Help
As you know,  computer viruses of many types have been all over the news lately.  According to Symantec Corporation, a leading provider of anti-virus software, there have been 19 new virus discoveries since September 15th and 118 since  August 18th  Fortunately, the university has several virus protection measures in place that safeguard the majority of our system.  However, there are a few side effects that you may still encounter.  One of those may be receiving blank e-mails from people that you know,  who did not actually send the message.  This is a mass-mailing worm that spreads itself through e-mail attachments and file-sharing networks such as KaZaA.   In all likelihood, there is someone with a virus on their home computer , who doesn't know their machine is infected,  that also has the Dominican Address book locally loaded into their Contact list.  The virus automatically replicates thru the Contact list of an infected computer.  Again, our anti-virus software should strip the message of a virus, but you will still receive the junk mail generated.   Another common one is receiving a message from someone telling you they previously sent you a virus or claim to provide you instructions to "delete infected files".  These are HOAX viruses.  They scare you into deleting needed system files.  It is important that you DO NOT act on these.  The following link is to a 'hoax' page maintained by Symantec that you should add to your favorites and check before acting as directed in a suspect email:  http://www.symantec.com/avcenter/hoax.html  If ever in doubt, please contact IT before taking any action.  Below is documentation pulled from Symantec Corporation .      
 

What is a virus?
A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria:

  • It must execute itself. It will often place its own code in the path of execution of another program.
  • It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike.

What is a Trojan horse?
Trojan Horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must, invite these programs onto your computers--for example, by opening an email attachment or downloading and running a file from the Internet. The PWSteal.Trojan is a Trojan.

What is a worm?
Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. PrettyPark.Worm is a particularly prevalent example.

What is a virus hoax?
Virus hoaxes are messages, almost always sent by email, that amount to little more than chain letters. They try to encourage you to delete a legitimate Windows file from your computer.  Some of the common phrases used in these hoaxes are:

  • If you receive an email titled [email virus hoax name here], do not open it!
  • Delete it immediately!
  • It contains the [hoax name] virus.
  • It will delete everything on your hard drive and [extreme and improbable danger specified here].
  • This virus was announced today by [reputable organization name here].
  • Forward this warning to everyone you know!

What is safe computing?
With all the hype, it is easy to believe that viruses lurk in every file, every email, every Web site. However, a few basic precautions can minimize your risk of infection. Practice safe computing and encourage everyone you know to do so as well.

General precautions

  • Do not leave a floppy disk in the floppy disk drive when you shut down or restart the computer.
  • Write-protect your floppy disks after you have finished writing to them.
  • Be suspicious of email attachments from unknown sources.
  • Verify that attachments have been sent by the author of the email. Newer viruses can send email messages that appear to be from people you know.
  • Do not set your email program to "auto-run" attachments.
  • Obtain all Microsoft security updates.
  • Back up your data frequently. Keep the (write protected) media in a safe place--preferably in a different location than your computer.