<HTML>
<BR>
Perhaps your vtk.org email has a virus. See below:<BR>
<BR>
<BR>
<span style="font-weight: bold;"><BR>
----- Original Message ----- <BR>
From: 'Content-filter at ummail04.mcleodusa.net' <virusalert@mcleodusa.net><BR>
To: <cdp@mcleodusa.net><BR>
Sent: Sun Nov 2 6:58<BR>
Subject: Fwd: VIRUS (W32/Mydoom.M@mm [Orion], Email-Worm.Win32.Mydoom.m [AVP]) in<BR>
mail TO YOU from <vtkusers-bounces@vtk.org><BR>
<BR>
<BR>
</vtkusers-bounces@vtk.org></cdp@mcleodusa.net></virusalert@mcleodusa.net></span>VIRUS ALERT<BR>
<BR>
Our content checker found<BR>
viruses: W32/<a href="javascript:top.opencompose('Mydoom.M@mm','','','')">Mydoom.M@mm</a> [Orion], Email-Worm.Win32.Mydoom.m [AVP]<BR>
banned name: multipart/mixed | multipart/digest | message/rfc822 |<BR>
multipart/mixed | application/octet-stream,.zip,dtrjwg.zip |<BR>
.zip,dtrjwg.zip | .exe,.exe-ms,dtrjwg.htm ... .com<BR>
<BR>
in an email to you from unknown sender:<BR>
?@public.kitware.com<BR>
claiming to be: <<a href="javascript:top.opencompose('vtkusers-bounces@vtk.org','','','')">vtkusers-bounces@vtk.org</a>><BR>
<BR>
Our internal reference code for your message is 16864-07/nAiA13CH7XSf<BR>
<BR>
First upstream SMTP client IP address: [66.194.253.19] public.kitware.com<BR>
According to a 'Received:' trace, the message originated at: [66.194.253.19],<BR>
public.kitware.com (localhost [127.0.0.1])<BR>
<BR>
Return-Path: <<a href="javascript:top.opencompose('vtkusers-bounces@vtk.org','','','')">vtkusers-bounces@vtk.org</a>><BR>
Message-ID: <<a href="javascript:top.opencompose('mailman.8.1225645203.19005.vtkusers@vtk.org','','','')">mailman.8.1225645203.19005.vtkusers@vtk.org</a>><BR>
Subject: vtkusers Digest, Vol 55, Issue 2<BR>
The message has been quarantined as: virus-nAiA13CH7XSf<BR>
<BR>
Please contact your system administrator for details.<BR>
</HTML>
<BR>