Results 1 to 6 of 6

Thread: How to block hoax messages

  1. #1
    Join Date
    Nov 2009
    Posts
    824

    How to block hoax messages

    Hi,
    With the ever increasing number of viruses (worms, Trojan horse, etc. I would say that a brief reminder of basic rules for avoiding contamination would be useful.The virus can be define as a program hidden in another run and can reproduce by infecting other programs or other computers. I have noticed some hoax messages in my email. Why they are sent. Other than a Trojan or worm what are the other more threats. How you classify this.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How to block hoax messages

    If you go on to read about Virus families then you will get more information on it. There are four major families of viruses. The first is Worms, they can spread through the network. Then comes the Trojan horses or Trojans creating loopholes in a system, Logic bombs are running after a system event and the hoax of hoaxes that are sent by mail. Different types of tools are available to clear this viruses.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: How to block hoax messages

    Damage ranged from a simple program that displays a message to the destruction of the motherboard via the display program that formats the hard drive after being multiplied. Viruses are not classified according to the damage they cause but in their mode of propagation and multiplication. A worm is a program that can replicate and move on the network without user intervention. They grow primarily through the mail by identifying all contacts. It is then sent as an attachment to them. To be infected the user opens the attachment, or no risk.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: How to block hoax messages

    A worm can be linked to any file. Files with extension txt, jpg, gif, bmp, avi, etc are an nice example. This can contain viruses but you are safe till they are not executed at the opening. However, the exe, com, bat, Vbs, etc are virus infected. Note also the files containing macros VB (Word, Excel, Power Point ...). They are easily infected and infected but are often considered harmless what is wrong (unless it was disabled macros in related programs).

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: How to block hoax messages

    Trojans are computer programs hidden in others. Trojans are creating a gateway on the machine so that the creator of the Trojan can then hack into the machine. It can also steal passwords, copy data, execute malicious actions. There are certain symptoms that allow their detection: the machine is connected to network and exchange data while it does nothing, curious reactions of the mouse, opening programs automatically, repeatedly crashes.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: How to block hoax messages

    Logic bombs are devices programmed with a trigger occurs at a time determined by exploiting the system date, the launch of an order or any system call. While conditions were not met, these viruses are difficult to locate if not impossible. Hoax are sent by mail hoaxes. They is no harmful action on the machine but clogging networks because of their mass propagation. Moreover, they overload our mailboxes and spreading disinformation.

Similar Threads

  1. Replies: 6
    Last Post: 30-04-2012, 12:30 PM
  2. What Is a Computer Hoax?
    By jaykant in forum Networking & Security
    Replies: 3
    Last Post: 30-08-2011, 09:05 PM
  3. Replies: 4
    Last Post: 21-02-2011, 08:18 PM
  4. what jdbgmgr.exe Virus Hoax
    By Graciano in forum Networking & Security
    Replies: 3
    Last Post: 03-02-2010, 07:01 AM
  5. Description on virus Hoax
    By Bansi_WADIA in forum Networking & Security
    Replies: 3
    Last Post: 05-12-2009, 12:33 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,718,530,896.19495 seconds with 17 queries