Viruses & Hoaxes


Sphere_yellowSM.gif (1147 bytes) Two common destructive file types are

Sphere_greenSM.gif (1127 bytes) Viruses   =   files that duplicate themselves and execute processes without authorization

Sphere_greenSM.gif (1127 bytes) Trojan Horses   =   files looking like legitimate programs containing hidden elements
        As described by Symantec:

"Trojan Horse programs do not replicate and spread themselves. Instead">

Viruses & Hoaxes


Sphere_yellowSM.gif (1147 bytes) Two common destructive file types are

Sphere_greenSM.gif (1127 bytes) Viruses   =   files that duplicate themselves and execute processes without authorization

Sphere_greenSM.gif (1127 bytes) Trojan Horses   =   files looking like legitimate programs containing hidden elements
        As described by Symantec:

"Trojan Horse programs do not replicate and spread themselves. Instead, they masquerade as legitimate programs ...  Users download these programs, thinking them beneficial, and run them. For the event, or trigger, to take place, users must manually download these files and consciously run them. The vast majority of Trojan Horse programs are written with a destructive intention."

Sphere_yellowSM.gif (1147 bytes) Serious damage can be done by virus and Trojan horse files

 Sphere_greenSM.gif (1127 bytes)   The antidote is accurate information, a system assessment and a plan to prevent and respond to infection

bulblu.gif (887 bytes)  Be aware you do not normally get a virus from reading email - you do get viruses by opening an infected email attachment or file on a floppy disc

bulblu.gif (887 bytes)  See examples of real virus and Trojan horse alerts with fixes

Sphere_yellowSM.gif (1147 bytes) Please, watch out for hoax "warnings," they divert attention from dealing with real viruses


Sphere_yellowSM.gif (1147 bytes) Quick Links to Virus and Hoax Information

Sphere_greenSM.gif (1127 bytes) Internet 101 - very basic introduction

Sphere_greenSM.gif (1127 bytes) Symantec's AntiVirus Research Center

bulblu.gif (887 bytes) Virus Hoaxes

bulblu.gif (887 bytes) Send a suspected virus to Symantec

Sphere_greenSM.gif (1127 bytes) Dr. Solomon's AntiVirus Pages 

bulblu.gif (887 bytes) Guidelines for an Anti-Virus Policy  and All About Viruses

bulblu.gif (887 bytes) Dr. Solomon's Virus Central 

 Sphere_greenSM.gif (1127 bytes) ShastaLaw.net's Virus, Trojan Horse & Hoax Information Links for Advanced Users


Sphere_yellowSM.gif (1147 bytes) Anti-virus software on the Internet

Sphere_greenSM.gif (1127 bytes) Norton Anti-Virus

Sphere_greenSM.gif (1127 bytes) McAfee Anti-Virus - free evaluation copy available

bulblu.gif (887 bytes)  Caution - Read instructions and system requirements.  Use anti-virus software that is designed for use on your system.  Anti-virus software may read "healthy" files as virus infected and attempt to eliminate files if the software is not designed for use with your system.


 Sphere_yellowSM.gif (1147 bytes) If you have a real emergency or need immediate assistance contact us by email


Home

Computers, Web & the Law


Copyright 1997, 1998, 1999, 2000 T. Steele, In To It Planning Associates, Inc.