RootsWeb.com Mailing Lists
Previous Page      Next Page
Total: 7040/10000
    1. Re: Drennen Roll
    2. James H Granger
    3. I have not seen it online, Sharon. You can order the Drennen Roll through your local LDS Family History Center. It is on microfilm #0830429. Jim Granger >Does anyone known if the Drennen Roll is online? Or, where I can get a >copy? I will transcribe it and get it online if someone can lead me to it. > >Wado, Sharon Holt Byers > >

    06/12/1999 07:48:10
    1. Re: McAlester IT
    2. Carolyn, What is this about McAlester IT being the only place whites could marry? Maybe this would help me too. Thanks, Brenda S.

    06/12/1999 07:40:20
    1. Two different messages
    2. I am going to unsubscribe for a while but thought if you saw these two messages together which I received back to back you might understand the confusion on the list. If only the list owner is allowed to post off topic messages, perhaps that should be listed in the welcoming letter. Personally I felt that physical characteristics were more pertinent to "the study of ancestry" than computer viruses. I became interested in genealogy when in high school I was told that I walked like my great grandmother. That comment sparked a life long interest in who my ancestors were and how they lived. Lela In a message dated 6/11/99 11:48:04 PM Central Daylight Time, jerri@cherokee.net writes: > ENOUGH ON THIS SUBJECT! > > Medical, genetics and discussions of other fairy tales should be done on > their proper mail lists-- and this isn't one of them! > > In case some of you have forgotten, this is a g-e-n-e-a-l-o-g-i-c-a-l mail > list. > In a message dated 6/12/99 12:03:36 AM Central Daylight Time, jerri@cherokee.net writes: > This is an official announcement from the U.S. Department of Energy > concerning the new virus. It's rather long, but I feel that the > information is critical. > >

    06/12/1999 05:24:41
    1. Drennen Roll
    2. Eaglesup
    3. Does anyone known if the Drennen Roll is online? Or, where I can get a copy? I will transcribe it and get it online if someone can lead me to it. Wado, Sharon Holt Byers

    06/12/1999 03:36:08
    1. Re: Facial & body hair- Native American
    2. Jo Ann Gibson
    3. you are right it is open to every ethnic group including N.A.. and the facial hair question to me --seems to be a fact that if there is little facial hair--it is another item to help prove N.A.. blood. At least this group isn't spending 3 days talking about SSI. so take a break. If you want to talk about something else--talk. Jo Ann woolfpac@prodigy.net wrote: > > SInce there seems to be a great deal of interest in Cherokee and Native lines on this list I thought I would point out that there are Cherokee lists which might prove educational for you. > > Cherokee-L@rootsweb.com is for Cherokee genealogy, but > queries about other nations are often placed there > and accepted. > Dan is the sysnop and he also has boards for Cherokee Culture and still another for just chit chat such as the hair question. The Culture list probably accepts such topics as well. I don't subscribe to it due to time so I can't say what is accepted. But check it out, you may find other researchers of your lines there. > > It is my understanding that Indian Territory Roots List is for every ethnic group, not just natives, so there are probably a great number of people here not interested in non genealogy items which apply to only one ethnic group. (; > > Good luck on the Cherokee list! They are very helpful over there. > > DEBBIE > > ---- On Jun 11 "Roberta L. Doman" <bobette@foxinternet.net> wrote: > > I am sorry I started all this, I guess I should have asked anyone to answer > > me privately....excuse me please, for starting all this hostility. But then > > as usual I wasn't thinking.....it was a legitimate question and it was asked > > with honesty and not to cause anything controversial. Please don't continue > > this on the mailing list, and if you want you ball me out for asking the > > question in the first place, do it privately so no one will have to be > > overwhelmed with a continuation of this when they are working on genealogy. > > Again thanks to those who answered my question. Won't ask anything else > > like this again....will just watch.... promise! > > > > bob > >

    06/11/1999 11:49:16
    1. Re: INDIAN and PROUD of IT.
    2. Jacque Hopkins Wolski
    3. AMEN, again. Jacque I've heard of some good jokes lately, coming from okie's living out of state, but not any good okie jokes otherwise. ----- Original Message ----- From: <Art4161@aol.com> To: <Indian-Territory-Roots-L@rootsweb.com> Sent: Wednesday, June 09, 1999 9:45 AM Subject: Re: INDIAN and PROUD of IT. > WHO CARES WHAT JIM THINKS! Anyone heard any good Okie jokes lately? >

    06/11/1999 11:46:04
    1. MARTIN's in I.T.
    2. Joyce Harrell
    3. Vivian, I'm a little new at this but I also have Martins with at least a connection to Paris, Texas. I'll just throw it in the pot. Joyce 1 Thomas Jefferson MARTIN Spouse: Mary CLOVER Children: James Lawson (1880-1948) Elizabeth Magdalene Tilda George Jack? 1.1 James Lawson MARTIN Birth: 30 Sep 1880, Arkansas Death: Oct 1948 Spouse: Ida Ellen TIMMONS Birth: 24 Feb 1883, Paris, Texas Father: Benjamin CURLEE TIMMONS (~1860-1925) Mother: Laura Delinda GREEN Children: Beulah Ida Beatrice 17 Mar 1904, Peggs, Oklahoma MM BM LM HM ZM LM JM DM DM

    06/11/1999 11:39:13
    1. "Official Announcement"
    2. Jerri (Rogers) Chasteen
    3. This is an official announcement from the U.S. Department of Energy concerning the new virus. It's rather long, but I feel that the information is critical. ~~~~~~~~~~~~~~~~~~~~~ : CIAC Mail User ?ciac@rumpole.llnl.gov? 8:25 PM Subject: CIAC Bulletin J-047: The ExploreZip Worm To: ciac-bulletin@rumpole.llnl.gov [ For Public Release ] __________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN The ExploreZip Worm June 11, 1999 23:00 GMT Number J-047 ______________________________________________________________________________ PROBLEM: A new worm program named zipped_files.exe spreads itself as an attachment to e-mail messages and destroys document files. PLATFORM: Windows 95, Windows 98, and Windows NT. Outlook or Exchange are need to spread. DAMAGE: The worm sends copies of itself to everyone in your inbox and destroys files with the extensions: .h, .c, .cpp, .asm, .doc, .xls, and .ppt. SOLUTION: Do not automatically run an attached file named zipped_files.exe even if it appears to have come from a friend. Update your antivirus software to detect this worm. ______________________________________________________________________________ VULNERABILITY Severe Risk: While this worm does not appear to be spreading ASSESSMENT: as rapidly as the Melissa virus, the payload can do severe damage to an organization by deleting all Microsoft Office documents and computer program source files. ______________________________________________________________________________ The ExploreZip Worm Introduction ============ CIAC has received reports of the spread of a new worm program called ExploreZip (alias: W32/ExploreZip.worm, Worm.ExploreZip). The worm spreads in a manner similar to the W97M.Melissa virus. The worm arrives as an attachment to an e- mail message. When a user double clicks on that attachment, the worm program runs and spreads itself by sending replies to all the mail in your inbox with the worm program as an attachment. Different from the Melissa macro virus, this is a worm program in that it does not infect other programs or documents. It is also executable code instead of a macro program so the macro detection capability in Microsoft Word will not protect you from this worm. The worm has a payload that destroys Microsoft Office documents and program source code files. As this is object code (binary) it only runs on INTEL platforms running Windows 95, Windows 98, and Windows NT. It cannot run on Macintosh or other hardware types and cannot run on earlier versions of windows or on DOS. In order to spread using e-mail, the worm needs Outlook or Microsoft Exchange. However, the payload will run and destroy files even if the program cannot spread itself via e-mail. Worm Operation ============== The worm is an executable program named "Zipped_files.exe" that appears to be a self extracting ZIP archive. It arrives as an attachment to an e-mail message with the following content: Hi <recipient>! I received your email and I shall send you a reply ASAP. Til then, take a look at the attached zipped docs. bye The message appears to be a reply to one of your messages. The subject of the mail message is variable and appears to be a reply to a message from you. When a user double clicks on the attached worm program, it puts up the following dialog box that makes the file appear to be a damaged zip archive. .------------------------------------------------------------------. | Error X| |------------------------------------------------------------------| | | | X Cannot open file: it does not appear to be a valid archive.| | If this file is part of a ZIP format backup set, insert | | the last disk of the backup set and try again. Please | | press F1 for help. | | ------------- | | | OK | | | ------------- | - -------------------------------------------------------------------- Pressing F1 does nothing and clicking OK simply closes the dialog box. If WinZip is installed on the system, it will open with the empty zip file: Zipped_files.zip, again making it appear to be a damaged zip archive. As the worm continues executing, it searches the inbox of your mail program and sends a reply to every message it finds there, adding the message listed above and attaching the worm program file. When it has finished sending mail, it stores a copy of itself on your system and sets that copy to be executed at system startup time. On Windows 95 and Windows 98 systems, it stores a copy of itself in: c:\windows\system\explore.exe and places the following line in the win.ini file to restart the worm every time you run Windows. run=C:\WINDOWS\System\Explore.exe If your active windows directory is not C:\WINDOWS, replace C:\WINDOWS in the command and file location above with the path to your active Windows directory. On Windows NT systems, it stores copies of itself in: c:\winnt\system32\explore.exe c:\winnt\_setup.exe If your active Windows NT directory is not c:\winnt, replace c:\winnt in the file locations above with the path to your active Windows NT directory. The worm then changes the value of the following registry key to "_setup.exe", which runs the _setup.exe program at startup. HKEY_CURRENT_USER\Software\Microsoft\WindowsNT\ CurrentVersion\Windows\run After installing itself, the worm runs its payload. The payload searches your lettered hard disk drives (C: through Z:) for programming source code files with the extensions: .h .c .cpp .asm (C header files, C programs, C++ programs, and assembly language programs) and Microsoft Office documents with the extensions: .doc .xls .ppt (Word documents, Excel documents, and PowerPoint documents) and changes them to a zero length file, making them nearly impossible to recover. You might be able to recover parts of a file using a disk editor but that would be a difficult and time consuming process. Detecting An Infection ====================== Infections with ExploreZip are easy to detect. Press Ctrl-Alt-Del and open the Task Manager as shown here. On Windows NT, press Ctrl-Alt-Del, click the Task Manager button, and then choose the Processes tab. The dialog box shown by Windows NT is slightly different from that shown here but has the same function. .-----------------------------------------------------------. | Close Program ? X| |-----------------------------------------------------------| | -----------------------------------------------------| | | |Exploring-temp | | | |Explorer | | | |Zipped_file | | | |Osa | | | |Systray | | | |Navapw32 | | | |Winzip32 | | | | | | | | | | | -----------------------------------------------------| | | WARNING: Pressing CTRL-ALT-DEL again will restart your | | computer. You will lose unsaved information in all | | programs that are running. | | | | -------------- --------------- ------------ | | | End Task | | Shut Down | | Cancel | | | -------------- --------------- ------------ | - ------------------------------------------------------------- Note the task named Zipped_file (Zipped_files.ex on Windows NT). This is the running worm program. To stop it, select Zipped_file (or Zipped_files.ex) and click End Task. If you have restarted your system since the infection, you will see the process Explore (_setup.exe on Windows NT) instead of Zipped_file. Again, to stop that process, select it and click End Task. Do not confuse the task Explore with the task Explorer as they are different. The Explorer task is the Windows explorer program. Removing An Infection ===================== The easiest way to eliminate the worm from your system is to use an updated antivirus package. However, to do it by hand, perform these steps: 1. Press Ctrl-Alt-Del to open the task manager. 2. Select the Zipped_file or Explore (Zipped_files.ex or _setup.exe for Windows NT) process (whichever is running) and click End Task 3. Delete all copies of zipped_file.exe from your system. These will be in the download or attachments directory of your mail program. 4. Delete the file c:\windows\system\explore.exe or for Windows NT, delete c:\winnt\system32\explore.exe and c:\winnt\_setup.exe. 5. Edit c:\windows\win.ini and remove the line run=c:\windows\system\explore.exe Or in Windows NT, run Regedit.exe and delete the value of the key: HKEY_CURRENT_USER\Software\Microsoft\WindowsNT\ CurrentVersion\Windows\run Protection ========== Most antivirus vendors already have detection and removal capabilities available for this worm and we expect the others to have them soon. Of the vendors that have a solution available, you may need to download it from their web pages and not depend on the automatic update features of the product. We expect the automatic update features to have this worm definition soon. The following vendors have solutions now: Symantec (NAV) http://www.symantec.com/avcenter/venc/data/worm.explore.zip.html Network Associates (McAfee) http://vil.mcafee.com/vil/vpe10183.asp DataFellows (F-PROT) http://www.datafellows.com/v-descs/zipped.htm Trend http://www.antivirus.com/vinfo/alerts.htm All users are cautioned to think before double clicking on a file included as an attachment to any e-mail message, even if that message appears to come from a friend. If that attachment is a Microsoft Office document and you have macro detection turned on, then you can double click the attachment and the macro detection capability will stop the document from loading if it contains a macro program. It will then give you the choice to enable or disable the macros. Remember, disable macros unless you are expecting to receive them. If the attachment is an executable program, scan it with your antivirus utility before running it. If it passes the antivirus scan, you might still want to reconsider running it if it comes from someone you do not know or is an unexpected delivery from someone you do know. Call the person up on the phone (don't send them e-mail) and ask him if he sent you an executable before running the file. If you send him an e-mail and he is infected with this worm, you will likely receive a reply (from the worm) saying "take a look at the attached zipped docs". If the file is a self extracting archive, open it with the archive program (for example, WinZip) instead of running the archive itself. You can still get the files out of the archive but without running the executable part (the self extractor) of the archive file. ______________________________________________________________________________ Thanks to Symantec and Network Associates for their early warning and analysis of this worm. ______________________________________________________________________________ For additional information or assistance, please contact CIAC: CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster coope

    06/11/1999 10:57:34
    1. question of heritage
    2. Cathy in Oregon
    3. If this is not a genealogy related question then I do not need to be on this list. I have wondered and thought on these lines my self. My mother had dark hair and high cheek bones. Was always told this was the Cherokee in her. She also had course hair on arms and legs... Thought this might be another trait also helping to prove she was at least Indian... Since I sure can't find any documented proof as yet... Why are there some people that can make up the rules and tell every one else what is accepted for genealogy and what is not? If there is a possibility these things can possibly show they did have some Indian blood in them, how could this not be considered Genealogy! On other lists for surnames such characteristic have shown that such things as a patch of gray in the males hair run in this surname... No wonder people are afraid to post on list... Afraid they will be jumped on for what they ask... How sad!!! Cathy in Oregon

    06/11/1999 10:44:37
    1. ENOUGH ON BODY PARTS!
    2. Jerri (Rogers) Chasteen
    3. ENOUGH ON THIS SUBJECT! Medical, genetics and discussions of other fairy tales should be done on their proper mail lists-- and this isn't one of them! In case some of you have forgotten, this is a g-e-n-e-a-l-o-g-i-c-a-l mail list.

    06/11/1999 10:42:41
    1. BOB'S QUESTION
    2. Coral Babb
    3. Why was Bob's question offensive? I thought is was a good question and considering what I had been taught many years ago in school and heard from my grandfather I was looking forward to the answer. Why is the characteristics of the Cherokee Indian and others not related to genealogy? Coral Babb

    06/11/1999 08:50:12
    1. Native American Men
    2. To all who are on this list, I honestly didn't mean to start all this forwarding of messages when I asked my question. I was looking for an honest and intelligent answer. Do Native American men not have to shave as much as men without NA blood? Sorry for all the trouble. Tammy

    06/11/1999 08:26:29
    1. Native American
    2. condor
    3. I have found everything that has been mentioned about the Cherokee very educational, it has helped me to understand why I am having problems getting information on my husbands grandmother. I am also having trouble getting information on my great grandmother, she was Navajo. No one knew about this until after she died. Can anyone tell my why she would keep this to herself. Thank you. Please answer this privately. Kathy

    06/11/1999 08:22:16
    1. Re: Facial & body hair- Native American
    2. SInce there seems to be a great deal of interest in Cherokee and Native lines on this list I thought I would point out that there are Cherokee lists which might prove educational for you. Cherokee-L@rootsweb.com is for Cherokee genealogy, but queries about other nations are often placed there and accepted. Dan is the sysnop and he also has boards for Cherokee Culture and still another for just chit chat such as the hair question. The Culture list probably accepts such topics as well. I don't subscribe to it due to time so I can't say what is accepted. But check it out, you may find other researchers of your lines there. It is my understanding that Indian Territory Roots List is for every ethnic group, not just natives, so there are probably a great number of people here not interested in non genealogy items which apply to only one ethnic group. (; Good luck on the Cherokee list! They are very helpful over there. DEBBIE ---- On Jun 11 "Roberta L. Doman" <bobette@foxinternet.net> wrote: > I am sorry I started all this, I guess I should have asked anyone to answer > me privately....excuse me please, for starting all this hostility. But then > as usual I wasn't thinking.....it was a legitimate question and it was asked > with honesty and not to cause anything controversial. Please don't continue > this on the mailing list, and if you want you ball me out for asking the > question in the first place, do it privately so no one will have to be > overwhelmed with a continuation of this when they are working on genealogy. > Again thanks to those who answered my question. Won't ask anything else > like this again....will just watch.... promise! > > bob >

    06/11/1999 05:49:25
    1. Chickasaw Annuity Rolls 1878
    2. Does someone know what the web address is for the above subj.? wa-do, Rhonda & G'ma

    06/11/1999 04:02:37
    1. surnames
    2. Alex
    3. Hi All, I am researching the following surnames. If you know of any of these names, please give me a shout. COOK=Union Co.,TN > White Co.,AR MONDAY=Claiborne Co. >Union Co.,TN GRAVES=Claiborne Co.,TN Thanks, Al

    06/11/1999 02:27:25
    1. Mailing lists owner's address
    2. Tommie Horn
    3. I lost my message that gave me the list owner's e-mail address. Could someone please send it to me. Thank you

    06/11/1999 11:02:20
    1. Re: Facial & body hair- Native American
    2. Roberta L. Doman
    3. I am sorry I started all this, I guess I should have asked anyone to answer me privately....excuse me please, for starting all this hostility. But then as usual I wasn't thinking.....it was a legitimate question and it was asked with honesty and not to cause anything controversial. Please don't continue this on the mailing list, and if you want you ball me out for asking the question in the first place, do it privately so no one will have to be overwhelmed with a continuation of this when they are working on genealogy. Again thanks to those who answered my question. Won't ask anything else like this again....will just watch.... promise! bob

    06/11/1999 10:48:04
    1. one drop rule/ Indian BLOOD...
    2. Tegwin Matenaer
    3. The TRAIL OF TEARS, Story of American Indian Removals, 1813-1855 byGloria Jahoda, 1975c;reprint 1995 by Wing Books of Random House and was approx.$10.00 from wherever I purchased it. The book discusses, in depth, the concept of the one drop (of blood) rules, among others regarding land, removal,etc. You do have to read the entire book to get a feel for what it's really saying. It's not one of those cases where you can go to the index, or contents, find the page and get your answer. It's a great book. I believe it also addresses the inclusive Cherokee of the Southeast wherein some were totally included in a state's society and depending on this "drop" of blood meant they got to stay on their land and/or had to go w/everyone else West. It's been a while since I reread the book but it talks about a lot of different removals not just the "one" we hear so much about and about the different tribes. I don't recall it specifically addressing the different rolls but it seems that I h! ad a better understanding of the different rolls from this book even before I got into geneology. Good luck, it's a great source for all sorts of things. teg for all = sorts of things. teg

    06/11/1999 10:03:56
    1. Re: Facial & body hair- Native American
    2. Paul Grose
    3. Thank You!!! Just when I thought you were NEVER going to say that!! Thanks, Paul -----Original Message----- From: Jerri (Rogers) Chasteen <jerri@cherokee.net> To: Indian-Territory-Roots-L@rootsweb.com <Indian-Territory-Roots-L@rootsweb.com> Date: Friday, June 11, 1999 6:21 AM Subject: Re: Facial & body hair- Native American |Tammy asked: |"Excuse my ignorance, but what does not having to shave very much have to do |with being Native American?" | | |Tammy- |You have a good point! It has totally N-O-T-H-I-N-G to do with genealogy -- |which is what this mail list is SUPPOSE to be about, --- and I think we should |get back to. | |List Owner | | |

    06/11/1999 09:44:40