The Top Ten Email-Viruses: How to Protect Yourself from All Viruses



What are the current top ten email viruses? How does one protect his or her computer from them?. This article is going to explore it.


1.The most often reported computer virus is the Netsky/32-P. It was a mass mailing worm which spreads by e-mailing itself to addresses
obtained from local hard drives.

The worm will also copy itself to peer-to-peer shared folders as a variety of files. There are too many of them to list all here, but they are all related to popular topics, obviously designed to catch the eye of the public. Some of the files are: Adobe Photoshop10 full.exe; Britney Spears .jpg.exe; and a variety of other files with the name of the popular topics. it can also be realted with porn.

2.The next most common virus is the W32/Mytob-AS, a mass mailing worm that attaches itself to computers through e-mail attachments and network shares. Many times the sender of this virus will send e-mail attachments that will claim the recipient has an e-mail account that will be suspended. The message may say: Your Account is Suspended; Detected Online User Violation; Your Account is Suspended for Security Reasons; Warning Message: Your services near to be closed; Email Account Suspension: Notice of Account Limitation.

The Microsoft website has a patch, MSO4-011, for the vulnerability caused by the worm.

3.The next most common virus was the W32 Bagle-Zip, a worm, downloaded as an IDE file.

4.The fourth most common virus is the W32/Nyxem-D, a worm, which turns off anti-virus programs on an infected computer, sends itself to e-mail addresses on an infected computer, deletes files off the computer, and forges the sender's e-mail address. It also uses its own e-mailing engine, downloads code from the Internet; reduces system security, and installs itself in the registry.

5.The fifth most common virus is the W32/MyDoom-O, a worm. It spreads through e-mail addresses. The worm creates a file named services.exe in the Windows or Temp folder. The worm may use search engines to find more e-mail addresses to infect.
The search engines used are Google, Lycos, Yahoo, and Altavista. The worm will typically send a message to the recipient that your e-mail could not be delivered for a variety of reasons or that it has been detected that your computer has been receiving a lot of unsolicited e-mails.

6.The next most common virus is the W32Zafi-B, a worm. It is spread through e-mail and will typically test for the presence of an Internet connection by connecting to Google or the Microsoft site.

7.The seventh most common virus is the Netsky/32-D, a worm. It is spread through e-mail. It can spoof a sender's e-mail address. It will typically have a subject line starting with, Re:, followed by such subjects as: Approved; Details; Documents; Excel file; Hello; Here; Here is the document; Hi; My details; Document; Message; Your document; Re: Thanks; Thanks; Word file; Your archive; Your bill; Your details; Your letter; Your music; Your picture; Your product; Your software; Your text; Your website.

If you receive such a worm, you will be encourage to read the enclosed file, although the exact encourage may vary.

8.The eight most common virus is the W32/Mytob-C. It is spread through e-mail attachments. It allows others access to the infected computer and sends itself to e-mail addresses found on an infected computer. It forges the sender's e-mail address.

9.The ninth most common virus is the W32/Mytob-FO. It is spread through e-mail attachments. The worm turns off anti-virus software on an infected computer. It allows others access to an infected computer, modifies data on a computer, forges a sender's e-mail address, and installs itself on the registry.

10. tenth is the W32/MyDoom-O, a worm. It is spread through e-mail. It sends itself to addresses found on an infected computer. It forges a sender's e-mail address, installs itself in the registry, and exploits system or software vulnerabilities.

We have looked at some of the characteristics of the viruses. They are all spread through e-mail or e-mail viruses. So....

1.Don't open an e-mail attachment from someone you don't know. The virus would be in the attachment, not the body of the e-mail.
2.Use a high quality anti-virus program. A variety of anti-virus software programs can be downloaded from the Internet. Some of them are even free.

3.Viruses are given in a variety of other ways, including sharing diskettes between computers (Make sure you trust a person who gives you a floppy), sharing program files (a less common way to get a virus, as program files aren't shared that often anymore), and sharing document files.

There are other things you can do to protect yourself from viruses.
1.Make back ups of important documents or files and store them on separate disks. If you use a computer in a college campus lab, reboot or run cleanup before starting your session.
2.Do not share commercial software with anyone, as this is illegal and also a good way to transfer viruses.
3. Make certain any software you obtain is from a reliable source.



1 comments:

karthik said...

An information is unique.try out other topics