Path: utzoo!attcan!utgpu!jarvis.csri.toronto.edu!cs.utexas.edu!asuvax!ncar!tank!cps3xx!eecae!netnews.upenn.edu!vax1.cc.lehigh.edu!sei.cmu.edu!krvw From: POSTMAST@IDUI1.BITNET (Marty Zimmerman) Newsgroups: comp.virus Subject: DIR EXEC remedies (VM/CMS) Message-ID: <0005.8912011616.AA11845@ge.sei.cmu.edu> Date: 28 Nov 89 12:54:00 GMT Sender: Virus Discussion List Lines: 12 Approved: krvw@sei.cmu.edu What are other VM/CMS installations doing to slow down the spread of the DIR EXEC? I seem to remember that the CHRISTMA EXEC prompted someone to write a program to scan/clean the SPOOL queue, and I was wondering if anything similar is available for DIR. On this subject: how far should system administrators go to protect users from this type of "letter bomb". It seems a bit heavy-handed to purge ANY file from the queue with a filetype of EXEC, XEDIT, or MODULE. Is it best to let the users fend for themselves, or overprotect them? Marty Zimmerman Brought to you by Super Global Mega Corp .com