Virus/Hoax Information
4 Point Protection Plan
A little history
Security Tips
Protect Yourself from Unwanted Links
Ladies and Gentlemen,
I am taking the opportunity to express my most sincere concern regarding the ever-growing waste of our valuable time (electronically and personally). I am referring to the ever popular Virus Hoaxes that I continually see passing around the Internet. This is a very big concern internationally as it ties up telecommunications with the wasted time of valuable bandwidth.
I have taken the time and effort to compose this web page with some basic information regarding virus hoaxes as well as real virus information. This page is comprised of information gathered from all over to ease your frustration from bouncing from web site to web site. I have also inserted hyperlinks to many virus hoax sites for your reading pleasure. Before you send a warning to everyone you know, PLEASE take the extra time to research the so-called virus. Most of the time (almost ALL of the time), you will find that it is just a hoax or an electronic chain letter.
BOTTOM LINE:
There is *NO* such thing as an E-mail text virus!!
Does this sound familiar: "Don't read or open any e-mail titled Good Times! It will destroy your computer!"
Many of you have received e-mails warning you of reading a specific e-mail sent to you going by a certain name (e.g.- "Good Times," etc.). These warnings tell you your computer will face certain doom if you open these e-mails and read them. THESE WARNINGS ARE A HOAX.
The TRUTH of the matter is, *YOU CAN NOT GET A VIRUS OR ANY SYSTEM DAMAGING SOFTWARE BY READING AN E-MAIL*. E-mails (that is, the ACTUAL message) can not contain viruses. This is why:
A virus can not exist in an e-mail text message. They also can NOT exist in USENET (newsgroup) postings or simply "float around" the internet. Viruses must be attached to and infect an executable program. Viruses and other system-destroying bugs can ONLY exist in FILES, and since e-mail is not a system file, viruses can not exist there. While reading e-mail, you are not executing any malicious code to activate! Thus, no virus can exist. HOWEVER, if you (or your computer) download a FILE attached to an e-mail or USENET posting (i.e.-binary) and run it, there IS a chance that file could contain a virus, since a run able file could contain a virus.
It is also very important that you DO NOT, under any circumstances, allow your e-mail program to automatically download and/or execute an attached file. You risk infection by doing so!
If you carefully read these hoax letters, you can pick out strange, nonsense technical jargon, used to confuse and scare those who aren't computer experts. This jargon usually talks about systems of a computer that don't exist or things that aren't possible.
Oh great, do I believe you or do I believe the virus warnings? Why should I believe you?
Good question. Well, I've been working with computers on various platforms for over twenty-five years. I am presently working as a Senior Systems Architect for Telecommunications, Windows NT and IT Security. I have my own computer business as a computer consultant based in Newark, DE. I am a retired United States Marine communications chief and have worked with the Internet since it's basic conception. But, please, don't simply take my word for it. Ask your ISP (Internet Service Provider) whether or not e-mail viruses exist. Also, please check out the following links that prove e-mail viruses can NOT exist.
The FCC's (Federal Government) Response to the Good Times Virus Hoax
U.S. Department of Energy - CIAC division - Report on Hoaxes
IBM on how to spot a virus hoax.
Symantec Corp.'s Descriptions of Virus Hoaxes
Stiller Research
HoaxKill
The 10 worst Internet hoaxes
So how can I get a real virus?
-
You can get a real virus ONLY by downloading or receiving a file which is infected that you run on your computer. Ways that can happen:
- If you get an e-mail with a file attached to it that contains a virus and you download that file AND run it, your computer will become infected.
- If you download a file from the internet that contains a virus AND you run it, your computer will become infected.
- Viruses are also transmitted by computer networks (2 or more computers linked up together) and by infected disks. Don't use someone else's floppy without virus-checking it first!
- If you were to boot a computer with an infected floppy (boot virus), your computer will be infected (it isn't advisable to boot your computer using a floppy).
How can I protect my computer from real viruses?
Take these precautionary steps:
-
NEVER download and/or run an attached file on an e-mail from a stranger or from an unknown address. Be VERY cautious when downloading/running one from a friend (most likely if they pass you a virus, they won't know they did!).
-
NEVER have your e-mail program set to automatically run attached files. VERY IMPORTANT! This is especially true for browsers and/or e-mail programs which automatically execute Microsoft Word after opening an e-mail. TURN OFF THE OPTION TO LAUNCH OR EXECUTE ANY PROGRAMS after receiving e-mail.
-
NEVER run a file you've just received without first running it through an updated anti-virus utility.
-
If your computer is on a network, make sure you have security steps in place to prevent unauthorized users putting files on your computer. Networks are ideal virus transmitters since they are accessed by many computers and there usually is a great deal of interaction between these computers.
-
MAKE SURE you've got a good anti-virus program that is updated often from the company (check out the anti-virus links below).
-
TAKE CARE in using floppy disks! The more computers a floppy has been used on, the better the chance of a virus infecting it. ALWAYS run floppies through an anti-virus program before using it and be extremely cautious when booting your computer from a floppy disk (it's advisable not to do so).
-
KEEP YOUR E-MAIL SOFTWARE UPDATED! Software companies are always finding problems with their software and if they are good about it, will post patches to update your e-mail software. Continually check your software company's web site for updates to your e-mail software!
What can I do to stop these hoaxes from spreading?
-
If you are ever forwarded a copy of one of these hoax warnings, simply reply back to the person who sent you the warning that it IS a hoax and suggest they check out this page. The URL is:
http://www.montney.com/virus.htm
Remember, don't be angry with the person who forwarded the message to you, they were most likely forwarded the same message by someone else. The more people we can educate about such hoaxes, the better! NEVER forward these hoaxes - it will only continue the problem and waste our precious bandwidth!
Some Important Clarification
-
I've received quite a bit of e-mail from people who say "Yes, you can receive a virus from e-mail." YES, you can. As explained on this page, that is one of the many ways to receive a file. The entire point, however, is you can NOT infect your machine simply by *READING* an e-mail. You (or your computer) must download an infected attachment and run it. The page is quite clear about this.
Additional sites to use for SPAM
Coalition Against Unsolicited Commercial Email (CAUCE)
Choose Your Mail
SPAM Recycle
Break The Chain
Additional sites to use for URBAN LEGENDS
Snopes.com
Truth Or Fiction
Identifying Hoaxes and Urban Legends
Additional sites to use for HOAXES
Hoax site list
That's Nonsense
Vmyths
Symantec
Hoax Busters
Hoax Slayer
Identifying Hoaxes and Urban Legends
Additional sites to use for VIRUSES
CSRC
SOPHOS Anti-Virus
Symantec
Trend Micro
Additional sites to use for SCAMS
Specifics regarding the Nigerian Scam
Crimes Of Persuasion
Scam-o-Rama
Back to Tech Page
Home