Alien Intruders!

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.

Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.

So what is a virus?

A virus is a program that can self replicate or reproduce itself. These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.

They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.

A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.

Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation

A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.

What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.

Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them.

If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.

Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.

Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.

Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs. Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.

These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.

If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.

Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.

Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.

Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.

Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.

Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.

Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently (not faster), through experience.

About The Author

Seamus Dolly is the webmaster of http://www.countcontrol.com His background is in engineering and analogue electronics. His studies include A+, Net+ and Server+; http://www.countcontrol.com

Beecher limo rentals ..
In The News:

Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.
Learn how to secure social media accounts, implement legacy contacts, and create a digital estate plan to protect your online assets from 'ghost hackers' after your death.
A ported phone number scam is leading to more people having their identities stolen by sophisticated scammers. Kurt “CyberGuy" Knutsson tells you what you need to know.
The Great Pacific Garbage Patch, a vast marine debris vortex, is being tackled by The Ocean Cleanup’s innovative technologies. Kurt “CyberGuy" Knutsson explains.
Discover easy solutions to tame autocorrect frustration on iOS and Android devices. Turn off, customize and add personal touches to your typing experience.
Kurt “CyberGuy" Knutsson reveals the six top things to do right now before it’s too late: Tech and life choices that can keep your safer on and offline.
Kurt “CyberGuy" Knutsson shows you some simple steps to discreetly hide apps or an entire app page on your iPhone for decluttering or confidentiality.
The ambient light sensors on smartphones may be turned into cameras, according to researches at MIT. This could pose a threat to people's privacy.
The Autonomous Road Repair System from tech firm Robotiz3d uses artificial intelligence technology to locate potholes and promptly seal them.
Scammers have stooped to using artificial intelligence to scan obituary websites to create fake obituary websites to target the grieving.

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

Microsoft Retail Management System (RMS) SQL Customization ? Overview for Programmer

Microsoft Retail Management System serves retail single store as well... Read More

Cisco Certification: Introduction To ISDN, Part III

Configuring PPP PAP AuthenticationNow we know how the ISDN link... Read More

Seven Reasons Why a Hosted Inventory Management Solution Might Be Right For Your Organization

Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More

Microsoft Great Plains: Large Scale Implementation

Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More

Microsoft Small Business Manager eCommerce ? Overview

Microsoft Business Solutions Small Business Manager is scaled down Great... Read More

What is a Document Manager without Version History?

Document Manager and Version HistoryIn previous articles I have discussed... Read More

MSN Messenger Is A Sweet Way To Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice

In the new era of internet marketing the problem of... Read More

Reporting for Microsoft Great Plains/Dynamics/eEnterprise: RW ? ReportWriter ? Tips for Developer

Microsoft Business Solutions Great Plains is written in Great Plains... Read More

What is Software Piracy?

There are several kinds of software piracy. The bottom line... Read More

The Opera Alternative

Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More

Make 2005 the Year You Save Time!

Today's business world is fast-paced. No matter what it is... Read More

Microsoft Great Plains on Ctree or Pervasive SQL ? What to Do ? Tips for IT Manager

As you probably know, when Microsoft purchased Great Plains Software... Read More

Simple Solution for Php Includes - IFrames

I have recently created my first Php program. I wanted... Read More

5 Time-Saving Tips in Microsoft Word

Whether you have used Microsoft Word for years, have just... Read More

Microsoft Great Plains Nationwide Remote Support

ERP Consulting industry is on the way to serve clients... Read More

MultiNational Corporation ERP Implementation ? Microsoft Business Solutions Great Plains

If you look back to the history, you will see... Read More

Oracle Development: JDeveloper 10G ? Java, J2EE, EJB, MVC, XML - Overview For Programmer

In 2004 Oracle, Inc. made its new step toward J2EE... Read More

Microsoft Great Plains Payroll Module Customization Scenarios

It is now common thing when large corporation selects mid-market... Read More

Microsoft Great Plains Chemicals & Paint Industry Implementation & Customization Notes

Microsoft Great Plains fits to majority of industries, in the... Read More

Microsoft Business Solutions Customization Options - Overview for Programmer

Several years ago Microsoft purchased Great Plains Software, then Navision... Read More

Keep Your Software Simple! A Review of EditPlus

I like my software simple. If it's too complex or... Read More

DB Integration - Software for Combine MS Access Databases

Our company, Novaprof Inc., developed unique software - DB Integration.... Read More

SpyBot - Search and Destroy versus Microsoft AntiSpyware (Beta).... My personal experiences...

Ok... Where to start?Well, I guess I will start at... Read More

Bridgeview limo Chicago ..