You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.
Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.
So what is a virus?
A virus is a program that can self replicate or reproduce itself. These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.
They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.
A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.
Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation
A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.
What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.
Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them.
If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.
Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.
Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.
Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs. Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.
These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.
If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.
Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.
Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.
Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.
Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.
Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.
Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently (not faster), through experience.
About The Author
Seamus Dolly is the webmaster of http://www.CountControl.com His background is in engineering and analogue electronics. His studies include A+, Net+ and Server+; seamus@countcontrol.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Background: For many organizations like ours, the interim target of... Read More
ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More
It would be easy to think, like most people apparently... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
Microsoft Great Plains as ERP and Microsoft CRM as... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
Adware is a type of Spyware program that displays some... Read More
What is 'adware'?Adware is basically software or scripts that are... Read More
Best Software Act! is very popular CRM for small and... Read More
Looks like Microsoft Great Plains becomes more... Read More
Several years ago Microsoft purchased Great Plains Software, then Navision... Read More
Most people don't use Photoshop to its fullest capabilities. Here... Read More
Rapid Application Development (RAD) is a software development methodology. In... Read More
Are you a whiz at calculating financial information? Not the... Read More
In our small article we'll consider Microsoft Business Solutions Great... Read More
This article is the third of a series of articles... Read More
There are two major WYSIWYG(What You See Is What You... Read More
A LOT OF UNWANTED FILES.When you uninstall an item of... Read More
Our company, Novaprof Inc., developed unique software - DB Integration.... Read More
What is IRC?IRC is Internet Relay Chat. It is a... Read More
Think of this, first we had the HAM Radio, then... Read More
Having from five to ten and more favorite screensavers is... Read More
Microsoft Business Solutions products: Great Plains, MS CRM, Navision, Axapta,... Read More
After seeing many people complain about their weak Internet security... Read More
I provide, here clear explanations and a count of function... Read More
Microsoft Great Plains is becoming more and more popular and... Read More
Have you ever noticed that when you look at your... Read More
1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More
Since technology changes so quickly, it is hard to begin... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
Linux essentials:It's free for download but you have to pay... Read More
MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
We would like to give you pluses and minuses of... Read More
Microsoft Business Solutions Great Plains has many years of successful... Read More
Microsoft CRM has built-in conversion tool, however you should probably... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
Viruses and spyware usually show up on your computer one... Read More
With the advent of 'Service Pack 2' for Windows XP... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
What is installation in the language of technology? Installation... Read More
Before being able to choose a secure Internet communication system,... Read More
Creating a new markup language.Introduction.General Reuse Markup Langauge, or GRML,... Read More
Music downloads are off the charts! We're listening to digital... Read More
Every organization which creates collaborative documents, whether they are budgets,... Read More
While Ukraine is becoming a new popular IT outsourcing destination,... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
Well, even if the combination might look very unusual, we... Read More
One day, you suddenly realize that your computer started to... Read More
While paper labeling CDs and DVDs may appear to be... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
Spyware, what it is and what it does. Basically, spyware... Read More
IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More
Since its release in 1987, QuarkXpress had made an immediate... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
Are you a whiz at calculating financial information? Not the... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
In today's business world it's all but impossible to escape... Read More
We will base our prognosis on our Microsoft Business Solutions... Read More
At the end of XX century, in the late 1990th... Read More
Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More
Let us give you - developer some hints in the... Read More
We all take the computer for granted. I mean, all... Read More
Research bears that less than 70 percent of development projects... Read More
Are you a database professional? Do you work with a... Read More
Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More
Software |