Javascript is either disabled or not supported by this browser. This page may not appear properly.
Worms and viruses other than email:

Worms and viruses can be delivered to a computer in every manner a program can be transfered from somewhere else to the computer; ... such as by a flopply disc, diskette, CDROM disc, local net, email, internet download, or placed automatically from the internet because the recipient computer browser settings are set to allow it.  Before transfering a program to their computer, a user should make sure the program is safe.

The worm / virus will be, and appear as, an executable program sitting somewhere in a computer, waiting to be clicked on / executed / initiated;  But since the worm / virus program must be initiated for it to begin it's work, it will likely appear on the desktop with some bait-name to entice the user to click on it.  An exception would be if the program were put somewhere where it would automatically be initiated, such as a Start folder.  Viruses can also reside as macros in MS Word documents. 

One must also be careful importing a program in an installation package, to notice where the installation is defaulted to install the package's start-execute program(s);  And of course One would always want a program package's executable programs to first be placed on the desktop or a limbo folder they create for it on desktop until they can run a virus check on it.  A limbo folder named BAD VIRUS can help discourage another user from clicking unawares on a program being held therein.

Your browser can also be hijacked online if you have your browser security settings set to allow it (IT'S DEFAULT SETTINGS WILL ALLOW IT), and a hijacking can reset your browser options to further allow nefarious programs, spyware, etc to be loaded into your computer automatically.  I would HIGHLY suggest that everyone know what their browser settings are for and what they allow or prevent, particularly the security settings.
------------------- LINKS ------------------
to study and keep handy for future quick reference
-----------------------------------------------------------------------------------------------

SYMANTEC:


ONLINE DEMO OF USING KLEZ REMOVAL TOOL:
Requires Shockwave program;  Downloadable here.
REMOVAL TOOL DEMO PROGRAM.



ANTIVIRUS.COM:

You can scan your computer using Antivirus.com's FREE online virus scanner.

TECH INFO about klez G.



MCAFEE




F-SECURE


DATAFELLOWS:


WARNING:
There is a common misconception that klez works only thru Microsoft Outlook email programsThat is not true.  Klez works in Windows systems and can get there by any email program.  HOWEVER, there IS a worm / virus danger in Internet Explorer Browser versions 5.1 & 5.5 (unless they have been fixed with Microsoft's patch) which enterprises upon IE5's Outlook email programs' option to auto-preview email attachments.  That IE5 problem can cause a virus attachment to initiate automatically when it's email is opened or even previewedTurn that Outlook option off.
....duhhhhh.

MICROSOFT:





which has additional info about your privacy and nefarious practices on the Internet.


This webpage courtesy of Denny's Guitar Studio & Shop.
SCENARIO:  (A)  You receive an email from someone you recognize (or maybe not recognize), and;  (B)  You recognize the subject ... (but not necessarily).  The subject will in most cases be one you've discussed with the sender named (and thus why your name is in an infected sender's address book), or can otherwise be enticing to get you to click on the attachments (D).  HAVING AN ATTACHMENT ICON (C) SHOULD BE THE FIRST ALARM THAT RINGS IN YOUR HEAD.  Clicking on the attachment notice icon (C.b) will reveal the icons for the attached files (D) WHICH YOU SHOULD NEVER EVER CLICK ON.  NOTICE that one of the attached files (D.a) is an executable program ... which IS THE WORM/VIRUS, and which will launch ONLY if you click on it; ...OR it can launch automatically IF (1) You use IE 5.1 or 5.5 browser and haven't corrected a faulty quirk in it AND (2) You use Outlook email program
AND
(3) You have your email options set to automatically open attachments for review,
which is the same thing as clicking on ANY / ALL attachments 
(Duhhhhhhh).  ----   Another good indicator that attachment D.a might be a klez worm-virus is that the attached file (D.a) will be between 65-125K in size, ...most often around +/- 100K for newer versions.

The executable file attachment (D.a.) is the worm-virus, which would send a copy of itself to addresses randomly taken from your address book, and would plant a virus to destroy some of your files to erase it's tracks, which can crash your computer.  IF you don't click on this worm-virus program, then deleting the email from your 'Inbox' and then from your 'Deleted Items Maibox' removes any dangers of the worm-virus.   If you DO click on the worm-virus program, you should take corrective measures listed in the links below as soon as possible (a good reason to keep the links handy)!

There is some info on the Internet that image file attachments (D.b.) can contain embedded text that can be accessed by some worms, giving them custom instructions like where to send files a worm mines from your computer, which could be very private files.

Klez is can also be sent out due to a human deformity where the brain cavity has very little brain matter and is filled with large intestine.  Some of those deformed people receive a virus in their email, notice it and deliberately send it to others.


You can also view an email virus attachments by clicking-on / opening the email in the email logue list (A & B above);  In which case you will get the following view:
I SUGGEST YOU PRINT THIS PAGE'S TEXT
TO READ WHILE STUDYING IT'S IMAGES
FOOTNOTE WARNING:  Klez is also being sent in VERY TRICKY emails FORGED to look EXACTLY like a <returned-undeliverable> email.  As you open it's envelope icons, you will still see attachments similar to those shown above. THE EXECUTABLE FILE IS STILL THE POISON.
(A)  In the vast number of cases, klez sent itself from another infected computer, and this 'from' entry will be forged by klez (from a different infected computer's address book) as will a different 'from' address listed at (C);  MEANING THAT PERSON'S COMPUTER DID NOT SEND KLEZ TO YOU
If (A) and (C) BOTH match, it is an indication that the virus could have been sent to you from that computer's operator and not by klez replicating from it
.

(B)  In the rare case of klez being sent to you directly from an originator, this routing field can have forged data.  When klez sends itself by it's replication, this field should be reliable.
I SUGGEST YOU PRINT THIS PAGE'S TEXT
TO READ WHILE STUDYING IT'S IMAGES
">
">
">
">
WORMS & VIRUSES
How to recognize - avoid - get rid of 'em
IMAGE 1:  Viral email received.
">
">
">
">
(C.b)
(C)
         D.a.
(D)
         D.b.
SCENARIO:  (A)  You receive an email from someone you recognize (or maybe not recognize), and;  (B)  You recognize the subject ... (but not necessarily).  The subject will in most cases be one you've discussed with the sender named (and thus why your name is in an infected sender's address book), or can otherwise be enticing to get you to click on the attachments (D).  HAVING AN ATTACHMENT ICON (C) SHOULD BE THE FIRST ALARM THAT RINGS IN YOUR HEAD.  Clicking on the attachment notice icon (C.b) will reveal the icons for the attached files (D) WHICH YOU SHOULD NEVER EVER CLICK ON.  NOTICE that one of the attached files (D.a) is an executable program ... which IS THE WORM/VIRUS, and which will launch ONLY if you click on it; ...OR it can launch automatically IF (1) You use IE 5.1 or 5.5 browser and haven't corrected a faulty quirk in it AND (2) You use Outlook email program
AND
(3) You have your email options set to automatically open attachments for review,
which is the same thing as clicking on ANY / ALL attachments 
(Duhhhhhhh).  ----   Another good indicator that attachment D.a might be a klez worm-virus is that the attached file (D.a) will be between 65-125K in size, ...most often around +/- 100K for newer versions.

The executable file attachment (D.a.) is the worm-virus, which would send a copy of itself to addresses randomly taken from your address book, and would plant a virus to destroy some of your files to erase it's tracks, which can crash your computer.  IF you don't click on this worm-virus program, then deleting the email from your 'Inbox' and then from your 'Deleted Items Maibox' removes any dangers of the worm-virus.   If you DO click on the worm-virus program, you should take corrective measures listed in the links below as soon as possible (a good reason to keep the links handy)!

There is some info on the Internet that image file attachments (D.b.) can contain embedded text that can be accessed by some worms, giving them custom instructions like where to send files a worm mines from your computer, which could be very private files.

Klez is can also be sent out due to a human deformity where the brain cavity has very little brain matter and is filled with large intestine.  Some of those deformed people receive a virus in their email, notice it and deliberately send it to others.


You can also view an email virus attachments by clicking-on / opening the email in the email logue list (A & B above);  In which case you will get the following view:
(D)
(D.a.)        (D.b.)
For users who can read email source properties:  Below is an image of the maximized window of the email <properties> <message source>.  See explanations below this image. 
EMAIL PROGRAM
">
">
">
">
IMAGE 2;  THE EMAIL OPENED.
IMAGE 3;  MESSAGE SOURCE

This page was last updated on: June 20, 2002

------------------- LINKS ------------------
to study and keep handy for future quick reference
-----------------------------------------------------------------------------------------------

SYMANTEC:


ONLINE DEMO OF USING KLEZ REMOVAL TOOL:
Requires Shockwave program;  Downloadable here.
REMOVAL TOOL DEMO PROGRAM.



ANTIVIRUS.COM:

You can scan your computer using Antivirus.com's FREE online virus scanner.

TECH INFO about klez G.



MCAFEE




F-SECURE


DATAFELLOWS:


WARNING:
There is a common misconception that klez works only thru Microsoft Outlook email programsThat is not true.  Klez works in Windows systems and can get there by any email program.  HOWEVER, there IS a worm / virus danger in Internet Explorer Browser versions 5.1 & 5.5 (unless they have been fixed with Microsoft's patch) which enterprises upon IE5's Outlook email programs' option to auto-preview email attachments.  That IE5 problem can cause a virus attachment to initiate automatically when it's email is opened or even previewedTurn that Outlook option off.
....duhhhhh.

MICROSOFT:





which has additional info about your privacy and nefarious practices on the Internet.


This webpage courtesy of Denny's Guitar Studio & Shop.
The following images are of the Klez worm-virus sitting in an email.  Different email programs will appear differently, ...but these images should provide ample insight to identify a worm or virus in email.  This page only addresses worms / viruses sent in email.  The most important thing to remember is that a computer CANNOT be infected with an email worm / virus unless it's operator initiates (clicks on) the executable worm program that is delivered as an email attachment.  -----   Info about IE / Outlook "auto-click problem" is listed later herein.
">
">
">
">
> AN EMAIL WORM / VIRUS CANNOT INFECT A COMPUTER ON IT'S OWN. <
Worms and viruses other than email:

Worms and viruses can be delivered to a computer in every manner a program can be transfered from somewhere else to the computer; ... such as by a flopply disc, diskette, CDROM disc, local net, email, internet download, or placed automatically from the internet because the recipient computer browser settings are set to allow it.  Before transfering a program to their computer, a user should make sure the program is safe.

The worm / virus will be, and appear as, an executable program sitting somewhere in a computer, waiting to be clicked on / executed / initiated;  But since the worm / virus program must be initiated for it to begin it's work, it will likely appear on the desktop with some bait-name to entice the user to click on it.  An exception would be if the program were put somewhere where it would automatically be initiated, such as a Start folder.  Viruses can also reside as macros in MS Word documents. 

One must also be careful importing a program in an installation package, to notice where the installation is defaulted to install the package's start-execute program(s);  And of course One would always want a program package's executable programs to first be placed on the desktop or a limbo folder they create for it on desktop until they can run a virus check on it.  A limbo folder named BAD VIRUS can help discourage another user from clicking unawares on a program being held therein.

Your browser can also be hijacked online if you have your browser security settings set to allow it (IT'S DEFAULT SETTINGS WILL ALLOW IT), and a hijacking can reset your browser options to further allow nefarious programs, spyware, etc to be loaded into your computer automatically.  I would HIGHLY suggest that everyone know what their browser settings are for and what they allow or prevent, particularly the security settings.
NOTICE THE PROGRAM ICON !
<
An enticing message can be in this window;  But I've seen it blank as many times as not.
NOTICE THE PROGRAM ICON.  Duhhhhhhh!
v