I'm a closet hippie, too - but when it comes to E-mail I'm a militant fascist. I was referring to E-mail hippies. I hate em. Real hippies are groovy man.
----- Original Message ----- From: "Hunter, Lori" <[EMAIL PROTECTED]> To: "Exchange Discussions" <[EMAIL PROTECTED]> Sent: Friday, November 09, 2001 7:05 AM Subject: RE: Outlook blocked access to the following potentially unsafe > Hey, I resemble THAT remark! > > I'm a full-fledged, card carrying hippie witch here, Eric. I would have > voted for that policy and as an added bonus put pictures of the offenders > (wearing cap and shirt) on a bulletin board by the coffee machine. Probably > posted on the intranet as well. > > Damn conservatives. > > -----Original Message----- > From: Eric Cooper [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 08, 2001 6:12 PM > To: Exchange Discussions > Subject: Re: Outlook blocked access to the following potentially unsafe > > > At my last job we proposed a security policy whereby any user who executed a > virus and infected the system would have to wear a dunce cap and a T-Shirt > that says "I'm the idiot who opened the virus" for a week. It was almost > made policy. Damn hippies shot it down... > > ----- Original Message ----- > From: "Mike Carlson" <[EMAIL PROTECTED]> > To: "Exchange Discussions" <[EMAIL PROTECTED]> > Sent: Thursday, November 08, 2001 4:00 PM > Subject: RE: Outlook blocked access to the following potentially unsafe > > > Exactly why MS has to create patches like this particular one. > > Morons. > > What would be cool is if you could put a lock on their mail box so that > when they open up Outlook there is an administrative message staring > them in the face. Before they could open any email they would have to > click OK and then retype what the administrative message was in a box > exactly as it was. If they don't get it right, they are prompted again. > If a new virus goes around the admin could put a lock on all mailboxes > until they perform those steps. > > Kind like yelling at your kids. You tell them something and then you > make them repeat it back to you so that you realize they heard what you > said. > > -----Original Message----- > From: Martin Blackstone [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 08, 2001 5:49 PM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > > > Users will open anything regardless of what you say. > I remember ILOVEYOU, and a user. I had sent out emails all day long > warning about this virus that had penetrated to a few machines before we > had the DAT file for it. Anyhow, after an email an hour all day, I was > talking to this guy about it at his desk. As I am talking, he is looking > at mail and opens it right then! He had a laptop, and I ripped the > PCCard NIC out, but too late. He just stood there and stared at me, as I > turned and ran for my servers. Too late. > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED]] On Behalf Of Mike Carlson > Sent: Thursday, November 08, 2001 3:45 PM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > > > Yes you should and you do. Edit the registry. > > No reason to blame MS for stupid people that open every > "clickmetof*ckupyourcomputer.exe" they get in an email. > > When are people going to take responsibility for stupid stuff they do > and their own incompetence. > > If you don't know how to drive are you going to blame the person that > runs into you? If you don't know how to use a shotgun are going to blame > the person who sold you the gun when you blow your arm off? > > I am amazed all the time when we get new hires, that cant barely survive > without a sign on their desk reminding them to inhale and exhale > otherwise they will die, and throw them in front of a computer and they > have no clue. We had to send a tech down to help a person log into their > computer. They didn't know how to press CTRL+ALT+DEL. The keyboard had > CTL instead of CTRL on the key. > > Or the other fabulous ones that reboot their computer and call us saying > their hard drive crashed when all they did was leave a non-bootable > floppy disk in the drive. > > People need to take responsibility and face up to the fact that they are > computer illiterate or just plain dense when it comes to some of this > stuff. > > Because people think they are computer geniuses even though they > couldn't tell the difference between \ and / companies like Microsoft > have to put in their application things like this patch. > > My wife is a prime example. She will be the first to admint she doesn't > know anything about computers ecept for the applications that she uses > all the time. If I am logged into my computer and she needs it, she logs > into her own account because I have setup her account so that she cant > do any damage to the computer. > > Don't blame MS. They are just responding to all the crap they got about > not being secure. If people wouldn't click on every stupid theng they > get via email, MS would ahev NEVER released that patch. > > There is no one to blame but morons. > > Mike > > -----Original Message----- > From: Wynkoop, John [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 08, 2001 2:11 PM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > > > I should have the option to block attachments or not! > > Explanation: > Some of us (those who work for universities with stupid staff members > and arrogant professors) don't have the option of blocking attachments > (Gosh forbid we infringe on anyone's "academic freedom"). That is > unless we wish to endure a never ending reign of sh*t from above. > Instead we have to work around the vunerabilities found in things such > as VBS, EXE, and COM files (which we have successfully done I might > add). We managed to succesfully ward off NIMDA, Code Red, and a rash of > other recent viruses without changing what users can and can't do (see, > it can be done). Now outlook just gives my users one more reason to > jump down my throat when something doesn't work. Thanks MicroShaft. > > John > > -----Original Message----- > From: Martin Blackstone [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 08, 2001 2:45 PM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > > > Even allowing your mail system to pass .EXE and .COM files is a mistake. > You should thank MS for making OL block those types of files since you > don't. > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED]] On Behalf Of Andy David > Sent: Thursday, November 08, 2001 11:41 AM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > > > >>>>For such a typically minor patch? > Where did you get that idea? > > The Patch didnt break Outlook, your lack of preparation did. > > Over and Out. > > -----Original Message----- > From: Shawn Connelly [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 08, 2001 2:30 PM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > > > You know, it astounds me that so many IT people are blind to Microsoft's > incompetence! > > BTW Mike, your 'car head light' analogy is not even relevant. A more > apt analogy would refer to the Ford Pinto's with the exploding gas > tanks. Sure the user could be mindful of driving only on roads with no > other vehicles, thereby preventing a back-end collision. The 'solution' > in service patch 2 could be likened to Microsoft removing the gas tank > altogether. > > First, I read about 70% of the material related to this service patch. > There are about 20 pages of material relating to this patch and since I > run a dept. with over 50 systems and 6 servers ON MY OWN (no help, not > even support contracts), I really don't have the time (nor is it humanly > possible) to read every patch/update/security document produced by > Microsoft alone (to say nothing about the 50+ other products I look > after). No, I'm not whining!! > > Simply put, this patch broke Outlook!! An email program that cannot > accept > .com and .exe's is damaged! Yes, yes, I know there are other methods > of > receiving files (such as zip'ed) but the point is that no other email > program such as Eudora, Groupwise, Netscape block these attachments. All > Microsoft had to do was to either disable the dangerous capabilities of > .asp,.vbs, (et al) code OR entirely block access to this code. IT WAS > AS SIMPLE AS THAT!! > > Geezz, what's with some of you in this (supposed to be?) friendly > discussions group? > > I sent a message asking about this (yes, I admit it was confrontational) > and I read return responses basically calling me an idiot based on inane > assumptions! > > Of course, I had to risk installing this patch because the risk of an > Outlook-based virus outbreak out weighted the potential annoyance of > breaking Outlook. BTW, I have never experienced a virus outbreak in the > 6 years I've been with this company because of my pro-active stance on > these issues. > > Message to Lori: > "Project Plan and Test Plan Results"??? For such a typically minor > patch? How many IT people do you have in your organization? The last > time I had the time to do anything like that was in 98/99 for Y2K. I'm > beginning to feel very small; am I the only IT person in this discussion > group with an IT budget less than my wage? > > Message to Andy David: > See note about inane assumptions. > > Over and out, > Shawn > > -----Original Message----- > From: Exchange Discussions digest [mailto:[EMAIL PROTECTED]] > Sent: November 6, 2001 1:00 AM > To: exchange digest recipients > Subject: exchange digest: November 05, 2001 > > Subject: RE: Outlook blocked access to the following potentially unsafe > at tach ments > From: "Mike Carlson" <[EMAIL PROTECTED]> > Date: Mon, 5 Nov 2001 09:38:28 -0600 > X-Message-Number: 38 > > It amazes me when people complain about this patch. First developers > wanted the ability to autmoate/script everything to customize it for > their environment. "Give us the tools! Give us the ability!" Well > Microsoft did. Now that users and administrators are too stupid, yes I > mean stupid, to be mindful of attachments and security issues, they now > blame Microsoft for releasing a buggy product. Its like blaming a car > company, when you get rear-ended, for your brake lights being out. > > Similarily, the current crap about IIS being insecure is the same > situation. If the system administrators would apply patches when they > come out, and properly configure the machines, they would have no > problems. > > When a company like Microsoft has to write into their application a > security process that the administrators should do themselves, you have > no one to blame but moron users and incompetant administrators. > > No one in our company had the ability, except admins, to open .exe, > .vbs, wsh files from Outlook before they released the patch. We have a > policy that everything must be in .zip or other compressed archive > format like .sit or .tar. This way we can limit the vulnerabilites we > have. > > People want it easy to use and administer. With that comes > responsibility. If you cant take responsibility, you do not deserve your > job. > > BTW: A company I do development for, fired 2 administrators because they > got hacked by Code Red and Nimda. They were too stupid and incompetent > to install patches that had been out for quite a long time. > > So again, blame stupid users and lazy administrators, not Microsoft. > > Also, if you blindly install patches and fixes without reading the > documentation first and then testing the patches, your job should be on > shakey ground. > > -----Original Message----- > From: Hunter, Lori [mailto:[EMAIL PROTECTED]]=20 > Sent: Monday, November 05, 2001 8:50 AM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > at tach ments > > > Sue Mosher and I (and so many many others) made it a personal goal to > speak ill of this patch whenever possible. In fact, we only refer to it > as the Hell Patch. Not sure who coined that one but it does fit. > > So Shawn, can you show me your Project Plan and Test Plan Results for > the application of this patch in a production environment? Or did you > just blindly apply it and are now here to get your money back? > > No soup for you. NEXT!! > > -----Original Message----- > From: Andy David [mailto:[EMAIL PROTECTED]] > Sent: Friday, November 02, 2001 8:16 PM > To: Exchange Discussions > Subject: RE: Outlook blocked access to the following potentially unsafe > at tach ments > > > Ahhh, I love it.. > If you had bothered to do even a little research before applying the SP > you would have known this... But of course, it's Microsoft's fault. > > > > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED]