Saturday, June 29, 2002
CNN.com - Police: Children die in hot car while mom at salon - June 29, 2002 A Detroit woman whose two small children died in her car while she was getting her hair styled has been taken into custody, police said.
What an excuse for a human being, She was either stupid or did not care for her kids. They were 10 mths and 3 years. I have a 4 and 5 year old, I would not leave them alone in the house, much less in a closed car.
THE EYE-OPENER
As you got up this morning, I watched you, and hoped you would talk to me, even if it was just a few words, asking my opinion or thanking me for something good that happened in your life yesterday. But I noticed you
were too busy, trying to find the right outfit to wear.
When you ran around the house getting ready, I knew there would be a few minutes for you to stop and say hello, but you were to busy. At one point you had to wait, fifteen minutes with nothing to do except sit in a chair.
Then I saw you spring to your feet. I thought you wanted to talk to me but you ran to the phone and called a friend to get the latest gossip instead. I watched patiently all day long.
With all your activities I guess you were too busy to say anything to me. I noticed that before lunch you looked around, maybe you felt embarrassed to talk to me, that is why you didn't bow your head. You glanced three or four tables over and you noticed some of your friends talking to me briefly before they ate, but you didn't. That's okay.
There is still more time left, and I hope that you will talk to me yet. You went home and it seems as if you had lots of things to do. After a few of them were done, you turned on the TV. I don't know if you like TV or not, just about anything goes there and you spend a lot of time each day in front of it not thinking about anything, just enjoying the show. I waited patiently again as you watched the TV and ate your meal, but again you didn't talk to me.
Bedtime--I guess you felt too tired. After you said goodnight to your family you plopped into bed and fell asleep in no time. That's okay because you may not realize that I am always there for you. I've got patience, more than you will ever know. I even want to teach you how to be patient with others as well.
I love you so much that I wait everyday for a nod, prayer or thought or a thankful part of your heart. It is hard to have a one-sided conversation.
Well, you are getting up once again. And once again I will wait, with nothing but love for you. Hoping that today you will give me some time.
Have a nice day! Your friend, GOD
--Selected from Pastor Tim's Illustrations: http://www.cybersaltlists.org/
Thursday, June 27, 2002
Guardian Unlimited | The Guardian | Narnia books attacked as racist and sexist Man, I wonder where this guy gets off, claiming the Narnia series is a blantant attempt at propaganda in the cause of the religion, but his books are not. You really have to read this to appreciate it.
Wednesday, June 26, 2002
KOTV Channel 6, The Spirit of Oklahoma Volunteers 'raising the roof' in Owasso. Isn't it nice to know that Christians can still raise the roof in an old fashion way?
Tuesday, June 25, 2002
News from Agape Press - Arrest Follows Pro-Lifer's Violation of Federal Injunction We are getting our liberties taken away from us one by one it would appear. Was this man tying to stop an abortion? Or reading his Bible? Can the government read our minds? There are a lot of questions not asked in this article, and that bothers me even more.
DAWN Fridayfax: News from Russia (2002 #24) I have always wondered what Godpeople believe in when they say that God does not do miracles today. I have no reason to doubt this story, a man with a damaged rental car gets it repaired by God. Read for yourself please
Mozilla Off to a Fast Start, But IE Dominates I have been using Mozila since it was in Beta, and I am begining to like it more and more. The email package in it is much better than it used to be in Netscape, and RSS feeds can be added as a side bar feature. If you have not tried it, come over to the light side and leave the dark side of the force to Microsoft (Hey I went and Saw Starwars Episode 2 this weekend, what do you want).
Monday, June 24, 2002
BBC News | SCI/TECH | Put your mobile where your mouth is Not one to cause an alarm, but is this a step towards the Mark of The Beast. Enquiring minds want to know? Thanks to Christdot(www.christdot.org) for the information.
Tuesday, June 18, 2002
Here is the latest email from Trend Virus Some new worm tricks out there. Be careful!
*********************************************************************
TREND MICRO WEEKLY VIRUS REPORT
(by TrendLabs Global Antivirus and Research Center)
*********************************************************************
------------------------------------------------------------------------
Date: June 14, 2002
------------------------------------------------------------------------
To read an HTML version of this newsletter, go to:
http://www.antivirus.com/trendsetter/virus_report/
Issue Preview:
1. Trend Micro Updates - Pattern File and Scan Engine Updates
2. It's Not Your Password - WORM_FRETHEM.E (Medium Risk)
3. "World Cup" Worm Withered - VBS_CHICK.F (Low Risk)
4. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US
5. Trend Micro PC-cillin 2002 Now Available
NOTE: Long URLs may break into two lines in some mail readers.
Should this occur, please cut and paste the URL in your browser.
************************************************************************
1. Trend Micro Updates - Pattern File and Scan Engine Updates
------------------------------------------------------------------------
PATTERN FILE: 299 http://www.antivirus.com/download/pattern.asp
SCAN ENGINE: 6.150 http://www.antivirus.com/download/engines/
2. It's Not Your Password - WORM_FRETHEM.E (Medium Risk)
------------------------------------------------------------------------
This non-destructive, memory-resident worm propagates via Microsoft
Outlook by sending email to all addresses listed in the infected user's
Windows Address Book, and in .DBX files where Microsoft Outlook Express
archives emails. It arrives as an attachment to an email message with
the following:
Subject: Re: Your password!
Message Body: ATTENTION!
You can access very important information by this password
DO NOT SAVE password to disk
use your mind
now press cancel
Attachments: Decrypt-password.exe
password.txt
This worm exploits the incorrect MIME (Multipurpose Internet Mail
Extensions) header vulnerability and IFRAME security hole that automatically
runs the attachment of an HTML email when a user reads or previews the
email. This vulnerability allows the worm to install itself in the
system without the user double clicking or opening the attachment.
If you would like to scan your computer for WORM_FRETHEM.E or thousands
of other worms, viruses, Trojans and malicious code, visit HouseCall,
Trend Micro's free online virus scanner at:
http://housecall.antivirus.com/
WORM_FRETHEM.E is detected and cleaned by Trend Micro pattern file #298
and above.
For additional information about WORM_FRETHEM.E please visit:
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_FRETHEM.E
3. "World Cup" Worm Withered - VBS_CHICK.F (Low Risk)
------------------------------------------------------------------------
The "World Cup" worm quickly withered, soon after its discovery. This
worm contains errors in its code and therefore, it fails to propagate.
It is capable of sending email, but is incapable of sending email with a
copy of itself as an attachment.
This non-destructive worm claims to contain the results of a World Cup
2002 soccer match, and propagates via Internet Relay Chat and email. It
executes on systems where ActiveX is enabled in Internet Explorer's
(IE) security settings. It arrives in an email with the following details:
Subject: RE: Korea Japan Results
Message Body: Take a look at these results ...
Regards,
Attachment: koreajapan.chm
Upon execution, Internet Explorer prompts the user with a warning,
asking to enable the ActiveX control. When the user clicks "Yes," the
malicious script of this worm executes. It sends an email only once, and
only to the first entry in the infected user's address book. After it has
sent the email, it does not re-execute the mailing routine.
Due to errors in its code, this worm fails to propagate: It can send
one email, but is incapable of sending email with a copy of itself as an
attachment.
VBS_CHICK.F is detected and cleaned by Trend Micro pattern file #295
and above.
For additional information about VBS_CHICK.F please visit:
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=VBS_CHICK.F
4. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US
(week of: June 3, 2002 to June 9, 2002)
------------------------------------------------------------------------
1. WORM_KLEZ.H
2. JS_EXCEPTION.GEN
3. WORM_BENJAMIN.A
4. JS_NOCLOSE.E
5. PE_ELKERN.D
6. PE_MAGISTR.A
7. TROJ_DLDER.A
8. PE_MAGISTR.B
9. PE_NIMDA.A-O
10. WORM_KLEZ.E
5. Trend Micro PC-cillin 2002 - Antivirus, Anti-Hacker, & PDA Virus
Protection
------------------------------------------------------------------------
Trend Micro is pleased to announce the release of PC-cillin 2002.
PC-cillin 2002 provides award-winning protection against macro viruses,
Trojans,
and other malicious threats. An integrated personal firewall helps
secure
desktop computers against illegal access, ping attacks, and even port
scanning
for Internet-era protection. This complete antivirus strategy also
includes
security for Palm, Pocket PC, and EPOC devices.
BUY NOW: $39.95
http://www.trendmicro.com/pcc2002_wvr
If you already own PC-cillin, you may purchase an upgrade to PC-cillin
2002 for
just $19.95 at:
http://www.antivirus.com/pc-cillin/products/upgrade.htm
This pricing applies to customers in the U.S. and Canada only.
************************************************************************
Sunday, June 16, 2002
Notes from the June 16th Morning service.
Pastor Barry Hall Family Fellowship Bible Church 6/16/2002 AM Service
It is hard to lead leaders, they have a nation inside them. Especially in raising boy children. He must he led in a strong way or he will lead the show. Young men need things to be definite. So it is with a leader. He must lead and submit. Think about Moses who had to lead a bunch of leaders. David was a worshiper and a military man. How can that be so? How can he be a weeping crying man and a man who is going to take you down in a heartbeat if you crossed him? Study leaders. How do they think? What makes them do what they do? Two things: 1) Great strength and 2) great weakness.. God will not deliver you from some things but will deliver you through them. Listen to what David said: Psalm 23
1 <<A Psalm of David.>> The LORD is my shepherd; I shall not want.
2 He maketh me to lie down in green pastures: he leadeth me beside the still waters. {green…: Heb. pastures of tender grass} {still…: Heb. waters of quietness}
3 He restoreth my soul: he leadeth me in the paths of righteousness for his name’s sake.
4 Yea, though I walk through the valley of the shadow of death, I will fear no evil: for thou art with me; thy rod and thy staff they comfort me.
5 Thou preparest a table before me in the presence of mine enemies: thou anointest my head with oil; my cup runneth over. {anointest: Heb. makest fat}
6 Surely goodness and mercy shall follow me all the days of my life: and I will dwell in the house of the LORD for ever. {for ever: Heb. to length of days}
What does it take to be a leader? Strength and control is what it takes. It has been said "you look like what you have come through". This is so true because getting victory is a fight.
Saturday, June 15, 2002
Want to take programming class with me this summer. Well I am learning C and have decided to put up my notes on each chapter read. I am a week and a half into the class, so I will add chapters 1 day at a time, till I get caught up so as not to overwhelm you. The notes are from A First Book of Ansi C third edition. by Gary J Bronson. We basically read the book, watch some videos, take part in threaded instructions, and turn in code, (with two test during the semester. If you are using the RSS Feed come to the site (http://dr_bob.blogspot.com/) to take a look. Any way, have fun you all.
Excuse the numbering the HTML is from Microsoft Word wich does not do a great job on HTML code.
Chapter 1 - Getting Started
- Introduction to Programming
A computer is a machine. Like any other machine it needs to be told what to do and that is called a program. All programs do basically the same thing, input data, manipulate the data and output the data. Why are there so many programming languages? There are so many because each has it own specialty niche.
- Science and engineering: Fortran
- Business Applications: COBOL
- Teaching programming: Basic and Pascal
- Structured programming: C
In order to write a program a programmer has to know how to write a step by step sequence of instructions to perform a computation. This is known as an algorithm. You must decide on one way to solve the problem. To simplify this process, begin by writing out the steps in plain English. This is referred to as pseudo code. Math equations are called formulas. Instead of pseudo code a pictorial representations is sometimes used. This is referred to as a flow chart.
Our next step would be to change the algorithm into a program (coding). Once coded it needs to be converted to machine language so the computer can use it (translated). In C we use a compiler to covert all the code to an executable file. Other programming languages use an interpreter and convert one line if code at a time as needed.
- Introduction to Modularity
Just as a building does not happen, neither do programs. They require planning. The structure is the program's overall construction. In constructing modular programming we will need to use modules. Each has a specific task in taking in, processing, and outputting data. In C, these modules are called functions.
Functions should be given good name (identifiers) that reflects what they really do. They need to follow the following rules:
- First character MUST be letter or underscore (_)
- Second and all following must be alphanumeric or underscore (_)
- Cannot be a reserve word
- No more than 31 characters (compilers may vary on this)
Each C program has a function named main where all other functions are called. It, as all functions start with a function header line. This tells the following information:
- What type of data is returned
- Name of the function
- Type of data, if any, is sent into the function
Here is an example:
int main()
in this example, int is integer, the type of value that will be returned, main is the name of the function, and () has the information that is being sent into the program. Since the ( ) are empty, there is no information being sent in. Any information (arguments) sent in would be in-between the ( ). After this will follow curly braces {} with the program between them. All statements insode the {} must have a semicolon at the end (;).
1.3 The printf() function
To put output ot a screen, the printf() function needs to be used. Anything that is between the ( ) will be output to the screen. It should be in " " in the ( ).
Comments are important to all programs as they tell you information on what was done, and why. They can be added to your code by putting them in-between /* and */. All comments will not compile when it comes time to compile the program. Do not nest one set of comments inside another set.
To use the printf() function, you will need to add a preprocessor line. This will include pre-built functions. For the printf() function we will use stdio.h. It is added before the main() function like this:
#include <stdio.h>
It is called a header file because of its locations and does not need to include a ; at the end.
printf() uses the \ character to do special things. One of these is \n which does a new line. The \ is called an escape character.
- Programming Style
While there is no specific way to write a program it is a good idea to make it readable. Lines should be indented as needed to express clarity. The compiler will ignore most white-space (space between characters). Also one should use comments liberally to help you and others what was being done in the program.
- Top Down Development
Five steps in program development
- Determine what the output is that the program needs to produce
- Determine what the inputs are to be.
- Design the program
- Select the algorithm for transferring the input to the output
- Check algorithm by hand with specific values
- Code in C.
- Test with selected data.
- Common Programming Errors
Steps 1 & 2 are the analysis phase.
Step 3 is the design phase.
Step 4 is the coding phase.
Step 5 is the testing phase.
- Omitting the () after the main function
- Omitting or not typing correctly the { at the start of the program
- Omitting or not typing correctly the } at the start of the program
- Misspelling a function name
- Forgetting to close the message in a printf() function with a "
- Omitting a semicolon (;) at the end of a statement
- Forgetting the \n to indicate a new line.
One major mistake that all new programmers make is that the start to code before they know what the program is supposed to do, what algorithms are needed, and a clear understanding of what is to be done. Take time from the start and you will get it right.
Microsoft Shipments Infected With Nimda One really has to laugh at this, the company that wants to impress us with how secure they want to make our systems.
Mercury News | 06/15/2002 | Many believe Jesus sinned on Earth, study reports Two quick thoughts 1) why is this under the entertainment side of the newspaper side of the website (look at the link), and 2) Because 25% of the people think this way does that make it true. Guess what? If 99% belived Jesus sined, would that make it true? I belive He lived a sinless life for me. And that is all that really matters. He died for me, and I am have eternal life in heave for it. How about you. Write me at drbobm@yahoo.com to discuss it!
Friday, June 14, 2002
BBC News | NEWSNIGHT | Hacker watches Nato spy pictures HMMMMM why have we not head about this here in the states. Can we all get together and buy our government a cable descramble, and then get Ted Turner to pitch in for scrambling equipment. What next?
New Yahoo! This is the future for Yahoo. What do you think. Maybe you should write your opinion. As one person said the directory is below the fold. I do not care for that, how about you.
F-Secure Computer Virus Information Pages: Frethem Moving up the charts with speed. Please be careful with emails promising you nice desktop themes. Update your antivirus programs please.
First Reported JPEG Virus Found Not to be too worried about this one. It is more theory than fact. Do me a favor people, practice Safe Hex will you! Do not detach or download any thing that you were not really expectecting. And if a program sounds too good to be true, it probally is.
Microsoft Warns Again on MSN Chat Flaw If you use MSN Instant Messenger please follow the links. It is possible to use the Chat feature and not know that you were. There is a serious hole and it needs to be closed. If you did it before, do it again, this is a diffrent hole.
Thursday, June 13, 2002
Tuesday, June 11, 2002
*********************************************************************
TREND MICRO WEEKLY VIRUS REPORT
(by TrendLabs Global Antivirus and Research Center)
*********************************************************************
------------------------------------------------------------------------
Date: June 7, 2002
------------------------------------------------------------------------
To read an HTML version of this newsletter, go to:
http://www.antivirus.com/trendsetter/virus_report/
Issue Preview:
1. Trend Micro Updates - Pattern File and Scan Engine Updates
2. Shakira Makes Her Debut - VBS_VBSWG.AQ (Medium Risk)
3. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US
4. Trend Micro PC-cillin 2002 Now Available
NOTE: Long URLs may break into two lines in some mail readers.
Should this occur, please cut and paste the URL in your browser.
************************************************************************
1. Trend Micro Updates - Pattern File and Scan Engine Updates
------------------------------------------------------------------------
PATTERN FILE: 295 http://www.antivirus.com/download/pattern.asp
SCAN ENGINE: 6.150 http://www.antivirus.com/download/engines/
2. Shakira Makes Her Debut - VBS_VBSWG.AQ (Medium Risk)
------------------------------------------------------------------------
On June 6, 2002 the risk level of VBS_VBSWG.AQ was upgraded from low
risk to medium risk, due to an increase in this worm's activity.
This destructive Visual Basic Script (VBScript) worm propagates using
Microsoft Outlook, and arrives in an email with the following:
Subject: Shakira's Pictures
Message Body: Hi :
i have sent the photos via attachment
have funn...
Attachment: ShakiraPics.jpg.vbs
Upon execution, it drops a file, SHAKIRAPICS.JPG.VBS, in the Windows
directory and then adds a registry entry that allows it to execute at
every Windows startup.
This worm also copies itself to all .VBS and .VBE files found in all
local and remote drives, effectively overwriting these infected files. If
floppy disks or Zip disks are present in the disk drives, this worm
attempts to infect these drives as well.
If you would like to scan your computer for VBS_VBSWG.AQ or thousands
of other worms, viruses, Trojans and malicious code, visit HouseCall,
Trend Micro's free online virus scanner at:
http://housecall.antivirus.com/
VBS_VBSWG.AQ is detected and cleaned by Trend Micro pattern file #292
and above.
For additional information about VBS_VBSWG.AQ please visit:
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=VBS_VBSWG.AQ
3. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US
(week of: May 27, 2002 to June 2, 2002)
------------------------------------------------------------------------
1. WORM_KLEZ.H
2. WORM_KLEZ.E
3. JS_EXCEPTION.GEN
4. JS_NOCLOSE.E
5. WORM_BENJAMIN.A
6. VBS_LOVELETTR.AS
7. PE_NIMDA.A-O
8. WORM_YAHA.B
9. WORM_BADTRANS.B
10. PE_MAGISTR.A
4. Trend Micro PC-cillin 2002 - Antivirus, Anti-Hacker, & PDA Virus
Protection
------------------------------------------------------------------------
Trend Micro is pleased to announce the release of PC-cillin 2002.
PC-cillin 2002 provides award-winning protection against macro viruses,
Trojans,
and other malicious threats. An integrated personal firewall helps
secure
desktop computers against illegal access, ping attacks, and even port
scanning
for Internet-era protection. This complete antivirus strategy also
includes
security for Palm, Pocket PC, and EPOC devices.
BUY NOW: $39.95
http://www.trendmicro.com/pcc2002_wvr
If you already own PC-cillin, you may purchase an upgrade to PC-cillin
2002 for
just $19.95 at:
http://www.antivirus.com/pc-cillin/products/upgrade.htm
This pricing applies to customers in the U.S. and Canada only.
Monday, June 10, 2002
Saturday, June 01, 2002
*********************************************************************
TREND MICRO WEEKLY VIRUS REPORT
(by TrendLabs Global Antivirus and Research Center)
*********************************************************************
------------------------------------------------------------------------
Date: May 31, 2002
------------------------------------------------------------------------
To read an HTML version of this newsletter, go to:
http://www.antivirus.com/trendsetter/virus_report/
Issue Preview:
1. Trend Micro Updates - Pattern File and Scan Engine Updates
2. Many Variants of ENEMANY - WORM_ENEMANY.A, .B, and .C (Low Risk)
3. KLEZ Breaks the 1 Million Mark - WORM_KLEZ.H (Low Risk)
4. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US
5. Trend Micro PC-cillin 2002 Now Available
NOTE: Long URLs may break into two lines in some mail readers.
Should this occur, please cut and paste the URL in your browser.
************************************************************************
1. Trend Micro Updates - Pattern File and Scan Engine Updates
------------------------------------------------------------------------
PATTERN FILE: 291 http://www.antivirus.com/download/pattern.asp
SCAN ENGINE: 6.150 http://www.antivirus.com/download/engines/
2. Many Variants of ENEMANY - WORM_ENEMANY.A, .B, and .C (Low Risk)
------------------------------------------------------------------------
There are several low-risk variants of WORM_ENEMANY.A that Trend Micro
is closely monitoring.
WORM_ENEMANY.A is a non-destructive, non-memory resident mass-mailing
worm that sends copies of itself via email to all contacts listed in an
infected user's Microsoft Outlook address book using Outlook's MAPI
functions.
It places recipient names in the BCC: field, so that the email
addresses are not visible. After sending copies of itself, it deletes the
emails from the Sent Items folder. It sends email messages with the
following:
SUBJECT: The New Xerox Update for our WinXP
MESSAGE BODY: Dear,
Microsoft WinXP User, here are the last Update from Xerox Security
System, please install this file and going to www.microsoft.com and
finished this Update too.
ATTACHMENT: Xerox-Update.Exe(8.72KB)
WORM_ENEMANY.B is a non-destructive mass-mailing worm that propagates
via Messaging Application Programming Interface (MAPI), and sends itself
to all addresses listed in an infected user's Microsoft Outlook address
book. It sends email messages with the following:
SUBJECT: Edonkey Update
MESSAGE BODY: Hello Edonkey User, this is the Update tool, to fix our
Edonkey Client to 35.16.61
ATTACHMENT: Esel_Update.Exe
WORM_ENEMANY.C is a non-destructive, non-memory resident mass-mailing
worm that sends copies of itself via email to all contacts listed in an
infected user's Microsoft Outlook address book using Outlook's MAPI
functions.
It places recipient names in the BCC: field, so that the email
addresses are not visible. After sending copies of itself, it deletes the
emails from the Sent Items folder. It sends email messages with the
following:
SUBJECT: Alle gegen den TEuro
MESSAGE BODY: Sieh Dir mal Die Tabelle an,
mit den neusten Information uber den teuren T-Euro
ATTACHMENT: teuro.Exe(7.18KB)
If you would like to scan your computer for any of the variants of
WORM_ENEMANY or thousands of other worms, viruses, Trojans and malicious
code, visit HouseCall, Trend Micro's free online virus scanner at:
http://housecall.antivirus.com/
The variants of WORM_ENEMANY are detected and cleaned by Trend Micro
pattern file #292 and above.
For additional information about the variants of WORM_ENEMANY, please
visit: http://www.antivirus.com/vinfo/
3. KLEZ Breaks the 1 Million Mark - WORM_KLEZ.H (Low Risk)
------------------------------------------------------------------------
WORM_KLEZ.H, the memory-resident variant of the WORM_KLEZ.A
mass-mailing worm has recently surpassed the one million mark. At the time of this
writing, approximately 1,059,967 computers worldwide have been infected
with WORM_KLEZ.H. Europe, Asia, and North America have been hardest
hit. You may view Trend Micro's Risk Statistics for WORM_KLEZ.H at
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_KLEZ.H&VSect=S&Period=All
This destructive, memory-resident mass-mailing worm uses SMTP to
propagate via email. The subject line of the email it arrives with is
randomly selected from a long list of possible choices. This worm can change
or spoof the original email address in the FROM: field. It obtains email
addresses (that it places in the FROM: field) from the infected user's
address book. This causes a non-infected user to appear as the person
who has sent this worm's malicious email, and hides the real address of
the sender of the infected email.
Upon execution, this worm decodes its data in memory. It then copies
itself to a WINK*.EXE file in the Windows System directory. The copy has
a hidden attribute and the * is a random number of random characters.
It also infects .EXE files.
The worm drops a randomly named file in the ProgramFilesDir (usually
C:\Program Files). Approximately 10KB in size, this program can infect
files in network-shared folders and disable system file protection. Trend
Micro detects this program as PE_ELKERN.D.
The worm also disables the running processes, and occasionally deletes
the executable files, of programs associated with several popular
antivirus products.
On Windows 98/95 systems, the worm registers itself as a service
process to hide itself from the taskbar. On Windows 2000 systems, the worm
creates a system service and registers it as a service control
dispatcher. This worm does not execute its payload on systems running Windows NT
4.0 and earlier versions, although infection of machines with this
operating system is possible if the machine has shared folders. The dropped
virus, PE_ELKERN.D, infects files in shared drives. When this happens,
a full infection of the system may result, since PE_ELKERN.D executes
on any Windows platform.
WORM_KLEZ.H is detected and cleaned by Trend Micro pattern file #265
and above.
For additional information about WORM_KLEZ.H, please visit Trend Micro
at:
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_KLEZ.H
4. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend Micro US
(week of: May 20, 2002 to May 26, 2002)
------------------------------------------------------------------------
1. WORM_KLEZ.H
2. JS_EXCEPTION.GEN
3. WORM_KLEZ.E
4. WORM_YAHA.B
5. WORM_BENJAMIN.A
6. WORM_MYLIFE.J
7. VBS_LOVELETTR.AS
8. PE_MAGISTR.B
9. PE_MAGISTR.DAM
10. PE_NIMDA.E
5. Trend Micro PC-cillin 2002 - Antivirus, Anti-Hacker, & PDA Virus
Protection
------------------------------------------------------------------------
Trend Micro is pleased to announce the release of PC-cillin 2002.
PC-cillin 2002 provides award-winning protection against macro viruses,
Trojans,
and other malicious threats. An integrated personal firewall helps
secure
desktop computers against illegal access, ping attacks, and even port
scanning
for Internet-era protection. This complete antivirus strategy also
includes
security for Palm, Pocket PC, and EPOC devices.
BUY NOW: $39.95
http://www.trendmicro.com/pcc2002_wvr
If you already own PC-cillin, you may purchase an upgrade to PC-cillin
2002 for
just $19.95 at:
http://www.antivirus.com/pc-cillin/products/upgrade.htm
This pricing applies to customers in the U.S. and Canada only.
************************************************************************
Wednesday, May 29, 2002
Sunday, May 26, 2002
5/26/02 Eddie & Delicia Family Fellowship Sunday AM service
Proverbs 10:22 The blessing of the Lord--it makes [truly] rich, and He adds no sorrow with it [neither does toiling increase it].(AMP)
When the Bible was translated by the Greek for the Septugenuit. they translated blessing, praise.
Rich mcans accumulate
Psalm 34:1 I WILL bless the Lord at all times; His praise shall continually be in my mouth.(AMP)
Here the psalmist tells us always give thanks. David had a bad family, 2 children tried to take his kingdom by annointing themselves King, one brother raped his sister. His employees killed people they were not s upposed to. Yet, through it all he praised God.
2 Sam 5:10-11 David became greater and greater, for the Lord God of hosts was with him. Hiram king of Tyre sent messengers to David, and cedar trees, carpenters, and masons; and they built David a house. (AMP)
David praised and God provided the best man and the best wood to build a house for him.
James 3:8-10 But the human tongue can be tamed by no man. It is a restless (undisciplined, irreconcilable) evil, full of deadly poison. With it we bless the Lord and Father, and with it we curse men who were made in God's likeness! Out of the same mouth come forth blessing and cursing. These things, my brethren, ought not to be so.(AMP)
You expect one or the other but not both blessings and curses. We need to walk in the blessings.
My own notes on what was taught.
I do not disagree with the premise of the sermon, I do agree with the first verse being used. It is not us blessing the Lord that is being talked about in this verse, it is the Lord blessing us. Numerous other translations have this as the thrust. This is what the Lord is doing for us, not what the Lord does in exchange for us blessing Him.
Saturday, May 25, 2002
Monday, May 20, 2002
Sunday, May 19, 2002
Friday, May 17, 2002
Wednesday, May 15, 2002
Thursday, May 09, 2002
Monday, April 29, 2002
. UMMMMMMMMM what is news about this???
Thursday, April 25, 2002
Wednesday, April 24, 2002
Friday, April 19, 2002
Thursday, April 18, 2002
Wednesday, April 17, 2002
Tuesday, April 16, 2002
Monday, April 08, 2002
Friday, April 05, 2002
Thursday, April 04, 2002
Wednesday, April 03, 2002
Friday, March 29, 2002
Tuesday, March 26, 2002
Monday, March 25, 2002
Saturday, March 16, 2002
Thursday, March 14, 2002
Deuteronomy 8 - 10
Chapter 8
v. 1 - 10 [The Lord?s Provision in the Desert] The Lord provided for you, your clothes never wore out, you were fed daily with Manna, God was humbling you, take that to heart. Remember what happened and know what a father does to a son, disciplining him so he will learn, so God will do with you. Follow His commands and enter into the promised land.
v. 11 - 20 [Exhortation to Remember That Blessing Comes from God] Again remember who it is that is providing this all for you, God, not yourself. God brought you through the desert, and will bless you in the land, honor Him for it.
Chapter 9
v. 1 - 6 [Theological Justification of the Conquest] You are about to cross the Jordan and take the land. God will take these people out for you, not because of you righteousness but because of their wickedness {Thought, does God still do that in our lives today?] In fact you are a stubborn group pf people ( he really loves to insult this group doesn't he?) [note: stubborn translate thick necked, the picture of an animal that will not submit to the reign, or will bend its neck to carry its share of the load, are they still in the church today? Am I one of them?]
v. 7 - 24 [The History of Israel?s Stubbornness] Moses reiterates the Golden calf issue, and how he had to pray for their deliverance.
v. 25 - 29 [Moses? Plea on Behalf of the Lord?s Reputation] Moses continues that his prayers delivered them from death, but that the people would die in the wilderness.
Chapter 10
v. 1 - 5 [The Opportunity to Begin Again] Moses talks: This time I made an ark, then I ascended the mountain and got the tablets again. I cam down put them in the Ark and they are still there.
v. 6 - 11 [Conclusion of the Historical Resume] So we moved out, Aaron died and was buried, and we traveled from area to area.
v. 12 - 22 [An Exhortation to Love Both God and People] Remember how powerful the Lord your God is, Keep his commandments, and lastly, love Him, and Love your fellow man as well.
Wednesday, March 13, 2002
Deuteronomy 5 - 7
Chapter 5
v. 1 - 5 [The Opening Exhortation] Listen people of Israel, the Lord our God made a covenant with us not our ancestors, but us, at Mount Horab, you were too afraid to go up so I stood between you and Him and told you these words he said.
v. 6 - 21 [The Ten Commandments] A basic retelling of the 10 commandments follows, with a bit more emphesis on the meaning behind them.
v. 22 - 33 [The Narrative of the Sinai Revelation and Israel?s Response] They heard, they said they feared God, and God heard it, and said to Moses, oh that they would fear me. Send them back to the tents, and you and I will have a talk about things.
Chapter 6
v. 1 - 3 [Exhortation to Keep the Covenant Principles] Keep thes rules and you will get into the promised land.
v. 4 -5 [The Essence of the Covenant Principles] Main rule to follow, Love the Lord your God with your whole heart and your whole mind, and your whole strength. In reality, there is no need for any other rule. All we have to do is get that one right.
v. 6 - 9 [Exhortation to Teach the Covenant Principles] Keep thes forever in front of you and remember to teach them to your children. Later Jewish people would take this command to the extreme.
v. 10 - 15 [Exhortation to Worship the Lord Exclusively] God is going to take you to a place that you do not deserve and that you will not earn, but remember that you are to worship no other God but Him.
v. 16 - 19 [Exhortation to Obey the Lord Exclusively] Do not keep trying to tempt the Lord.
v. 20 - 25 [Exhortation to Remember the Past] And when you children ask why you do these things, make sure that you tell them why.
Chapter 7
v. 1 - 6 [The Dispossession of Nonvassals] Now understand this guys, when God brings you over to this land, and you defeat a foe, kill them all, do not take one of them for a wife or a sewrvant, or any thing else.
v. 7 - 11 [The Basis of Israel?s Election] And another thing guys, remember that it is not your large numbers that is bringing you into the land, it is your God and is love for you.
v. 12 - 15 [Promises of Good for Covenant Obedience] Obey and God will make you a very blessed people.
v. 16 - 26 [Exhortation to Destroy Canaanite Paganism] Lastly, do not pity these people or their gods. Destroy all of them and all of the places of worship to their false gods. They will polute you if you do.
Tuesday, March 12, 2002
Deuteronomy 3 and 4
Chapter 3
v. 1 - 11 [Defeat of King Og of Bashan] Moses continues, Basham tried to
defeat us, but we did to them as God had helped us to deal with the others,
and we killed these giants, all of them, and divided the spoils.
v. 12 - 17 [Distribution of the Transjordanian Allotments] Moses now
describes the dividing up of the land of the ones that wanted to stay on
this side of the river (the trans-jordans).
v. 18 - 22 [Instructions to the Transjordanian Tribes] Moses now reinforces
to them what they are supposed to do, they are to go over with their
brothers and help them take the land, and then they can return.
v. 23 - 29 [Denial to Moses of the Promised Land] Moses lays on the guilt
trip again, it is because of their unfaithfulness that he will not get into
the promise land. God tells him to go up on the mountain and he will see
the land. So for the time they settle by the that mountain.
Chapter 4
v. 1 - 8 [The Privileges of the Covenant] Moses now reaffirms to them what
they needs to do. They need to keep the covenant. It is wise for them to
do so. Not only has He fought for them the whole way, but also they can see
that there is wisdom in their words, and others will see that as well.
v 9 - 14 [Reminder of the Horeb Covenant] Remember at Mount Horeb what God
did for you. He says do the same now. I know it was frightening with the
voice but no body, but he gave you the rules to live by and the covenant
promises to keep.
v. 15 - 24 [The Nature of Israel’s God] Be careful when you get across, God
is an all consuming fire. Do not make graven images of God, trying to make
him like an animal. No God made them. If you do that you will make god in
your image. God refined you in Egypt. You are not to be like that.
v. 25 - 31 [Threat and Blessing following Covenant Disobedience] When you
make these graven images, you know what will happen, God will consume you,
that is what will happen.
v. 32 - 40 [The Uniqueness of Israel’s God] Instead people know this, God is
unique. Who else speaks from fire, delivering people by doing majestic
things, no, God is a unique God.
v. 41 - 43 [The Narrative Concerning Cities of Refuge] Moses now names the
cities of refuge where a man could run if he accidentally killed someone.
v. 44 - 49 [The Setting and Introduction of the Covenant] And all this
happened this side of the Jordan river.
God's History lesson. What an important thing to learn. How unique and
great God really is and Moses does a good job with it.
Bob M.
Monday, March 11, 2002
Bob M.
From the Baptist News Press
Mosque construction
halted in Nazareth
By Staff
JERUSALEM, Israel (BP)--The cabinet of Israeli Prime Minister Ariel
Sharon has halted the construction of a mosque in Nazareth near the
landmark Basilica of the Annunciation, where tradition holds that the
Angel Gabriel announced to the Virgin Mary that she would bear Jesus.
The decision was prompted by "stiff pressure from the Vatican and a
united front of Christian factions in the Holy Land," The New York
Times reported March 2.
The decision, recommended by a special Israeli commission, reverses
previous approvals of the mosque under Israeli governments led by
Benjamin Netanyahu and Ehud Barak.
"This decision shows tremendous wisdom and courage and should be
applauded by Christians everywhere," said David Parsons, a spokesman
for the International Christian Embassy Jerusalem, in a news release.
"It has reinforced our long-held confidence in Israel as the proper
guardian of holy sites in the land, and gives new impetus for
Christians to stand in support of this embattled nation."
According to a statement by the special Israeli commission, "Protection
of the holy sites connotes not only physical security, but also being
attuned to the sensitivities of all religious people worldwide." The
commission was led by Natan Sharansky, Israel's minister of
construction and housing.
Parsons noted that aggressive efforts by a group known as the Islamic
Movement to build a mosque on the site fits within a disturbing pattern
of Muslim encroachment on authentic Bible sites throughout the Land of
Israel, particularly the destruction of Jewish antiquities on the
Temple Mount in Jerusalem. The resolution of the Nazareth dispute
presents an opportune time to forge a collective Christian/Jewish stand
against these encroachments, Parsons added.
"Any Christian truly concerned about safeguarding our biblical heritage
in Nazareth should be just as troubled by what has been happening on
the Temple Mount," Parsons said. "Not only were the First and Second
Temples located there, but also more events recorded in the New
Testament occurred on the Temple Mount than any other single place in
the Land of Israel, making it a uniquely significant Bible site that
must be preserved."
Construction of the mosque, according to the International Christian
Embassy Jerusalem, began moving ahead "at break-neck speed by hostile
Muslim elements" late last year -- with the foundation already having
been poured, despite lacking permits and a court injunction -- along
the primary access route to the Basilica of the Annunciation. Nazareth
is a city of about 200,000, 70 percent of whom are Muslim.
Over the previous two months, the Sharansky commission had conducted a
probe of the five-year-old dispute, which included Easter 1999 street
clashes between Muslims and Christians. The commission made on-site
visits and heard testimony from both Muslim and Christian
representatives.
In its decision, the Israeli cabinet expressly withdrew approval for a
modest mosque previously granted by the former governments of Netanyahu
and Barak -- which had been significantly expanded by the Islamic
Movement -- and restored older plans for a tourist plaza on the vacant
parcel.
The government also will begin discussions with local Muslims about
building a "large and dignified mosque" on one of seven alternative
tracts currently available in Nazareth, most on state-owned lands and
some located only 250 meters away.
The Muslim leadership also will be allowed to refurbish a monument on
the square to the 12th-century Muslim cleric Shihab a-Din, a nephew of
Saladin who was killed fighting Crusaders. But they must erect a
barrier separating the monument from the tourist plaza and Basilica
access route and remove their protest tent and anti-Christian banners
that have been in place since they first occupied the spot by force in
1997.
Muslim authorities, meanwhile, reacted with anger to the Israeli
cabinet decision. Local Islamic Movement leader Salman Abu Ahmed, who
has exploited the dispute to become the deputy mayor of Nazareth,
described it as a declaration of war and vowed to resist any attempts
to remove them from the spot.
"We defeated the Crusaders 800 years ago and we will defeat the enemies
of Islam today," Abu Ahmed charged.
Abu Ahmed has largely blamed the decision on outside pressures brought
by Pope John Paul II and U.S. President George W. Bush. "Tell the pope
and Bush that the Muslims in Israel won't forgive them," Abu Ahmed said
after the Israeli cabinet decision March 2.
The Muslim leader also condemned local Christian leaders for their role
in opposing the mosque, singling out Latin Patriarch Michel Sabbah, a
pro-Palestinian cleric and native of Nazareth, for special criticism.
The Catholic leaders in Israel are part of the congregation of the pope
and inciters against Islam, Abu Ahmed said, calling them a foreign
element among the Arabs.
Papal Nuncio Pietro Sambi responded that the local Christians arrived
in the region at least 640 years before the Muslims. "If they want to
speak of foreign bodies, they are more foreign," Sambi stated.
Sharansky held a press briefing after the cabinet decision and
explained that the commission had taken into account Muslim threats of
violence if the decision went against them, but he said the entire
government and security apparatus was prepared to enforce the ruling.
He also insisted that the committee had not been influenced by any
outside political pressure.
Sharansky, who sat on a prior government committee that had approved
the mosque construction in Nazareth, explained what had swayed him to
change his mind. He said the Muslim activists had never respected the
decisions of the two prior government's permitting a smaller mosque,
but intended all along to erect a grand mosque to detract from the
Basilica.
Sharansky noted that they had occupied the entire area and used
loudspeakers to broadcast threats to their opponents, and had rushed
ahead with construction before obtaining proper permits. Allowing even
a smaller mosque to be constructed at this time, Sharansky said, would
be rewarding violence.
He also noted that the prior government committees had never taken into
account the views of the larger Christian world, but rather treated it
as a local matter and based their decisions largely on electioneering
concerns. He noted this was the first time that the entire Christian
community had been united, with opponents to the mosque ranging from
PLO supporters to those who support Israel.
In addition, the previous committees seemed to have ignored the
applicability of Israeli laws regarding protection of holy sites in
Land, Sharansky said. "We have an obligation to safeguard the holy
places and protect the rights of minorities and their freedom of
religion," he stressed.
At a subsequent conference on anti-Israel media bias, Sharansky noted
that he was proud everyone in Israel was free to express their
opinions, but this dispute marked the first time he had encountered
Israeli citizens who were afraid to speak their mind in public. He
revealed that a number of Christians and Muslims from Nazareth came to
his committee in secret to declare their opposition to the mosque,
which helped convince him to side against those using intimidation to
achieve their ends.
--30--
Chapter 1
v. 1 - 4 [The Covenant Setting] We are now getting our bearings on where we are. One note should be that the name Horeb (used primarily in the book of Deuteronomy), and Sinani (used primarily in Exodus) are actually the same area. Also to note, what should have taken them 11 days to travel, about 140 miles, or from Tulsa to Oklahoma City, took them in reality, over 40 years. And it was not because Moses would not ask for directions. God would not let the unfaithful into the promise land. So now Moses is ready to speak to the people and tell them what to prepare for.
v. 6 - 17 [Events at Horeb] At Horeb, God told Moses to get up and go to the land that they were to receive. Moses gave them leaders to watch over the people so that they would be cared for down to the lowest level and only when it needed to, should it be brought to Moses. And they were to increase. This is really an example of church growth, leveling the caring so that all members are ministered to. Each member of a team having 5 to 10 people that he checks on, they report to a higher level, who has 5 to 10 of them etc. Eventually getting to the Pastor. If there is a problem, then it can be passed up the line as it was with Moses.
v. 18 - 25 [Instructions at Kadesh Barnea] Moses continues. We made it to Kadesh Barnea, and God told us to go take the land. You people told me to send spies in and to check out how to take the land. I thought it was a good idea, so I listened to you (gee where have we heard about listening to the wrong people before?). They came back and told us how good the land was.
v. 26 - 33 [Disobedience at Kadesh Barnea] So they came back with a bad report, the land is filled with giants in cities that we will never break into. It drained your faith. (Negative reports, from others or yourself will do that). I told you that the great God who delivered us from Egypt and carried us like a father carries a son, He would go before us, but you had no confidence. (Is Moses stepping on some toes here or what?)
v. 34 - 40 [Judgment at Kadesh Barnea] So God became angry with you, and swore that you would never enter the land, but instead, the children that you thought would be sacrifices, they will take the land. Only two older ones will enter. Caleb, who gave the good report with Joshua, who is my successor. As for me, God is angry at me because of you people (gee Moses is laying it on a little thick here, wasn't it because he struck the rock instead of speaking to it?)
v. 41 - 46 [Unsuccessful Conquest of Canaan] So what happens, you repent and try to take the land any way. Why didn't you listen when I warned you, you were beaten cause God was not with you, in fact he has not been with you, but with your offspring. He wouldn't listen to you when you cried out.
Chapter 2
v. 1 - 15 [The Journey from Kadesh Barnea to Moab] So we wandered, and after a while, we got to a point and God told me to head north with you. We were to pass by the land of your distant cousins, Edom, where the descendants of Esau settled. You will not live there, you can get food and drink, but this land is not yours, I have sworn it to them. So we traveled to Moab, but God did not want you to go there either. That was the land of the descendants of Lot that I had given to them. (Remember Lot fathered two children from his daughters). So now we were ready to go take the land, for all the old generation had died.
v. 16 - 25 [Instructions Concerning Ammon] Moses basically repeats the last section and then adds they are ready to fight now, now that all the military men are gone by death. In fact, these Kings are going to be in fear of them.
v. 26 - 37 [Defeat of Sihon, King of Heshbon] So we sent a message to King Heshbon of Sihon, that we wanted to cross over in peace, conduct commerce with him, and go over to the land that God had given us, but he would not, God had hardened his heart. (Gee sounds like Pharaoh). So he attacked, and we beat him, not letting any of the people live, but taking their flocks and plunder. And God gave it to us all.
Notes: What a history these people had. Moses is giving it to them. They have a clean slate going into this land. What a life they could have had. Moses is trying to prep them for it. We have the vantage point of history and know what would happen, they would be like their parents, and we can sit here smugly and say we would never be like that. Guess, what, we do it every day. We deny God the power to defeat our enemies for us.
Bob M.
Saturday, March 09, 2002
Too bad a company got selfish about things. Instead of shelving it, why didn't they release it out into the open. Sigh..... and I was thinking of something like this so I could verify who I was on the internet.