Thank you for writing to us! Although we receive hundreds of e-mails every day, we really and truly read them all, and your comments, suggestions, and questions are most welcome. Unfortunately, we can manage to answer only a small fraction of our incoming mail.
Our site covers many of the items currently being plopped into inboxes everywhere, so if you were writing to ask us about something you just received, our search engine can probably help you find the very article you want.
Choose a few key words from the item you're looking for and click here to go to the search engine.
(Searching on whole phrases will often fail to produce matches because the text of many items is quite variable, so picking out one or two key words is the best strategy.)
We do reserve the right to use non-confidential material sent to us via this form on our site, but only after it has been stripped of any information that might identify the sender or any other individuals not party to this communication.
DO NOT OPEN ANY EMAIL FROM SUPPORT@MICROSOFT.COM
IF YOU RECEIVE ONE, DELETE IT WITHOUT OPENING
A new computer worm that disguises itself as an e-mail from Microsoft Corp. is spreading, computer security firms warned on Monday. The e-mail containing the worm, dubbed Palyh or Mankx, appears to come from email@example.com, but is not from the software company. When the attachment is opened, the worm copies itself to the Windows folder, scoops up e-mail addresses from the hard disk and starts sending itself out.
Origins: Palyh (also known as Mankx) is a mass-mailing worm which hit the Internet in May 2003 and propagates by mailing itself to recipients extracted from e-mail addresses found on infected machines. It lures recipients into opening infected messages by sending itself out under a forged <firstname.lastname@example.org> return address. The subjects of these infected messages can be any of the following:
Re: Approved (Ref: 3394-65467)
Re: Approved (Ref: 38446-263)
I Re: My application v
Re: My details
The triggering attachment can be any of the following filenames:
Palyh can be identified and removed from infected machines with virus protection software updated with the latest virus definition files.