The Greek Series:


Viruses: a program designed to spread copies of itself onto multiple computers by infecting files or system areas of hard drives and floppy disks.

Nasty viruses: can contain "payloads" in the form of malicious code that may alter, corrupt or delete files on a hard drive and make them inaccessible to you.
Viruses try to remain hidden until it's too late and damage is done.

Worms: code that exits simply to replicate itself, not to damage files.

Trojan Horses: secret programs that allow access to a system through a remote connection, they often spread email attachments or downloaded executables.

Spyware: can take many forms, basic cookies are the worst - these are files created by a web server that live on a user's PC for either the length of a web session or permanently on the user's hard drive. The goal of any spyware is to record your online activities, that means sites you visit, they collect information about you browsing habits, then report that information back to the company that placed the spyware file on your PC.

Cookies: information stored on your computer by a Web Browser at the request of software at web site . cookies can pose security risk to you, because they store information that can be sensitive to you.

The term Cookie comes from a 1980's prank computer program called Cookie Monster that would interrupt users and demand that they type
the word cookie before continuing.

To delete Cookies on your PC.
1. Launch Internet Explorer, then go to tools, Internet Options.
2. In the middle of the screen is a button that says Delete Cookies.
3. Internet Explorer will delete all the cookies that are stored on the PC.
Security Tips:
                     DIGITAL SIGNATURE: A digital signature proves the identity of the sender, and shows that the e-mails hasn't been tampered with. Get a free digital ID from -    (

In Outlook, choose Tools, Options, Security, Get a Digital ID.
Internet Explorer 6: lets you choose whether to block or accept cookies, on who they're from and the sites privacy policy. Choose Tools, Internet Options, Privacy.

 Here are some of the top viruses to watch out for:
   1. Packer.Malware.                    2.  Exploit.Win32.WMF-PFV          3. BehavesLike:Trojan.             
       NSAnti.k                                                                                          Downloader

   4. Win32.Netsky.P@mm            5.Win32.Parite.B                            6.Win32.NetSky.D@mm

   7. Win32.Netsky.AA@mm         8.Win32.Nyxem.E@mm                 9. Trojan.Peed.Gen

  10. Trojan.Pandex.G




Click Blow


Thinks You Should Know About Viruses: