An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you something new on the computer, this article is for you!

In the course of my career, I've worked with many people who I knew were smart but were convinced that they couldn't learn how to do new things on a computer. At some point, they'd convinced themselves that they weren't one of those "computer people". I would try to teach them how to do something that would make their work a lot easier or faster, and I could see them shut down immediately. "I can't do stuff like that. I'm just not good at it."

In a few cases, my colleagues were simply amazed that I knew how to do things like upload photos to the Internet or how to start a new folder in Windows. Some would tell me that I must have some special gift for technology. I would just laugh and tell them that nothing could be further from the truth! I have a degree in psychology. I'm not a math and science type of person, and if it weren't for the patience of my tech-minded husband and friends, I never would have learned how to do these things.

The fact is, computers are such a part of our lives, that you can't afford to think of yourself as not a "computer person". The reason I think that a lot of people are intimidated when learning about computers is that so much of the instructions and directions are full of jargon and assume that people have as much technological knowledge as people who work with computers for a living.

I'm convinced that if I can do it, anyone else can do it too. All it takes is an open mind, confidence, and someone to explain things to you step by step in plain English.

---------------------

Aside from using anti-virus software, there is another way to keep some email viruses or worms from driving you crazy and clogging up your inbox. While the "Sobig" virus seems to have died down, there are sure to be some like it in the future. If you would like to prevent these bogus Emails from reaching your inbox, you can set up rules in Outlook or Outlook Express to send them directly to the delete folder.

Although the Sobig virus seems to be under control, it might be good practice to do this now. That way when the next big virus comes around, you'll be able to filter it out right away. It might seem like its difficult, but I know that anyone can do this. If you're smart enough to do your taxes and balance your checkbook, you can do this, trust me.

If you're using Outlook Express, go to Tools, then select "message rules" and then "mail". A box will pop up with buttons on the right side of the window. Hit the "new" button. Another box pops up with three windows. In the first box, click the box next to "Where the subject line contains specific words".

In the second box, click "delete it". Now in the third box it should say, "Apply this rule after the message arrives/Where the Subject line contains specific words/Delete it." Click on the words "contains specific words".

This is where you tell the program what words to look for in the subject line. It's very important to remember that this is case sensitive, meaning that if you put "abc" in, it will only delete emails with "abc" in the subject, and not "ABC" or "Abc". For the Sobig virus, there were seven subject lines that were commonly used. If you would like to read more about this, go to http://www.webpro.com/iq/sobigf.asp The subject lines are:

  • That movie

  • Wicked screensaver

  • Your application

  • Approved

  • My details

  • Details

  • Your details

  • Thank you

It's a good idea to copy and paste the phrases above to make sure the capitalization is exactly the same. (copy=control C, Paste=Control V)

Enter the first phrase into the box and then click on the "add" button to the right. That phrase will appear in the box below. You can add as many phrases as you'd like, clicking "add" after each one. When you're done, hit "ok" Then hit "ok" again.

At this point, we are back to one box open with buttons on the right. Be sure to click the "apply now" button if you want the rule to apply to the email that is already in your inbox as well as any future emails.

When you are done with that, click the "ok" button and you're finished.

If you use Outlook, the process is a little different.

First go to Tools, and then choose "Rules Wizard". Click on the "new" button on the right. It should say at the top of a new box "What type of rule would you like to create?" There will be a list of types of rules: you want to choose "Check messages when they arrive", which is at the top so it should already be highlighted. Simply click on "next".

The next box asks you "which conditions do you want to check?" with a list of choices, each with an empty box next to it. Scroll down until you get to "with specific words in the subject", and click the box in front of it.

Once you click it, you'll notice that "with specific words in the subject" appears in the box below. Click on the "specific words" in the lower box here to specify which words the program should look for.

This is where you tell the program what words to look for in the subject line. It's very important to remember that this is case sensitive, meaning that if you put "abc" in, it will only delete emails with "abc" in the subject, and not "ABC" or "Abc".

For the Sobig virus, there were seven subject lines that were commonly used. If you would like to read more about this, go to http://www.webpro.com/iq/sobigf.asp The subject lines are:

  • That movie

  • Wicked screensaver

  • Your application

  • Approved

  • My details

  • Details

  • Your details

  • Thank you

A new box will pop up that says, "search text" at the top. Enter one of the phrases you want to filter out and click "add". You may enter as many phrases as you'd like, clicking "add" after each one. When you're finished, click "Ok". You'll be taken back to the previous box. Click "next" at the bottom.

At this point, you have two choices. You can either specify that these emails go into your delete file to be reviewed later, or you can specify that they be permanently deleted from Outlook so that you never see them. At this point, either click in the box next to "delete it", which simply moves it automatically to the delete folder, or click "permanently delete", which means that you will never see the email at all and won't be able to get it back.

Click "next" again and you're now at the exceptions box. I can see no reason to use the exceptions when dealing with the Sobig viruses and others like it. There might be a temptation to make an exception for people who are in your address book or close friends. But remember, a virus will take over someone else's address book and send you emails without the person ever knowing. Anyone in your address book could send you an infected email without knowing it. I recommend that you hit "next" without selecting any exceptions at this point.

In the next box, the program would like to know the name of the rule you've just created. You might want to call it "viruses #1" or something similar. Click finish after naming your rule. At this point you have another choice: you can apply the rule you just created to the mail already in your inbox, or you can choose to have it apply only to the incoming mail from now on. Choose either "run now" or "ok".

You're finished. That wasn't SO hard, was it? You might even want to set up some more rules to help you organize your inbox or to filter out spam or unwanted email.

-------------------

Some more information about attachments and viruses/worms:

Email viruses and worms almost always are transmitted through attachments. Remember after the Anthrax scare in the US a couple of years ago when everyone was very picky about what mail they accepted and opened? Anything that looked suspicious or didn't have a return address wasn't opened.

Think about attachments in the same way. If you get email from someone you don't know, don't open the attachment! If the email doesn't say anything personal to you or use your real name, don't open the attachment. You can always send an email back to that person asking them about who they are or what the attachment is for if you're in doubt.

What you need to know about the difference between spam and viruses:

Recently online I've seen a couple of people referring to the emails they get from viruses as spam. If you want to impress your friends and coworkers with your technological savvy, you need to know that spam is unwanted and unsolicited email you get for a commercial purpose. The intention of the email is commercial. Someone wants you to buy something, be a part of their program or visit their website.

Email you get because of viruses is technically not spam. Although it is unwanted, its intention is not to advertise or market anything, it's simply a nuisance created by someone with too much time on his or her hands!

Also keep in mind that viruses commonly get into people's address books and send out automatic emails to everyone on the list. Your friends and relatives are not sending you infected email on purpose.

About The Author

Heather Dickson is the owner of http://www.webpro.com/iq/sobigf.asp, a virtual assistant practice. She is a member of the International Virtual Assistants Association and a Certified Real Estate Support Specialist. Heather lives in Missouri with her husband and four cats.

http://www.webpro.com/iq/sobigf.asp

move in cleaning service Mundelein ..
In The News:

Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
New Instagram parental controls allow families to manage teen screen time and content limits through the Family Center with stricter safety settings.
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.

Freight Forwarding ERP: Microsoft Business Solutions Great Plains customization & setup ? overview

Microsoft Great Plains may be recommended for international freight forwarding... Read More

Microsoft Great Plains: If You are Orphan Client ? What to Do and FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More

Software Automation Helps Increase your Bottom Line

When you own a small business, time is money. And... Read More

Microsoft CRM Customization: Integration with Third Party SQL Application/Database

Microsoft CRM ? Client Relationship Management package from Microsoft Business... Read More

Great Plains Dynamics/eEnterprise Upgrade ? Things to Consider and FAQ

If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More

Brand Your Websites URL With a Favicon

Have you ever noticed that when you look at your... Read More

Microsoft CRM Development

Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More

Google Brings the Earth to Your Desktop

Google Inc. has launched a new software package that allows... Read More

Top Questions to Ask Before Buying a Help Desk & Asset Management Software

#5 All your hardware components like Printers, PCs etc come... Read More

Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the... Read More

.NET :Solving the Multiple Inheritance Issue Under .NET Platform

.NET platform does not support multiple inheritance. Do not confuse... Read More

Software Tools To Help Your Business Sell More

Sales are all about leverage, because there is only so... Read More

Microsoft CRM Customization - Processing In/Out-Going Email Messages

We would like to give you several situations, when you... Read More

String in Java

Handling character strings in Java is supported through two final... Read More

S is for Spying, Surveillance -- and for Software as Well

Words we choose to describe things and phenomena often show... Read More

Document Templates Give You The Perfect Framework For Your Documents

When it comes to running an office, the SOHO entrepreneur... Read More

Industry Experts Answer the One Million-dollar Question - Why Genie Backup Manager?

Many reasons made GBM a unanimous choice for experts, one... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

Does Microsoft have any real competition?

Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More

Microsoft Great Plains Implementation: Verticals - Wholesale Order Entry center ? overview

Microsoft Business Solutions Great Plains has substantial market share and... Read More

ERP System of the Future: Database, Business Logic and Interface

We will base our prognosis on our Microsoft Business Solutions... Read More

Linux Secrets

The first thing that you will notice about Linux Red... Read More

Microsoft Great Plains on Ctree or Pervasive SQL ? What to Do ? Tips for IT Manager

As you probably know, when Microsoft purchased Great Plains Software... Read More

Recovering Microsoft Great Plains Customization ? Tips for IT Director

Remember nice and prosperous Clinton era? When you implemented innovative... Read More

New SQL Delta Version 3.1

COMMAND LINE FUNCTIONA powerful command line script processor has been... Read More

insured cleaning company Highland Park ..