Practical E-mail protection from viruses and worms: Part 1
Computers & Technology → Email
- Author Chris Kaminski
- Published October 30, 2006
- Word count 578
Here's some practical and invaluable steps you can take to protect your e-mail today from viruses and worms. Part 1
-
Change your Windows settings so that you can see the true file extensions. For example, on Windows machines, open Windows Explorer. Under the View menu, select Options. Select "Display the Full MS-DOS path in the title bar." You can also get to this by clicking on My Computer, then View, then Options, then the View tab. Never click on a file that ends in .exe or .pif or .vbs as these are files that launch programs. Even MS Word .doc files can be programmed to harm your computer, so while you do not need to be paranoid, you do need to be vigilant. Never open a file attachments from people you don't know, or where the email somehow seems strange. Your intuition is probably correct.
-
Create a phony contact record within your email address book. If a worm virus gets onto your computer, it typically heads straight for your email address book. It then replicates itself and sends itself to everyone in your address book, thus sending infected emails to all your friends and associates. Use that fact to alert yourself when/if a virus slips past your anti-virus precautions! First, open your address book and click on "new contact." In the window where you would enter a FIRST name, type in: 000_ (three zeroes followed by an underscore, which is located next to your zero key). In the box where it prompts you to enter the new email address, type: Wormalert2003@leapmail.net.
If your program tells you this is not a valid address just say 'yes' to add it, or click OK. Here's what you've done and why it works: the "name" 000_ will be placed at the top of your address book as entry #1. This will be where the worm will start in an effort to send itself to all your friends. But when it tries to send itself to 000_ it will be undeliverable because of the phony email address you entered. If the first attempt fails (which it will because of the phony address), the worm goes no further and your friends will not be infected. Here's the second great advantage of this method: if an email cannot be delivered, you will be notified of this, because you will receive a MAILER DAEMON in your Inbox.
So, if you ever get an email telling you that an email addressed to Wormalert2003@alertme.com could not be delivered, you know right away that a worm has infected your system. You can then take steps to get rid of it!
-
Choose an Internet Service Provider (ISP) that offers virus filtering on all email. This means that your ISP should be able to catch and delete messages that have viruses or worms attached to them. Most ISPs will then send notice to you that the email did not get through because of the attachment. For a list of ISPs who provide specialized add-ons such as anti-spam and anti-virus filtering services, go to http://www.choosinganisp.com.
-
Educate other people within your company and/or household how to scan for viruses on the computer. Teach children how to spot suspicious email attachments.
-
Get in the real habit of backing up data. If you have had virus infections in the past, chances are that your backup disks are also infected and need to be scanned for viruses. Better be safe than sorry!
.
Chris Kaminski has been working in computer repair and web development for the last 20 years. Kaminski is CEO and head technician for Computerguyslive.com, an online computer repair company based in Asheville, NC. Visit Computer Guys Live online for experienced online virus scans and computer repair at http://www.computerguyslive.com and bookmark our invaluable wireless connection guide at http://computerguyslive.com/content/wireless/wirelessindex.asp
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Writing Engaging Email Newsletters!
- Proton Mail In Vivaldi Email
- Email Deployment
- Squarespace email campaigns vs Mailchimp
- Squarespace email campaigns vs Mailchimp
- Email Extractor from CSV
- How to download Gmail email content into a CSV file.
- Is email marketing legit?
- Mastering Lead Generation in 2024 Techniques to Attract More Customers
- Technology and gadgets
- Navigating the Cybersecurity Landscape: A Comprehensive Guide for Businesses
- Improving Email Deliverability: Best Practices and Tips
- Boost Your Business's Credibility with a Custom Domain Email
- 10 Benefits of Temporary Email and Why You Should be Using
- 10 Crіtісаl Rеаѕоnѕ Whу Yоur Buѕіnеѕѕ Needs Emаіl Mаrkеtіng
- Managing Your In-House Email with MDaemon Messaging Server
- How do I connect with AOL Customer Support? | +1 8885154600
- Optimize and protect your business email workflows
- 5 Quick Tips to Resolve POGO Games Not working and Sign in issue
- How to Earn Money from Email Marketing. Email Marketing for Beginners:
- How to Make Custom Personal Or Business Mail Logos?
- Best Gmail Backup Tool Review
- Powerful business email with MDaemon Messaging Server
- Email Marketing By Spoken Communication
- MDaemon Messaging Server - a business email server for Windows
- How to Reinstall AOL Desktop Gold
- Avaya Users Email List - Avaya Users Mailing Data - B2B Technology Lists
- Autodesk Users Email List - Buy AutoDesk User List - B2B Technology Lists
- Actuate Users Email List - Actuate Users Mailing List - B2B Technology Lists
- Email etiquette nightmares we could all do without