Christmas in March?

Bradner, Scott
April 1999
Network World;04/05/99, Vol. 16 Issue 14, p26
Trade Publication
Describes the e-mail computer viruses, including a Christmas tree computer program and the Melissa virus. Mechanisms of action; Similarities between the two viruses; Computer system features exploited by both viruses.


Related Articles

  • SST worm uncovers user, e-mail system vulnerabilities. Fonseca, Brian // InfoWorld;02/19/2001, Vol. 23 Issue 8, p18 

    Reports that some computer viruses forced the shutdown and impairment of electronic mail servers and systems worldwide as of February 2001. Basis for the shutdown and impairment of the servers and the systems; Characteristics of the viruses.

  • Trust Me. Spangler, Todd // Interactive Week;6/11/2001, Vol. 8 Issue 23, p66 

    Presents a precaution regarding a computer virus designed to wipe out a personal computer's hard disk, masquerading as an electronic (E)-mail indicating a nude picture of singer/actress Jennifer Lopez. Value of the financial losses from viruses in the United States for 2001; Implications of the...

  • Micro organism. Brown, Andrew // New Statesman;04/09/99, Vol. 128 Issue 4431, p39 

    Comments on Melissa, a computer virus that affects e-mail programs of Microsoft Corp. How the virus acted as a spam for a list of pornographic sites; Effects of the virus.

  • Melissa Virus Spooks Users. Cheng, Kipp // MediaWeek;09/13/99, Vol. 9 Issue 34, p52 

    Offers a look at the effects of the Melissa e-mail virus. What a Web surfer should do when invaded by this virus; Utility sites; How this virus can spread.

  • A RASH OF PAIN.  // Accountancy;Jan1998, Vol. 121 Issue 1253, p40 

    Focuses on virus infected e-mail attachments. Prevention of computer virus.

  • Worm stymies e-mail systems. Meserve, Jason // Network World;12/10/2001, Vol. 18 Issue 50, p12 

    Focuses on W32/Goner-A (Goner), a computer worm that affected enterprise electronic mail systems and end-user personal computers (PC) in December 2001. Number of machines infected by the worm; Vendors' release of patches and cleaning tools; Disguise of Goner as a Windows screen saver called...

  • E-mail your way to the top! Taylor, Shirley // Manager: British Journal of Administrative Management;Sep/Oct2001, Issue 27, p10 

    Focuses on the work and experience of an administrative manager concerning electronic mails in Great Britain. Destruction of electronic mail viruses; Convenience of electronic mails in the business; Guidelines on how to compose electronic mail messages.

  • Explosive e-mail? Cassidy, William B. // Traffic World;03/09/98, Vol. 253 Issue 10, p37 

    Opinion. Reports that a computer virus is traveling through the Internet in disguise an an innocent piece of e-mail entitled `Join the Crew'. What would be the outcome if this virus is opened; Reference made to the warning issued on this virus; Suggestion that not may people know about this virus.

  • Utah tech watch. Politis, David // Enterprise/Salt Lake City;06/21/99, Vol. 28 Issue 52, p21 

    Details how the Worm.Explore.Zip computer virus is distributed through e-mail systems. Damages caused by the virus to a companies' computer files; Activation of the virus; Avoidance of the virus.

  • Protecting Yourself From Cyber Viruses. Brooke, Bob // Hispanic;Mar2000, Vol. 13 Issue 3, p56 

    Presents tips on protecting computers from viruses. Importance of updating virus program data files; Information on the use of boot disks; Electronic mail attachments to avoid.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics