TITLE

PREVENTING THE NEXT LOVELETTER FROM WREAKING HAVOC

AUTHOR(S)
Hoffman, Paul
PUB. DATE
May 2000
SOURCE
Network World;05/15/2000, Vol. 17 Issue 20, p67
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the prevention of computer viruses and Trojan horses. Warnings to be given to computer users when they are about to execute computer programs; Preventing systems administrators from changing security settings easily; Need to educate users about viruses and Trojan horses.
ACCESSION #
3159467

 

Related Articles

  • Love Bug Does Not Make the World Go Round. Cottle, Nathan // Chartered Accountants Journal;Jul2000, Vol. 79 Issue 6, p35 

    Presents information on the Love Letter computer virus and advice on avoiding viruses. Description of the Love virus; Reasons for the virus' quick worldwide transmission; Estimates of damages; Writing of the virus; Danger of macro viruses; Precautions that need to be taken to avoid viruses;...

  • TROJANHUNTER VERSION 3.0 RELEASED.  // Computer Security Update;Apr2003, p7 

    Reports on the release of computer trojan scanner TrojanHunter 3.0. Features of the trojan scanner; Windows platforms on which TrojanHunter can be run; Cost of the program.

  • Finding Out If You're Infected. Izhar, Avner // Certification Magazine;Nov2009, Vol. 11 Issue 11, p10 

    The article presents an answer to a question about computer virus infection.

  • Teardrops and land bugs.  // Software Magazine;Mar98, Vol. 18 Issue 4, p16 

    Deals with the `Teardrop' and `Land' computer bugs. Operating systems affected by the bugs; Concept behind the bugs; Advice in stopping the bug attacks.

  • Deloder, Lovgate worms mark perils of slack security policy. Fisher, Dennis // eWeek;3/17/2003, Vol. 20 Issue 11, p34 

    Focuses on hazards of invasion of computer viruses due to inadequate security policy. Process adopted by the viruses Deloder and Lovgate in invading computer networks; Risks involved in retaining easy-to-guess passwords; Problems faced by administrators due to invasion of viruses.

  • TECHNO. Newman, Keith // Metro (NZ);Sep2000, Issue 231, p41 

    Comments on the importance of developing strategies to combat the computer security threats caused by emerging computer viruses. Recognition of the rapid evolution and variations of the viruses; Techniques for screening out super viruses developed to activate the moment they arrive in computer...

  • Klez and Bugbear named most prolific viruses as 2002 sees rise in infected email. Ticehurst, Jo // Information World Review;Jan2003, Issue 187, p1 

    Reports on the emergence of Klez worm computer virus as the most prolific virus of 2002. Information on other computer viruses; Protection against Klez; Reason for the popularity of the virus.

  • Net Intruders.  // Christian Science Monitor;8/15/2001, Vol. 93 Issue 183, p8 

    Editorial. Comments on computer security in the wake of the Code Red virus in summer 2001, and suggests that consumers demand more secure systems.

  • ILOVEYOU DOESN'T. Gibbs, Mark // Network World;05/15/2000, Vol. 17 Issue 20, p64 

    Focuses on the proliferation of the ILOVEYOU computer worm. Differences between computer viruses and worms; Method by which the worm proliferates itself; Emergence of worm variants; Ways to prevent the spread of worms.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics