L
Lanwench [MVP - Exchange]
> you're welcome.
>
> the information you
> provided is valuable.
Except that there's no hope of pursuing spam originating from a Japanese
mail server.
>
>
>
>
> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>
>
> .
>
>
> "Adela" <nuevadela2@rcn.com> wrote in message
> news:uuBdM7EQIHA.1208@TK2MSFTNGP03.phx.gbl...
>> Hi db and thanks. Are the headers what you see by clicking on the
>> email and then on "properties"? Then here they are:
>>
>> Return-Path: <sophia1@viola.ocn.ne.jp>
>> Received: from mr06.lnh.mail.rcn.net (EHLO mr06.lnh.mail.rcn.net)
>> ([207.172.157.26])
>> by ms16.lnh.mail.rcn.net (MOS 3.8.5-GA FastPath queued)
>> with ESMTP id AQT61407;
>> Sat, 15 Dec 2007 06:19:17 -0500 (EST)
>> Received: from mx04.lnh.mail.rcn.net (mx04.lnh.mail.rcn.net
>> [207.172.157.54]) by mr06.lnh.mail.rcn.net (MOS 3.8.5-GA)
>> with ESMTP id HNR97028;
>> Sat, 15 Dec 2007 06:19:16 -0500 (EST)
>> Received: from viola.ocn.ne.jp (HELO smtp.viola.ocn.ne.jp)
>> ([122.1.235.101]) by mx04.lnh.mail.rcn.net with ESMTP; 15 Dec 2007
>> 06:19:10 -0500 Received: from ltiwfl
>> (p1078-dng08motoma.hiroshima.ocn.ne.jp
>> [61.112.137.79]) by smtp.viola.ocn.ne.jp (Postfix) with SMTP
>> id CB6A22B6D; Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>> From: "Microsoft Network Security Center" <>
>> To: "Commercial Client" <client@news.com>
>> SUBJECT: Network Critical Upgrade
>> Message-Id: <20071215111725.CB6A22B6D@smtp.viola.ocn.ne.jp>
>> Date: Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>> X-Junkmail-Status: score=10/50, host=mr06.lnh.mail.rcn.net
>> X-Junkmail-SD-Raw: score=unknown,
>> refid=str=0001.0A010207.4763B716.00B4,ss=1,vtr=str,vl=3,fgs=16,
>> ip=122.1.235.101,
>> so=2007-07-31 18:51:00,
>> dmn=5.4.3/2007-11-16
>> X-Antivirus: AVG for E-mail 7.5.503 [269.17.2/1184]
>> Mime-Version: 1.0
>> Content-Type: multipart/mixed; boundary=uchuyxbxzjv
>>
>> Ohhhhh, my goodness! It came from Japan? Although MS is all over
>> the world.
>>> o) This is the only thing I could decipher! I'd be very much
>>> interested in
>> knowing what you discovered, for which, thank you! Adela
>>
>>
>>
>>
>> " db ´¯`·.. ><)))º>` .. ."
>> <databaseben.public.newsgroup.microsoft.com> wrote in message
>> news:OJK7%23KBQIHA.5184@TK2MSFTNGP05.phx.gbl...
>>> you should post the
>>> headers of that msg
>>> on this thread.
>>>
>>>
>>>
>>> --
>>>
>>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>>>
>>>
>>> .
>>>
>>>
>>> "Adela" <nuevadela2@rcn.com> wrote in message
>>> news:eIGuHd$PIHA.6060@TK2MSFTNGP05.phx.gbl...
>>>> Please forgive my taking so much space here, but I hope someone
>>>> could tell me how to find out if the following is a GENUINE
>>>> Microsoft msg, or a phishing? Also, if this isn't the proper
>>>> newsgroup, please let me know to which I should send this post. I
>>>> clicked on "contact" and there wasn't any contact there.
>>>> Thanks so very much!: Adela
>>>>
>>>> I received the following email, supposedly from Microsoft, on Dec.
>>>> 15, 2007 at 6:19am but I'm afraid to act on it for fear it's a
>>>> phishing: FROM: Microsoft Network Security Center
>>>> TO: Commercial Client
>>>> SUBJECT: Network Critical Upgrade
>>>>
>>>> Microsoft Client
>>>>
>>>> this is the latest version of security update, the "December 2007,
>>>> Cumulative Patch" update which resolves all known security
>>>> vulnerabilities affecting MS Internet Explorer, MS Outlook and MS
>>>> Outlook Express. Install now to protect your computer from these
>>>> vulnerabilities, the most serious of which could allow an
>>>> malicious user to run code on your computer. This update includes
>>>> the functionality of all previously released patches. Then it lists on
>>>> a table:
>>>>
>>>> Requirements:
>>>> This update applies to:
>>>> Recommendations:
>>>> How to install:
>>>> How to use:
>>>>
>>>> Microsoft Product Support Services and Knowledge Base
>>>> articles can be found on the Microsoft Technical Support web site.
>>>> For security-related information about Microsoft products, please
>>>> visit the Microsoft Security Advisor web site, or Contact Us.
>>>>
>>>> Thank you for using Microsoft products.
>>>>
>>>> Please do not reply to this message. It was sent from an
>>>> unmonitored e-mail address and we are unable to respond to any
>>>> replies. --------------------------------------------------------------------------
>>>> The names of the actual companies and products mentioned
>>>> herein are the trademarks of their respective owners.
>>>>
>>>> Contact Us | Legal | TRUSTe
>>>> ©2007 Microsoft Corporation. All rights reserved. Terms of Use
>>>> | Privacy Statement | Accessibility
>
> the information you
> provided is valuable.
Except that there's no hope of pursuing spam originating from a Japanese
mail server.
>
>
>
>
> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>
>
> .
>
>
> "Adela" <nuevadela2@rcn.com> wrote in message
> news:uuBdM7EQIHA.1208@TK2MSFTNGP03.phx.gbl...
>> Hi db and thanks. Are the headers what you see by clicking on the
>> email and then on "properties"? Then here they are:
>>
>> Return-Path: <sophia1@viola.ocn.ne.jp>
>> Received: from mr06.lnh.mail.rcn.net (EHLO mr06.lnh.mail.rcn.net)
>> ([207.172.157.26])
>> by ms16.lnh.mail.rcn.net (MOS 3.8.5-GA FastPath queued)
>> with ESMTP id AQT61407;
>> Sat, 15 Dec 2007 06:19:17 -0500 (EST)
>> Received: from mx04.lnh.mail.rcn.net (mx04.lnh.mail.rcn.net
>> [207.172.157.54]) by mr06.lnh.mail.rcn.net (MOS 3.8.5-GA)
>> with ESMTP id HNR97028;
>> Sat, 15 Dec 2007 06:19:16 -0500 (EST)
>> Received: from viola.ocn.ne.jp (HELO smtp.viola.ocn.ne.jp)
>> ([122.1.235.101]) by mx04.lnh.mail.rcn.net with ESMTP; 15 Dec 2007
>> 06:19:10 -0500 Received: from ltiwfl
>> (p1078-dng08motoma.hiroshima.ocn.ne.jp
>> [61.112.137.79]) by smtp.viola.ocn.ne.jp (Postfix) with SMTP
>> id CB6A22B6D; Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>> From: "Microsoft Network Security Center" <>
>> To: "Commercial Client" <client@news.com>
>> SUBJECT: Network Critical Upgrade
>> Message-Id: <20071215111725.CB6A22B6D@smtp.viola.ocn.ne.jp>
>> Date: Sat, 15 Dec 2007 20:17:25 +0900 (JST)
>> X-Junkmail-Status: score=10/50, host=mr06.lnh.mail.rcn.net
>> X-Junkmail-SD-Raw: score=unknown,
>> refid=str=0001.0A010207.4763B716.00B4,ss=1,vtr=str,vl=3,fgs=16,
>> ip=122.1.235.101,
>> so=2007-07-31 18:51:00,
>> dmn=5.4.3/2007-11-16
>> X-Antivirus: AVG for E-mail 7.5.503 [269.17.2/1184]
>> Mime-Version: 1.0
>> Content-Type: multipart/mixed; boundary=uchuyxbxzjv
>>
>> Ohhhhh, my goodness! It came from Japan? Although MS is all over
>> the world.
>>> o) This is the only thing I could decipher! I'd be very much
>>> interested in
>> knowing what you discovered, for which, thank you! Adela
>>
>>
>>
>>
>> " db ´¯`·.. ><)))º>` .. ."
>> <databaseben.public.newsgroup.microsoft.com> wrote in message
>> news:OJK7%23KBQIHA.5184@TK2MSFTNGP05.phx.gbl...
>>> you should post the
>>> headers of that msg
>>> on this thread.
>>>
>>>
>>>
>>> --
>>>
>>> db ·´¯`·.¸. , . .·´¯`·..><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>¸.
>>>> <)))º>·´¯`·.¸. , . .·´¯`·.. ><)))º>`·.¸¸.·´¯`·.¸.·´¯`·...¸><)))º>
>>>
>>>
>>> .
>>>
>>>
>>> "Adela" <nuevadela2@rcn.com> wrote in message
>>> news:eIGuHd$PIHA.6060@TK2MSFTNGP05.phx.gbl...
>>>> Please forgive my taking so much space here, but I hope someone
>>>> could tell me how to find out if the following is a GENUINE
>>>> Microsoft msg, or a phishing? Also, if this isn't the proper
>>>> newsgroup, please let me know to which I should send this post. I
>>>> clicked on "contact" and there wasn't any contact there.
>>>> Thanks so very much!: Adela
>>>>
>>>> I received the following email, supposedly from Microsoft, on Dec.
>>>> 15, 2007 at 6:19am but I'm afraid to act on it for fear it's a
>>>> phishing: FROM: Microsoft Network Security Center
>>>> TO: Commercial Client
>>>> SUBJECT: Network Critical Upgrade
>>>>
>>>> Microsoft Client
>>>>
>>>> this is the latest version of security update, the "December 2007,
>>>> Cumulative Patch" update which resolves all known security
>>>> vulnerabilities affecting MS Internet Explorer, MS Outlook and MS
>>>> Outlook Express. Install now to protect your computer from these
>>>> vulnerabilities, the most serious of which could allow an
>>>> malicious user to run code on your computer. This update includes
>>>> the functionality of all previously released patches. Then it lists on
>>>> a table:
>>>>
>>>> Requirements:
>>>> This update applies to:
>>>> Recommendations:
>>>> How to install:
>>>> How to use:
>>>>
>>>> Microsoft Product Support Services and Knowledge Base
>>>> articles can be found on the Microsoft Technical Support web site.
>>>> For security-related information about Microsoft products, please
>>>> visit the Microsoft Security Advisor web site, or Contact Us.
>>>>
>>>> Thank you for using Microsoft products.
>>>>
>>>> Please do not reply to this message. It was sent from an
>>>> unmonitored e-mail address and we are unable to respond to any
>>>> replies. --------------------------------------------------------------------------
>>>> The names of the actual companies and products mentioned
>>>> herein are the trademarks of their respective owners.
>>>>
>>>> Contact Us | Legal | TRUSTe
>>>> ©2007 Microsoft Corporation. All rights reserved. Terms of Use
>>>> | Privacy Statement | Accessibility