stevekl at PANIX.COM
Wed Jul 25 14:16:00 UTC 2001
On Tue, 24 Jul 2001, Douglas G. Wilson wrote:
> My recommendation: do not open or execute any attachment before verifying
> the authenticity of the message by e-mailing the putative sender. It might
> be a good idea to make restrictive settings on one's e-mail program also. I
> still don't feel safe ....
Using a mail program like Pine on a UNIX shell majorly helps in this
-- Steve Kl.
More information about the Ads-l