieuse.
This is a serious VIRUS alert.
Comme je vous ai envoyé des courriels dans les 3 derniers mois, je
vous
invite à vérifier s'il n'y aurait pas un dossier intitulé
SULFNBK.EXE
quelques part dans votre ordinateur.
Since I have emailed you in the last couple of month I invite you to
read
the following text carefully. Please note that, against all odds, I
had it
exactly where it was mentionned it would be...
Prenez note que ce VIRUS ( SULFNBK.EXE )est indétectable et qu'il
doit être
activé le 1er JUIN donc, vérifier immédiatement, Ne l'ouvrez PAS et
jetter
le directement à la poubelle; VIDER LA POUBELLE PAR LA SUITE.
Original Portuguese version
Vocês acreditam que uma amiga da lista enviou um alerta e os procedimentos que deveriam ser tomados para a possível detecção do maledeto SULFNBK.EXE. e eu fui conferir só por desencargo de consciência. Pois é...O bichinho tava lá, escondidinho até da McAfee e do Norton, talvez esperando algum gatilho prá começar a trabalhar, né?
Aí vão, moçada, as orientações que eu segui à risca e que me levaram ao tal coisinha ruím:
1 - Iniciar/Localizar Pastas. Digite o nome do "mardito": SULFNBK.EXE
2 - Se for encontrado, abra o Windows Explorer, vá até a pasta onde ele se encontra alojado e delete-o de lá ou do próprio ambiente do Localizar; - Não click com o botão esquerdo sobre ele e não abra o arquivo nem em caso de incêndio, ok?
3 - Apenas delete o bichinho.
4 - O meu estava em Windows/Command.
5 - O vírus da pessoa que passou o aviso estava em Windows/Config.
Sim, o Norton e nem o McAfee não detectou.
Não sabemos se ele faz algum estrago na máquina, mas acho que ninguém aqui vai querer testar para saber, né?
Gente, sem brincadeiras, já tirei o meu daqui....
E nem imaginava que tivesse hóspedes no PC.
Minha vacina está super-atualizada!!!
Façam o mesmo, ok?
Danish version
Virusen er programmeret til at aktivere sig på et senere tidspunkt, derfor vil den ikke blive opdaget af et standard virusbeskyttende program, såsom Mcafee eller Norton. Ingen ved, hvor længe den har været i omløb - muligvis i flere måneder. Når den aktiverer sig vil den slette alle filer og dokumenter på jeres harddisk. Den spreder sig via e-mail og placerer sig i C.WINDOWS/COMMAND.
For at finde den og slette den skal I gøre følgende:
1. Klik på start
2. Vælg Søg efter
3. Vælg filer eller mapper
4. Gå til Søg alle filer og vælg lokale hardiske - i de fleste
tilfælde er det C:.
5. I feltet Navn skrives SULFNBK.EXE
6. Hvis filen findes, marker den, men ÅBN DEN IKKE !!!!!!!!!
7. Højreklik på filen og vælg SLET
8. Luk dialogboksen Søg alle filer
9. Tøm papirkurven
Så er I smittefri og computeren reddet. Den dårlige nyhed er, at man muligvis har smittet alle, som man har sendt mail til i mange måneder.
Derfor bør man kontakte alle personer i ens adressekartotek og straks sende dem denne meddelelse.
Og det har jeg også gjort
PS.: Og jeg havde altså også denne luskede virus
Dutch
"het is mogelijk dat je computer besmet is met een virus dat erop geprogrammeerd is om actief te worden gemaakt. door de "activeer vertraging" die er in gebouwd zit , wordt het niet ontdekt door o.a. mcafee en norton .
niemand weet hoe lang het virus al circuleert. mogelijk al enkele maanden. als het virus geactiveerd wordt, verwijdert het alle bestanden en
mappen van de harde schijf.
het virus verbreidt zich via e-mail en infiltreert het dossier
"c:/windows/command".
er zal dus "grote schoonmaak" moeten worden uitgevoerd indien je het virus detecteerd op je computer en op de computers van diegenen waarmee je
de laatste tijd per e-mail in contact hebt gestaan, anders blijft het een eeuwig durende cirkel.
om het te vinden en te verwijderen:
- klik op start
- vervolgens op zoeken
- kies bestanden of mappen
- ga naar zoeken en kies lokale vaste schijven of "c"
- typ op de regel "naam" : SULFNBK.EXE
- als het bestand wordt gevonden selecteer het, doch open het niet
- klik op bewerken
- vervolgens op alles selecteren
- klik op bestand
- vervolgens op verwijderen.
- sluit het venster en leeg de prullebak.
na deze operatie zit je in principe goed. maar je hebt waarschijnlijk zelf mensen besmet aan wie je e-mails hebt verzonden. mocht je dus het virus hebben waarschuw ze dan , zodat ook zij hun schijven kunnen opschonen." ]
How to restore the Sulfnbk.exe file
If you have deleted this file, restoration is optional. Sulfnbk.exe is a Microsoft Windows utility that is used to restore long file names. It is not needed for normal system operation. If you want to restore it, there is more than one way to do this. See the information that follows.
NOTE: The instructions in this document are provided for your convenience. The extraction of Windows files uses Microsoft programs and commands. Symantec does not provide warranty support for or assistance with Microsoft products. If you have any questions, please see your Windows documentation or contact Microsoft.
Windows Me
If you are using Windows Me, you can restore the file using the System Configuration Utility.1. Click Start and then click Run.
2. Type msconfig and then press Enter.
3. Click Extract Files. The "Extract one file from installation disk" dialog box appears.
4. In the "Specify the system file you would like to restore" box, type the following, and then click Start:
c:\windows\command\sulfnbk.exe
NOTE: If you installed Windows to a different location, make the appropriate substitution.
The Extract File dialog box appears.
5. Next to the "Restore from" box, click Browse, and browse to the location of the Windows installation files. If they were copied to the hard drive, this is, by default, C:\Windows\Options\Install. You can also insert the Windows installation CD in the CD-ROM drive and browse to that location.
6. Click OK and follow the prompts.
Windows 98
If you are using Windows 98, you can restore the file using the System File Checker.1. Click Start and then click Run.
2. Type sfc and then press Enter.
3. Click "Extract one file from installation disk."
4. In the "Specify the system file you would like to restore" box, type the following, and then click Start:
c:\windows\command\sulfnbk.exe
NOTE: If you installed Windows to a different location, make the appropriate substitution.
The Extract File dialog box appears.
5. Next to the "Restore from" box click Browse, and browse to the location of the Windows installation files. If they were copied to the hard drive, this is, by default, C:\Windows\Options\Cabs. You can also insert the Windows installation CD in the CD-ROM drive and browse to that location.
6. Click OK and follow the prompts.
Windows 95 (or alternative method for Windows 98/Me)
If you are using Windows 95, you need to use the extract command. This can also be used on Windows 98/Me.
1. Click Start, point to Find or Search, and then click Files or Folders.
2. Make sure that "Look in" is set to (C:) and that Include subfolders is checked.
3. In the "Named" or "Search for..." box, type:
precopy1
4. Click Find Now or Search Now. If it does not exist on the hard drive, then insert the Windows installation CD and repeat the search on that drive.
5. When you find the file, write down the location of Precopy1, for example, C:\Windows\Options\Cabs. This is your Source Path.
6. The general form of the Extract command is:
extract /a <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command
NOTE: Make sure that you include the /a switch, as shown. Depending on your version of Windows, the Sulfnbk,exe file can be in a .cab file other than Precopy1.cab. By using the /a switch, the Extract program will look first in the Precopy1.cab, and if the file is not found there, it will look in all subsequent .cab files until it is found, and can be extracted.
So if the source path is C:\Windows\Options\Cabs, then the Extract command becomes:
extract /a c:\windows\options\cabs\precopy1.cab sulfnbk.exe /L c:\windows\command
NOTE: If you installed Windows to a different location, make the appropriate substitution.
7. Click Start and then click Run.
8. Type the following, making the appropriate substitutions as previously noted
extract /a <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command
9. Click OK.
For more information on how to use the Microsoft Extract command, see the Microsoft Knowledge Base document, How to Extract Original Compressed Windows Files, Article ID: Q129605
Write-up by: Patrick Martin
http://www.symantec.com/avcenter/venc/data/sulfnbk.exe.warning.html
Paste by Chucka The Paste Guy in Research and PR for Public Companies, who are YOU ? Old Bud?
"....Now, hold on there just one minute, Mr. President...."!! (tee hee)
Per Microsoft:
SULFNBK.EXE Warning
Reported on: April 17, 2001
Last Updated on: December 19, 2001 at 07:01:06 PM PST
Printer-friendly version Tell a Friend
Symantec Security Response encourages you to ignore any messages regarding this hoax. It is harmless and is intended only to cause unwarranted concern.
Type: Hoax
Description:
The following hoax email was first reported in Brazil, and the original email was in Portuguese. Other language versions are in circulation. Currently, the English language versions are most common.
CAUTIONS:
This particular email message is a hoax. The file that is mentioned in the hoax, however, Sulfnbk.exe, is a Microsoft Windows utility that is used to restore long file names, and like any .exe file, it can be infected by a virus that targets .exe files.
The virus/worm W32.Magistr.24876@mm can arrive as an attachment named Sulfnbk.exe. The Sulfnbk.exe file used by Windows is located in the C:\Windows\Command folder. If the file is located in any other folder, or arrives as an attachment to a email message, then it is possible that the file is infected. In this case, if a scan with the latest virus definitions and with NAV set to scan all files does not detect the file as being infected, quarantine and submit the file to SARC for analysis by following the instructions in the document How to submit a file to SARC using Scan and Deliver.
If you have deleted the Sulfnbk.exe file from the C:\Windows\Command folder and want to know how to restore the file, see the How to restore the Sulfnbk.exe file section at the end of this document.
English versions
Version 1
This is very real, and I may have passed it on to you. Check it out as below right now. Your drive may crash!!
"I had a virus which apparently attaches itself to everyone in my address book. I deleted it successfully. you may have it as well. Follow these instructions to see if you have it. It transfers to whomever is in your address book. It lies dormant for 14 days, then kills your hard drive. If you've got it send these instructions to everyone in you address book. Otherwise, it may be sent back to you by somebody else.
1. go to start-then to "find or search" 2. in the "search for files or folders" type in sulfnbk.exe - this is the name of the virus. 3. in the "look in" make sure you're searching drive C
4. hit "search" button ))or find_
5. if this file shows up (it's an ugly blackish icon that will have the name sulfnbk.exe) DON'T OPEN IT
6. right click on the file - go down to delete and left click
7. It will ask if you want to send it to the recycle bin - yes
8. go to your desktop (where all your icons are) and double-click on the recycle bin
9. right click on sulfnbk.exe and delete again or just empty the recycle bin
IF YOU FIND THIS.....SEND IT TO EVERYONE IN YOUR ADDRESS BOOK, BECAUSE THAT'S HOW IT IS TRANSFERRED.
Version 2
Do you believe that a friend of mine sent me an alert and the procedure that we have to follow for the possible infection of SULFNBK.EXE. And I had checked, just to make sure. An then... the file was there, hidden even of McAfee and Norton, maybe waiting something to start work.
Well, see bellow the procedure that I followed step by step, and I found the file:
1. Start/Find Folders. Type the file name: SULFNBK.EXE
2. If it find, open Windows Explorer, browse into the folder where the file is and delete it. Do not click with left button on the file and do not open it.
3. Just delete it
4. Mine was on Windows/Command
5. The virus from the person who gave the alert was on Windows/Config
Yes, Norton and McAfee do not detect it.
We do not know if it makes some damage on the machine, but I think that anybody will not want to test it to know, will it?
Folks, this is not fun, I deleted it from my computer.
And my definitions are updated.
Do the same, ok?
Version 3
This one has additional text stating that the virus will activate on June 1st.
It was brought to my attention yesterday that a virus is in circulation via email. I looked for it and to my surprise I found it on mine. ..
Please follow the directions and remove it from yours TODAY!!!!!!!
No Virus software can detect it. It will become active on June 1, 2001.
It might be too late by then. It wipes out all files and folders on
the hard drive. This virus travels thru E-mail and migrates to the
'C:\windows\command' folder.
The bad part is: You need to contact everyone you have sent ANY
E-mail to in the past few months. Many major companies have found this virus on
their computers. Please help your friends !!!!!!!!
DO NOT RELY ON YOUR ANTI-VIRUS SOFTWARE. McAFEE and NORTON CANNOT
DETECT IT BECAUSE IT DOES NOT BECOME A VIRUS UNTIL JUNE 1ST.
WHATEVER YOU DO, DO NOT OPEN THE FILE!!!
French
Bonjour à tous, Hello everyone!
Ceci est une alerte au VIRUS assez sérieuse.
This is a serious VIRUS alert.
Comme je vous ai envoyé des courriels dans les 3 derniers mois, je
vous
invite à vérifier s'il n'y aurait pas un dossier intitulé
SULFNBK.EXE
quelques part dans votre ordinateur.
Since I have emailed you in the last couple of month I invite you to
read
the following text carefully. Please note that, against all odds, I
had it
exactly where it was mentionned it would be...
Prenez note que ce VIRUS ( SULFNBK.EXE )est indétectable et qu'il
doit être
activé le 1er JUIN donc, vérifier immédiatement, Ne l'ouvrez PAS et
jetter
le directement à la poubelle; VIDER LA POUBELLE PAR LA SUITE.
Original Portuguese version
Vocês acreditam que uma amiga da lista enviou um alerta e os procedimentos que deveriam ser tomados para a possível detecção do maledeto SULFNBK.EXE. e eu fui conferir só por desencargo de consciência. Pois é...O bichinho tava lá, escondidinho até da McAfee e do Norton, talvez esperando algum gatilho prá começar a trabalhar, né?
Aí vão, moçada, as orientações que eu segui à risca e que me levaram ao tal coisinha ruím:
1 - Iniciar/Localizar Pastas. Digite o nome do "mardito": SULFNBK.EXE
2 - Se for encontrado, abra o Windows Explorer, vá até a pasta onde ele se encontra alojado e delete-o de lá ou do próprio ambiente do Localizar; - Não click com o botão esquerdo sobre ele e não abra o arquivo nem em caso de incêndio, ok?
3 - Apenas delete o bichinho.
4 - O meu estava em Windows/Command.
5 - O vírus da pessoa que passou o aviso estava em Windows/Config.
Sim, o Norton e nem o McAfee não detectou.
Não sabemos se ele faz algum estrago na máquina, mas acho que ninguém aqui vai querer testar para saber, né?
Gente, sem brincadeiras, já tirei o meu daqui....
E nem imaginava que tivesse hóspedes no PC.
Minha vacina está super-atualizada!!!
Façam o mesmo, ok?
Danish version
Virusen er programmeret til at aktivere sig på et senere tidspunkt, derfor vil den ikke blive opdaget af et standard virusbeskyttende program, såsom Mcafee eller Norton. Ingen ved, hvor længe den har været i omløb - muligvis i flere måneder. Når den aktiverer sig vil den slette alle filer og dokumenter på jeres harddisk. Den spreder sig via e-mail og placerer sig i C.WINDOWS/COMMAND.
For at finde den og slette den skal I gøre følgende:
1. Klik på start
2. Vælg Søg efter
3. Vælg filer eller mapper
4. Gå til Søg alle filer og vælg lokale hardiske - i de fleste
tilfælde er det C:.
5. I feltet Navn skrives SULFNBK.EXE
6. Hvis filen findes, marker den, men ÅBN DEN IKKE !!!!!!!!!
7. Højreklik på filen og vælg SLET
8. Luk dialogboksen Søg alle filer
9. Tøm papirkurven
Så er I smittefri og computeren reddet. Den dårlige nyhed er, at man muligvis har smittet alle, som man har sendt mail til i mange måneder.
Derfor bør man kontakte alle personer i ens adressekartotek og straks sende dem denne meddelelse.
Og det har jeg også gjort
PS.: Og jeg havde altså også denne luskede virus
Dutch
"het is mogelijk dat je computer besmet is met een virus dat erop geprogrammeerd is om actief te worden gemaakt. door de "activeer vertraging" die er in gebouwd zit , wordt het niet ontdekt door o.a. mcafee en norton .
niemand weet hoe lang het virus al circuleert. mogelijk al enkele maanden. als het virus geactiveerd wordt, verwijdert het alle bestanden en
mappen van de harde schijf.
het virus verbreidt zich via e-mail en infiltreert het dossier
"c:/windows/command".
er zal dus "grote schoonmaak" moeten worden uitgevoerd indien je het virus detecteerd op je computer en op de computers van diegenen waarmee je
de laatste tijd per e-mail in contact hebt gestaan, anders blijft het een eeuwig durende cirkel.
om het te vinden en te verwijderen:
- klik op start
- vervolgens op zoeken
- kies bestanden of mappen
- ga naar zoeken en kies lokale vaste schijven of "c"
- typ op de regel "naam" : SULFNBK.EXE
- als het bestand wordt gevonden selecteer het, doch open het niet
- klik op bewerken
- vervolgens op alles selecteren
- klik op bestand
- vervolgens op verwijderen.
- sluit het venster en leeg de prullebak.
na deze operatie zit je in principe goed. maar je hebt waarschijnlijk zelf mensen besmet aan wie je e-mails hebt verzonden. mocht je dus het virus hebben waarschuw ze dan , zodat ook zij hun schijven kunnen opschonen." ]
How to restore the Sulfnbk.exe file
If you have deleted this file, restoration is optional. Sulfnbk.exe is a Microsoft Windows utility that is used to restore long file names. It is not needed for normal system operation. If you want to restore it, there is more than one way to do this. See the information that follows.
NOTE: The instructions in this document are provided for your convenience. The extraction of Windows files uses Microsoft programs and commands. Symantec does not provide warranty support for or assistance with Microsoft products. If you have any questions, please see your Windows documentation or contact Microsoft.
Windows Me
If you are using Windows Me, you can restore the file using the System Configuration Utility.
1. Click Start and then click Run.
2. Type msconfig and then press Enter.
3. Click Extract Files. The "Extract one file from installation disk" dialog box appears.
4. In the "Specify the system file you would like to restore" box, type the following, and then click Start:
c:\windows\command\sulfnbk.exe
NOTE: If you installed Windows to a different location, make the appropriate substitution.
The Extract File dialog box appears.
5. Next to the "Restore from" box, click Browse, and browse to the location of the Windows installation files. If they were copied to the hard drive, this is, by default, C:\Windows\Options\Install. You can also insert the Windows installation CD in the CD-ROM drive and browse to that location.
6. Click OK and follow the prompts.
Windows 98
If you are using Windows 98, you can restore the file using the System File Checker.
1. Click Start and then click Run.
2. Type sfc and then press Enter.
3. Click "Extract one file from installation disk."
4. In the "Specify the system file you would like to restore" box, type the following, and then click Start:
c:\windows\command\sulfnbk.exe
NOTE: If you installed Windows to a different location, make the appropriate substitution.
The Extract File dialog box appears.
5. Next to the "Restore from" box click Browse, and browse to the location of the Windows installation files. If they were copied to the hard drive, this is, by default, C:\Windows\Options\Cabs. You can also insert the Windows installation CD in the CD-ROM drive and browse to that location.
6. Click OK and follow the prompts.
Windows 95 (or alternative method for Windows 98/Me)
If you are using Windows 95, you need to use the extract command. This can also be used on Windows 98/Me.
1. Click Start, point to Find or Search, and then click Files or Folders.
2. Make sure that "Look in" is set to (C:) and that Include subfolders is checked.
3. In the "Named" or "Search for..." box, type:
precopy1
4. Click Find Now or Search Now. If it does not exist on the hard drive, then insert the Windows installation CD and repeat the search on that drive.
5. When you find the file, write down the location of Precopy1, for example, C:\Windows\Options\Cabs. This is your Source Path.
6. The general form of the Extract command is:
extract /a <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command
NOTE: Make sure that you include the /a switch, as shown. Depending on your version of Windows, the Sulfnbk,exe file can be in a .cab file other than Precopy1.cab. By using the /a switch, the Extract program will look first in the Precopy1.cab, and if the file is not found there, it will look in all subsequent .cab files until it is found, and can be extracted.
So if the source path is C:\Windows\Options\Cabs, then the Extract command becomes:
extract /a c:\windows\options\cabs\precopy1.cab sulfnbk.exe /L c:\windows\command
NOTE: If you installed Windows to a different location, make the appropriate substitution.
7. Click Start and then click Run.
8. Type the following, making the appropriate substitutions as previously noted
extract /a <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command
9. Click OK.
For more information on how to use the Microsoft Extract command, see the Microsoft Knowledge Base document, How to Extract Original Compressed Windows Files, Article ID: Q129605
Write-up by: Patrick Martin
"..Have you hugged your Grandkiddies today.."?? and...Merry Christmas everybody..!!
.
Virus Alert, and this is the real thing, when I read this, I checked my drive and it was there....
I learned about this virus today, checked my hard drive, found the virus and deleted it. Many others whom I have talked to have found it also so please protect yourself and look for it. Once inside your computer, it will use your address book to infect others.
It is easy to find and destroy, but it apparently lies dormant for 14 days, then kills your hard drive, so please check for it and , if found, delete it and send the warning on to all in your address book.
Here's how to stop it:
If you've got it, send this e-mail to everyone in your address book.
The directions for removing it are easy -
1. Go to 'start' - then to "find or search" (depending on your computer)
2. Open 'search for files' or 'files or folders'
3. In the Name & Location tab, type in sulfnbk.exe -- this is the virus name -- in the 'Named' box.
4. In the 'Look in' box, make sure you're searching Drive C.
5. Hit the "search" button (or find)
6. If this file shows up (it's an ugly blackish icon that will have the name
'sulfnbk.exe') DO NOT OPEN IT
7. Right click on the file - go down to delete and left click.
8. It will ask you if you want to send it to the recycle bin, say yes.
9. Go to your desktop (where all your icons are) and double click on the Recycle Bin.
10. Right click on sulfnbk.exe and delete again - or empty the entire recycling bin. IT IS VERY IMPORTANT YOU DELETE IT FROM THE RECYCLE BIN!!
If you find this file on your "C" drive please send this email to everyone in your address book, because that is how it transfers itself. By sending itself to everyone in your address book and then being activated 14 days later, IT DESTROYS YOUR HARD DRIVE. SO CHECK FOR IT NOW, AND GET RID OF IT!!
OT...which on-line brokage firm works the best with Penny Stocks...and please don't come back with E Trade...I was dumped there when they bought out Web Street.
Thanks
Charlie T
For good or for had.
Chucka( I know how to edit)
if this company would stop doing reruns it would be different...but it's the sos all the time. In this case it's the history of the company that counts...they have never delivered what they said, always having excuses or blaming others. As they say..."Those that ignore history are doomed to repeat it."
~
Don't put words in my...( on edit EGADS this post has a 13 in it LOL )Chuckau GOLD!
( on edit #2...at least it is NOT Friday the 13th !)
P.S.- Woof to your dog.
Followers
|
3
|
Posters
|
|
Posts (Today)
|
0
|
Posts (Total)
|
166
|
Created
|
09/17/01
|
Type
|
Free
|
Moderators |
Volume | |
Day Range: | |
Bid Price | |
Ask Price | |
Last Trade Time: |