Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Computer Viruses, Worms, and Hoaxes > NetSparsh - Viral Content you Love & Share

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. As frustrating as it was deleting all of these nasty little boogers, I realized that some of these "worm" emails even came from persons I knew - or so I thought I knew.

The problem with the "Mydoom" email worm is that it specifically targets email addresses with the following extensions:

  • .htm
  • .sht
  • .php
  • .asp
  • .dbx
  • .tbb
  • .adb
  • .pl
  • .wab
  • .txt
Furthermore, it sends "get" requests to target domains and uses direct connections to port 80. It will also attempt to send email messages using its own SMTP engine. The worm is successful by using a mail server that a recipient uses or local server as well. Some strings to these target domain names are:
  • gate.
  • ns.
  • relay.
  • mail1.
  • mxs.
  • smtp.
  • mail.
  • mx.

The "Mydoom" worm will have subject headings such as:

  • "Returned Mail"
  • "Delivery Error"
  • "Status"
  • "Server Report"
  • "Mail Transaction Failed"
  • "Mail Delivery System"
  • "Hello/hello"
  • "Hi/hi"

What persons need to realize is that even if you "know" the sender, you must make absolutely sure that any attachments are specifically clarified from the sender before you attempt to open these suspect emails. Most worms and viruses are spread directly through attachments. Unless you are expecting an attachment from a person you know, be cautious. Do NOT open attachments unless you are absolutely positive that your known correspondent has actually sent it to you. Another thing to remember is that the "Mydoom" worm ranges from 6,144 bytes to 29,184 bytes in size and can affect Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP. Luckily, if you have DOS, Linux, Macintosh, OS/2 or UNIX, your systems will not be affected by the MyDoom worm.

For those of you who share files through Kazaa, there is a new worm with aliases such as Worm.P2P.Apsiv (Kaspersky) and W32/Apsiv.worm!p2p (McAfee) and seemingly affects Windows systems 2000, 95, 98, Me, NT, Server 2003 and Windows XP. The damage profile has not yet been assessed, but it would be a good idea to steer clear of this one as well.

"Keylogger.Stawin" is probably one of the nastiest viruses as it attempts to steal a user's online banking information. A Trojan is distributed through email messages with the subject line, "I still love you," and has a "" attachment. Affecting the same vunerable systems as mentioned above, Keylogger records keystrokes and has the ability to steal personal, financial information. A few systems that Keylogger monitors are window titles such as "PayPal," "Logon," and numerous other window titles associated with banking logins.

Common Hoaxes

A popular hoax circulating the Internet is an email titled, "FREE M &M's." Sorry guys - no M & M's here. More recently, you may have received the "Life is Beautiful" virus ... er, hoax. The "Life is Beautiful" virus is not real and should be ignored. This is only a scare tactic that causes unwarranted fears and concerns.

In closing, the Internet is a massive electronical world filled with infinite bits of information. When using your "key" to this magnificent but vast window of versatile knowledge, it pays to use logic when distinguishing hoaxes from real threats such as viruses and worms.

  • To learn more about current viruses and worms, visit:
  • For an updated listing of current email hoaxes, go to:

Copyright 2004 - All Rights Reserved
Computer Viruses, Worms and Hoaxes
by C. Bailey-Lloyd/LadyCamelot

About the Author: C. Bailey-Lloyd/LadyCamelot is the Public Relations Director & Writer for Holistic Junction -- Your source of information for Holistic Practitioners; Naturopathic Schools, Massage Therapy Schools, and Reflexology Schools; Alternative Healthcare; Insightful Literature and so much more!

NOTICE: Article may be republished free of charge as long as Author Resource Box (above) is included, and ALL Hyperlinks REMAIN in tact and active.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


Here's How You Can Stay Ahead Of Your Cyber Security ETF
Berlin, Germany - January 11: Symbolic photo on the topic Data security. A padlock is on the board of a computer on January 11, 2018 in Berlin, Germany. (Photo Illustration by Thomas Trutschel/Photothek via Getty Images). An ETF provides a single ...

and more »

CSO Online

8 questions to ask about your industrial control systems security
CSO Online
Do I have the people to manage and sustain ICS security? Organizational planners often tend to think of industrial cybersecurity as largely a technology issue when often the much bigger problem is a lack of skilled resources, says Sid Snitkin, an ...

and more »

Washington Post

Security clearance process remains 'broken' despite 2016 changes ...
Washington Post
Among the list of problems beleaguering the security clearance process, reciprocity, among and even within agencies, should be easy to fix. Federal employees and contractors can be cleared to work in one office, but if they move to another, they often ...

and more »

U.S. News & World Report

With Security Measures, Urban Schools Avoid Mass Shootings
U.S. News & World Report
As schools around the U.S. look for ways to impose tougher security measures in the wake of last month's school shooting in Parkland, Florida, that left 17 people dead, they don't have to look further than urban districts such as Detroit, Chicago, Los ...
Experts Believe Security Measures Help Detroit Schools Avoid Mass ShootingsCBS Detroit

all 2 news articles »


Retirement Security Being Threatened By High Debt Warns Researchers
Ted Knutson , Contributor I am your guru for cybersecurity/fintech/Bitcoin SEC/CFTC/FTC/OCC. Opinions expressed by Forbes Contributors are their own. Tweet This. “(They) are placing themselves at risk of running short of money,” the researchers found ...


PGA eyes security after Austin bombings
The PGA Tour, which is staging the Dell Match Play Championship in west Austin, Texas, this week, says its security advisers are collaborating closely with law enforcement to try to ensure the safety of players and fans. The PGA said Monday that it ...
AUDIO: Austin bombing heard on security

all 712 news articles »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: March 10 - March 16
Council on Foreign Relations (blog)
About CFR · All About CFR · Who We Are · Membership · Member Programs · Outreach · For Media · Careers · Support CFR · Contact · Member Login · · Member Login · Nigeria Security Tracker Weekly Update: March 10 ...

Readout of National Security Advisor HR McMaster's Meeting with National Security Office Director Chung Eui-yong of ... (press release)
National Security Advisor H.R. McMaster of the United States, National Security Office Director Chung Eui-yong of the Republic of Korea, and Secretary General of the National Security Secretariat Shotaro Yachi of Japan held a trilateral meeting on ...

Cybersecurity trend forecast: Streamlined, simplified security
In part one of this two-part Q&A, Malik spoke with SearchCIO about changes in the cybersecurity landscape and highlighted key cybersecurity trends to watch out for this year. He also shed light on how emerging tech like AI and techniques like DevSecOps ...

Wall Street Journal

How Secure Is Mobile Banking?
Wall Street Journal
The general consensus is that while the risk is low when it comes to banking, security does depend to some extent on consumers—many of whom don't do what they should be doing to keep their phones safe from attack. As a result, experts say, banks could ...

Google News

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero Superhero watches your computer for changes,... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More