In case anyone on the list knows someone whose computer has it.
Begin forwarded message:
> PowerPoint presentation athttp://www.afhs.ab.ca
> stop what you are doing and read them *NOW*! Both of these resources
> show you, step-by-step, how to use Microsoft's free "Windows Update"
> utility to patch some critical security holes in Windows ... including
> the hole that is currently being exploited by the now infamous
> "double-u-thir-ty-two-bla-ster" worm. [Sorry for the phonetic naming
> there, folks. I shy away from including viruses names in my posts
> overzealous sysadmins have been known to block ALL email that even
> MENTIONS the name of a known virus or worm.]
> The current Worm-Who-Must-Not-Be-Named takes advantage of a known
> security hole in Windows NT 4, Windows 2000, Windows XP, and Windows
> 2003 Server. Microsoft patched this hole back in mid-July. If you've
> run Windows Update and downloaded all of the critical update anytime
> after July 16th, your computer should be safe from this particular
> If you haven't run Windows Update, though, let me be the first to bid
> you a hearty "bye-bye!"
> [One of the symptoms of the Worm-Who-Must-Not-Be-Named reportedly is
> that your computer automatically restarts every 60 seconds, making it
> quite difficult for you to download and install the necessary patch.
> Word is that you can delay the restart by double-clicking on your
> computer's clock and then changing the year to 2002.]
> To learn more, including what you should do in case your computer
> becomes infected with this particular worm, check out