P
Patti Mollica
going bonkers with spam and can't get any help from MS - what else is new.
every day i receive about 100 emails that are bogus Microsoft updates and
notices. they contain about 5 links to Microsoft. anyone know how to get rid
of these? would an update to 6.0 help? i've tried "(e-mail address removed)" and they
send me to a link that gives no information whatsoever. can anyone help?
here is a sample of what i keep getting
Return-path: <[email protected]>
Received: from mta7.srv.hcvlny.cv.net (mta7.srv.hcvlny.cv.net
[167.206.5.22])
by mstr3.srv.hcvlny.cv.net
(iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003))
with ESMTP id <[email protected]> for
(e-mail address removed); Wed, 24 Sep 2003 18:07:44 -0400 (EDT)
Received: from smtp.prodigy.net.mx (dfproxy06.prodigy.net.mx
[148.235.168.22])
by mta7.srv.hcvlny.cv.net
(iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003))
with ESMTP id <[email protected]> for
(e-mail address removed) (ORCPT (e-mail address removed)); Wed,
24 Sep 2003 18:12:04 -0400 (EDT)
Received: from xuepmq (du-148-221-35-21.prodigy.net.mx [148.221.35.21])
by SMTP.Prodigy.Net.mx (Sun Internet Mail Server
sims.4.0.2001.07.26.11.50.p9)
with SMTP id <[email protected]>; Wed,
24 Sep 2003 17:08:37 -0500 (CDT)
Date: Wed, 24 Sep 2003 17:07:46 -0500 (CDT)
Date-warning: Date header was inserted by SMTP.Prodigy.Net.mx
From: Microsoft Corporation Internet Security Center
<[email protected]>
Subject: Last Internet Security Pack
To: Commercial Customer <[email protected]>
Message-id: <[email protected]>
MIME-version: 1.0
Content-type: multipart/mixed;
boundary="Boundary_(ID_e3flBp/XCOiWVu/WGcC+tg)"
Original-recipient: rfc822;[email protected]
--Boundary_(ID_e3flBp/XCOiWVu/WGcC+tg)
Content-type: multipart/related; type="multipart/alternative";
boundary="Boundary_(ID_Z57BiTvSDnmIle0rRz3D8A)"
--Boundary_(ID_Z57BiTvSDnmIle0rRz3D8A)
Content-type: multipart/alternative;
boundary="Boundary_(ID_1KWC93PAme1uocAJOJMwOA)"
--Boundary_(ID_1KWC93PAme1uocAJOJMwOA)
Content-type: text/plain
Content-transfer-encoding: 7BIT
MS Customer
this is the latest version of security update, the
"September 2003, Cumulative Patch" update which fixes
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express
as well as three newly discovered vulnerabilities.
Install now to maintain the security of your computer
from these vulnerabilities, the most serious of which could
allow an attacker to run executable on your computer.
This update includes the functionality of all previously released patches.
System requirements: Windows 95/98/Me/2000/NT/XP
This update applies to:
- MS Internet Explorer, version 4.01 and later
- MS Outlook, version 8.00 and later
- MS Outlook Express, version 4.01 and later
Recommendation: Customers should install the patch at the earliest
opportunity.
How to install: Run attached file. Choose Yes on displayed dialog box.
How to use: You don't need to do anything after installing this item.
Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support web site.
http://support.microsoft.com/
For security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site
http://www.microsoft.com/security/
Thank you for using Microsoft products.
Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable to respond
to any replies.
Microsoft <http://www.microsoft.com/> All Products
<http://www.microsoft.com/catalog/> | Support
<http://support.microsoft.com/> | Search <http://search.microsoft.com/> |
Microsoft.com Guide <http://www.microsoft.com/> Microsoft Home
<http://www.microsoft.com/>
MS Customer
this is the latest version of security update, the "September 2003,
Cumulative Patch" update which fixes all known security vulnerabilities
affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as
three newly discovered vulnerabilities. Install now to maintain the security
of your computer from these vulnerabilities, the most serious of which could
allow an attacker to run executable on your computer. This update includes
the functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP This update applies to MS
Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later Recommendation Customers should
install the patch at the earliest opportunity. How to install Run attached
file. Choose Yes on displayed dialog box. How to use You don't need to do
anything after installing this item.
Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support <http://support.microsoft.com/> web
site. For security-related information about Microsoft products, please
visit the Microsoft Security Advisor <http://www.microsoft.com/security>
web site, or Contact Us. <http://www.microsoft.com/contactus/contactus.asp>
Thank you for using Microsoft products.
Please do not reply to this message. It was sent from an unmonitored e-mail
address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are the
trademarks of their respective owners.
Contact Us <http://www.microsoft.com/contactus/contactus.asp> | Legal
<http://www.microsoft.com/legal/> | TRUSTe
<https://www.truste.org/validate/605> ©2003 Microsoft Corporation. All
rights reserved. Terms of Use <http://www.microsoft.com/info/cpyright.htm>
| Privacy Statement <http://www.microsoft.com/info/privacy.htm> |
Accessibility <http://www.microsoft.com/enable/>
every day i receive about 100 emails that are bogus Microsoft updates and
notices. they contain about 5 links to Microsoft. anyone know how to get rid
of these? would an update to 6.0 help? i've tried "(e-mail address removed)" and they
send me to a link that gives no information whatsoever. can anyone help?
here is a sample of what i keep getting
Return-path: <[email protected]>
Received: from mta7.srv.hcvlny.cv.net (mta7.srv.hcvlny.cv.net
[167.206.5.22])
by mstr3.srv.hcvlny.cv.net
(iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003))
with ESMTP id <[email protected]> for
(e-mail address removed); Wed, 24 Sep 2003 18:07:44 -0400 (EDT)
Received: from smtp.prodigy.net.mx (dfproxy06.prodigy.net.mx
[148.235.168.22])
by mta7.srv.hcvlny.cv.net
(iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003))
with ESMTP id <[email protected]> for
(e-mail address removed) (ORCPT (e-mail address removed)); Wed,
24 Sep 2003 18:12:04 -0400 (EDT)
Received: from xuepmq (du-148-221-35-21.prodigy.net.mx [148.221.35.21])
by SMTP.Prodigy.Net.mx (Sun Internet Mail Server
sims.4.0.2001.07.26.11.50.p9)
with SMTP id <[email protected]>; Wed,
24 Sep 2003 17:08:37 -0500 (CDT)
Date: Wed, 24 Sep 2003 17:07:46 -0500 (CDT)
Date-warning: Date header was inserted by SMTP.Prodigy.Net.mx
From: Microsoft Corporation Internet Security Center
<[email protected]>
Subject: Last Internet Security Pack
To: Commercial Customer <[email protected]>
Message-id: <[email protected]>
MIME-version: 1.0
Content-type: multipart/mixed;
boundary="Boundary_(ID_e3flBp/XCOiWVu/WGcC+tg)"
Original-recipient: rfc822;[email protected]
--Boundary_(ID_e3flBp/XCOiWVu/WGcC+tg)
Content-type: multipart/related; type="multipart/alternative";
boundary="Boundary_(ID_Z57BiTvSDnmIle0rRz3D8A)"
--Boundary_(ID_Z57BiTvSDnmIle0rRz3D8A)
Content-type: multipart/alternative;
boundary="Boundary_(ID_1KWC93PAme1uocAJOJMwOA)"
--Boundary_(ID_1KWC93PAme1uocAJOJMwOA)
Content-type: text/plain
Content-transfer-encoding: 7BIT
MS Customer
this is the latest version of security update, the
"September 2003, Cumulative Patch" update which fixes
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express
as well as three newly discovered vulnerabilities.
Install now to maintain the security of your computer
from these vulnerabilities, the most serious of which could
allow an attacker to run executable on your computer.
This update includes the functionality of all previously released patches.
System requirements: Windows 95/98/Me/2000/NT/XP
This update applies to:
- MS Internet Explorer, version 4.01 and later
- MS Outlook, version 8.00 and later
- MS Outlook Express, version 4.01 and later
Recommendation: Customers should install the patch at the earliest
opportunity.
How to install: Run attached file. Choose Yes on displayed dialog box.
How to use: You don't need to do anything after installing this item.
Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support web site.
http://support.microsoft.com/
For security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site
http://www.microsoft.com/security/
Thank you for using Microsoft products.
Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable to respond
to any replies.
Microsoft <http://www.microsoft.com/> All Products
<http://www.microsoft.com/catalog/> | Support
<http://support.microsoft.com/> | Search <http://search.microsoft.com/> |
Microsoft.com Guide <http://www.microsoft.com/> Microsoft Home
<http://www.microsoft.com/>
MS Customer
this is the latest version of security update, the "September 2003,
Cumulative Patch" update which fixes all known security vulnerabilities
affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as
three newly discovered vulnerabilities. Install now to maintain the security
of your computer from these vulnerabilities, the most serious of which could
allow an attacker to run executable on your computer. This update includes
the functionality of all previously released patches.
System requirements Windows 95/98/Me/2000/NT/XP This update applies to MS
Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later Recommendation Customers should
install the patch at the earliest opportunity. How to install Run attached
file. Choose Yes on displayed dialog box. How to use You don't need to do
anything after installing this item.
Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support <http://support.microsoft.com/> web
site. For security-related information about Microsoft products, please
visit the Microsoft Security Advisor <http://www.microsoft.com/security>
web site, or Contact Us. <http://www.microsoft.com/contactus/contactus.asp>
Thank you for using Microsoft products.
Please do not reply to this message. It was sent from an unmonitored e-mail
address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are the
trademarks of their respective owners.
Contact Us <http://www.microsoft.com/contactus/contactus.asp> | Legal
<http://www.microsoft.com/legal/> | TRUSTe
<https://www.truste.org/validate/605> ©2003 Microsoft Corporation. All
rights reserved. Terms of Use <http://www.microsoft.com/info/cpyright.htm>
| Privacy Statement <http://www.microsoft.com/info/privacy.htm> |
Accessibility <http://www.microsoft.com/enable/>