Beginning March 2nd, 2020 the Mailing Lists functionality on RootsWeb will be discontinued. Users will no longer be able to send outgoing emails or accept incoming emails. Additionally, administration tools will no longer be available to list administrators and mailing lists will be put into an archival state.
Administrators may save the emails in their list prior to March 2nd. After that, mailing list archives will remain available and searchable on RootsWeb
I am looking for information on the family of Matilda Jane
Cleveland who married J.W. Bailey (according to the
Cleveland genealogy published in 1899). Matilda Jane was
born 19 Oct 1852 in Pickens District, SC, to Jonathan Reeder
Cleveland and Elizabeth Bryce. I do not have any
information on J.W. Bailey, and did not find a family that
matched in the 1900 SC soundex.
I would love to hear from anyone who has information on this
family or on the families of any of Jonathan Reeder
Cleveland's descendants.
Brenda Parker
Houston, TX
Please make sure that you have an updated antivirus program installed and
enabled!
Fred
>
> As many Rootsweb mail list subscribers know, it is impossible to receive
an
> attachment born virus from Rootsweb because the list servers at Rootsweb
remove
> all attachments before sending a posting onto a list.
>
> Nonetheless, some of the larger Rootsweb lists are currently having
problems
> due a new virus called W32 Bad Trans, which is spread subscriber to
subscriber
> in a new and novel way. This virus and its variants are of special
concern to
> list subscribers.
>
> This virus targets users of Outlook email programs, and rather than send a
copy
> of the virus to all the email addresses in the address book as in past, it
> sends a virus to all the email addresses that are in unopened email in the
> Inbox.
>
> For example, if subscriber A posts to a list and subscriber B has an
infected
> computer, subscriber A will get a virus induced response from subscriber B
that
> will contain a virus in the attachment. More worrisome, is that
subscriber A
> anticipating a response may eagerly open the attachment only to find a
virus
> that now infects their machine and the process of a widening infection
> continues.
>
> McAfee has issued the following information on this virus.
>
> Virus Name W32/Badtrans
>
> Virus Characteristics
> This mass mailing worm attempts to send itself using
> Microsoft Outlook by replying to unread email
messages.
> It also drops a remote access trojan (detected as
> Backdoor-NK.svr with the 4134 DATs; detected
> heuristically as New Backdoor prior to the 4134 DAT
> release).
>
> When run, the worm displays a message box entitled,
> "Install error" which reads, "File data corrupt:
> probably due to a bad data transmission or bad disk
> access." A copy is saved into the WINDOWS directory as
> INETD.EXE and an entry is entered into the WIN.INI
file
> to run INETD.EXE at startup. KERN32.EXE (a backdoor
> trojan), and HKSDLL.DLL (a valid keylogger DLL) are
> written to the WINDOWS SYSTEM directory, and a
registry
> entry is created to load the trojan upon system
startup.
>
> HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
> RunOnce\kernel32=kern32.exe
>
> Once running, the trojan attempts to mail the victim's
> IP Address to the author. Once this information is
> obtained, the author can connect to the infected
system
> via the Internet and steal personal information such
as
> usernames, and passwords. In addition, the trojan
also
> contains a keylogger program which is capable of
> capturing other vital information such as credit card
> and bank account numbers and passwords.
>
> The next time Windows is loaded, the worm attempts
to
> email itself by replying to unread messages in
> Microsoft
> Outlook folders. The worm will be attached to
these
> messages using one of the following filenames
(note
> that
> some of these filenames are also associated with
other
> threats, such as W95/MTX.gen@M):
> Card.pif
> docs.scr
> fun.pif
> hamster.ZIP.scr
> Humor.TXT.pif
> images.pif
> New_Napster_Site.DOC.scr
> news_doc.scr
> Me_nude.AVI.pif
> Pics.ZIP.scr
> README.TXT.pif
> s3msong.MP3.pif
> searchURL.scr
> SETUP.pif
> Sorry_about_yesterday.DOC.pif
> YOU_are_FAT!.TXT.pif
> The message body may contain the text:
> Take a look to the attachment.
> AVERT first received an intended version of this
worm
> (10,623 bytes) on April 11 from a company in New
> Zealand.
>
> (c) 2001, Network Associates, Inc. and its affiliated Companies. All
> Rights
> Reserved.