Showing posts with label email. Show all posts
Showing posts with label email. Show all posts

Thursday, September 9, 2010

Here you have' e-mail worm hits corporate world!!

A new virus based in e-mails with the subject line "Here You have" began running rampant Thursday, hitting corporate America hard.

So far, the virus has already been sighted at ABC/Disney, Google, Coca Cola and NASA, several individuals with knowledge of the situation told. Comcast was forced to shut down its e-mail servers entirely after being hit, a spokesperson said on Twitter.

E-mails that carry the virus contain a link that encourages readers to click on a PDF document file. But rather than a PDF, the file  contains a Windows script that transmits a virus and spams the entire contact list of the person who opened the file.



The worm is similar to the ILoveYou and Anna Kournikova worms, which spread in 2000 and 2001, and is a type of malware that has not been a major problem since around 2002, according to David Cowings, a senior manager with Symantec Security Response. "It looks like we've had a resurgence of mass-mailing worms," he said.

This latest worm seems to do nothing more than send itself out, using the victim's contact list. Cowings said "It appears to be mailing itself to all of the mailing lists that are in someone's contacts. It may also go to individuals," he said. The worm appeared to be affecting Outlook e-mail users, but it's not clear if it is also affecting users of other mail programs.

The body of the e-mail typically says something like, "Hello... this is the document I told you about, you can find it here." Because the worm is spreading via contact lists, the e-mail often comes from someone the victim knows.

A note posted on the McAfee site Thursday afternoon said: "It looks like multiple variants may be spreading and may take some time to work through them all to paint a clearer picture."

Thursday, September 2, 2010

Gmail's Priority Inbox Auto-Filter importent E-Mails!

Google Inc. can sift through more than a trillion Web links in a matter of seconds, but can the Internet search leader help people wade through their overflowing e-mailboxes?
That's the challenge Google will try to tackle Tuesday with the introduction of a tool called "Priority Inbox" in its Gmail service.

The feature relies on formulas devised by Google engineers to automatically figure out and highlight which incoming messages are likely to be the most important to each Gmail user.


Users who opt to turn on the Priority Inbox will see their messages separated into three categories. "Important and unread" e-mails will be at the top followed by messages that have been previously stamped with a star by an accountholder. Everything else appears at the bottom.

Switching back to the standard view of the inbox can be done with a click on a link along the left side of the Web page.

Google's e-mail analysis is based on a variety of factors, including a person's most frequent contacts and how many other people are getting the same message. The content of the e-mail also is factored into the equation.

Although it might unnerve some people, the notion of Google's computers scanning through the content of individual e-mails isn't new. Google has been doing it for years to determine what kinds of ads to show to the right of e-mails and to block junk e-mail commonly known as "spam."

With more than 100 daily e-mails pouring into some inboxes now, people now need help to identify "the bacon and baloney" along with the spam, said Keith Coleman, Gmail's product director.

Google helped create the information clutter six years ago when it introduced its free Gmail service with a then-unheard of 1 gigabyte of storage per account. Other e-mail services quickly expanded their capacity limits to remain competitive, and now most inboxes can store multiple gigabytes of information.

Wednesday, August 11, 2010

Orkut changes it's appearance!

Since past couple of weeks Orkut is undergoing minor changes whcih people didn't much notice. But, finally they made it visible to all the users. The Orkut face has changed! They have introduced new appearance to Orkut. They changed the layout to an extend and added an easy access for your favorite application. 

Now you can choose to send a private scrap to a friend. On the new orkut, before posting a scrap, just change its visibility to "private", and that scrap will remain visible only to you and the person receiving the scrap, so it stays completely secret. 

Orkut has made it absolutely clear who else can see the content you’re looking at on orkut. Every scrap (as well as photos, videos, etc) will now have a privacy label, so you can easily tell who else can see it. These are exactly the same as the privacy levels that we already had on photos: private, friends and public. 

Orkut has become a secure place than before. Here you can have a private conversation with your friend via scrap and noone is gonna peep into that. 

I am relaxed now as I don't worry about my private scraps being expossed to whole the world!

Gmail makes changes to it account!

Google has made some updates to the Gmail experience with a heavy focus on contacts. The company says that out of all of the feedback it gets about Gmail, most of it is about improving the contacts experience. 


New contacts features include:


Keyboard shortcuts (go to Contacts and hit "?" for the full list)
Sort by last name (look under "More actions")
Custom labels for phone numbers and other fields
The ability to undo changes you've just made
Automatic saving
Structured name fields, so you can adjust titles, suffixes, and other name components
A bigger, more prominent notes field
In addition to these, Google has slightly altered the look of Gmail. Mail, Contacts, and Tasks links have been moved to the top left. Compose Mail is now a button rather than a link. A smaller header area puts the first message in your inbox higher on the screen. Finally, the select all, none, read, unread, and starred links that used to be above messages are now in a drop-down menu, next to the archive button. 


The features has been rolled out in everyone's account. The company also says that Google Apps users will have to wait because they're working on making domain-specific features work well with the new interface. The company seems to be paying more attention to the security piece as well. The users are asked to verify their alternate email account and the phone number to overcome several attempts to hack the Google account across the globe.


I am excited to see the new changes. It looks like my favorite Gmail would become my favorite email account for ever! :)

Sunday, January 17, 2010

China tried to hack India's computers: NSA

Chinese hackers have tried to penetrate computers in the offices of National Security Adviser M K Narayanan, a British paper on Monday quoted him as saying.

Narayanan said his office and other Government departments were targeted on December 15, the same date that US defence, finance and technology companies, including Google, reported cyber attacks from China.

"This was not the first instance of an attempt to hack into our computers," Narayanan told The Times in an interview, adding the would-be hackers sent an e-mail with a PDF attachment containing a Trojan virus.

The virus, which allows hackers to download or delete files, was detected and officials were told not to log on until it was eliminated, Narayanan said.

"People seem to be fairly sure it was the Chinese. It is difficult to find the exact source but this is the main suspicion. It seems well founded," he told The Times, adding that India was cooperating with the US and Britain to bolster its cyber defences.

The Chinese government has denied any role in the attacks, with a foreign ministry spokeswoman saying: "Hacking in whatever form is prohibited by law in China."

Narayanan said that while he expected China to be an increasingly high security priority for India, the main threat still came from militants based in Pakistan.

He said Islamabad had done nothing to dismantle militant groups since the 26/11 Mumbai attacks, and criticised Britain for accepting its excuse that such groups were beyond its control.

"The British are still blinkered on this. We believe Pakistan's policy of using terror as a policy weapon remains," Narayanan said, adding India is anxious to prevent an attack from Pakistan during the Commonwealth Games in October.

"From Pakistan's point of view, it's important to disrupt the Games so you can claim that India is not a safe place," Narayanan said

Wednesday, January 13, 2010

Google threatens to leave China

Google has threatened to close its operations and offices in China after hacking of email accounts of many human rights activists.

In a statement on its blog on Tuesday, the world's second biggest corporate said it has detected in December "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.''

The main goal of the attackers was access the Gmail accounts of Chinese human rights activists, the statement said. But they didn't succeed as "only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves,'' Google said.

But independent of this attack, Google said it has "discovered that the accounts of dozens of US, China and Europe based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties.

"These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers.''

The Mountain View-based company said it has made "infrastructure and architectural improvements that enhance security for Google'' and urged users to deploy anti-virus and anti-spy ware programmes. These attacks, Google said, have forced it to "review the feasibility of our business operations in China.''

The company, which had agreed to censor of Google.cn at its launch in 2006, said it was "no longer willing to continue censoring our results on Google.cn.''

Google said it will soon hold discussions the Chinese soon whether it can operate an unfiltered search engine. "We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China,'' the blog warned.

Tuesday, September 1, 2009

Gmail down for an hour!!!

A majority of Google mail users were unable to access the service on Tuesday afternoon, in a rare widespread outage of the popular Gmail service.

Google said at 5:37 pm ET that it fixed the problem but was still investigating the cause of the outage, which lasted for over an hour.

Users around the world appeared to be affected, with people from England, Italy, Singapore and South Africa reporting problems on the company's support site.

The outage comes as Google attempts to compete with Microsoft Corp. and IBM to expand its service among business users, who are likely to be less tolerant of long outages. Gmail already competes with Microsoft's Hotmail and Yahoo's Web-based e-mail.

"Anyone thinking of migrating over to Google mail for business might want to think again! It's so annoying - free or otherwise!" one user wrote on the support site Tuesday.

Google offers its email service for free and also sells a version to businesses with extra features and technical support for $50 per user per year.

The fear of outages, in addition to security concerns, has been a reason many businesses are wary of adopting "cloud computing" technologies being offered by Google as well as Salesforce.com and Amazon.com, which help deliver data and services over the Internet

Saturday, May 9, 2009

There is no such thing as "deleted" on the Internet!!

It's always fun to write about research that you can actually try out for yourself.

Try this: Take a photo and upload it to Facebook, then after a day or so, note what the URL to the picture is (the actual photo, not the page on which the photo resides), and then delete it. Come back a month later and see if the link works. Chances are: It will.

Facebook isn't alone here. Researchers at Cambridge University (so you know this is legit, people!) have found that nearly half of the social networking sites don't immediately delete pictures when a user requests they be removed. In general, photo-centric websites like Flickr were found to be better at quickly removing deleted photos upon request.

Why do "deleted" photos stick around so long? The problem relates to the way data is stored on large websites: While your personal computer only keeps one copy of a file, large-scale services like Facebook rely on what are called content delivery networks to manage data and distribution. It's a complex system wherein data is copied to multiple intermediate devices, usually to speed up access to files when millions of people are trying to access the service simultaneously. But because changes aren't reflected across the CDN immediately, ghost copies of files tend to linger for days or weeks.

In the case of Facebook, the company says data may hang around until the URL in question is reused, which is usually "after a short period of time." Though obviously that time can vary considerably.

Of course, once a photo escapes from the walled garden of a social network like Facebook, the chances of deleting it permanently fall even further. Google's caching system is remarkably efficient at archiving copies of web content, long after it's removed from the web. Anyone who's ever used Google Image Search can likely tell you a story about clicking on a thumbnail image, only to find that the image has been deleted from the website in question -- yet the thumbnail remains on Google for months. And then there are services like the Wayback Machine, which copy entire websites for posterity, archiving data and pictures forever.

The lesson: Those drunken party photos you don't want people to see? Simply don't upload them to the web, ever, because trying to delete them after you sober up is a tough proposition.

Tuesday, May 5, 2009

Why do people write viruses???

Every time when reports of a big new virus or other malware attack hits media, my mind will be out for an answer for the question: Why do people write viruses?

I answer as succinctly as I can, but the question is a deep and complex one. Why do people burglarize homes? Why do people tag buildings with graffiti? Why do they post anonymous hatred on online message boards? Why do they play video games? These questions may sound like they have nothing to do with one another, but you might be surprised how their answers are all related to the topic at hand.

TechRepublic offered an interesting analysis of this issue a month ago but it slipped by me. Fortunately I stumbled upon it this weekend and hope you'll give it a read in order to help shed a little light on a surprisingly complex issue.

So why do people write viruses (and I'll use that term loosely throughout this post as a descriptive for any kind of malware)?

TechRepublic plays it down a bit, but my #1 answer to the question is always the obvious one: For the money. In the old days, a virus designed to erase your hard drive or fill your computer screen with garbage was just a prank (more on that later) but those viruses are quite rare these days. Nowadays, the vast majority of viruses have far more practical ends: They make your PC send spam, they harvest financial information, turn computers into zombies, and extort money out of you directly if you want it deleted. All of these have direct and quantifiable financial goals: Spam is paid for by the message (or the millions of messages) sent. Personal data can be sold on the black market for use in identity theft. It's business, pure and simple -- bad business, to be sure, but all about the cash at the end of the day.

Several of the items on the TechRepublic list get at a secondary reason for virus-writing: They do it because they can. It's the same reason people jump out of planes or drive at insane speeds: It's a thrill, and for a certain subset of programmers, there's a thrill, a laugh, or a power-trip to be had from causing as much damage as possible -- and getting away with it. While most virus writers don't want attention (which can bring serious prison time in the end), a few do, and some underground hackers get off on the notoriety.

Sabotage -- whatever the motivation -- is another common theme in malware creation. Any political issue -- whether it's a presidential election or a Microsoft vs. open source legal spat -- tends to be ground zero for hacker attacks. Denial of service attacks are commonly launched against websites owned by those with opinions unpopular in the hacker community. And that's where your machine comes in: Hackers compromise it with malware to turn it into a DoS zombie.

So, getting the picture? Viruses and other malware are going to be with us forever because they're a digital version of human nature.

Sunday, April 5, 2009

Do I need to back up my computer?

Even if you've taken precautions to protect your computer from malicious software, other potential dangers could destroy the information it holds. A power surge, lightning strike, hardware failure, or natural disaster could leave you without your important data or the use of your computer.

Backing up your files can help you avert disaster. Backing up is simply making an electronic copy of files and storing that copy in a safe place. If you back up your files regularly, you can retrieve some, if not all, of your information if something happens to the originals on your computer.

Here are some tips for backing up your computer:

* Use an external hard disk, CDs, DVDs, or other storage medium for your backup copies. Or upload data to an Internet-based file storage service. Whatever you do, don't just copy files to another location on your hard disk.

* Label the medium with the date and time of the backup. Don't erase the previous backup until you have made a new one.

* Back up anything you can't replace easily such as financial information, digital photos, music or programs you bought and downloaded from the Web, and school projects. For these types of files, you can simply copy and paste the file into the backup medium.

* If you use an email program that is installed on your computer (such as Microsoft Outlook), back up important email messages and your email address book. Some email programs include an export feature for backing up important data.

* If you're trying to save time or space when backing up your computer, consider backing up only your personal data. Don't copy programs like Microsoft Outlook or your operating system. They can be reinstalled from the original CDs you purchased or the System Restore CDs that came with your computer.

* If you use your computer occasionally, back up your data once a week. If you use your computer every day, a daily backup of the files you use most often or modified that day is a good idea.

* To be sure you've backed up every file, use backup software. You can find a list of backup products in the website. Your operating system may also include backup features.

* Make sure you have a copy of your operating system on a CD for re installation in case your computer's hard drive fails. If your computer shipped without a copy of the operating system, contact the manufacturer for a copy.


Wednesday, March 18, 2009

Protecting your computer makes good sense!!!

It can delete important data or programs from your hard disk. It can constantly display annoying pop-up ads. It can slow your computer to a crawl or stop it from functioning. It can even help computer thieves steal your sensitive information and your identity.

It's malware — malicious software. And unless you take steps to prevent it from attacking your computer, you can be a victim of viruses, spyware, and adware. What's even more frustrating is that these programs can be so well-hidden on your computer that you can't find and remove them without the help of an anti-malware program. And in extreme cases, you may have to completely clean your hard disk and reinstall your operating system to rid yourself of these pests.

  • Viruses can infect your computer and spread to your friends

A virus is a program that inserts itself into other programs, documents, or email attachments. If you open a document or click a link or attachment in an email, you may download a virus. Once a computer is infected, a virus can do intentional damage, from slowing down a computer by overloading its memory, to destroying important data or programs. The virus may attempt to infect other computers by emailing or instant messaging itself to everyone in your address book.

  • Spyware can lurk in other software

Spyware is software that gathers information about you without your knowledge or consent. It "records" what you do with your computer (such as the web sites you visit) by tracking everything you type on your keyboard. Some spyware can even gather email addresses, passwords, and credit card information and transmit it to the company or persons that produced the spyware. The data may then be sold to other companies that use it to display their ads to you, or used by criminals to steal your identity. Spyware is often hidden in other software that is downloaded from the Internet.

  • Adware is more than annoying

Adware is software that displays advertising, such as pop-up ads, as you surf the Web. Some adware double as spyware and also collect your personal information without your consent. Like spyware, adware can be installed when you download a program from the Internet or install software from disks. Adware may not disclose its behavior before you install it or may not clearly identify itself as the source of ads.

Thursday, March 12, 2009

How to Protect Your PC

Use anti-virus software and keep it up-to-date

If you haven't installed anti-virus software on your computer, do it now. Anti-virus software can detect many — but not all — forms of malicious software before they have a chance to affect your computer. When you purchase anti-virus software, look for one that includes anti-spyware. Most anti-virus software can automatically download updates for you. Check to make sure your software is downloading updates correctly.

Keep all your software up-to-date

You can prevent many problems by regularly checking for and installing updates for your programs, including your operating system, browser, messaging software, and other software. Many programs include a feature that automatically checks for updates. Be wary of clicking links in emails claiming to have updates for your software; it is safer to type the address of the web site into your browser’s Address bar to visit the site directly.

Check your security settings

Most operating systems (such as Windows XP) have a built-in firewall and other safeguards to prevent unauthorized access to your computer. Check your operating system to make sure it's set up so that your computer is protected. Install any security updates or patches for your operating system promptly.

Be careful opening email attachments

Consider turning off the feature in your email programs that automatically opens attachments. If you receive an attachment you aren't expecting, do not open it. Before you open any email attachment — even if it's from someone you trust — scan it using anti-virus software. Most of the online mail service providers automatically scans all email attachments for viruses.


Don't install unfamiliar programs

Think carefully before installing or running new software, such as freeware or shareware programs available online. Only download software from a source you trust. Do not install software if you cannot verify that it's from a trusted source. Make sure you know what the software will do and how it will affect your computer. Malicious software (like viruses and spyware) often masquerade as legitimate and even useful programs. For example, you might be tempted to download a program that claims to keep your computer clock synchronized with an official clock. But if that program contains adware or spyware, it could also display advertising pop-ups whenever you're online or keep track of where you go on the Internet.

Be wary of pop-up and email warnings

Don't believe every warning you read — especially pop-up warnings that you see while you're surfing the Web. Unscrupulous companies use pop-up ads to display false warnings about your computer. Ignore them.

Do NOT click any button in the pop-up (such as a "Close" or "No" button) or the Close box that may appear in the upper-right corner of the pop-up. Closing a pop-up in that way might actually install a virus or other malicious software on your computer. To close a pop-up ad, press Ctrl-W (if you're using a Windows computer) or Command-W (on a Mac computer). You may receive an email warning that claims to be from a computer "expert" warning you of a virus. These are usually hoaxes. Do not follow the steps described in any email unless you're sure the threat is real.

Monday, March 2, 2009

How do I get rid of viruses, adware, or spyware?

If you suspect that your computer is infected with a virus or other malicious software, remove it as soon as possible.

Unlike other software, malware can't be completely removed using your operating system's Add/Remove Programs feature. Some bits of malware may still be hiding on your hard drive, doing its damage behind the scenes. To get rid of malware, use software specifically designed to find and delete it.

Many solutions are available for ridding your computer of malicious software. You can find these programs by searching the Web for virus protection. I would advice Symantec Endpoint Protection as a good anti virus. Whatever software you choose, be sure to keep it up-to-date.

In some extreme cases, anti-virus programs may not be able to remove all malware. It may be necessary to reformat your hard drive and reinstall its operating system. If you're using a laptop computer, installing the operating system from the partition backup may not completely remove malware. Instead, be sure to get installation disks for your operating system from your hardware vendor and use those to reinstall your operating system.

Thursday, February 26, 2009

How do I safeguard my password?

Choosing a strong password is just one part of protecting your online account. You should also follow these tips to keep it safe:

* Your ID and password are confidential information. No one will never ask you for your password in an unsolicited phone call or email. Do not respond to any message that asks for your password.

* Do not write your password down. If you must write it down, keep it safe away in a place only you can access. Treat it as if it were cash.

* Change your password if you suspect something is amiss. Change your passwords frequently to keep it much more safer.

* Verify your online account information. From time to time, make sure your information is accurate and that no one has changed your data. If you suspect someone knows the answer to your secret question and any other information asked on the Sign-In Problems page, change them as soon as possible.

* Use care with automatic sign-in. If you check Remember my ID on this computer when you sign in to online account, you're still signed in even after you close your browser.

This feature can be a convenience for you: When you return to the online account, you don't have to re-enter your password. (If you're away from your computer for a while, you may be asked to re-enter your password.)

Do not check the Remember my ID on this computer box if you use a shared computer.

To change the setting of this feature, click the Sign out link on your online account page, and then sign in again, but do not check the Remember my ID box.

* Read the fine print. Before saving your password on any browser, plug-in, or program, thoroughly read the security documentation for that program or service. Depending on the program, your passwords may be available to anyone who uses that computer.


Saturday, January 24, 2009

How do I choose my password?

Your password is more than just a key to your online account. If your password falls into the wrong hands, someone can easily impersonate you while online, sign your name to online service agreements or contracts, engage in transactions, or change your account information. So, choose your password carefully and then keep it safe from others.

A password is like a toothbrush: Choose a good one and don't share it. A password can be any length, and can contain spaces, symbols, or numbers. With so many options, you should be able to come up with a password that's easy for you to remember but impossible for someone else to figure out. A password is a secret that only you should know.

Here are some tips for choosing a strong password — one that is difficult to guess.

* Choose a password you'll remember. It should be memorable for you (so that you don't have to write it down or leave it in the open), but difficult for others to guess.
* Avoid using a word. Avoid a complete word from a dictionary (English or otherwise) or a name.
* Use at least 7 characters. The more characters your password contains, the harder it is for someone to guess it. A long but simple password can be safer than a short, complex one — and often easier to remember.
* Use a combination of capital and lowercase letters, numbers, and standard symbols (! @ # $ % ^ & *). Your Yahoo! password is case-sensitive, which means that a capital letter A is different from a lowercase a.
* Don't use personal information that someone could easily figure out. Avoid a password based on information easily obtained about you (like your birthday, your child or pet's name, phone number, license plate number, employer, school name, automobile brand, or street name). Don't use a password you already use for another account, such as your bank account PIN. And don't use your user name in any form (such as reversed, capitalized, or doubled).
* Avoid the obvious. Don't make it easy for attackers by repeating a digit or letter (like "111111" or "FFFFFF") or any other common sequence of characters (like "123456"). Stay away from obvious passwords such as "test" or "password." When you change your password, change several characters; don't just append a number like "2" to the end. And make sure anyone watching you enter your password can't guess it as you type (such as a password typed using a single hand, like "qwerty").
* Put a new spin on a familiar phrase. Pick a favorite phrase or lyric for your password. To shorten it, substitute letters with a number or a standard symbol or remove vowels. For example, "fredsboy" can be made into "Fr3d$boy." Shorten "two tickets to paradise" to "2Tickets2Paradiz," or combine "cat" and "dog" into "cAt!Do8."
* If you use a password generator, be careful. Make sure you can identify and trust the creator of a password management or generator program. Never share any personal information unless you trust the company or person you're working with. Online password-generator programs can help you create a random password that is generally harder to crack but also more difficult to remember.

Protect your privacy by choosing a strong password!!!

Wednesday, December 24, 2008

Things to know about phishing…

Phishing is like fishing personal details…

Phishing is a new way of getting personal information through fake pages which is most similar to the original page. The victim will enter his/her personal information on the fake page and will end up in big loss like identity theft money loss etc.


How to identify Phishing pages?


There are several ways to identify the fake pages.

1. First and for most is to upgrade your browser to the latest one which the service provider offers. Internet Explorer version 7 has the in built capacity to identify the fake page. If you happened to logging to a fake page, the browser will give you a warning message stating that it may be a phishing attempt.


2. Look into the address bar properly.If you check your address bar you will come to know whether it is a fake page or an original page. Fake page will not have the correct site address that you tried to log in. The fake pages are normally hosted from a free site hosting pages which will be mentioned in the address bar. But little more advanced hackers will host a website which has the address similar to the targeted site. So it is always better to type in the address of the site to which you have to take a look.

3. Don’t follow the links which is in an Email.You should never follow a link in an Email send to you. Always remember that hackers use email as a medium to carry their fake pages to their victims. You may find some wonderful offer from your bank or from your Email provider. Never click the link that contained in that email. Because we may not know, if it is a fake page. If you are interested in the add type the address of the site in the address bar and navigate through your site to see if an offer is made by them. If yes apply for that with confident.


4. Don’t provide personal information.Never provide your personal information in any of the social networking sites. Hackers normally target those sites to collect the contact of their victims.

So beware of phishers and be safe always…

Monday, February 4, 2008

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A vir

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.

A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

Viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

To help avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments.

Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.


Search The Fire Seal

Random Post: I'm feeling lucky!!!