tag:blogger.com,1999:blog-8067962.post8675540088520153738..comments2023-10-09T12:06:00.796-05:00Comments on Iowa Geek: Where is This Coming From???Doug Hhttp://www.blogger.com/profile/13321591462356632057noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-8067962.post-65393242268136584412008-06-14T10:53:00.000-05:002008-06-14T10:53:00.000-05:00Hey Jody--its malware/virus. Often loads with a jp...Hey Jody--its malware/virus. Often loads with a jpeg.<BR/><BR/>Trend Micro has good info.<BR/>http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=EXPL_MS04-028.A<BR/><BR/><BR/> generic detection for JPEG image files that exploit the MS04-028 vulnerability, which is also known as Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution. <BR/><BR/>These JPEG image files may be crafted maliciously to contain executable code such that the code is automatically executed when the image files are viewed on vulnerable or unpatched systems. The code may also execute even when the image files are simply previewed as thumbnails. The crafted files may also cause Windows Explorer to crashlilahttps://www.blogger.com/profile/15573977277141554746noreply@blogger.comtag:blogger.com,1999:blog-8067962.post-89867470931455837212008-06-13T22:12:00.000-05:002008-06-13T22:12:00.000-05:00Have you checked the web site for your software pr...Have you checked the web site for your software provider? They may have some more information on the message you're getting and how to get rid of it. Wish I could be more help!Anonymousnoreply@blogger.com