Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Computer Viruses, Worms, and Hoaxes > NetSparsh - Viral Content you Love & Share

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. As frustrating as it was deleting all of these nasty little boogers, I realized that some of these "worm" emails even came from persons I knew - or so I thought I knew.

The problem with the "Mydoom" email worm is that it specifically targets email addresses with the following extensions:

  • .htm
  • .sht
  • .php
  • .asp
  • .dbx
  • .tbb
  • .adb
  • .pl
  • .wab
  • .txt
Furthermore, it sends "get" requests to target domains and uses direct connections to port 80. It will also attempt to send email messages using its own SMTP engine. The worm is successful by using a mail server that a recipient uses or local server as well. Some strings to these target domain names are:
  • gate.
  • ns.
  • relay.
  • mail1.
  • mxs.
  • smtp.
  • mail.
  • mx.

The "Mydoom" worm will have subject headings such as:

  • "Returned Mail"
  • "Delivery Error"
  • "Status"
  • "Server Report"
  • "Mail Transaction Failed"
  • "Mail Delivery System"
  • "Hello/hello"
  • "Hi/hi"

What persons need to realize is that even if you "know" the sender, you must make absolutely sure that any attachments are specifically clarified from the sender before you attempt to open these suspect emails. Most worms and viruses are spread directly through attachments. Unless you are expecting an attachment from a person you know, be cautious. Do NOT open attachments unless you are absolutely positive that your known correspondent has actually sent it to you. Another thing to remember is that the "Mydoom" worm ranges from 6,144 bytes to 29,184 bytes in size and can affect Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP. Luckily, if you have DOS, Linux, Macintosh, OS/2 or UNIX, your systems will not be affected by the MyDoom worm.

For those of you who share files through Kazaa, there is a new worm with aliases such as Worm.P2P.Apsiv (Kaspersky) and W32/Apsiv.worm!p2p (McAfee) and seemingly affects Windows systems 2000, 95, 98, Me, NT, Server 2003 and Windows XP. The damage profile has not yet been assessed, but it would be a good idea to steer clear of this one as well.

"Keylogger.Stawin" is probably one of the nastiest viruses as it attempts to steal a user's online banking information. A Trojan is distributed through email messages with the subject line, "I still love you," and has a "" attachment. Affecting the same vunerable systems as mentioned above, Keylogger records keystrokes and has the ability to steal personal, financial information. A few systems that Keylogger monitors are window titles such as "PayPal," "Logon," and numerous other window titles associated with banking logins.

Common Hoaxes

A popular hoax circulating the Internet is an email titled, "FREE M &M's." Sorry guys - no M & M's here. More recently, you may have received the "Life is Beautiful" virus ... er, hoax. The "Life is Beautiful" virus is not real and should be ignored. This is only a scare tactic that causes unwarranted fears and concerns.

In closing, the Internet is a massive electronical world filled with infinite bits of information. When using your "key" to this magnificent but vast window of versatile knowledge, it pays to use logic when distinguishing hoaxes from real threats such as viruses and worms.

  • To learn more about current viruses and worms, visit:
  • For an updated listing of current email hoaxes, go to:

Copyright 2004 - All Rights Reserved
Computer Viruses, Worms and Hoaxes
by C. Bailey-Lloyd/LadyCamelot

About the Author: C. Bailey-Lloyd/LadyCamelot is the Public Relations Director & Writer for Holistic Junction -- Your source of information for Holistic Practitioners; Naturopathic Schools, Massage Therapy Schools, and Reflexology Schools; Alternative Healthcare; Insightful Literature and so much more!

NOTICE: Article may be republished free of charge as long as Author Resource Box (above) is included, and ALL Hyperlinks REMAIN in tact and active.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


Security researcher claims macOS Mojave privacy bug on launch day
A security researcher has claimed a new vulnerability in the latest version of macOS — just hours before the software is due to be released. Patrick Wardle, chief researcher officer at Digita Security, tweeted a video Monday of an apparent privacy ...
Critical MacOS Mojave vulnerability bypasses system securityDigital Trends
macOS Mojave - AppleApple
macOS Mojave on the Mac App Store - iTunes - AppleiTunes - Apple

all 223 news articles »


Must-watch TV: Trump to wield gavel at key UN Security Council meeting
“I'm sure that's going to be the most watched Security Council meeting ever,” Nikki Haley, Trump's ambassador to the U.N., predicted last week in outlining to reporters the administration's agenda for this week's high-level meetings in New York City.
From reality TV to UN, Trump to wield Security Council gavelReuters
Current Members of the Security Council - Members of the United Nations Security CouncilMembers of the United Nations Security Council
Senate advances plan to combat opioid epidemicUSA TODAY
YouTube -United Nations Office on Drugs and Crime
all 743 news articles »

Data Center Knowledge

Microsoft's stock closes at record as security moves seek to shake up cloudscape
Microsoft Corp. shares closed at a record high as the tech giant broadened its profile as a secure cloud vendor on Monday, using its annual IT conference to announce several security initiatives designed to woo enterprises to its Azure public cloud ...
Microsoft Rolls Out New Office, Security, Cloud OfferingsData Center Knowledge
Microsoft Rolls Out Additions to Office, Security and Cloud OfferingsBloomberg
Microsoft 'kills' passwords, throws up threat manager, APIs Graph SecurityThe Register
BleepingComputer -Microsoft
all 224 news articles »

Fox News

Wisconsin restaurant responds after video shows security guards fighting man in wheelchair
Fox News
“The actions that the independant security company took in this matter are NOT acceptable and do not reflect Jalisco's mission or core values. Effective immediately we will have a new security company working our restaurant starting today,” the ...
Wife of man in wheelchair, security company head speak out after

all 12 news articles »


Security experts say Chrome 69's 'forced login' feature violates user privacy
Many security folks have already panned the move as unwanted behavior, arguing it violates their privacy. Some users had good reasons not to want to be logged into Chrome, but now Chrome seems to takes that decision away from the user. Matthew Green ...
Chrome's turning 10, here's what's new - Google BlogGoogle Blog
Why I'm done with Chrome – A Few Thoughts on Cryptographic EngineeringA Few Thoughts on Cryptographic Engineering
Adobe Announces Flash Distribution and Updates to End | WebKitWebKit
MDN - Mozilla
all 172 news articles »


Yubico's new security keys now support FIDO2
Yubico, the company behind the popular Yubikey security keys, today announced the launch of its 5 Series keys. The company argues that these new keys, which start at $45, are the first multi-protocol securities keys that support the FIDO2 standard ...
Yubico launches new lineup of multifactor FIDO2 security keysVentureBeat
YubiKey 5: First multi-protocol security keys with FIDO2 supportZDNet
The new YubiKey 5 security keys offer physical protection for your private dataAndroid Central

all 36 news articles »

NCCU student shot, killed by security officer at off-campus apartment complex
Durham, N.C. — A North Carolina Central University student was shot and killed by a security guard last week at an off-campus apartment complex, officials said Monday. Around 10:15 p.m. on Sept. 17, officers with the Durham Police Department responded ...
Police: College Student Shot, Killed by Security OfficerU.S. News & World Report
Security firm says shooting of NC Central University student was self-defenseDurham Herald Sun
New Bern college student killed by Durham security guardWITN
Spectrum News
all 65 news articles »

School security part of design and construction of new Willoughby-Eastlake schools
WILLOUGHBY, Ohio-- The 1,400 students of Willoughby South High School are getting a brand new home. The new high school is set to open in fall of 2019. While the sweeping curved walls and wide-open spaces in the architecture stand out, ...

Dallas News (blog)

Gunman escapes after shooting two security guards at Fort Worth saloon, police say
Dallas News (blog)
Another security guard said he witnessed the shooting about 1:15 a.m. as he was driving past the bar in the 3300 block of East Lancaster Avenue, north of the Texas Wesleyan University campus. Two men had been trying to get into the club as one of them ...
2 nightclub security guards shot in Fort Worth parking lot, police sayFort Worth Star Telegram
Two Security Guards Shot Outside of Fort Worth BarNBC 5 Dallas-Fort Worth
Two nightclub security guards shot in parking lot in Fort Worth, police

all 5 news articles »

College security officer accused of posing as teen girl to get teen boy to send him nude pics
He works as a campus security officer at Rider University in Lawrence and serves as captain of Bordentown City's volunteer fire department, the prosecutor's office said. (On his LinkedIn page, Berman identifies himself as a member of the department's ...

and more »
Google News

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More