Frequently Asked Questions


 1. Emails
 2. FTP
 3. PDF
 4. PicBlazer
 5. Virus Protection
Q:5.1 - What types of viruses are there?
A: Untitled 1

There are a few different types of computer viruses. There are also email viruses, worms, and Trojan horses. Email viruses first started showing up in the 1990s when the use of email became widespread. Email viruses are able to spread more quickly than traditional viruses, because they are sent via email.

One of the most impressive viruses to hit computers was the Melissa virus, which happened in March 1999. The virus was attached to a word document that was downloadable from an Internet newsgroup. Anyone who downloaded that document executed the virus. The virus was able to then make its “attack” by sneaking into the person’s email account and sending the infected document to the first fifty people in the address book, with a friendly subject line. These people would see the email message, and click on it to open it up. This would then execute the virus, and then the document would be sent to the first fifty people in the new address book. This became the fastest spreading virus ever seen. The damage was quite significant. The virus infected a central file called NORMAL.DOT. Any file saved later would also contain the virus.

Another notable email virus was called the ILOVEYOU virus, which infected computers on May 4, 2000. An email was sent out with a virus infected attachment. The recipient double-clicked on the attachment, allowing the virus to execute—automatically sending the attachment to the recipient’s entire address book. The effects were disastrous as well—destroying files and programs on the recipient’s computer.

Worms are pieces of code that use computer networks and security holes to replicate themselves and wreak havoc on systems. Worms are computer programs that are able to copy themselves from machine to machine, through computer networks. In July 2001, the Code Red Worm copied itself over 250,000 times in a nine hour span. It specifically attacked servers of Windows NT 4.0 and Windows 2000 running Microsoft Internet Information Server. The worm searched for unsecured servers, and copied itself to them. The Code Red Worm was made to have three major effects:

• Replicate itself for the first twenty days of infection

• Replace the victim’s web pages with a page stating, “Hacked by Chinese.”

• Orchestrated an attack on the White House web server in an attempt to overwhelm it.

Trojan Horses are actually normal computer programs. A Trojan Horse pretends to be a regular downloadable program, such as a game, but actually does something different—most likely does damage to a computer, like erasing a disk. This is different from a regular virus, because it doesn’t attempt to reproduce itself. Trojan Horses do not affect a great number of people because they are discovered quickly.

   5.2 - What is malware?
   5.3 - What is spyware?
   5.4 - What is the best Antivirus tool?
   5.5 - What is the best anti-Spyware tool?
 6. Web Hosting