You are on page 1of 7

HOW THEY GOT THE NAME W H AT T H E Y A R E HOW THEY SPREAD HOW TO PREVENT THEM

AND HOW TO PREVENT THEIR ANNOYING EVIL TWIN, VIRUS HOAXES

PC VIRUSES
WHAT THEY ARE

E-mail viruses An e-mail virus moves around in attachments to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

PC VIRUSES
WHAT THEY ARE

Dave Parry, TPC User explains Most e-mails are sent as plain ASCII text, which cannot run programs. Word and Excel files can carry viruses because they have a macro language. The files as such are quite harmless if they have no macros. One way to cleanse WinWord DOC files is to save them as RTF, which is text only and no macros.

PC VIRUSES
WHAT THEY ARE

TPC October Meeting participants respond: email that uses HTML coding can carry viruses embedded in the HTML coding of the message. Users have a choice to use HTML coding or not the suggestion from the floor was to turn it off

PC VIRUSES
WHAT THEY ARE

Trojan Horse A Trojan horse is a computer program The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk) Trojan horses have no way to replicate automatically.

PC VIRUSES
WHAT THEY ARE

Worms A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine and starts replicating from there

PC VIRUSES
WHAT THEY ARE

Worms and Trojan horses are actually more common today than viruses. Antivirus programs offer protection against all viruses, worms, and Trojans refer to all of these types of malware as viruses.

You might also like