>Folks,
>
>As a followup to this latest, nasty problem with the ILOVEYOU virus I am reminded that late last year someone here on the UT made an offhand remark along the lines of, "Just wait until someone figures out how to use WSH to create a virus."
>
>Well, it didn't take long did it.
>
>For those of you who are far more proficient at WSH than am I what would be the best advice available with respect to protecting one's self against this obviously open door?
>
>I ask this because I'm sitting here more than flummoxed at the notion that someone actually posted the source code to this beast. I fully expect many more variations in the near future since most of the heavy lifting has already been done. Kind of like posting a bomb formula. <g> I question the intelligence of those who did this though I fully understand why they might have done this.
>
>Perhaps, if we respond quickly we can avoid these troubles, at least among our community.
>
>Best,
>
Doug,
I don't mean to throw water on this, but just because you get a file with a vbs extension doesn't mean you have the source. WSH source files can be encrypted so that they'll run just fine, yet are unreadable to us.
The safest policy is to first save it to the disk. That won't start it. You can they right click the file and select Edit. If you can't read it, delete it. Otherwise, you can then view the source to see if any file renaming and/or registry access is going on.
George
Ubi caritas et amor, deus ibi est