TITLE

`Bubbleboy' e-mail virus benign, but also a warning

AUTHOR(S)
Fontana, John
PUB. DATE
November 1999
SOURCE
Network World;11/15/99, Vol. 16 Issue 46, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Deals with the threat posed by the `Bubbleboy' virus found in electronic mail message systems. Rate of the virus' spread; Effect of the virus on Microsoft's Outlook and Outlook Express e-mail clients; Mailing of the virus to virus researchers in the United States; Discovery of a patch to combat the virus.
ACCESSION #
2552789

 

Related Articles

  • Latest worm Nimda spreads via many paths. Rapoza, Jim; Gonsalves, Chris // eWeek;9/24/2001, Vol. 18 Issue 37, p11 

    Reports the shutdown of several websites due to the Nimda virus in the United States. Outbreaks of Nimda virus through electronic mail; Vigilance of the network administrators and software vendors on viruses and worms; Propagation method of Nimda.

  • Viruses 101: simple procedures can save time and money. Cardenas, Felipe // Caribbean Business;2/20/2003, Vol. 31 Issue 7, p36 

    Provides tips to avoid computer virus attack. Characteristics of a computer virus; Transmission of viruses via electronic mail attachments, floppy disks or the Internet; List of dangerous viruses.

  • Beat back spam in growing e-mail world. Yudkowsky, Chaim // Business Journal (Central New York);11/1/2002, Vol. 16 Issue 44, p19 

    Discusses the problems associated with spam. Production of workplace-harassment issues; Supply of computer viruses to the corporate network; Details of the spam operation.

  • Virus Worms Its Way Through The Net. Duvall, Mel // Inter@ctive Week;06/14/99, Vol. 6 Issue 24, p8 

    Reports on the emergence of the virus called W32/Explore-Zip.worm that attacks e-mail systems. Prediction from Wes Wasson, director of anti-virus products at Network Associates; Contents of an infected reply; Anti-virus companies that have posted cleaners for the virus on their sites.

  • Trojan horses, worms drive companies' tech costs up. Kirtland, Chad // New Orleans CityBusiness (1994 to 2008);03/26/2001, Vol. 21 Issue 40, p32 

    Describes various types of computer viruses that attack e-mails. Viruses that arrive as e-mail attachments; Examples of Trojan horses; Threat posed by e-mail viruses to businesses.

  • Viruses to outstrip email growth.  // Knowledge Management;May2001, p6 

    Reports on projections regarding the increase in number of computer viruses encountered by the government of Great Britain for 2001. Increase in electronic mail use; Effect of virus volume increase on the finance sector; Updating of anti-virus software.

  • Fake virus warnings, dubious scams cut your productivity. Taylor, Dave // InfoWorld;03/02/98, Vol. 20 Issue 9, p82D 

    Discusses the need for sifting through electronic mail messages carrying fake virus warnings. Examples of computer virus hoax spread through electronic mail; Rules of thumb for eliminating chances of virus infection; Information offered in the Computer Virus Myth Web site.

  • Melissa Virus Spooks Users. Cheng, Kipp // Brandweek;09/13/99, Vol. 40 Issue 34, p40 

    Looks at the electronic mail virus Melissa. When was it unleashed; What it revealed; Way to avoid infection.

  • SST worm uncovers user, e-mail system vulnerabilities. Fonseca, Brian // InfoWorld;02/19/2001, Vol. 23 Issue 8, p18 

    Reports that some computer viruses forced the shutdown and impairment of electronic mail servers and systems worldwide as of February 2001. Basis for the shutdown and impairment of the servers and the systems; Characteristics of the viruses.

  • Trust Me. Spangler, Todd // Interactive Week;6/11/2001, Vol. 8 Issue 23, p66 

    Presents a precaution regarding a computer virus designed to wipe out a personal computer's hard disk, masquerading as an electronic (E)-mail indicating a nude picture of singer/actress Jennifer Lopez. Value of the financial losses from viruses in the United States for 2001; Implications of the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics