Tip

5 ways to guard against e-mail viruses

5 ways to guard against e-mail viruses

From Roger Pence's AS/400 Letter on Windows, Workgroups and the Web, May 15, 2000. Provided courtesy of The 400 Group.

1. Don't use Outlook and Outlook Express. This may not be realistic advice in the real world, but you should at least use Love Bug as a reason to reevaluate what your shop standards are for e-mail clients. Viruses often target Outlook and/or Outlook Express; using other clients minimizes your exposure. Beware, though, that avoiding Outlook isn't unconditional protection. Love Bug required Outlook to replicate itself but was able to damage PCs in the absence of Outlook.

2. Make all users aware of the dangers of unsolicited attachments. E-mail viruses rely on users opening infected attachments. All e-mail users must understand the potential consequences of opening attachments from bad guys.

As a further reminder of how dangerous attachments can be, consider creating an incoming mail rule in Outlook that directs all e-mails with attachments to an attachments-specific folder. I now use an Outlook rule that directs mail with attachments to a folder called BeCareful. Putting mail with attachments in this folder doesn't make it impossible to launch them, but it does help provide me with a constant reminder that e-mails with attachments should be treated with special care.

3. Use anti-virus software and keep it current. Anti-virus software isn't foolproof: early in Love Bug's life anti-virus software offered no protection against the virus because it hadn't yet been identified as a virus. Despite a potential limitation on late-breaking viruses, good anti-virus protection is mandatory! Get an enterprise anti-virus subscription and keep it current. Also, virtually all anti-virus vendors offer e-mail services to update you with late-breaking virus news. (See URLs below.)

4. Be aware of the need for secondary virus fixes. Even after McAfee's anti-virus software had removed infected files from my PC, I still had residual entries in my registry. To fix such spurious side effects, you'll often need to run adjunct software to fully rehabilitate infected PCs. Norton has published a free secondary fix called FIXLOVE.EXE on its Web site that worked for me. (See URL below.)

5. Disable the Windows Scripting Host. The Windows Scripting Host (WSH) is Windows' solution for a robust batch processor -- it is primarily a replacement for DOS BAT files. WSH not only provides a rich scripting language (using either VBScript or JavaScript), but it also exposes all of Windows COM objects. These COM objects provide the clever WSH programmer keys to your Windows kingdom.

Unless you have a specific need for WSH (and you probably don't), disable this way:

  1. Open the Control Panel.

  2. Open the Add/Remove Programs applet.

  3. Click the Windows Set-up tab.

  4. Double-click Accessories.

  5. Deselect Windows Scripting Host shown in the Accessories list. If it isn't already selected or present, it currently isn't installed on your system.

  6. Click OK twice.

Web sites and other references
FixLove.EXE to repair Love Bug-damaged Windows registry

Symantec site with Love Bug virus details

Symantec virus e-mail newsletter

McAfee anti-virus Web site (and e-mail alert subscription)

This was first published in May 2000

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.