Received MS Critical Upgrade....genuine? or phishing?

  • Thread starter Thread starter Adela
  • Start date Start date
> you're welcome.
>
> the information you
> provided is valuable.


Except that there's no hope of pursuing spam originating from a Japanese
mail server.
>
>
>
>
> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>

>
>
> .
>
>
> "Adela" <nuevadela2@rcn.com> wrote in message
> news:uuBdM7EQIHA.1208@TK2MSFTNGP03.phx.gbl...
>> Hi db and thanks. Are the headers what you see by clicking on the
>> email and then on "properties"? Then here they are:
>>
>> Return-Path: <sophia1@viola.ocn.ne.jp>
>> Received: from mr06.lnh.mail.rcn.net (EHLO mr06.lnh.mail.rcn.net)
>> ([207.172.157.26])
>> by ms16.lnh.mail.rcn.net (MOS 3.8.5-GA FastPath queued)
>> with ESMTP id AQT61407;
>> Sat, 15 Dec 2007 06:19:17 -0500 (EST)
>> Received: from mx04.lnh.mail.rcn.net (mx04.lnh.mail.rcn.net
>> [207.172.157.54]) by mr06.lnh.mail.rcn.net (MOS 3.8.5-GA)
>> with ESMTP id HNR97028;
>> Sat, 15 Dec 2007 06:19:16 -0500 (EST)
>> Received: from viola.ocn.ne.jp (HELO smtp.viola.ocn.ne.jp)
>> ([122.1.235.101]) by mx04.lnh.mail.rcn.net with ESMTP; 15 Dec 2007
>> 06:19:10 -0500 Received: from ltiwfl
>> (p1078-dng08motoma.hiroshima.ocn.ne.jp
>> [61.112.137.79]) by smtp.viola.ocn.ne.jp (Postfix) with SMTP
>> id CB6A22B6D; Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>> From: "Microsoft Network Security Center" <>
>> To: "Commercial Client" <client@news.com>
>> SUBJECT: Network Critical Upgrade
>> Message-Id: <20071215111725.CB6A22B6D@smtp.viola.ocn.ne.jp>
>> Date: Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>> X-Junkmail-Status: score=10/50, host=mr06.lnh.mail.rcn.net
>> X-Junkmail-SD-Raw: score=unknown,
>> refid=str=0001.0A010207.4763B716.00B4,ss=1,vtr=str,vl=3,fgs=16,
>> ip=122.1.235.101,
>> so=2007-07-31 18:51:00,
>> dmn=5.4.3/2007-11-16
>> X-Antivirus: AVG for E-mail 7.5.503 [269.17.2/1184]
>> Mime-Version: 1.0
>> Content-Type: multipart/mixed; boundary=uchuyxbxzjv
>>
>> Ohhhhh, my goodness! It came from Japan? Although MS is all over
>> the world.
>>> o) This is the only thing I could decipher! I'd be very much
>>> interested in

>> knowing what you discovered, for which, thank you! Adela
>>
>>
>>
>>
>> " db ´¯`·.. ><)))º>` .. ."
>> <databaseben.public.newsgroup.microsoft.com> wrote in message
>> news:OJK7%23KBQIHA.5184@TK2MSFTNGP05.phx.gbl...
>>> you should post the
>>> headers of that msg
>>> on this thread.
>>>
>>>
>>>
>>> --
>>>
>>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>>>
>>>
>>> .
>>>
>>>
>>> "Adela" <nuevadela2@rcn.com> wrote in message
>>> news:eIGuHd$PIHA.6060@TK2MSFTNGP05.phx.gbl...
>>>> Please forgive my taking so much space here, but I hope someone
>>>> could tell me how to find out if the following is a GENUINE
>>>> Microsoft msg, or a phishing? Also, if this isn't the proper
>>>> newsgroup, please let me know to which I should send this post. I
>>>> clicked on "contact" and there wasn't any contact there.
>>>> Thanks so very much!: Adela
>>>>
>>>> I received the following email, supposedly from Microsoft, on Dec.
>>>> 15, 2007 at 6:19am but I'm afraid to act on it for fear it's a
>>>> phishing: FROM: Microsoft Network Security Center
>>>> TO: Commercial Client
>>>> SUBJECT: Network Critical Upgrade
>>>>
>>>> Microsoft Client
>>>>
>>>> this is the latest version of security update, the "December 2007,
>>>> Cumulative Patch" update which resolves all known security
>>>> vulnerabilities affecting MS Internet Explorer, MS Outlook and MS
>>>> Outlook Express. Install now to protect your computer from these
>>>> vulnerabilities, the most serious of which could allow an
>>>> malicious user to run code on your computer. This update includes
>>>> the functionality of all previously released patches. Then it lists on
>>>> a table:
>>>>
>>>> Requirements:
>>>> This update applies to:
>>>> Recommendations:
>>>> How to install:
>>>> How to use:
>>>>
>>>> Microsoft Product Support Services and Knowledge Base
>>>> articles can be found on the Microsoft Technical Support web site.
>>>> For security-related information about Microsoft products, please
>>>> visit the Microsoft Security Advisor web site, or Contact Us.
>>>>
>>>> Thank you for using Microsoft products.
>>>>
>>>> Please do not reply to this message. It was sent from an
>>>> unmonitored e-mail address and we are unable to respond to any
>>>> replies. --------------------------------------------------------------------------
>>>> The names of the actual companies and products mentioned
>>>> herein are the trademarks of their respective owners.
>>>>
>>>> Contact Us | Legal | TRUSTe
>>>> ©2007 Microsoft Corporation. All rights reserved. Terms of Use
>>>> | Privacy Statement | Accessibility
 
thanks Lanwench, but I thought that email communications of any kind are
internaitonal....Not so? Thansk again. Adela

"Lanwench [MVP - Exchange]"
<lanwench@heybuddy.donotsendme.unsolicitedmailatyahoo.com> wrote in message
news:uYujANYQIHA.6060@TK2MSFTNGP05.phx.gbl...
>> you're welcome.
>>
>> the information you
>> provided is valuable.

>
> Except that there's no hope of pursuing spam originating from a Japanese
> mail server.
>>
>>
>>
>>
>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>

>>
>>
>> .
>>
>>
>> "Adela" <nuevadela2@rcn.com> wrote in message
>> news:uuBdM7EQIHA.1208@TK2MSFTNGP03.phx.gbl...
>>> Hi db and thanks. Are the headers what you see by clicking on the
>>> email and then on "properties"? Then here they are:
>>>
>>> Return-Path: <sophia1@viola.ocn.ne.jp>
>>> Received: from mr06.lnh.mail.rcn.net (EHLO mr06.lnh.mail.rcn.net)
>>> ([207.172.157.26])
>>> by ms16.lnh.mail.rcn.net (MOS 3.8.5-GA FastPath queued)
>>> with ESMTP id AQT61407;
>>> Sat, 15 Dec 2007 06:19:17 -0500 (EST)
>>> Received: from mx04.lnh.mail.rcn.net (mx04.lnh.mail.rcn.net
>>> [207.172.157.54]) by mr06.lnh.mail.rcn.net (MOS 3.8.5-GA)
>>> with ESMTP id HNR97028;
>>> Sat, 15 Dec 2007 06:19:16 -0500 (EST)
>>> Received: from viola.ocn.ne.jp (HELO smtp.viola.ocn.ne.jp)
>>> ([122.1.235.101]) by mx04.lnh.mail.rcn.net with ESMTP; 15 Dec 2007
>>> 06:19:10 -0500 Received: from ltiwfl
>>> (p1078-dng08motoma.hiroshima.ocn.ne.jp
>>> [61.112.137.79]) by smtp.viola.ocn.ne.jp (Postfix) with SMTP
>>> id CB6A22B6D; Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>>> From: "Microsoft Network Security Center" <>
>>> To: "Commercial Client" <client@news.com>
>>> SUBJECT: Network Critical Upgrade
>>> Message-Id: <20071215111725.CB6A22B6D@smtp.viola.ocn.ne.jp>
>>> Date: Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>>> X-Junkmail-Status: score=10/50, host=mr06.lnh.mail.rcn.net
>>> X-Junkmail-SD-Raw: score=unknown,
>>> refid=str=0001.0A010207.4763B716.00B4,ss=1,vtr=str,vl=3,fgs=16,
>>> ip=122.1.235.101,
>>> so=2007-07-31 18:51:00,
>>> dmn=5.4.3/2007-11-16
>>> X-Antivirus: AVG for E-mail 7.5.503 [269.17.2/1184]
>>> Mime-Version: 1.0
>>> Content-Type: multipart/mixed; boundary=uchuyxbxzjv
>>>
>>> Ohhhhh, my goodness! It came from Japan? Although MS is all over
>>> the world.
>>>> o) This is the only thing I could decipher! I'd be very much
>>>> interested in
>>> knowing what you discovered, for which, thank you! Adela
>>>
>>>
>>>
>>>
>>> " db ´¯`·.. ><)))º>` .. ."
>>> <databaseben.public.newsgroup.microsoft.com> wrote in message
>>> news:OJK7%23KBQIHA.5184@TK2MSFTNGP05.phx.gbl...
>>>> you should post the
>>>> headers of that msg
>>>> on this thread.
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>>>>
>>>>
>>>> .
>>>>
>>>>
>>>> "Adela" <nuevadela2@rcn.com> wrote in message
>>>> news:eIGuHd$PIHA.6060@TK2MSFTNGP05.phx.gbl...
>>>>> Please forgive my taking so much space here, but I hope someone
>>>>> could tell me how to find out if the following is a GENUINE
>>>>> Microsoft msg, or a phishing? Also, if this isn't the proper
>>>>> newsgroup, please let me know to which I should send this post. I
>>>>> clicked on "contact" and there wasn't any contact there.
>>>>> Thanks so very much!: Adela
>>>>>
>>>>> I received the following email, supposedly from Microsoft, on Dec.
>>>>> 15, 2007 at 6:19am but I'm afraid to act on it for fear it's a
>>>>> phishing: FROM: Microsoft Network Security Center
>>>>> TO: Commercial Client
>>>>> SUBJECT: Network Critical Upgrade
>>>>>
>>>>> Microsoft Client
>>>>>
>>>>> this is the latest version of security update, the "December 2007,
>>>>> Cumulative Patch" update which resolves all known security
>>>>> vulnerabilities affecting MS Internet Explorer, MS Outlook and MS
>>>>> Outlook Express. Install now to protect your computer from these
>>>>> vulnerabilities, the most serious of which could allow an
>>>>> malicious user to run code on your computer. This update includes
>>>>> the functionality of all previously released patches. Then it lists on
>>>>> a table:
>>>>>
>>>>> Requirements:
>>>>> This update applies to:
>>>>> Recommendations:
>>>>> How to install:
>>>>> How to use:
>>>>>
>>>>> Microsoft Product Support Services and Knowledge Base
>>>>> articles can be found on the Microsoft Technical Support web site.
>>>>> For security-related information about Microsoft products, please
>>>>> visit the Microsoft Security Advisor web site, or Contact Us.
>>>>>
>>>>> Thank you for using Microsoft products.
>>>>>
>>>>> Please do not reply to this message. It was sent from an
>>>>> unmonitored e-mail address and we are unable to respond to any
>>>>> replies. --------------------------------------------------------------------------
>>>>> The names of the actual companies and products mentioned
>>>>> herein are the trademarks of their respective owners.
>>>>>
>>>>> Contact Us | Legal | TRUSTe
>>>>> ©2007 Microsoft Corporation. All rights reserved. Terms of Use
>>>>> | Privacy Statement | Accessibility

>
>
>
 
Adela <nuevadela2@rcn.com> wrote:
> thanks Lanwench, but I thought that email communications of any kind
> are internaitonal....Not so? Thansk again. Adela


Nope. And since "spam" laws are not international laws, good luck going
after someone sending you v1agra spam from Korea. Futile.



>
> "Lanwench [MVP - Exchange]"
> <lanwench@heybuddy.donotsendme.unsolicitedmailatyahoo.com> wrote in
> message news:uYujANYQIHA.6060@TK2MSFTNGP05.phx.gbl...
>>> you're welcome.
>>>
>>> the information you
>>> provided is valuable.

>>
>> Except that there's no hope of pursuing spam originating from a
>> Japanese mail server.
>>>
>>>
>>>
>>>
>>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>>>
>>>
>>> .
>>>
>>>
>>> "Adela" <nuevadela2@rcn.com> wrote in message
>>> news:uuBdM7EQIHA.1208@TK2MSFTNGP03.phx.gbl...
>>>> Hi db and thanks. Are the headers what you see by clicking on the
>>>> email and then on "properties"? Then here they are:
>>>>
>>>> Return-Path: <sophia1@viola.ocn.ne.jp>
>>>> Received: from mr06.lnh.mail.rcn.net (EHLO mr06.lnh.mail.rcn.net)
>>>> ([207.172.157.26])
>>>> by ms16.lnh.mail.rcn.net (MOS 3.8.5-GA FastPath queued)
>>>> with ESMTP id AQT61407;
>>>> Sat, 15 Dec 2007 06:19:17 -0500 (EST)
>>>> Received: from mx04.lnh.mail.rcn.net (mx04.lnh.mail.rcn.net
>>>> [207.172.157.54]) by mr06.lnh.mail.rcn.net (MOS 3.8.5-GA)
>>>> with ESMTP id HNR97028;
>>>> Sat, 15 Dec 2007 06:19:16 -0500 (EST)
>>>> Received: from viola.ocn.ne.jp (HELO smtp.viola.ocn.ne.jp)
>>>> ([122.1.235.101]) by mx04.lnh.mail.rcn.net with ESMTP; 15 Dec 2007
>>>> 06:19:10 -0500 Received: from ltiwfl
>>>> (p1078-dng08motoma.hiroshima.ocn.ne.jp
>>>> [61.112.137.79]) by smtp.viola.ocn.ne.jp (Postfix) with SMTP
>>>> id CB6A22B6D; Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>>>> From: "Microsoft Network Security Center" <>
>>>> To: "Commercial Client" <client@news.com>
>>>> SUBJECT: Network Critical Upgrade
>>>> Message-Id: <20071215111725.CB6A22B6D@smtp.viola.ocn.ne.jp>
>>>> Date: Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>>>> X-Junkmail-Status: score=10/50, host=mr06.lnh.mail.rcn.net
>>>> X-Junkmail-SD-Raw: score=unknown,
>>>> refid=str=0001.0A010207.4763B716.00B4,ss=1,vtr=str,vl=3,fgs=16,
>>>> ip=122.1.235.101,
>>>> so=2007-07-31 18:51:00,
>>>> dmn=5.4.3/2007-11-16
>>>> X-Antivirus: AVG for E-mail 7.5.503 [269.17.2/1184]
>>>> Mime-Version: 1.0
>>>> Content-Type: multipart/mixed; boundary=uchuyxbxzjv
>>>>
>>>> Ohhhhh, my goodness! It came from Japan? Although MS is all over
>>>> the world.
>>>>> o) This is the only thing I could decipher! I'd be very much
>>>>> interested in
>>>> knowing what you discovered, for which, thank you! Adela
>>>>
>>>>
>>>>
>>>>
>>>> " db ´¯`·.. ><)))º>` .. ."
>>>> <databaseben.public.newsgroup.microsoft.com> wrote in message
>>>> news:OJK7%23KBQIHA.5184@TK2MSFTNGP05.phx.gbl...
>>>>> you should post the
>>>>> headers of that msg
>>>>> on this thread.
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>>
>>>>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>>>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>>>>>
>>>>>
>>>>> .
>>>>>
>>>>>
>>>>> "Adela" <nuevadela2@rcn.com> wrote in message
>>>>> news:eIGuHd$PIHA.6060@TK2MSFTNGP05.phx.gbl...
>>>>>> Please forgive my taking so much space here, but I hope someone
>>>>>> could tell me how to find out if the following is a GENUINE
>>>>>> Microsoft msg, or a phishing? Also, if this isn't the proper
>>>>>> newsgroup, please let me know to which I should send this post. I
>>>>>> clicked on "contact" and there wasn't any contact there.
>>>>>> Thanks so very much!: Adela
>>>>>>
>>>>>> I received the following email, supposedly from Microsoft, on
>>>>>> Dec. 15, 2007 at 6:19am but I'm afraid to act on it for fear
>>>>>> it's a phishing: FROM: Microsoft Network Security Center
>>>>>> TO: Commercial Client
>>>>>> SUBJECT: Network Critical Upgrade
>>>>>>
>>>>>> Microsoft Client
>>>>>>
>>>>>> this is the latest version of security update, the "December
>>>>>> 2007, Cumulative Patch" update which resolves all known security
>>>>>> vulnerabilities affecting MS Internet Explorer, MS Outlook and MS
>>>>>> Outlook Express. Install now to protect your computer from these
>>>>>> vulnerabilities, the most serious of which could allow an
>>>>>> malicious user to run code on your computer. This update includes
>>>>>> the functionality of all previously released patches. Then it
>>>>>> lists on a table:
>>>>>>
>>>>>> Requirements:
>>>>>> This update applies to:
>>>>>> Recommendations:
>>>>>> How to install:
>>>>>> How to use:
>>>>>>
>>>>>> Microsoft Product Support Services and Knowledge Base
>>>>>> articles can be found on the Microsoft Technical Support web
>>>>>> site. For security-related information about Microsoft products,
>>>>>> please
>>>>>> visit the Microsoft Security Advisor web site, or Contact Us.
>>>>>>
>>>>>> Thank you for using Microsoft products.
>>>>>>
>>>>>> Please do not reply to this message. It was sent from an
>>>>>> unmonitored e-mail address and we are unable to respond to any
>>>>>> replies.
>>>>>> --------------------------------------------------------------------------
>>>>>> The names of the actual companies and products mentioned herein are
>>>>>> the trademarks of their respective owners.
>>>>>>
>>>>>> Contact Us | Legal | TRUSTe
>>>>>> ©2007 Microsoft Corporation. All rights reserved. Terms of
>>>>>> Use
>>>>>>> Privacy Statement | Accessibility
 
Well, you are not the only one who received this email, and I got one in
official looking Microsoft online stationary, along with 3 attachments of
downloads of supposed updates. I checked the other links in the email, to
see if they took me to real Microsoft pages, which it seems to do, but the
Live Hotmail warned against use of the attachments in a comment at the top:

"Windows Live Hotmail has blocked some attachments in this mail because they
appear unsafe."

I had received a similar email months before, but deleted it because it
looked Phishy. I have tried to contact Microsoft directly about it, but I am
sure any correspondence I send will be ignored. I figured I may as well be
safe and research this before deleting it again. I also had my XP searched
for needed updates, but none were found, nor none in the history of updates
showed up with these similar credentials.

If this is a real attempt at phishing, then Microsoft needs to find and stop
this copyright infringement on their name and stationary use.

--
Terry


"Lanwench [MVP - Exchange]" wrote:

> Adela <nuevadela2@rcn.com> wrote:
> > Please forgive my taking so much space here, but I hope someone could
> > tell me how to find out if the following is a GENUINE Microsoft msg,

>
> Not legit.
>
> Don't know whether it's a virus or a phishing attempt, but delete
> it/don't click. You're wise to be cautious.
>
> Remember, if you never signed up for email security bulletins, Microsoft has
> no way (or reason) to contact you by email, and they sure don't send out
> security updates as attachments.
>
> If you want updates, use Microsoft Update (that is to say, "don't call us,
> we'll call you." )
>
>
> > or a phishing? Also, if this isn't the proper newsgroup, please let
> > me know to which I should send this post. I clicked on "contact" and
> > there wasn't any contact there.
> > Thanks so very much!: Adela
> >
> > I received the following email, supposedly from Microsoft, on Dec.
> > 15, 2007 at 6:19am but I'm afraid to act on it for fear it's a
> > phishing:
> > FROM: Microsoft Network Security Center
> > TO: Commercial Client
> > SUBJECT: Network Critical Upgrade
> >
> > Microsoft Client
> >
> > this is the latest version of security update, the "December 2007,
> > Cumulative Patch" update which resolves all known security
> > vulnerabilities affecting MS Internet Explorer, MS Outlook and MS
> > Outlook Express. Install now to protect your computer from these
> > vulnerabilities, the most serious of which could allow an malicious
> > user to run code on your computer. This update includes the
> > functionality of all previously released patches.
> > Then it lists on a table:
> >
> > Requirements:
> > This update applies to:
> > Recommendations:
> > How to install:
> > How to use:
> >
> > Microsoft Product Support Services and Knowledge Base articles
> > can be found on the Microsoft Technical Support web site. For
> > security-related information about Microsoft products, please visit
> > the Microsoft Security Advisor web site, or Contact Us.
> >
> > Thank you for using Microsoft products.
> >
> > Please do not reply to this message. It was sent from an
> > unmonitored e-mail address and we are unable to respond to any
> > replies.
> > --------------------------------------------------------------------------
> > The names of the actual companies and products mentioned herein
> > are the trademarks of their respective owners.
> >
> > Contact Us | Legal | TRUSTe
> > ©2007 Microsoft Corporation. All rights reserved. Terms of Use |
> > Privacy Statement | Accessibility

>
>
>
>
>
 
On Dec 16, 3:59 pm, "Jupiter Jones [MVP]"
<jones_jupi...@hotnomail.com> wrote:

> There are a few exceptions to that.
> Like most absolutes, Never, Always etc, there are exceptions.


SHOW ME ONE.

Note that I said that unless one was subscribed to security updates
from MS, NO notice from MS would EVER be found in an email message.
 
They are very rare and I can not show you one.

But the few I have known have been where someone was working with
Microsoft on a specific issue.
The solution was a small file that needed to be run.
In these cases, Microsoft also wanted the person to provide feedback.

But at this point, the receiver of the file knew in advance it was
coming and from who.
In this case the question would not be asked since the file was
expected.

--
Jupiter Jones [MVP]
http://www3.telus.net/dandemar


"Uncle Grumpy" <pauld1943@hotmail.com> wrote in message
news:e57cdff3-63ca-4a56-afb5-0f127685d6d7@i3g2000hsf.googlegroups.com...
On Dec 16, 3:59 pm, "Jupiter Jones [MVP]"
SHOW ME ONE.

Note that I said that unless one was subscribed to security updates
from MS, NO notice from MS would EVER be found in an email message.
 
Here is the link to the Microsoft website that explains this exact email. It
has been evidently passed around again with this year's date. Read this and
see if it is like the one I received.

http://www.microsoft.com/protect/yourself/phishing/msemail.mspx


--
Terry


"Jupiter Jones [MVP]" wrote:

> They are very rare and I can not show you one.
>
> But the few I have known have been where someone was working with
> Microsoft on a specific issue.
> The solution was a small file that needed to be run.
> In these cases, Microsoft also wanted the person to provide feedback.
>
> But at this point, the receiver of the file knew in advance it was
> coming and from who.
> In this case the question would not be asked since the file was
> expected.
>
> --
> Jupiter Jones [MVP]
> http://www3.telus.net/dandemar
>
>
> "Uncle Grumpy" <pauld1943@hotmail.com> wrote in message
> news:e57cdff3-63ca-4a56-afb5-0f127685d6d7@i3g2000hsf.googlegroups.com...
> On Dec 16, 3:59 pm, "Jupiter Jones [MVP]"
> SHOW ME ONE.
>
> Note that I said that unless one was subscribed to security updates
> from MS, NO notice from MS would EVER be found in an email message.
>
>
 
Back
Top