Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(5 classifications) (8 resources)

Computer viruses

Catalogs. (1)
Hoaxes (2)
Nomenclature. (1)
Prevention (16)
Research (2)

View Resource Symantec: Hoaxes

Periodically a series of "important messages" about new email viruses make their way through various mailing lists. While savvy Internet users can usually immediately spot these hoaxes, they can be both intimidating and frightening to neophytes (not to mention the bandwidth wasted when the messages are passed on to other users.) One of the better sites that track both email and other computer...
View Resource A Funny Way of Showing It: ILoveYou Worm is Most Damaging Virus Yet

Vast numbers of users yesterday were doubtless disappointed to find that not only did they not have a secret admirer, but they had caught viruses in trying to open their "love letters." A new destructive worm swept computers around the world on Thursday, infecting systems in the Pentagon, the CIA, Parliament, and Ford Motor Company, to name just a few. Like the Melissa virus and so many of its...
View Resource Two on the Code Red Virus: The Spread of the Code-Red Worm

During the final weeks of July, a computer worm known as Code Red spread to over 350,000 computers on six continents. The two sites listed above provide details and analysis of the worm incident. This site, from University of California's Cooperative Association for Internet Data analysis (CIDA), provides a wealth of data on the origin and spread of Code Red. A neat feature is the animation of the...
View Resource The WildList Organization International

The WildList is a free list of all known computer viruses that are spreading in the world, as compiled by volunteer antivirus experts of the WildList Organization International. It is updated monthly and, as one can imagine, is quite lengthy. The site has many other interesting features besides the list. For example, a somewhat humorous article by the WildList's founder describes his views on "how...
View Resource Internet Quarantine: Requirements for Containing Self-Propagating Code

Appearing at the INFOCOM conference in April 2003, this research paper provides insight into critical factors necessary to contain outbreaks of self-propagating code on the Internet. Citing the outbreak of the Code-Red worm in 2001 as an example, the authors justify the need for better methods of quickly controlling the spread of malicious code and minimizing damage. A couple scenarios for the...
View Resource Truth about Computer Security Hysteria

Citing common misconceptions and the deliberate distribution of misinformation about computer security, the Vmyths Web site serves as a reference to refute virus hoaxes and, more generally, to eliminate widespread hysteria by educating the unaware. False email warnings can cause the recipient to delete important system files, thinking they are infected with a virus. This is just one situation that...
View Resource Symantec: Virus Alerts and Hoaxes

This website by Symantec (makers of Norton AntiVirus) provides information on the latest virus threats, security advisories, updates for Symantec products and removal tools, as well as some basic information on viruses. The Reference Area includes FAQ, a Glossary, Newsletter, White Papers, a section where you can Submit Virus Samples, postings of Hoaxes, a Security Database, Virus Encyclopedia,...
View Resource Vcatch Antivirus

Vcatch Antivirus is a program that will help users monitor their incoming emails and downloads in order to protect their computers from viruses and other such nefarious intruders. This program is integrated with Windows Explorer, and includes a detection engine that analyzes all files. Another helpful feature is that this application cooperates with anti-virus programs that are already installed...