Bradner, Scott
May 2000
Network World;05/15/2000, Vol. 17 Issue 20, p58
Trade Publication
Discusses the proliferation of computer viruses that takes advantage of vulnerabilities found in Microsoft Word and Exchange. Mechanism by which the LoveLetter virus were able to take advantage of some feature in Microsoft software; Vulnerabilities resulting from the root enabler feature installed by Microsoft in its software.


Related Articles

  • Melissa's kin get easy way in. Coffee, Peter // PC Week;04/05/99, Vol. 16 Issue 14, p20 

    Focuses on features in Microsoft Corp.'s Outlook 98 and Microsoft Office 2000 which will make it easier to hackers to infect computers with viruses similar to the Melissa virus which appeared in 1999. The threat from active content on Web pages; How Outlook and Office handle Active X controls;...

  • Worms Find New Ways to Snare Your PC. Johnston, Stuart J. // PC World;Nov2001, Vol. 19 Issue 11, p63 

    Discusses two strains of worms, a type of computer virus. Worm found in Microsoft MSN Messenger files, called W32/Annoying.Worm; Worm found in Adobe Acrobat files, called VBS/PeachyPDF@MM; How to remove these worms.

  • When Killing Bugs Reveals Your Data. Brandt, Andrew // PCWorld;Apr2002, Vol. 20 Issue 4, p38 

    Focuses on a feature of Microsoft Windows XP operating system and Office XP software called Application Error Reporting, which aims to give engineers information to create fixes when bugs make computers crash. Idea that the piece of memory sent with the bug report could contain a sensitive...

  • Is Outlook patch enough? Berinato, Scott; Fisher, Dennis // eWeek;05/22/2000, Vol. 17 Issue 21, p11 

    Reports on Microsoft Corp.'s release of an anti-virus patch for its Microsoft Outlook software program. Outlook users' view that the patch does not go far enough in securing the program; Users' criticism of Microsoft's response to the ILoveYou virus; Microsoft's insistence that the ILoveYou...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (UK Edition);May2005, p11 

    This section presents statistics related to cybersecurity as of May 2005. The most widespread e-mail worm, as of May 2005, is NetSky. Bagle, Mydoom, Zafi and Lovgate compete with NetSky for rankings in the top 10 computer viruses, Meanwhile, the recently announced Windows Transmission Control...

  • Windows Shell.  // SC Magazine: For IT Security Professionals (UK Edition);May2005, p15 

    This article reveals a vulnerability of Windows Shell that compromises computer security. A vulnerability in the Windows shell allows malicious code to be executed from a document with an unregistered file extension. It is enabled once Windows uses several techniques to determine what program...

  • Patch-Management Software. Fellinge, Jeff // Windows IT Pro;Oct2004, Vol. 10 Issue 12, p33 

    Reports on the importance of keeping up-to-date with Microsoft patches to avoid worms and viruses that exploit vulnerabilities in Microsoft products. Steps of manually deploying patches; Different Patch-Management tools used by various computer vendors; Capabilities of patch-management tools.

  • What is anti-virus worth? Brooks, Jason // eWeek;12/1/2008, Vol. 25 Issue 35, p48 

    The author reflects on the introduction of a free charge anti-malware product, known as Morro software, from Microsoft Corp. He presents his disagreement on the proposal of Microsoft that its newly launched anti-virus product will be free of charge, posting his idea that anti-virus licensing...

  • Defining a Computer Virus.  // Software World;Sep2004, Vol. 35 Issue 5, p3 

    This article describes the characteristics of a computer virus. In computer security terminology, a virus is a piece of program code that, by analogy with a biological virus, makes copies of itself and spreads by attaching itself to a host, often damaging the host in the process. The host is...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics