I went to cnn and read that this virus warning was sent out in nineteen ninety five...it has since been resolved...if you have an updated anitvirus software program....
Nullius in verba ... ☎||||||||||| ... To Fate I sue, of other means bereft, the only refuge for the wretched left. ... Hold no regard for unsupported opinion. When flower power came along I stood for Human Rights, marched around for peace and freedom, had some nooky every night - we took it serious. [Fred Wedlock, "The Folker"] Who has a spare two minutes to play in this month's FG Trivia game! ... My other OS is Slackware.
Only so long as fifty panicked dimwits^h^h^h^h^h^h^h^h uninformed persons don't instantly fire it off to their entire address book list. They do, believe me, they do.
Nullius in verba ... ☎||||||||||| ... To Fate I sue, of other means bereft, the only refuge for the wretched left. ... Hold no regard for unsupported opinion. When flower power came along I stood for Human Rights, marched around for peace and freedom, had some nooky every night - we took it serious. [Fred Wedlock, "The Folker"] Who has a spare two minutes to play in this month's FG Trivia game! ... My other OS is Slackware.
spot;613501 wrote: Only so long as fifty panicked dimwits^h^h^h^h^h^h^h^h uninformed persons don't instantly fire it off to their entire address book list. They do, believe me, they do.
:wah: :wah: Jim has just been telling the kids all about the virus, not to open the message and how it could go to their friends address'
I am nobody..nobody is perfect...therefore I must be Perfect!
SuzyB;613512 wrote: :wah: :wah: Jim has just been telling the kids all about the virus, not to open the message and how it could go to their friends address'
Hiya Suzy. You've not given him his daily spanking yet, then? Think of it as medicinal.
Nullius in verba ... ☎||||||||||| ... To Fate I sue, of other means bereft, the only refuge for the wretched left. ... Hold no regard for unsupported opinion. When flower power came along I stood for Human Rights, marched around for peace and freedom, had some nooky every night - we took it serious. [Fred Wedlock, "The Folker"] Who has a spare two minutes to play in this month's FG Trivia game! ... My other OS is Slackware.
Next time you're passing through Devon there's a guy I'd like you to meet.
Nullius in verba ... ☎||||||||||| ... To Fate I sue, of other means bereft, the only refuge for the wretched left. ... Hold no regard for unsupported opinion. When flower power came along I stood for Human Rights, marched around for peace and freedom, had some nooky every night - we took it serious. [Fred Wedlock, "The Folker"] Who has a spare two minutes to play in this month's FG Trivia game! ... My other OS is Slackware.
spot;613501 wrote: Only so long as fifty panicked dimwits^h^h^h^h^h^h^h^h uninformed persons don't instantly fire it off to their entire address book list. They do, believe me, they do.You're talking about me are'nt ya?
abbey;613535 wrote: You're talking about me are'nt ya?
Only the once, Abbey. You make up for it in other ways.
Sing, Heavenly Muse... maybe this'll help. I'm inspired to write for you the briefest, most useful and above all essential guide to computer security unattempted yet in prose or rhyme.
Spot's Guide To Email Hoaxes About Computer Security As At May 2007.1. Your computer, be it what it may, Mac, Microsoft, Linux or Other, has code running on it from the moment you feed it power.1.1. Much of this is the Operating System (often called XP or Vista), bits might be the word processor (eg Microsoft Office Word) or web browser (eg Internet Explorer).1.1.1. All of these programs have built-in permission to read your personal information, watch you type and transmit to other computers.
1.1.2. All of them have security loopholes, some of which are discovered, some of which are unknown. Fixes (or "patches") come out monthly for the bigger program types. These are so essential that the default on your computer it to apply them as soon as the fixes are announced, without you asking for it to happen.
1.1.3. These security loopholes can only be infiltrated from outside your home by way of your internet connection. What infiltrates typically inherits permission to read your personal information, watch you type and transmit to other computers from the program that let it in. The thing which stops infiltration is called a Firewall. If you don't use one, or you merrily click "allow" every time you're asked for permission to pass through it, you need remedial treatment immediately. Last time I checked it took an average of about one minute for a genuine security breach to be made after turning a firewall off and being directly open to the internet.1.2. Any new program which is permitted to run on your computer can introduce new loopholes.1.2.1. Viruses or Trojans are designed to introduce new security loopholes and then to offer themselves to other computers.
1.2.2. A new virus or trojan program can only be run on your computer if you have no virus checker and:1.2.2.1. You have an unpatched system with a known security hole (or, wildly improbably, the attacker knows an unknown security hole) and a computer outside your home tells your computer to accept a copy of itself.
1.2.2.2. You bring in a virus-carrying program from outside your home and you tell your computer to run it.
1.2.2.3. Someone emails you a virus-carrying program and you tell your computer to run it.1.2.3. The thing which stops known Viruses and Trojans from being permitted to run on your computer is called a Virus Checker. If you don't use one, or you disable it every time you're puzzled by events, you need remedial treatment immediately.1.3. There are several choices of firewall and virus checker. Some are better than others. Any of them is so close to perfect, compared to not having one of them, that the question of which to use is immaterial until you're actually using one of each to start with.
1.4. Assuming you've managed to get past 1.3. and you have a firewalled virus-scanned virus-protected computer, here (finally) is the story about emails.1.4.1. An email is no more of a risk to you than the rest of the outside world.
1.4.2. Warning anybody about an email-spread virus is pointless. If they have a firewall and a virus-checker already, they're protected from it already. If they don't, they're wide open to attacks across the Internet itself and the occasional viral email is the least of their problems.
1.4.3. The warning about an email-spread virus (called a virus hoax email) is itself harmlessly viral. It has spread as far as you, after all. You're about to spread it to someone else. The fact that it has no malign intent doesn't stop the spreading of it from being antisocial. If you spread warnings about viruses by email for the protection of those on your address book, you're helping nobody at all, you're giving them a false sense of confidence.
1.4.4. If you think that getting warnings about viruses by email is your protection, you need remedial treatment immediately.
Nullius in verba ... ☎||||||||||| ... To Fate I sue, of other means bereft, the only refuge for the wretched left. ... Hold no regard for unsupported opinion. When flower power came along I stood for Human Rights, marched around for peace and freedom, had some nooky every night - we took it serious. [Fred Wedlock, "The Folker"] Who has a spare two minutes to play in this month's FG Trivia game! ... My other OS is Slackware.
SuzyB;613569 wrote: I was doing ok til I got to 1.1.1.
1.1.1. is where you're *meant* to wet yourself in terror.
Nullius in verba ... ☎||||||||||| ... To Fate I sue, of other means bereft, the only refuge for the wretched left. ... Hold no regard for unsupported opinion. When flower power came along I stood for Human Rights, marched around for peace and freedom, had some nooky every night - we took it serious. [Fred Wedlock, "The Folker"] Who has a spare two minutes to play in this month's FG Trivia game! ... My other OS is Slackware.