Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Need history lesson on virus'.

Status
Not open for further replies.
Aug 2, 2001
5,203
US
I'm trying to write the Ten Commandments of Safe Computing. I've covered things like keeping a good anti-virus program loaded and up to date, I've talked about critical up-dates, I've talked about spy-ware. Now I want to move onto some things most people have forgoten about. Don't use the prievew pane because it's the same as opening an e-mail. At one time someone discovered the flaw which allowed a computer to become infected just by opening an e-mail. No attachment was needed. I worked for a company of about 250 clients who loved the prieview pane, and I was kept busy. What was the name of the virus/worm, whatever it was.
Secondly, it's not a good idea to use something that keeps you constantly connected to the internet like weatherbug because there was a virus that when you viewed the sites of infected servers, you were infected. Everybody I know who ran things like weatherbug got infected. No e-mail even needed to be loaded. Does anybody remember these, the names would be good enough because I could research the details from there. (Also, if you've got any tips on safe computing, let me know. I'll post the whole thing when done. Right now the start of it is in Starting and Running a Technology Business. Thanks in advance.

Glen A. Johnson
If you're from Northern Illinois/Southern Wisconsin feel free to join the Tek-Tips in Chicago, Illinois Forum.

TTinChicago
Johnson Computers
 
VBS/BubbleBoy is the one that was caused by viewing the email in OE in the preview pane.

John
 
Two (2) other areas that many do not have on their radar:

A good HOSTS file can go a long way to keeping us away from known bad sites. A tool such as SpyBlocker (alone) provides over 30K URL blocked items (redirect to 127.0.0.1). Any risk minimizing procedure must also be protected and safeguarded from potential hijacking risks.

Scripting payloads via email or html content remains the largest silent covert risk factor possibility:

Staying away from bad places helps (HOSTS file assisted).

Researching and insisting on downloads from reputable sites is also a must (instead of just settling for the first search engine link found).

Also advisable is choosing to disable or prompt for all/most instances of scripting encounters. Associated (sanity preserving) procedures include allowing only 'trusted zone' content to execute scripts or to select a less vulnerable browser.

Other protective tools include 'kill bit' technology, email mail sanitizers (text only), and script sentries or monitors.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top