June 1993
Macworld;Jun93, Vol. 10 Issue 6, p73
Gives information on several computer viruses. T4-C virus; Variant of the CDEF virus; CPro trojan horse virus; Virus type; Date identified in Virus Watch column; Profile of virus; Potential damage to computer system.


Related Articles

  • The PC corner: Computer viruses. Kratofil, Bruce // Business Economics;Jan1990, Vol. 25 Issue 1, p52 

    Discusses computer viruses. Harmfulness of computer viruses; Ways of transmitting a virus; Preventive measures against computer virus attacks.

  • The virus from e-mail is not what you think. Dyril, Odvard Egil // Technology & Learning;Apr98, Vol. 18 Issue 8, p42 

    Presents information on computer viruses focusing on what the e-mail message virus, `Join the Crew' can do to computer hard drives. How the virus operates; What a computer virus is; Information on e-mail hoaxes; Detailed information on how to protect against such viruses.

  • Virus reports average 58 per month.  // Computing Japan;Jan1997, Vol. 4 Issue 1, p11 

    Points out the increase in the number computer virus infections reported in Japan from January to September 1996. Data from the nonprofit organization, Information Technology Promotion Agency (IPA); Sources of most infections; Top computer viruses; Contact information.

  • Costly computer Gremlins sneak back. Belsie, Laurent // Christian Science Monitor;4/2/96, Vol. 88 Issue 88, p4 

    Reports on the prevalence of viruses in the United States. Examination of computer viruses; Discussion of a survey involving 300 companies; Negative consequences of encountering a virus.

  • Ask Mr. Technology. Huber, Joe // Technology Connection;Nov96, Vol. 3 Issue 7, p47 

    Answers a question on a computer virus problem that affects the master boot record. Effectiveness of the F-PROT program for locating and cleaning viruses.

  • Fighting the battle against computer viruses.  // New Hampshire Business Review;9/29/95, Vol. 17 Issue 20, p6A 

    Features a reprint of an article that appeared in the September 1995 issue of `StepAhead,' a newsletter published by NYNEX regarding suggestions on how to fight computer viruses. Definition of a computer virus; Misconceptions; Protection of computer system; Frequency of checking system for viruses.

  • Tricky worm triggers new P2P alarms. Messmer, Ellen // Network World;5/19/2003, Vol. 20 Issue 20, p1 

    Reports on the discovery of a computer worm called Fizzer sneaking into U.S. corporate networks via the Kazaa peer-to-peer program. Concerns about the risks of file-sharing networks; Decision of many companies to ban peer-to-peer applications.

  • Computer virus update: Newer strains defy experts. Belsie, Laurent // Christian Science Monitor;3/3/95, Vol. 87 Issue 67, p3 

    Informs about the Michelangelo virus which becomes active on the Italian artist's birthday which falls on March 6. Precautionary measures taken by business community; Information about the biggest virus threat Natas.

  • Virus watch. Littman, Dan; Moran, Tom // Macworld;Dec1992, Vol. 9 Issue 12, p177 

    Alerts Mac users to current viruses, Trojan horses, and worms. T4-A, T4-B, virus, damages system files and applications; ChinaTalk, Trojan horse, deletes the contents of disk drive on restart; INIT 1984, virus, destroys files and changes file and folder names and attributes to random garbage;...

  • The virus that fizzled.  // Australian Personal Computer;Oct96, Vol. 17 Issue 10, p24 

    Focuses on the media's exaggeration of the Krsna memory-resident and polymorphic computer virus, which was detected in Australia in June 1996. Impact of the virus on Internet service provider OzEmail; Antivirus company Cybec's disinfection of affected systems; Profile of a virus writer;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics