Virus Explanations:
Virus, Worm, Etc.
Real & Hoax
Explanations/Solutions

The Essex and County Mailing Lists (and all mailing lists for that matter), are just what it says, mailing lists and not newsgroups. As mailing lists on Rootsweb that are NOT gatewayed with a Usernet Newsgroup it is IMPOSSIBLE to receive a virus from these mailing lists. Some viruses are sent as .exe attachments to email and have to be manually opened by the receiver. The latest viruses have also been sent as .doc attachments which also have to be manually opened by the receiver. In either case, the Essex and Middlesex County Mailing Lists do NOT allow attachments to be sent to its subscribers and therefore no virus can ever be sent to any of the members. When a virus is made that can be transmitted through a RootsWeb mailing list you can be sure that the announcement will be made by me on the mailing list for your protection.

Below is a listing of Web Sites that deal with Viruses and Hoaxes:

RootsWeb Virus Warnings - RootsWeb Explanations

http//www.antivirus.com/subscriptions/default.asp - This link will subscribe you to the TREND MICRO ANTI-VIRUS REPORT MAIL LIST

 

http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_PLAGE2000.A - TROJ_PLAGE2000.A, PLAGE2000.A, W95/Plage.worm

http://www.europe.f-secure.com/v-descs/newapt.htm - I-Worm.NewApt, W32.NewApt.Worm. Worm.NewApt

http://vil.nai.com/vil/wm10475.asp - W32.NewApt.Worm, I-Worm/MesMate, TROJ_NEWAPT.WORM, W32.NewApt.worm,W32/NewApt.worm

http://www.symantec.com/avcenter/venc/data/worm.newapt.html - W32.NewApt.Worm

http://vil.nai.com/vil/vpe10450.asp - W32/ExploreZip.worm.pak

http://vil.nai.com/vil/vm10441.asp - W97M/Prilissa - W97M/Melissa.w, Melissa.w, W97M/Prilissa, W97M/Pri.q, WM97/Melissa-ag, Melissa

http://www.antivirus.com/vinfo/security/sa110999.htm - BubbleBoy

http://vil.nai.com/vil/vm10385.asp - W97M/Melissa.u

http://vil.nai.com/vil/vm10386.asp - W97M/Melissa.v

http://www.sarc.com/avcenter/venc/data/worm.explore.zip.html   Virus Name: Worm.ExploreZip
Aliases: W32.ExploreZip Worm,   Area of Infection: Windows System directory, Email Attachments

http://www.symantec.com/avcenter/venc/data/prettypark.worm.html   Virus Name: PrettyPark, Worm  Aliases: Trojan Horse, W32.PrettyPark

http://www.avertlabs.com/public/datafiles/valerts/vinfo/va10182.asp  Windows 9x Internet Backdoor Trojan.  When running it gives virtually unlimited access to the system over the Internet to anyone running the appropriate client software.

http://www.cert.org/incident_notes/IN-99-03.html   (CIH/Chernobyl Virus)
http://www.symantec.com/avcenter/kill_cih.html   (CIH/Chernobyl Virus)

http://www.datafellows.com/v-descs/ska.htm  ("happy99.exe")

http://www.fedcirc.gov/

http://www.nonprofit.net/hoax/hoax.html

http://www.kumite.com/myths/

http://ciac.llnl.gov/ciac/CIACHoaxes.html

http://www.datafellows.fi/vir-info/index.htm#search

http://www.snopes.com/