Ask Dr. Intranet

Blass, Steve
June 2000
Network World;06/05/2000, Vol. 17 Issue 23, p61
Trade Publication
Advises on how to protect oneself from electronic-mail viruses such as Melissa and ILOVEYOU. Importance of logging on to a mail server to preview and weed out e-mails on the Unix server; Effort not to use Microsoft mail clients; Need to avoid opening attachments as much as possible.


Related Articles

  • PUTTING UP VIRUS FENCES. Chen, Anne // eWeek;06/19/2000, Vol. 17 Issue 25, p65 

    Discusses measures used by corporate information technology (IT) managers to build stronger defenses against electronic mail-borne viruses. Emergence of virus protection products that can proactively evaluate the behavior of code coming from the Internet; Establishment and enforcement of...

  • 'Net Buzz. McNamara, Paul // Network World;3/1/2004, Vol. 21 Issue 9, p58 

    Discusses the need for punishing employees responsible for unleashing computer viruses onto corporate computer networks. Tendency of some employees to open up e-mail attachments; Costs of virus infections.

  • Start-up takes new anti-virus tack. Fontana, John // Network World;10/4/2004, Vol. 21 Issue 40, p17 

    This article reports that start-up Avinti is putting a virtual server twist on a well-known concept which is the quashing of viruses that use e-mail as their delivery vehicle. The company is set to unveil its isolation Server, a virus-blocking technology that uses a virtual server to open e-mail...

  • Top Ten Facts On Spam Firewalls.  // Database & Network Journal;Aug2004, Vol. 34 Issue 4, p22 

    Using a spam wall to block spam is the most advantageous and efficient way for an organization to keep unsolicited email from reaching the network, server, and end user inboxes. Spam firewalls offload spam filtering from the email server, increase server bandwidth and free up network resources....

  • Learning Lessons from Code Red. Snyder, Joel // Network World;9/10/2001, Vol. 18 Issue 37, p53 

    Focuses on security issues pertaining to the code red computer virus in the United States. Vulnerability of companies on code red computer virus infection; Issuance of security bulletins against the code red virus by Microsoft Inc.; Suggestions for the prevention of computer system infiltration...

  • Anti-virus protection needed to keep computers healthy. O'Flaherty, Kristi // Fort Worth Business Press;11/12/99, Vol. 12 Issue 29, p26 

    Discusses steps to keeping anti-virus software working against computer viruses that are introduced everyday. Network administrators' responsibility for updating virus protection programs frequently; Downloading of updates from the Internet; Affordability of anti-virus software from McAfee,...

  • Users should plan to ring in the new year with anti-virus products. Mitchell, Lori; Railsback, Kevin // InfoWorld;01/15/2001, Vol. 23 Issue 3, p48A 

    Focuses on the anti-virus products that can help companies and users protect their systems. Capabilities of Xcellent's Afaria software; Network-based solutions that can help secure one's system.

  • I Love You...Not! Britton, Randy // Business NH Magazine;Sep2000, Vol. 17 Issue 9, p19 

    Focuses on ways to protect companies against computer viruses. Shutting down of mail servers to alert employees; Suggestions for safe use of electronic mail.

  • Keeping infections at bay and your reputation intact.  // Cabinet Maker;02/09/2001, Issue 5224, p4 

    Presents the steps to prevent computer viruses from harming your business reputation. Installation of a virus protection software in the computer; Use of the Microsoft Internet Explorer as a medium; Efficiency of virus scanners in electronic mails.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics