Virus threatens NT nets

Burns, Christine
January 1999
Network World;01/11/99, Vol. 16 Issue 2, p17
Trade Publication
Looks at the threat posed by computer virus Remote Explorer to Windows NT networks. Mobile code that encrypts executable, text and hypertext markup language files; Movement across networks to take advantage of connected systems; NT Server and NT Workstation machines as virus' targets.


Related Articles

  • Aspirin for Your NT Virus Headaches.  // IT Professional;Sep/Oct1999, Vol. 1 Issue 5, p59 

    Features Norton's Antivirus 5.0 for Windows NT, a software designed to eliminate the administrative attention needed to protect NT servers from virus attacks. Tools needed to run the software; Research center for cure development of the software.

  • Tossing around more cookies; what fonts can do to the speed of Windows. Glass, Brett // InfoWorld;8/05/96, Vol. 18 Issue 32, p38 

    Answers computer-related questions and inquiries. Filtering of cookies by the Internet Fast Forward; Problem with downloading Windows onto an upgraded machine; Presence of a virus located in a computer's RAM.

  • ANTIVIRUS SOFTWARE. Taylor, Nathan // Australian PC User;Sep2004, Vol. 16 Issue 9, p46 

    Presents information on the results of the Virus Bulletin tests on selected antivirus utility software for Windows XP operating system. Ahnlab V3; Computer Associates eTrust Antivirus 7.1; McAfee VirusScan. INSET: ABOUT THE VIRUS BULLETIN.

  • Gunk Busters! Leonhard, Woody // PCWorld;Jan2006, Vol. 24 Issue 1, p74 

    This article offers tips on how to maintain personal computers. Start by visiting the Windows Update site to make sure that the computer have the latest patches for the version of the operating system. Next, check the antivirus and antispyware utilities for updates, and then run a complete check...

  • New 'Tiger' Version Of Mac OSS X Anti-Virus Solution.  // Software World;May2005, Vol. 36 Issue 3, p25 

    Reports that Sophos Anti-Virus for Mac OS X has been extended to include support for the version of the Apple Macintosh operating system, Mac OS X v. 10.4 "Tiger".

  • The End of Innocence. Snell, Jason // Macworld;Jul2006, Vol. 23 Issue 7, p7 

    The article highlights the stability and security of the computer operating software Mac OS X from Apple computers. In February 2006, a couple of malicious software targeting OS X appeared in the wild. This malware didn't work very well. For years, Apple has been incredibly circumspect about...

  • Malware. Briddock, David // Micro Mart;7/10/2014, Issue 1319, p53 

    The article offers information on the types of malicious software or programs that attack computer operating systems and applications. Topics covered include malware, the computer virus, and the software worm. It mentions denial-of-service attacks, the Morris worm, and security holes. Also...

  • Pushdo.  // SC Magazine: For IT Security Professionals (UK Edition);May2008, p11 

    The article offers information on Pushdo Trojan, a malware delivery platform that is being deployed on a regular basis. It is a classic Trojan horse program. Once the program is executed it will assess the system and report the system's capabilities which include the firewall or security...

  • Antivirus work has software firm searching for more space, staff. Jackson, Tom // Crain's Cleveland Business;9/27/2004, Vol. 25 Issue 39, p12 

    This article reports that continuing outbreaks of computer virus infections have created a healthy climate for Central Command Inc., a Medina software company that makes antivirus computer programs. The small company, currently housed in 4,000 square feet of office space, is negotiating to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics