X-Virus-Scanned: clean according to Sophos on Logan.com Return-Path: Received: from snt0-omc2-s24.snt0.hotmail.com ([65.55.90.99] verified) by logan.com (CommuniGate Pro SMTP 5.4.6) with ESMTP id 5651744 for flyrotary@lancaironline.net; Sat, 14 Jul 2012 10:57:28 -0400 Received-SPF: pass receiver=logan.com; client-ip=65.55.90.99; envelope-from=instructorbill@msn.com Received: from SNT136-W24 ([65.55.90.71]) by snt0-omc2-s24.snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Sat, 14 Jul 2012 07:56:53 -0700 Message-ID: Return-Path: instructorbill@msn.com Content-Type: multipart/alternative; boundary="_2185f7b7-2f6e-4f1d-99c2-b8cd930511e9_" X-Originating-IP: [50.131.29.38] From: William Mason To: Subject: Re: [FlyRotary] Re: Date: Sat, 14 Jul 2012 07:56:52 -0700 Importance: Normal MIME-Version: 1.0 X-OriginalArrivalTime: 14 Jul 2012 14:56:53.0088 (UTC) FILETIME=[E7A25600:01CD61D0] --_2185f7b7-2f6e-4f1d-99c2-b8cd930511e9_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Yes=2C I got hijacked. My password has been reset and my Linux Ubuntu base= d machine is clean of any malware/spyware. For me=2C this is a first. I've been violated. It has been much more a ta= sk to let everyone know that I'd been hacked and request that they don't op= en and delete the message=2C though I'm not sure the message had any malici= ous content. It was only one message=2C sent to my entire contacts list. = Now its over. My apologies. Bill Mason From: "Ed Anderson" Subject: Re: [FlyRotary] Re:=20 Date: Fri=2C 13 Jul 2012 13:05:11 -0400 To: "Rotary motors in aircraft" Did some research on this email hijacking and apparently it can happen seve= ral different ways. Ranging from you service provider being hacked=2C emai= l trolling=2C password intercepted and as Marv mentioned - an trojan/virus = embedded in your computer. From what I read=2C if you have a trojan embedd= ed in your computer using your contact list - then you should see the email= s it sends out from your computer in your "Sent" email box. =20 =20 If on the other hand=2C some of the other hijack methods are responsible th= en you will not see those emails in your sent box. =20 My point is that apparently there are several methods other than a trojan/v= irus embedded in you computer that are used by hijackers. =20 I have 4 different spyware/malware/virus checkers - but=2C if the method be= ing used is not through an embedded trojan=2C then these will not find the = cause. But=2C always wise to have these checkers scan your system periodic= ally and often. =20 Will try to do better=2C Marv =20 Ed = --_2185f7b7-2f6e-4f1d-99c2-b8cd930511e9_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Yes=2C I got hijacked.  =3BMy password has been reset and my Linux Ubun= tu based machine is clean of any malware/spyware.


For me=2C this= is a first.  =3BI've been violated.  =3BIt has been much more a ta= sk to let everyone know that I'd been hacked and request that they don't op= en and delete the message=2C though I'm not sure the message had any malici= ous content.  =3B It was only one message=2C sent to my entire contacts= list.  =3B Now its over.


My apologies.


Bill Maso= n






From: "Ed Anderson" <=3Beanderson@carolina.r= r.com>=3B
Subject: Re: [FlyRotary] Re:
Date: Fri=2C 13 Jul 2012 13= :05:11 -0400
To: "Rotary motors in aircraft" <=3Bflyrotary@lancaironli= ne.net>=3B


Did some research on this email hijacking and appar= ently it can happen several different ways. Ranging from you service provi= der being hacked=2C email trolling=2C password intercepted and as Marv ment= ioned - an trojan/virus embedded in your computer. From what I read=2C if = you have a trojan embedded in your computer using your contact list - then = you should see the emails it sends out from your computer in your "Sent" em= ail box.  =3B


If on the other hand=2C some of the other hij= ack methods are responsible then you will not see those emails in your sent= box.

My point is that apparently there are several methods other t= han a trojan/virus embedded in you computer that are used by hijackers.
=
I have 4 different spyware/malware/virus checkers - but=2C if the meth= od being used is not through an embedded trojan=2C then these will not find= the cause. But=2C always wise to have these checkers scan your system per= iodically and often.

Will try to do better=2C Marv

Ed =
= --_2185f7b7-2f6e-4f1d-99c2-b8cd930511e9_--