Viruses and All about them

Discussion in 'Archives' started by Macroman, Jul 20, 2007.

Viruses and All about them
  1. Unread #1 - Jul 20, 2007 at 7:13 PM
  2. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    [​IMG]

    Helpfull Links
    http://www.learnthenet.com/ENGLISH/html/79secure.htm
    http://www.cert.org/tech_tips/home_networks.html



    free Anti- Virus software
    http://www.norton-antivirus-2007.ne...a5c-b89b-8b5740ff0bee&track=AUnortonantivirus
    http://www.avast.com/eng/avast_4_home.html
    http://spybot-now.com/index.asp?kbid=1459&sub=gg_spybot_au
    http://www.pandasecurity.com/homeusers/downloads
    http://www.grisoft.com/




    It seems like each and every day I get an e-mail or two about the latest and most deadly virus to date. Since there are thousands of viruses out there, it would be impossible to watch out for all of them. So, I'm going to give you some general virus guidelines that you can use to help keep yourself from getting infected. It's like that old saying, "Type code for a man and get his program running for a day. Teach him C++ and get his programs working for life".

    Ok, maybe that's not the *exact* way that one goes, but you get the idea.

    What is a virus anyway?

    A virus is an unwanted program that, in almost all cases, the user accidentally installs onto his or her computer. Some are relatively harmless and cause little, if any, damage. Some are much more hazardous and can render the information on your computer's hard drive useless. Most just like to try to share your information, crash your computer, and spread themselves around.

    So why do people make viruses?

    Well, some (maybe most) do it just to see if they *can* do it. Some are genuinely looking to cause havoc. Others, and these are the ones to watch, are trying to get personal information from you. Many of the viruses out there are used to send their creator information from your computer via e-mail. Sure, there are more than just those 3 reasons, but I believe those to be the primary ones.

    A day in the life of a virus

    Since most of the viruses that give people trouble tend to be in the form of e-mail viruses, I'm going to give you the low down on how most of these puppies work with our computer buddy, "Jim".

    Let's say Jim goes to work and checks his e-mail like he always does. He notices an e-mail from someone he knows with an attachment. The e-mail says something generic like "Hey, check out this attachment, it's really cool".

    In all likelihood, there will be no signature (although there could be).

    So, old Jim clicks the little paperclip icon and runs the attachment. It probably ends in ".exe" or ".zip".

    Maybe he gets a cute little display on his screen (the Happy99 virus gave the user a fireworks display). Jim thinks "Hmm, that was cool" and gets back to work, completely unaware that he has been infected.

    Now the virus goes to work. The first thing it will probably do is get into his address book and send itself to everyone in it. When these people get the e-mail virus, it looks like their friend Jim has just sent them a cool little file to check out. Old Jim doesn't have a clue that this has even transpired but now all his friends are opening up this little file and infecting their own computers (and sending it out to everyone in their address books). Do you see how these things can infect millions of computers in a hurry?

    Another route the virus can take is to send a second e-mail with itself attached to anyone you are sending a message to. For instance, say you send Jim a message. Jim checks his e-mail and sees your message plus another message from the virus that you didn't even know you sent.

    A quick way to check and see if you are infected with this type of "piggy back" virus is to send yourself an e-mail. If you get a second e-mail with an attachment, you're infected (note - this only works for viruses that spread themselves as described above).

    Another way these e-mail themselves is by choosing an address from your address book as the "from" person (The Klez virus does this). So, it looks like one of Jim's friends is sending out viruses form their computer, but it's really coming from his machine.

    Jim's friend then gets lots of e-mail from people telling him that he's sending out viruses! Of course, he's not, but Jim is. (In addition, Jim may get an earful from this (now former) friend once he figures out what happened!)

    OK, I now what you may be thinking. Maybe you have 500 people in your address book and it seems like you would notice that there was an excessive amount of e-mail going out when you send / receive.

    Well, you may with some viruses, but the smarter ones have an "SMTP" engine built in. Simply put, they can send e-mail from your computer without using your e-mail software or server. This is done is the background and may seem like nothing more than a sluggish internet connection.


    Also from :
    http://www.worldstart.com/guides/virus1.htm



    What are viruses, worms, and Trojan horses?
    Published: 3/9/2004
    * *
    Related Links
    • Antivirus software: frequently asked questions
    • More articles about preventing viruses
    • Virus alert center
    * *

    Return to sender

    Recent security threats, such as MyDoom, have spread through e-mails disguised as e-mail error messages that look familiar.The attached file appeared to be the text of a message you might have sent to the wrong address, but if you opened it you fell victim to the virus. No matter how authentic an e-mail appears to be, make sure you know the contents of the attachment before you open it.

    Help protect against viruses, worms, and Trojan horses

    Although viruses, worms, and Trojan horses have very different characteristics, there are three main ways you can help protect yourself against all of them.

    Step 1: Never open an e-mail attachment from a stranger.

    Step 2: Never open an e-mail attachment from someone you know, unless you know exactly what the attachment is.

    Step 3: Always keep your antivirus software up-to-date.

    Step 4: Keep your Microsoft software current with these online resources:
    •

    Microsoft Windows Update (for Windows and Internet Explorer)

    •

    Microsoft Office Update (for Office products, such as Microsoft Word, Excel, and PowerPoint)
    Illustration of viruses, worms, Trojan horses

    Viruses, worms, and Trojan horses are malicious programs that can cause damage to your computer and information on your computer. They can also slow down the Internet, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the Web. The good news is that with an ounce of prevention and some good common sense, you are less likely to fall victim to these threats.

    Read on to learn about the characteristics and differences of viruses, worms, and Trojan horses.
    On This Page
    What is a virus? What is a virus?
    What is a worm? What is a worm?
    What is a Trojan horse? What is a Trojan horse?
    How do worms and other viruses spread? How do worms and other viruses spread?
    How can I tell if I have a worm or other virus? How can I tell if I have a worm or other virus?
    Next steps: Reduce your virus risk Next steps: Reduce your virus risk
    What is a virus?
    Illustration of a virus

    A virus is a piece of computer code that attaches itself to a program or file so it can spread from computer to computer. It infects as it travels. Viruses can damage your software, your hardware, and your files.

    Virus (n.) Code written with the express intention to replicate itself. A virus attaches itself to a host program and then attempts to spread from computer to computer. It might damage hardware, software, or information.

    Just as human viruses range in severity from Ebola to the 24-hour flu, computer viruses range from the mildly bothersome to the downright destructive. The good news is that a true virus does not spread without human action. Someone must share a file or send an e-mail to move it along.
    Top of pageTop of page
    What is a worm?
    Illustration of a worm

    A worm, like a virus, is designed to copy itself from one computer to another, but it does so automatically. First, it takes control of features on the computer that can transport files or information. Once a worm is in your system, it can travel alone. A great danger of worms is their ability to replicate in great volume. For example, a worm could send out copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. When new worms are unleashed, they spread very quickly. They clog networks and possibly cause a long wait for you (and everyone else) to view Web pages on the Internet.

    Worm (n.) A subclass of virus. A worm generally spreads without user action and distributes complete copies (possibly modified) of itself across networks. A worm can consume memory or network bandwidth, which can cause a computer to crash.

    Because worms don't need to travel via a "host" program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely. Recent examples of worms included the Sasser worm and the Blaster worm.
    Top of pageTop of page
    What is a Trojan horse?
    Illustration of a Trojan horse

    Just as the mythological Trojan horse appeared to be a gift, but turned out to contain Greek soldiers who overtook the city of Troy, today's Trojan horses are computer programs that appear to be useful software, but instead they compromise your security and cause a lot of damage. A recent Trojan horse came in the form of an e-mail that included attachments that claimed to be Microsoft security updates, but turned out to be viruses that attempted to disable antivirus and firewall software.

    Trojan horse (n.) A computer program that appears to be useful but that actually does damage.

    Trojan horses spread when people are lured into opening a program because they think it comes from a legitimate source. To better protect users, Microsoft often sends out security bulletins via e-mail, but they never contain attachments. We also publish all our security alerts on our Security Web site before we e-mail them to our customers.

    Trojan horses can also be included in software that you download for free. Never download software from a source that you don't trust. Always download Microsoft updates and patches from Microsoft Windows Update or Microsoft Office Update.
    Top of pageTop of page
    How do worms and other viruses spread?

    Virtually all viruses and many worms cannot spread unless you open or run an infected program.

    Many of the most dangerous viruses were primarily spread through e-mail attachments—the files that are sent along with an e-mail message. You can usually tell if your e-mail includes an attachment because you'll see a paperclip icon that represents the attachment and includes its name. Photos, letters written in Microsoft Word, and even Excel spreadsheets are just some of the file types you might receive through e-mail each day. A virus is launched when you open an infected file attachment (usually you double-click the attachment icon to open an attachment).
    Tip

    Tip: Never open anything that is attached to an e-mail unless you expect the attachment and you know the exact contents of that file.

    If you receive an e-mail with an attachment from someone you don't know, delete it immediately. Unfortunately, sometimes it’s not even safe to open attachments from people you do know. Viruses and worms have the ability to steal information out of e-mail programs and send themselves to everyone listed in the address book. So, if you get an e-mail from someone with a message you don't understand or a file you didn’t expect, always contact the person and confirm the contents of the attachment before you open it.

    Other viruses can spread through programs you download from the Internet or from virus-ridden computer disks that you borrow from friends or even buy in a store. These are less common ways to contract a virus. Most people get viruses if they open and run unknown e-mail attachments.
    Top of pageTop of page
    How can I tell if I have a worm or other virus?

    When you open and run an infected program, you might not know you've contracted a virus. Your computer might slow down or crash and restart every few minutes. Sometimes a virus attacks the files you need to start up a computer. In this case, you might press the power button and find yourself staring at a blank screen.

    All of these symptoms are common signs that your computer has a virus—although they could also be caused by hardware or software problems that have nothing to do with a virus.

    Beware of messages that indicate you sent e-mail that contained a virus. This might mean that the virus has listed your e-mail address as the sender of a tainted e-mail. This does not necessarily mean you have a virus. Some viruses have the ability to forge e-mail addresses.

    Unless you have up-to-date antivirus software installed on your computer, there is no sure way to know if you have a virus or not. If you don't have current antivirus software or if you want to install a different brand of antivirus software, visit our Security software downloads page.
    Top of pageTop of page
    Next steps: Reduce your virus risk

    Nothing can guarantee the security of your computer 100 percent. However, you can continue to improve your computer's security if you keep your software up to date and maintain a current antivirus software subscription.

    http://www.microsoft.com/middleeast/athome/security/viruses/virus101.mspx



    Anti-virus software and other preventive countermeasures

    There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms’ have yet to create a signature for.

    Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.

    One may also prevent the damage done by viruses by making regular backups of data (and the Operating Systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus. Likewise, an Operating System on a bootable can be used to start the computer if the installed Operating Systems become unusable. Another method is to use different Operating Systems on different file systems. A virus is not likely to affect both. Data backups can also be put on different file systems. For example, Linux requires specific software to write to NTFS partitions, so if one does not install such software and uses a separate installation of MS Windows to make the backups on an NTFS partition (and preferably only for that reason), the backup should remain safe from any Linux viruses. Likewise, MS Windows can not read file systems like ext3, so if one normally uses MS Windows, the backups can be made on an ext3 partition using a Linux installation.

    [edit] Recovery methods

    Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

    [edit] Virus removal

    One possibility on Windows XP is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files. Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt. An examples virus that does this is CiaDoor.

    Administrators have the option to disable such tools from limited users for various reasons. The virus modifies the registry to do the same, except, when the Administrator is controlling the computer, it blocks all users from accessing the tools. When an infected tool activates it gives the message "Task Manager has been disabled by your administrator.", even if the user trying to open the program is the administrator.

    [edit] Operating system reinstallation

    As a last ditch effort, if a virus is on your system and anti-viral software can't clean it, then reinstalling the operating system may be required. To do this properly, the hard drive is completely erased (partition deleted and formatted) and the operating system is installed from media known not to be infected. Important files should first be backed up, if possible, and separately scanned for infection before erasing the original hard drive and reinstalling the operating system.

    http://en.wikipedia.org/wiki/Computer_virus#Vulnerability_and_countermeasures

    How to protect your computer from virii and spyware (for FREE)
    By D.W.

    Are you getting unexplained pop-ups or advertising?
    Are you ready to call your favourite technically inclined family member?
    Do you just want to learn more about fixing your own computer?

    There are 3 simple steps to protecting and repairing your computer from virii and spyware.

    Step 1: Uninstall ad-serving programs with Add/Remove

    Many programs such as Kazaa or other freeware are ad-supported. That means they display ads in order to support their program and the designers earn when you click them. To avoid being listed in anti-spyware and anti-virus software, ad-supported programs will sometimes install additional advertising programs in a “legitimate” fashion. That is, they won’t TELL you the programs are installed but they can be removed with the standard Add/Remove method so they aren’t considered “spyware”.

    1. Browse to your Windows® Control Panel.
    2. Click Add/Remove Programs
    3. Go through your list of installed programs one-by-one. If you do not recognize a program try a Google search for the program name to determine if it is ad-ware.
    4. If you find a pop-up or other advertising serving program, click Remove or Uninstall to remove it. Note that this can break your ad-supported program and you should probably find a better, non ad-ware solution.

    Step 2: Install and run anti-spyware programs regularly

    I use two FREE anti-spyware programs. Lavasoft Ad-Aware and Spybot - Search & Destroy.

    * To download Ad-Aware Personal, Click Here
    * To download Spybot - Search & Destroy, Click Here

    Once the programs are installed your chore is to scan about once a month or whenever you notice problems. I like to scan with BOTH programs, just in case.

    To scan for and remove spyware with Ad-Aware:

    1. Install the program.
    2. Load Ad-Aware from the desktop or Start -> Programs -> LavaSoft -> Ad-Aware. If when loading Ad-Aware you see messages such as “Check for Updates” or “Install new build #012345″ click “Yes” or “OK”.
    3. If you were not prompted to check for or install new updates, do it manually. It is VERY important for you to update before each and EVERY scan of your computer. On the Ad-Aware main program page, at bottom right above the “Start” button, you will see a link for “Check for updates”. Click it then click “Connect” to download and install updates until you can click “Finish”.
    4. Scan your computer, click “Start”. Leave the scan mode on the default “Perform smart system scan” and click “Next”. The program will start an exhaustive search of your system for known spyware.
    5. When scanning if you see entries coming up under any of the “Critical” sections, Ad-Aware has found some spyware to remove!
    6. When the scan is complete, click “Next” to view the results.
    7. To remove found spyware you must check the box next to it. “Tracking Cookies” are not generally dangerous, but it’s up to you… If you have a large number of “critical” results, you may simply want to Right-Click -> Select All Objects. When you’ve selected the entries to remove, click “Next”, then “OK” to remove the selections.
    8. Your scan and removal with Ad-Aware is complete! You can scan again if you want to double-check that critical objects were removed. Otherwise, go ahead and close the program.

    To scan for and remove spyware with Spybot - Search & Destroy:

    1. Install the program.
    2. Load Spybot - Search & Destroy from the desktop or Start -> Programs>/i> -> Spybot- Search & Destroy -> Spybot - Search & Destroy. The first time you load Spybot - Search & Destroy you will be prompted to make a backup of your registry. Do so. You will also be asked to “Search for Updates”. Click “Download All Updates.
    3. If you were not prompted to check for or install new updates, do it manually. It is VERY important for you to update before each and EVERY scan of your computer. On the Spybot - Search & Destroy main program page click “Search for updates”. If any updates are found, check the box next to them and then click “Download Updates” to install them.
    4. Scan your computer. If you are still in the “Update” tab, click “Search & Destroy” on the left menu, then click “Check for problems”. The program will start an exhaustive search of your system for known spyware.
    5. Spybot - Search & Destroy will automatically flag problems. Simply click “Fix Selected Problems” to remove found spyware.
    6. Your scan and removal with Spybot - Search & Destroy is complete! You can scan again if you want to double-check that critical objects were removed. Otherwise, go ahead and close the program.

    Step 3: Install and run an anti-virus program regularly

    An excellent FREE antivirus package is AVG Antivirus. To download it Click Here

    To scan for and remove virii with AVG Antivirus:

    1. Install the program.
    2. Make sure the “Resident Shield” feature is enabled. To do this, open the AVG “Control Center”. Click on “Resident Shield”. At the bottom right of the window click “Properties”. Make sure the feature is enabled and set the options as you like. I use “Scan infectable files” and “Use heuristic analysis”. The “Resident Shield” feature is very useful, as it scans files on-the-fly, as you open them. Just before any .EXE (program) executes it is scanned by AVG antivirus automatically for your protection.
    3. Schedule regular updates and/or a routine system scan. In the Control Center click “Scheduler”, then “Scheduled Tasks” near the bottom of the window. Choose the task “Update plan in Basic mode” and click “Edit Schedule”. Enable the feature and set the time you would like automatic updates to be downloaded and applied. These updates will allow you to be protected from the latest virii.

    There you have it! You have the programs and step-by-step instructions you need to clean yourself of any unwanted bugs! Send this to your family, friends or anyone else who is constantly bugging you about spyware. :)

    http://dwtips.com/2006/07/02/how-to-protect-your-computer-from-virii-and-spyware-for-free/

    There are dozens of things that you can do to protect your computer. People sell so many software packages and information products you may not be able to get a handle on all of it. Have you wondered to yourself what the basics are so that you can protect your identity and your data and so that you no longer have to worry?

    I am not sure if we will ever get to a point that a computer security solution is perfect and we never have to worry but we can get to a point of an increased security posture. That just means that we can take a few steps to help protect ourselves against the not so nice people in the world.

    First if you have a computer you should turn on a local firewall.

    You may say, I am working behind one of those routers you can purchase from the electronics store, I am safe. There is a term in the field that is called defense in depth. There are many takes on what this actually means and how to implement it but I will be the first to tell you every extra security precaution you can take will be helpful in the effort to protect your identity and your data.

    Each layer of defense will add to your protection. You may have a router but go ahead and turn on that software firewall that comes with your operating system too. Learn more about your computer so that you can be proactive. You never know when you might travel with that laptop and your software firewall saves you from an intrusion. Just be cautious. Most people lock their doors at night before they go to bed or when they leave for work in the morning. Don’t forget to lock the doors on your computer.

    Second, you may consider installing a well proven anti-virus product.

    There are many packages on the market. Some you can get for free and others you can pay for. You need to determine your level of knowledge and how much support you may require.

    There are many anti-virus vendors that are free that have been certified and protect your systems just as well as the pay for kind. The main difference is that you may get better support from the pay for kind. You may end up supporting the free kind on your own and having to do research on the net for answers. This is truly your call and should be congruent to your level of computer knowledge.

    Anti-virus software should be a must. It has saved my system many times as well as friends of mine. I had a buddy that downloaded pictures form a digital camera that was infected with a virus. They can be anywhere. This is just another layer of defense you should consider in your quest to protect your identity and your data.

    Third, you should consider backing up your system regularly.

    I am not talking about once a year either. I am talking about using CD, DVD, or an external hard drive and backing up your data daily, weekly, or at least monthly. This may not necessarily be a defense but it is a proactive measure that could save you tons of money and time.

    I have known several people who have inadvertently gotten a virus on their computer lost tons of data and information such as pictures and music which were priceless and irreplaceable. They were able to save their data because they backed it up regularly. They may have lost a few days worth of data but they retrieved most of it back. They were quickly able to perform a desktop restore and get 90% of their data back.

    Now, one consideration is that if your data changes regularly you may want to consider backing up your data on a more frequent basis. The reason for this is if you have to perform a system restore or a file restore you want to be able to retrieve the most current data possible. Anyone out there can do this. There is backup software all over the web and 9 times out of 10 your computer probably has backup software built in that you can use for free.

    The bottom line is that you should take measures to protect your data the same way you would protect your house or car. We too many times implement this on the physical world but forget to do the same for the digital world. There is a ton of information available for you to improve your knowledge and understanding of computer systems and how to protect your data and your identity. Don’t become a statistic. Protect your data today.

    Imagine having the ability to schedule a backup and walk away knowing your data is being protected nightly. Learn how to use a computer backup system, find out how to backup files, and find out how to protect your data. Joseph Simcic has written an easy to read eBook that you can download now and start learning how to backup your computer.

    Article Source: http://EzineArticles.com/?expert=Joseph_Simcic
     
  3. Unread #2 - Jul 20, 2007 at 7:17 PM
  4. Annex
    Joined:
    Aug 28, 2005
    Posts:
    2,324
    Referrals:
    3
    Sythe Gold:
    0
    UWotM8?

    Annex Ballin'
    Veteran (Ex-Admin)
    PHP Programmers Retired Administrator

    Viruses and All about them

    oh my people have so much to learn about virii
     
  5. Unread #3 - Jul 20, 2007 at 7:36 PM
  6. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    Im guessing that was sarcastic
     
  7. Unread #4 - Jul 23, 2007 at 6:51 AM
  8. Osmosis
    Joined:
    Apr 29, 2005
    Posts:
    2,695
    Referrals:
    2
    Sythe Gold:
    0

    Osmosis Retired Australian Mod
    Banned

    Viruses and All about them

    virii is plural.
     
  9. Unread #5 - Jul 23, 2007 at 7:14 AM
  10. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    That explains allot and you just extended my vocabulary.
     
  11. Unread #6 - Jul 23, 2007 at 9:46 AM
  12. The End
    Joined:
    Dec 10, 2005
    Posts:
    397
    Referrals:
    0
    Sythe Gold:
    0

    The End Forum Addict

    Viruses and All about them

    some programmers make virii for money/self gain but some still do it for other reasons, and you should go in-depth about other things like malware/trojans/worms :D
     
  13. Unread #7 - Jul 24, 2007 at 3:43 AM
  14. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    Happy?
     
  15. Unread #8 - Jul 24, 2007 at 7:25 AM
  16. I Iced I
    Joined:
    Apr 16, 2007
    Posts:
    353
    Referrals:
    0
    Sythe Gold:
    0

    I Iced I Forum Addict

    Viruses and All about them

    Yep, nice guide.. My vocabulary now consists of the words i just typed and virii, ty.
     
  17. Unread #9 - Jul 28, 2007 at 7:40 AM
  18. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    lets try sticking on topic
     
  19. Unread #10 - Jul 28, 2007 at 8:19 PM
  20. Blupig
    Joined:
    Nov 23, 2006
    Posts:
    7,145
    Referrals:
    16
    Sythe Gold:
    1,609
    Discord Unique ID:
    178533992981594112
    Valentine's Singing Competition Winner Member of the Month Winner MushyMuncher Gohan has AIDS Extreme Homosex World War 3 I'm LAAAAAAAME
    Off Topic Participant

    Blupig BEEF TOILET
    $5 USD Donor

    Viruses and All about them

    Nice guide here. You could add so much more, look on wikipedia and such so you can add.
     
  21. Unread #11 - Jul 29, 2007 at 10:04 AM
  22. ellsworthz
    Joined:
    Jan 21, 2007
    Posts:
    1,361
    Referrals:
    1
    Sythe Gold:
    0

    ellsworthz Guru
    Do Not Trade

    Viruses and All about them

    perdy good guide, helped me some.
     
  23. Unread #12 - Jul 31, 2007 at 1:48 PM
  24. dragon scimitar
    Joined:
    Jul 6, 2007
    Posts:
    108
    Referrals:
    0
    Sythe Gold:
    0

    dragon scimitar Active Member

    Viruses and All about them

    thanks, ill check if i got one..... iv been running a lil slow lately
     
  25. Unread #13 - Sep 2, 2007 at 2:21 AM
  26. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    Doing that now.
     
  27. Unread #14 - Sep 2, 2007 at 7:44 AM
  28. unkn0wn
    Joined:
    Feb 25, 2006
    Posts:
    473
    Referrals:
    0
    Sythe Gold:
    0

    unkn0wn Forum Addict
    Banned

    Viruses and All about them

    Thanks for educating a complete newbie about viruses :D
     
  29. Unread #15 - Sep 2, 2007 at 8:00 AM
  30. pur3 st4k3r
    Joined:
    Jul 9, 2007
    Posts:
    550
    Referrals:
    0
    Sythe Gold:
    0

    pur3 st4k3r Forum Addict
    Do Not Trade

    Viruses and All about them

    i didnt really understand but i need to know about them and the affects so thanks
     
  31. Unread #16 - Sep 30, 2007 at 9:27 AM
  32. Macroman
    Joined:
    Jan 21, 2007
    Posts:
    6,919
    Referrals:
    9
    Sythe Gold:
    12

    Macroman Hero
    Do Not Trade

    Viruses and All about them

    Well im glad its helping some people. I extended it allot so enjoy reading about 50 pages.
     
  33. Unread #17 - Sep 30, 2007 at 9:29 AM
  34. c0r3z5
    Referrals:
    0

    c0r3z5 Guest

    Viruses and All about them

    nice guide xD
     
  35. Unread #18 - Feb 28, 2008 at 3:38 PM
  36. Evilly
    Joined:
    May 3, 2007
    Posts:
    221
    Referrals:
    0
    Sythe Gold:
    0

    Evilly Active Member
    Banned

    Viruses and All about them

    Hahahhahh I laughed so hard at the condom picture.

    Very great guide, nice detail and everything. One of the things that was most helpful was the idea of sending yourself an email to check for a piggybacking virus :)
     
  37. Unread #19 - Feb 28, 2008 at 3:47 PM
  38. everlast777
    Joined:
    Feb 24, 2008
    Posts:
    149
    Referrals:
    0
    Sythe Gold:
    0

    everlast777 Active Member
    Banned

    Viruses and All about them

    That is a very helpfull guide, how long did it take you to write that? : O
     
  39. Unread #20 - Feb 28, 2008 at 6:09 PM
  40. cp
    Joined:
    Jan 30, 2007
    Posts:
    3,278
    Referrals:
    6
    Sythe Gold:
    0

    cp an cat
    Banned

    Viruses and All about them

    Virii isn't a real word. It has a definition, but it's more of a "slang" type of word; you won't find it in any type of dictionary.

    Why are you pasting the text? You might as well just paste the link, seeing as you didn't write it. Why sticky? It's just a link. Maybe sticky a bunch of links similar to this one?
     
< @#@how To Use Sticky Keys@#@ | ~~free account training~~ >

Users viewing this thread
1 guest


 
 
Adblock breaks this site