W.O.L.F. Sector
Monday, Sep 28, 2020
Worlds Of Lesbian Fiction
What's Going On With Kodi...

Thursday, May 2, 2002

Post #87

Written by Kodi Wolf at 12:00 AM

Chapter 20 of Bloodlines has been posted. The next chapter will be posted on Monday.

Well, you'll all be happy to know that I'm taking May off in addition to April, which means more updates. :) Money's going to be tight, but as long as my bills get paid and I can eat, I consider myself pretty lucky.

Anyway, I'm almost finished with the next installment of Xena: Warrior Slave (there should be 2 more after this one and then the story will be completed, yay!), so that should be going off to beta within the next few days. The final chapters of Assassin have also apparently cleared beta, so I'm hoping to get them posted maybe over the weekend.

Also, for those of you who were having problems accessing my site, I've changed servers, which seems to have fixed the problem, at least for me. If you know of anyone who is still having problems getting my site to come up, please let me know.

And one last thing. I have been getting bombarded with a new virus, though as far as I know, I do not have the virus (I've deleted all the e-mails without opening the attachments, and my hard drive was scanned and came up clean), nor have I passed it on, though I've received several e-mails saying that others have received virus-attached e-mails from me. I didn't think it was a big deal at first, but I noticed on Ashera's Archive that Ashera has also apparently been receiving e-mails saying that people are getting viruses from her.

Here's what I know from Symantec (Norton Anti-virus):

A virus called W32.Klez.gen@mm infects a computer and then scans the computer (Windows address book, ICQ database, and other local files) for e-mail addresses. It then sends a message to all of the addresses it finds with itself as an attachment, along with a real file from the infected computer (the file is chosen at random from the hard drive, and this could include personal files that you really don't want anyone else to see). The infected file attachment usually has a double extension (i.e., file.txt.exe, file.bat.txt, etc.), though not always. The subject line is random ("how are you," "lets be friends," etc.).

Now, here's the really fun part. The "From" part of the e-mail message is also random. The virus just chooses an e-mail address from random among all the addresses it finds on the computer and inserts it into the From section of the message, so you never see where the message was really sent from. This means that someone with my address on their hard drive has probably been infected, and my address happened to be the one that got picked for the From slot (probably on more than one computer). This is probably the case with most of the supposed senders of this virus.

So, if you get any messages that have two file attachments, even if they're from people you know, but there's no real message in the body of the e-mail, or the message is generic, do not open it and delete the thing immediately!

I've been getting about a dozen or more messages a day that contain this virus as an attachment (some talk about a new game it wants me to be the first to try, while one of the new ones says it's offering a virus tool to remove W32.Elkern). Sometimes, I recognize the address it's coming from (I've even gotten one that said it's from lunacyreviews@yahoogroups.com, which I have never been a member of, but obviously someone who got infected had that e-mail address on their hard drive), but I figure if the e-mail was legitimate, there would be something personally identifying in the text of the message.

The fact that I've received so many e-mails tells me that this virus is very widespread. So please, use an anti-virus program to check your hard drive, remove the virus if you have it, and then do not open any two-attachment e-mails.

For more information about the most recent viruses, please visit Symantec.com and go to their Expanded Threat List.

For information specifically about W32.Klez.gen@mm, you can read about it at the following link: http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.gen@mm.html.