How to prevent them

Run a secure operating system like UNIX or Windows NT
 security features keep viruses away

  

Buy virus protection software Avoid programs from unknown sources (like the Internet) Stick with commercial software purchased on CDs

. spreadsheets (.GIF and . images (. With E-mail viruses  defense is personal discipline ▪ Never double-click on an attachment that contains an executable program ▪ Attachments that come in as ▪ Word files (. etc.DOC).XLS).JPG). are data files ▪ and they can do no damage .

VBS is an executable ▪ and an executable can do all sorts of damage ▪ once run.  Never run executables from e-mail. you have given it permission to do anything on your machine. With E-mail viruses (cont.COM or .)  defense is personal discipline ▪ Never double-click on an attachment that contains an executable program ▪ A file with an extension like . .EXE. .

 if you receive JDBGMGR. . Some rules of thumb:  if you merely find JDBGMGR.EXE as an email attachment. .  But. then it probably is infected. . then it's probably not infected.EXE on your computer.

. E-mail is clearly the predominant vulnerability point for viruses  Current viruses are spread via security holes in Microsoft Outlook and Outlook Express ▪ Free patches are available from Microsoft to address these problems ▪ many people are reluctant to apply them.

update your system with Windows Update and Office Update  or.my-etrust. First. buy a Mac  Buy virus protection software  eTrust EZ Anti Virus ▪ (TPC NG’s Tom Young from Osaka recommends it) ▪ http://www2.com/products/Antivirus .

 What’s the best one to buy?  The WildList International: ▪ As each package offers slightly different features. ▪ There are a number of papers written on how to choose the best personal antivirus software. . only the individual or corporate administrator can decide which package would best suit the need.

 (see False Authority Syndrome) . What’s the best one to buy?  The WildList International: ▪ We encourage you to arm yourself with as much knowledge as possible prior to making a final purchasing decision. ▪ This includes being familiar with ▪ the affiliation of the authors of such papers and ▪ any affiliations between testers and software developers.

2 McAfee Virus Scan 6.Product (rated by PC Magazine) Norton Anti Virus 2002 McAfee Security Suite Trend PC-Cillin 2002 Panda Antivirus Platinum 6.0 Kaspersky Anti-Virus Personal F-Secured Anti-Virus Pesonal Edition ETrust EX Armor Suite Editor's Rating 5 No rating 3 4 3 3 3 3 3 Member's Rating 3 No rating 4 No rating No rating 4 No rating No rating No rating .0 Norman Virus Control 5.

How to spot a hoax .

By removing the actual thinking process.  In addition. driven by hype). "Thoughts travel faster in a vacuum."  Think about it. thoughts can travel uninhibited and thus exceed all logical bounds. such thoughts often tend to become hyperdriven (adj. .

 There are warnings usually in ALL CAPS about reading or downloading an e-mail message ▪ Also look for the multiplication of exclamation marks. Rule of thumb: If you receive a virus alert message. don't believe it.  Salvation by immediate deletion is also nearly universal. .

Hoax viruses always seem to wield the powers of a vengeful binary god. mere mortals. .  For some reason the word "miscreant" is a common catchphrase in hoaxes. or even most hardware technicians.  Such godlike viruses can often do nasty things to your system that are beyond the abilities of software.

 (it says) forward this mail to anyone you care about. This is the replication engine.  Here it is. This is also a dead giveaway that it is a hoax. This is what gives the virus the pesky lifelike ability to multiply. .

. that according to the FCC they have never. however. and will never." ▪ This aspect of cited authority is meant to lend credibility to the hoax. The Authoritative Source Syndrome  "Whoa! The FCC. This must be real. ▪ The truth is. send out virus warnings.

. All the viruses seen (at IBM Research) are extremely dumb.  “most destructive”  “most polymorphic”  “stealthiest” virus. Superlative abilities of the virus:  unparalleled in its destructive capability  this virus is "highly intelligent” ▪ Odd.

It uses computer jargon  It tends to lend credibility to the hoax.  The language is crafted to sound technical. ▪ Do you believe that a CPU can be melted down by "an nthcomplexity infinite binary loop”? .

TPC User Comments .

 Recent virus unleashed!  W32/Bugbear@MM ▪ found on McAfee’s site ▪ reported by TPC Member Sam Julien .

 Andrew Hayes writes:  “Store your original program installation CD's and license information in a safe place (A safe place is not next to you PC)  Keep backups of your data or any downloaded software ▪ (after it has been thoroughly scanned)  Run AV software 24/7 .

. Andrew Hayes writes:  Don't open email attachments unless you're 110% certain they are safe. from a relatively benign Word Macro virus to one that trashed the HDD (so that) a low-level format was need to get it working again. ▪ if you're not expecting something from a friend.  (He’s) seen a few infected systems. confirm with them before opening it.

do they?” .  Modern motherboards don't have those types of defects. Andrew Hayes writes:  “I also saw one that blew the mobo by setting registers to a certain combination that caused an overload in part of the circuit. but I'm sure those sort are very rare now.

▪ He goes on to say that the Australian Gov’t uses Leprechaun antivirus software . ▪ (He) gave up on McAfee after paying for upgrades and getting the runaround when (he couldn’t) log in to download the goodies. David Parry (uses)  Virus Buster from Leprechaun Software ▪ Updates are available very soon after a new virus appears ▪ e-mailed notification of new viruses and also news of hoaxes.

and credit card information already filled in for you. CR Lipton has interesting comments  about security on the Trend Micro site ▪ “Apparently. if this morning's CNet News is to be believed. address. ▪ And. even better. ▪ If anyone wants to. ▪ According to the story. one of the things you should NOT do is to scurry down to the Trend Micro website and buy anything from them. they can then charge their purchase to your credit card while getting the product delivered to themselves. your credit card info continues to be displayed until the next honest person erases yours and types in theirs. their shopping pages have a little glichette that causes it to pop up with the previous buyer's name. .

Resources .

tokyopc.html Carnegie Mellon Software Engineering Institute.com/virus.org/other_sources/viruses.vmyths. CERT® Coordination Center Computer Virus Resources www. Also links to other sites that are being maintained.gov/ciac/CIACVirusDatabase. it has loads of advice and information about PC and Mac viruses.zdnet.com/ This site is NOT sponsored by antivirus companies – it lists virus hoaxes www.         www.com/ Virus Bulletin Independent Anti Virus Advice www. www.html Here’s another hoax site. from Symantec www.com/avcenter/ Symantec Security Advisory site www.htm How computer viruses work www.howstuffworks.Chit Chat “Personal Computer Virus Attacks” www.com/products/stories/reviews/0.ciac.2248291.org/ Chit Chat Newsgroup -.llnl.cert.00.virusbtn.symantec.html Although the Computer Incident Advisory Capability site (associated with the DOE) is no longer being maintained. .symantec.4161.html ZD Nets tells you how to protect against computer viruses.com/avcenter/hoax.

Trojans.ht ml Joe Wells seminar and funny paper on getting “in the know” www. CA’s eTrust Antivirus Research Centers monitor around-the-clock to defend against the damaging effects a virus outbreak could cause. Malware. Journals. Portals and Reference. worms. US Government Resources.    www. Adware and Trojan Horses.jaring.com/antivirus/SciPapers/Wells/HOWTOSPOT/howtospot. Anti-Virus Solutions (over 30 of them!) www.northernlight.research.nmhu. up-to-the-minute resource. and hoaxes. containing detailed information on viruses. .ibm.edu/virus. as well as valuable documentation on the implementation of comprehensive antivirus protection.htm Computer viruses have been with us since the late 1980s and continue to increase in number. The Virus Information Center serves as a rich. Journal articles and editorials. Spyware.com/virusinfo/ More than I ever wanted to know about computer viruses. From Wayne Summers at New Mexico Highlands University. Virus Writers and Hackers. www3. The following list includes some of the best sites on the Internet for describing computer viruses as well as links to many of the top anti-virus software sites.ca.special. Diagnostics. Web bugs.com/compvirus/ Current news.

UK and first published in: October 1999 www.sophos.com.00.ibm.wildlist.com/virusinfo/whitepapers/videmys.theriault@sophos. But don't take our word for it.com/vtutor/index.asp PC Magazine Personal Antivirus Article www. There’s Mirrors.asp?virus_k=99728McAfee detailed information on latest virus released into the Wild.html An introduction to computer viruses written by Carole Theriault.htm Computer Knowledge Virus Tutorial www.htm With scientific papers titled.mcafee. Where There’s Smoke.com/antivirus/SciPapers.      www.cknow. Oxford.com/article2/0.com/dispVirus. how can you go wrong? http://vil.org/ The world's premier source of information on which viruses are spreading In the Wild. Sophos Plc. carole.research. Read what PC Magazine. .4149. MSNBC an others have to say about us www.6276.pcmag.

Sign up to vote on this title
UsefulNot useful