Virus Information:  

Worried about getting a computer virus bug? Learn about them here. You'll find multiple links to virus protection sites and what you need to know about viruses.

ATTENTION: ABSOLUTELY, POSITIVELY, UNDER NO CIRCUMSTANCES - DON'T EVER OPEN AN E-MAIL ATTACHMENT WITH THE FILE NAME EXTENSION OF .VBS, .PIF, .SCR or .HTA ! ! !

You can be absolutely certain that these are damaging viruses - no matter whom it may be addressed from - even your best friend!

.EXE and .HTM files can also often be a virus carrier. Viruses can also come in the body of an e-mail message too now, not just as an attachment. Please read on -


Click here for quick links direct to McAfee.com and Symantec.com Anti-virus and virus hoax pages

(Please Note: You will be leaving Jerry's Pages. Please come back and see us again)!

Click each for:  What is a virus? -  -  - What is a hoax?


From the Webmaster:

We are using the Internet more and more every day, as we become more experienced and more proficient at it. With this usage comes the need for responsibility. Because we are connecting to other computers via a network (the Internet) there is the strong possibility of transferring problems from one computer to another. These “problems” are sometimes destructive communicable viruses that are transferred to (and from) your machine by e-mail and/or by other behind the scenes methods. They can and will cause the destruction of your and other persons computer files among other things computer viruses do. Important data such as your Microsoft Word, Excel and Power Point data can easily be erased or corrupted by these viruses – and you most likely have no chance of recovering them if that does happen.

 Please be cautious of the floppy diskettes that you use, the Internet sites that you visit, the files that you download and the e-mail and e-mail attachments that you open. These are the places where viruses come from. By cautious usage, you can minimize your exposure.

With the following information, you'll  find links pointing you to two of the major virus protection software companies. You'll find highlights here of some of the most popular (?) viruses that are currently active and going around. You'll also find information on some of the various virus hoaxes that are portrayed every day on unsuspecting persons, where to go for help and how to deal with them. 

There are 50,000 viruses out there at any one time, with these viruses mutating and changing regularly. It is very difficult for even the most dedicated person to keep up with them all under the best of circumstances, so it stand to reason that if YOU don't pay attention to this very important computer usage area, you ARE going to get bit by one of these bugs.

MOST IMPORTANT!!! - If you suspect you have opened a virus, and you don't have virus detection software, or it didn't catch the virus, immediately SHUTDOWN and DISCONNECT the computer from the Internet as quickly as possible. Use a clean, virus free, floppy "boot disk", with current virus detection software, to repair, or have repaired, the damage, BEFORE restarting the computer from your hard drive disk. If you don't understand this and/or don't know how to do it, find someone that does! The hassle (and the damage) will most often be a lot less than if you continue to try to use a computer that is infected with a virus!!! A matter of moments can make a huge difference in damage done to your computer and/or to other computers that you may be connected to or to those than you have the ability to send e-mail to.

Some of these viruses automatically replicate themselves and send themselves from your computer via e-mail - and you probably won't even know it is happening till it is TOO LATE!  - The best rule to follow is - DO NOT OPEN ATTACHMENT FILES THAT DON'T APPEAR ABSOLUTELY LEGITIMATE AND/OR THAT YOU MIGHT SUSPECT for any reason!!!! More often than not viruses DO come from persons that you know, due to the auto-replication and auto-send process that they employee.

Please remember that once the damage is done, in many cases it will be impossible to retrieve your lost data. DO NOT PAUSE OR HESITATE! Disconnect from the Internet and shut the computer down immediately! The virus won’t wait on you to finish what you were doing.

Remember, there are 50,000 viruses in existence at any one time. The below are just a couple of example articles on a few of the most well known viruses - and also on a couple of very popular (?) hoaxes. Listed just below these examples on this page, you'll find links to McAfee and Symantec, two of the most respected and well known companies in the virus protection business. These links are directly to their pages that show the actual viruses and hoaxes that are currently out there. The information on these sites will inform you of the latest viruses, hoaxes and how to deal with them. Please make them part of your regular routine, visit them often and get very familiar with them - for your own sake. 


Some basic examples of today's most prevalent Viruses:

 (Click above to go back to: What is a Virus?)

(Just click directly on the virus name for detailed info. They are linked to a document page description of the particular virus type).

Examples of VBS virus names:

ILoveYou.vbs Virus - This virus was one of the first .VBS viruses.

Melissa.vbs - Another .VBS virus

Mother's Day Variant - A variant of the original I Love You .VBS virus.

All the above have file names that end in .VBS

While thousands of other types of dangerous active viruses exist, .VBS viruses are the most common that you'll see right now.

You can be certain that these .vbs examples are viruses - or worse, in that the .vbs file that you might receive may even be a mutated/modified version of them, that may be even more destructible and damaging.

The file names of other types of virus carriers that are similar in damaging power to the .VBS file are file name with the extensions of .PIF, .SCR and .HTA. Resist the temptation! Do not open ANY OF THESE ! ! !

Executable viruses:

This type of virus is actually a fully independent program and does NOT require anything else in the computer to run. Usually comes as an e-mail attachment. Just click on it and you are zapped! These file names will end in .EXE.

Example of an executable virus:

Navidad.exe -  A virus that sends e-mails to everyone in your address book and then locks your computer up the next time that you re-start it! It would do more damage if it could, except that it is written in Spanish and stops short of fully wiping out everything because of that.

These types of viruses causes major headaches and can cost a fortune to correct, oftentimes causing a complete loss of data and requiring a complete erase and re-install of every program in the computer.

The one thing that all these viruses have in common are that they come as an attachment to your e-mail. SO, - - be VERY careful of what attachments that you open - even if it is from a friend!


HOAX examples:

(Click above to go back to: What is a Hoax?)

It takes guts to say Jesus

Wobbler

California

Win a Holiday

I have receive hundreds of "warnings" over the years from people in our company about viruses. While there are real viruses out there, the vast majority of the warnings that I receive turn out to be "Hoaxes" like the ones above. Just a little investigation on the part of the sender could have prevented a false alarm. I have composed a standard template "Reply" response to this problem that I send back to all senders of hoax warnings. Here it is:

 


Example Reply E-mail Message:

You (and now I) are the victim of a "virus hoax warning". Scare tactics such as this are considered a form of computer virus of and in itself. You have been had - and now I have too again, - - for about the thousandth time.

The following information is supplied to you to give you the ability to stop being a victim and to prevent the spread of worthless information such as this.

This "California" virus (often referred to as the "Wobbler"), the "Win A Holiday" virus, It Takes Guts to say Jesus virus and other virus warnings like them are well known hoaxes that have been circulating e-mail systems for a long time. Continuing to forward this message is a form of a virus, with the replication of the message itself being the virus, causing unknowing but (usually) well meaning persons to clog mail systems, waste others time and spread untrue information. In the future, please click on your search engine button a do a search for the subject information first, before sending out messages such as this. It took me only a couple of minutes to do a search that came up with the following URL addresses that specifically identifies the California/Wobbler, It takes guts to say Jesus and Win A Holiday viruses as for sure "hoaxes": Click on these links for verification:

http://www.europe.datafellows.com/hoaxes/wobbhoax.htm

http://www.urbanlegends.com/ulz/xwobbler.html

http://vil.mcafee.com/dispVirus.asp?virus_k=98307&

Additionally, For other general virus hoax information which proliferates in this manner, you can also, FIRST, before forwarding a message of this type, go to the http://vil.mcafee.com/hoax.asp and/or http://www.symantec.com/sarc/avcenter/hoax.html web pages for verification of virus warnings and/or hoax viruses.

The above information is furnished so that you too may participate in responsible computer usage.

This message is a standard response sent by me in response to hoax e-mail warnings that I regularly receive - and should NOT be taken personally.

The above being said, if after you've visited the above sites you are still in doubt about a possible virus warning, please contact me. I will be happy to assist in any way that I can. You never know when it may be real, and safe is better than sorry - but please research the above site links first!

Jerry Erbesfield

 

End of example e-mail message

For more info on viruses please visit:

Click here for quick links direct to McAfee.com and Symantec.com Anti-virus and virus hoax pages

REMEMBER: ABSOLUTELY, POSITIVELY, UNDER NO CIRCUMSTANCES, - DO NOT OPEN ANY E-MAIL ATTACHMENT WITH THE FILE NAME EXTENSION OF .VBS, .PIF, .SCR or .HTA. and be extremely cautious when opening .HTM or .EXE files!!!!.

 

Back to Top

 


The Webmaster of this site assumes no liability for any content displayed here or for your use of this website. Use of this website is entirely at your own risk. All products, services and logos mentioned or used on this website are the registered trademarks of their respective companies. No warranties are expressed or implied in any manner as to the accuracy of any information appearing on this website. Your use of the website constitutes your acceptance of these terms. Questions, problems or issues  regarding this site should be directed to the Webmaster.

Copyright © 2011, Jerry A. Erbesfield