Alien Intruders!

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.

Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.

So what is a virus?

A virus is a program that can self replicate or reproduce itself. These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.

They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.

A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.

Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation

A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.

What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.

Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them.

If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.

Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.

Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.

Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs. Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.

These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.

If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.

Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.

Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.

Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.

Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.

Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.

Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently (not faster), through experience.

About The Author

Seamus Dolly is the webmaster of http://www.countcontrol.com His background is in engineering and analogue electronics. His studies include A+, Net+ and Server+; http://www.countcontrol.com

maide service in Park Ridge ..
In The News:

Scammers create fake Evite invitations that mimic legitimate event emails, requiring users to verify senders and use antivirus software for protection.
The new Apple Watch hypertension feature passively monitors blood pressure patterns over 30 days using sensors to detect chronic high blood pressure signs.
Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.

Five Steps to Rapid Development with TierDeveloper 4.0

Follow the steps below to quickly design, generate, and deploy... Read More

Easy Guide to RAID Recovery

What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More

Microsoft CRM for Large Corporation ? Security

Microsoft Business Solutions CRM proved to be reliable solution in... Read More

Microsoft Navision and Crystal Reports - An Overview

Microsoft Business Solutions ? Navision is an integrated solution for... Read More

Microsoft Great Plains e-Commerce ? additional considerations for programmer

Microsoft Great Plains, designed back in 1990th as database transferable... Read More

Introduction To ISDN, Part III: PAP

Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More

Microsoft Great Plains Customization and Development ? Overview for Programmer

When Great Plains Software was designing and developing Great Plains... Read More

eStore Advantage ? Extending Microsoft eConnect for MBS Great Plains

eStore Advantage allows front-office applications to communicate with back-office business... Read More

Increase Office Efficiency With One Simple Tool

When you need a phone number, you do a quick... Read More

Downloading Spyware Removers: Think Before, not After

Just imagine: you are walking, say, towards your car, and... Read More

Microsoft Blues

With the advent of 'Service Pack 2' for Windows XP... Read More

Microsoft Great Plains 8.0 Brazilian Version ? Overview For International Consultant

Microsoft Great Plains has substantial mid-market share in the USA... Read More

Instant Messaging is a Sweet Way to Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

Scrap Booking Online: Word Perfect or Corel Graphics Suite?

Scrapbooks are very popular these days. I think that almost... Read More

Microsoft Great Plains: If You are Orphan Client ? What to Do and FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More

MySQL for Beginners ? How to Create a MySQL Database

Whether you are an experienced web programmer or a complete... Read More

Software: What Suits Me?

Almost all new and major brand of PCs come with... Read More

Microsoft Great Plains: Dexterity vs. eConnect ? FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics/eEnterprise... Read More

The Software 2005 Conference - A Review

The Software 2005 conference is now a wrap. This conference,... Read More

RSS: Get Notified When Your Favorite Websites Are Updated

RSS (Really Simple Syndication) is a way for a site... Read More

Antivirus Software ? Get The Bugs Before They Get You!

You turn on your computer, and it doesn't look quite... Read More

Microsoft Great Plains: Service Business Customization & Integration Example

Microsoft Business Solutions Great Plains might be considered as ERP... Read More

Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

We'll give you non formal view, based on our consulting... Read More

after renovation cleaning Highland Park ..