It has come to my attention that there are a few default settings for
Outlook , Outlook Express, and Windows itself that should be changed
before we receive even one more email with attachments written
in the HTML language which is capable of automatically launching
attached scripts and executables.

1. Left click on the button in the Windows task bar.
2. From the {Programs} menu select

3. Left click  to open the {View} menu, then left click on the last selection
    in that menu {Folder Options...}

4. Left click on the {View} tab as shown above.

5. Left click to place a bullet next to:
{Show all files}
 and to remove the check from beside
{Hide file extensions for known file types}
as illustrated above.

6. Left click on the [Apply] button.

7. Close Windows explorer.

Now we will be able to see the full file name for email
attachments. This is important because in the case of
the "ILOVEYOU.TXT.vbs" if one were to receive this
email without having disabled 
{Hide file extensions for known file types}
the attachment would appear only as "ILOVEYOU.TXT"
which might lead one to not worry about its contents since there
is no known way to transmit a virus via a (.txt) file.

The (.vbs) file extension is what should have caught everyone's eye.
This extension stands for Visual Basic Scripting.
Which is a simple programming language that interacts
with the Windows Scripting Host. The Scripting host translates 
commands from Visual Basic into the Windows system commands 
which are what drove the payload of this virus. One should not
expect to receive a letter of any sort from someone that employed
the (.vbs) technology in its creation.

Apart from the file extension differences you may also 
tell (.vbs) files from others by the icon that  windows 
assigns these files.



If you receive any file with the .vbs extension you should take every
precaution before attempting to open this file. I personally would never
open any (.vbs) file even if it was from someone I knew unless
You knew for certain that the person who sent it created it themselves
and that they did so without implementing any harmful code

11. Open Outlook 2000

12. Left click on the {Tools} menu and then select
the {Options} selection from the bottom of that menu.

13. Left click on the Security tab as shown above to the left.

14. In the Secure content portion use the pull down menu
to select the Restricted sites option.

15. Left click on the [Attachment Security...] button.

By default this setting is already on {High:} when you install Outlook
However I suggest making sure it has not been changed somehow
before assuming it is indeed that way.

16. Left click on the [OK] button in the Attachment Security prompt.

17. Left click on the [Apply] button in the Security/Options
prompt and then left click on the [OK] button.

You have now made it safe to use the preview pane in Outlook 2000 again.
When you do receive an unsafe message you will see the .vbs icon
 in the preview header beside the regular paper clip.

Any attempt to execute this script in the preview pane will result in the following prompt:

At this point you should attempt to get what you can from the preview pane and promptly delete
the message without ever fully opening it neither should you attempt to open its attachment as
the script was most likely designed to do that very thing and would have, without intervention
from you, had you not followed the steps in this walkthrough.

P.S. This walkthrough is basically  the same for outlook express except the windows for step 13 and 14
look like this:

and step 15 is omitted for this program.

Back to the Walkthroughs page