Date:         Fri, 5 May 2000 01:50:23 -0500
Reply-To:     TOURBUS-Request@LISTSERV.AOL.COM
Sender:       The Internet TourBus - A virtual tour of cyberspace
              
Comments:     Resent-From: crispen@netsquirrel.com
Comments:     Originally-From: Patrick Douglas Crispen

From:         Patrick Douglas Crispen 
Subject:      TOURBUS -- 4 MAY 00 -- THE LOVE BUG
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
 
----------------------------------------------------------------------
                TOURBUS Volume 5, Number 89 -- 4 May 2000
----------------------------------------------------------------------
 
[ Tip: Use a monospace font like Courier when reading this message ]
     _________ ____________ ________ __________ _____________ ___ _
    /         |            /        |          |             /   | \
   |     LOCAL NEWS... YOUR HOME'S VALUE IS INCREASING.     /    |  \
   |__________|__________/__________|__________|___________/_____|   \
  /                                                              |----\
| Would you like to know by how much? Find out how much you've  |////|
| gained at HomeGain. Get a FREE, instant valuation report on   |////|
| your home, complete with prices of comparable homes recently  |////|
| sold in your neighborhood.                                    |////|
|                                                               |////|
|                |////|
| CLICK HERE                                                |////|
\_______________________________________________________________|____|
       /   \  /   \                                             /   \
       \___/  \___/  T h e   I n t e r n e t   T o u r B u s    \___/
       FIVE YEARS of Searchable Archives at http://www.TOURBUS.com !!
 
TODAY'S TOURBUS STOP(S):
    THE LOVE BUG
TODAY'S TOURBUS ADDRESS(ES):
    http://www.cert.org/advisories/CA-2000-04.html
 
Howdy, y'all, and greetings from the city of Tuscaloosa, Alabama,
former capital of the Ottoman Empire.  (I ran out of things to say
about my hometown, so I figured I'd just start making stuff up).  :)
 
TOURBUS is made possible by the kind support of our sponsors.  I thank
the folks at "HomeGain.com," "SmarterKids.com," and "Candlemart.com"
for making today's post possible.  As always, please visit our
wonderful sponsors and thank them for keeping the bus rolling!
 
 
+------------------------------------------------------------------+
   Get a FREE Children's CD-Rom with any order of $10 or more
   at SmarterKids.com, the web's leading online educational
   toy store. Choose from 10 of today's most popular children's
   software titles including favorites like Dr. Seuss, Arthur,
   Webster's, Sesame Street and more. (Values to $29.95.)
   Click by May 15th to Get Yours:
 
   
   CLICK HERE 
+------------------------------------------------------------------+
 
+-----------  SAVE 75% on a Great MOTHER'S DAY GIFT!   ------------+
 
  Fruit Jel Candle w/fruit chunks just $6.99 for a limited time.
  I'm sure you've seen them in stores for as much as $24.95 but until
  our stock is gone they are just $6.99 at the World's Largest Candle
  Store!  Daily Deal section has many items listed BELOW wholesale.
  We also offer a 100% money back guarantee on all of our products!
  http://www.candlemart.com/cgi-bin/orders/showproducts.pl?01-CC-573
 
+------------------[ http://www.Candlemart.com ]-------------------+
 
 
On with the show ...
 
------------------------------------------------------
I LOVE YOU ... I HONESTLY L#$@_^($@ ... **NO CARRIER**
------------------------------------------------------
 
Update your antivirus definitions, kiddies.  There's a new bug in
town: the "ILoveYou" worm (a.k.a. "VBS.LoveLetter.A").
 
Who is affected?  Anyone who is running Windows, especially if you
also have Windows Scripting Host enabled.  Should you panic?  NO!
This too shall pass (and, besides, there are some SIMPLE ways to
protect yourself from both the "ILoveYou" worm and the countless
copycat worms that are already starting to pop up).
 
Here's what's going on.  Someone sends you an email with the subject
"ILOVEYOU" and a body that reads "kindly ch3ck th3 attach3d LOV3L3TT3R
coming from m3."  Attached to the email is a file named "LOVE-LETTER-
FOR-YOU.TXT.VBS."  If you are foolish enough to double-click on the
attached file, that's when the fun begins.  [By the way, since many
ISPs are now automatically filtering ANY message that contains the
"kindly check ..." body text, I took the liberty of changing the
"e"s in that sentence to "3"s.  After all, we wouldn't want your ISP
to inaccurately think that today's TOURBUS post is actually the
dreaded "ILoveYou" letter.]  :)
 
Anyway, according to our friends at CERT, the organization formerly
known as the computer emergency response team, "when the worm executes,
it attempts to send copies of itself using Microsoft Outlook to *ALL*
the entries in *ALL* the address books."  [Emphasis mine]  In other
words, if you have Outlook and you foolishly double-click on LOVE-
LETTER-FOR-YOU.TXT.VBS, the worm will automatically email itself to
EVERYONE you know.
 
Oh, but wait.  It gets worse.
 
Even if you don't use Microsoft Outlook, the "ILoveYou" worm can still
do an unimaginable amount of damage to your PC.  According to CERT, if
executed, the worm will locate certain files on your computer (.vbs,
.vbe, .js, .jse, .css, .wsh, .sct, and .hta files) and replace them
with copies of the "ILoveYou" worm.  The worm will also take *ALL* of
the JPEG picture files stored on your computer and replace them with
worm-infected files.  (For example, a file named x.jpg will be
replaced by a file called x.jpg.vbs containing a copy of the worm).
And, for you music lovers who have MP3 and MP2 files on your PCs,
"ILoveYou" will create a copy of itself for every one of those files
as well.  (Fortunately, your original mp3 or mp2 files will still be
there, but they will be hidden).
 
Frightening, isn't it?  But wait ... there is even MORE!  CERT warns
that
 
      Since the modified files are overwritten by the worm code rather
      than being deleted, file recovery is difficult and may be
      impossible.
 
      Users executing files that have been modified in this step will
      cause the worm to begin executing again.  If these files are on a
      filesystem shared over a local area network, new users may be
      affected.
 
I may be wrong here, but I think the folks at CERT are trying to tell
us that if our PCs become infected with this little bugger, the only
way to fix it will be to format our hard drives and start from
scratch.  EEEK!
 
You can read *ALL* of CERT's comments on the "ILoveYou" worm at
 

http://www.cert.org/advisories/CA-2000-04.html .
 
With all of the nasty stuff that the "ILoveYou" worm does to your
computer, and with the squillion different copycat viruses that are
waiting in the wings, why on earth did I, a few paragraphs ago, tell
you NOT to panic?  Simple!  While the "ILoveYou" worm is frightening,
protecting yourself from it (and its ilk) isn't all that difficult ...
 
---------------------------------------------
Crispen's *SIX* Antivirus Rules -- 4 May 2000
---------------------------------------------
 
In light of the recent "ILoveYou" worm outbreak, I decided to re-
rewrite my rules on how to protect yourself from computer viruses,
Trojan horses, or worms.  Regardless of your operating system, these
six rules should protect you from most of the over FORTY-SIX THOUSAND
viruses that are currently floating around the Net (including the
"ILoveYou" worm).
 
----------------------------------------------------------------------
1. PURCHASE A GOOD, COMMERCIAL ANTIVIRUS PROGRAM LIKE NORTON ANTIVIRUS
    OR MCAFEE VIRUSSCAN.
----------------------------------------------------------------------
 
         Most commercial antivirus programs usually cost between US$40
         and US$50 and can be purchased at almost any computer store in
         the world.  [You can usually save about US$10 if you purchase
         the software online -- visit http://www.shopper.com/ for more
         information].
 
         Antivirus program manufacturers also release minor upgrades
         every two to three months and major upgrades every twelve to
         eighteen months.  YOU NEED THESE UPGRADES.  Minor upgrades are
         usually free, and major upgrades usually cost anywhere between
         US$20 and US$40, depending on the manufacturer [think of this
         as an expected expense -- just as you have to change your
         car's oil every 3,000 miles, you have to upgrade your
         antivirus software every year to year-and-a-half].
 
         To see if any minor or major upgrades are available for your
         antivirus program, visit your antivirus program manufacturer's
         homepage.  A list of antivirus manufacturers' homepages can be
         found at http://www.yahoo.com/ or at AOL keyword "virus."
 
----------------------------------------------------------------------
      2. UPDATE YOUR VIRUS DEFINITIONS FREQUENTLY (AT LEAST ONCE A
         WEEK).
----------------------------------------------------------------------
 
         With over 250 new viruses being discovered each week, if you
         don't update your definitions frequently you won't be
         protected from ANY of the new viruses floating around the Net.
 
         How do you update your virus definitions?  That depends on
         the antivirus program you use.  Norton Antivirus has a "Live
         Update" button built into the program; click on it, and Norton
         automatically downloads and installs the latest virus
         definitions from Net.  McAfee VirusScan has a similar update
         function (go to File --> Update VirusScan).
 
         If you are unsure of how to update your virus definitions,
         visit the homepage of your antivirus software manufacturer and
         look for their "download," "update," or "technical support"
         section.
 
----------------------------------------------------------------------
      3. NEVER DOUBLE-CLICK (OR LAUNCH) *ANY* FILE, ESPECIALLY AN EMAIL
         ATTACHMENT, REGARDLESS OF WHO THE FILE IS FROM, UNTIL YOU
         FIRST SCAN THAT FILE WITH YOUR ANTIVIRUS PROGRAM.
----------------------------------------------------------------------
 
         This is probably the most important rule of them all.  There
         are currently over forty-six thousand viruses out there, there
         are over 2.8 trillion possible files names out there, and any
         one of those viruses could be hiding in any one of those file
         names.  A lot of people think that you can protect yourself
         from a computer virus by being on the lookout for one
         particular virus or one particular file name (hence all of the
         virus warnings you have received in your email inbox lately).
         That's not only silly, that's dangerous.  If you want to
         protect your computer from viruses, you need to ignore ALL of
         the virus warnings you receive and instead beware of EVERY
         file you see, especially every file that is attached to an
         email message.
 
         It is important to note that, despite all of the warnings to
         the contrary, there is no such thing as an email virus.  If
         you are running the most up-to-date version of Windows (see
         rule #5 below) or if you have a Mac, you can open your emails,
         regardless of their subject lines, without fear of infecting
         your computer, provided your email program doesn't
         automatically open attachments (most don't).  It is the files
         that are ATTACHED to emails that you have to fear.
 
         Think of a computer virus as a well-packaged letter bomb.  You
         can move a letter bomb from room to room in your house without
         any danger.  Open the letter bomb, however, and you die.  The
         same is true with computer viruses.  You could download a
         billion virus-infected files from the Internet and receive
         another billion virus-infected files attached to email
         messages and your computer still wouldn't be infected with a
         virus.  Open, or double-click on, just ONE of those files,
         though, and your computer is dead.
 
         Remember, to infect your computer with a virus, you have to
         open (or double-click on) a file that contains a virus.  As
         long as you don't open that file, you really have nothing to
         fear.
 
         How can you scan a file for viruses?  That depends on the
         antivirus program you use.  The best bet is to read your
         antivirus program's instructions or read its online help
         section.  If you use Norton Antivirus or McAfee VirusScan,
         right-click (or, if you have a Mac, click and hold) on the
         file in question.  A pop-up menu should appear, and one of the
         choices should be "Scan with ..." and the name of your
         antivirus program.  If that doesn't work, just open your
         antivirus program and try to scan the file from there.
 
         Do you have to scan EVERY file, even if that file is from your
         friends or coworkers?  Yes!  The Melissa, WormExplore.Zip, and
         "ILoveYou" viruses distributed themselves by opening your
         email program, looking at either your 'friends' list or the
         list of email addresses in your inbox, and then distributing
         virus-infected files to everyone on that list.
 
         In the world of computer viruses, you can't trust ANYONE
         (even if they say they love you).  :P
 
----------------------------------------------------------------------
      4. TURN ON MACRO VIRUS PROTECTION IN MICROSOFT WORD, AND BEWARE
         OF ALL WORD MACROS, ESPECIALLY IF YOU DON'T KNOW WHAT MACROS
         ARE.
----------------------------------------------------------------------
 
         Word Macros are saved sequences of commands or keyboard
         strokes that can be stored and then recalled with a single
         command or keyboard stroke.  They enable advanced Word users
         to easily accomplish what would otherwise be difficult tasks.
         They also allow virus writers to do serious damage to your
         computer.  For example, the Melissa virus was actually a Word
         Macro virus.
 
         If you use Word 97, go to Tools --> Options.  Click on the
         "General" tab.  Make sure that "Macro virus protection" (at
         the bottom of the list) is checked.
 
         If you use Word 2000, Double-click on the Tools menu, point to
         "Macro," and then choose "Security."  Select the level of
         security you want.  High security will allow only macros that
         have been signed to open.  Unsigned macros will be
         automatically disabled.  Medium security always brings up the
         macro dialog protection box that allows you to disable macros
         if you are unsure of the macros.
 
         With Macro virus protection turned on, Microsoft Word will
         warn you every time you try to open a Word document that
         contains a macro.  The warning gives you three choices: the
         option to open the file but disable its macros ("disable
         macros"), open the file with macros enabled ("enable macros"),
         or the option to not open the file ("do no open").  Chose the
         first (default) option: "disable macros."
 
         For more information, visit the Macro Virus Protection page at
         http://officeupdate.microsoft.com/focus/articles/o97mcrod.htm
 
----------------------------------------------------------------------
      5. RUN WINDOWS UPDATE AT LEAST ONCE A MONTH
----------------------------------------------------------------------
 
         Windows is aptly named because it is full of holes.  There are
         several, inadvertent 'open doors' (or 'security holes') in the
         Windows operating system that *COULD* conceivably make your
         computer vulnerable to outside attack.  In specific, a mean-
         spirited hacker *COULD* 'walk through' one of these open doors
         on your Windows PC and read any file on your computer, delete
         specific files or programs, or even completely erase your hard
         drive.
 
         When the folks at Microsoft discover a security hole, they
         immediately release a software patch to close it.  Without the
         patch -- and there are MANY -- your computer is wide open to
         outside attack.
 
         Fortunately, downloading these patches couldn't be simpler.
         Built into every 98 PC (and into every version of Microsoft's
         Internet Explorer since version 4.0)is something called
         "Windows Update."  Windows Update is an easy-to-use tool that
         helps you ensure that your PC is running the absolute latest
         Microsoft software patches and drivers.
 
         Here is how to use Windows Update to download all of the
         security patches Microsoft has released since your PC was
         made:
 
              1. Connect (or logon) to the Internet.
 
              2. If you have Windows 98, launch Windows Update by going
                 to Start --> Settings --> Windows Update on your PC.
                 You can also launch Windows Update by going to Tools
                 --> Windows Update in either Internet Explorer 4 or 5.
                 Either way will connect you to Microsoft's Windows
                 Update page [ http://windowsupdate.microsoft.com/ ].
 
                 By the way, if you don't have Internet Explorer 4 or
                 later, Microsoft's Windows Update page will
                 automatically talk you through the process of
                 downloading and installing the latest version of
                 Internet Explorer.
 
              3. On the top left-hand side of the Windows Update page,
                 click on the "Product Updates" link (it is the one
                 with the hand and the red *)
 
              4. A pop-up window will appear, telling you to wait while
                 your computer DOESN'T send any information to
                 Microsoft (well, that's what it says!)
 
              5. Eventually, you'll see a page that says "Select
                 Software."  When Microsoft releases an essential
                 update or patch to close a security hole in Windows,
                 they put it in this page's "Critical Updates" section.
                 Select (or click on) EVERYTHING in the "Critical
                 Updates" section -- you need *ALL* of the critical
                 updates -- and then click on the big, gray "Download"
                 arrow in the top right hand corner of the page.
 
              6. Follow the on-screen prompts.  That's it!  :)
 
New security holes are found in Windows every week or two, so it is a
good idea to run Windows Update at least once a month.  The first time
you run it, expect to see a MESS of critical updates.  After that,
though, there should only be one or two critical updates you'll have
to download every month.
 
----------------------------------------------------------------------
      6. IF SOMEONE UNEXPECTEDLY SENDS YOU AN EXECUTABLE FILE OR VISUAL
         BASIC SCRIPT FILE -- IN OTHER WORDS, A FILE THAT ENDS IN .EXE
         OR .VBS -- THROW IT OUT.
----------------------------------------------------------------------
 
         Most of the forty-six thousand viruses that are floating
         around the Net right now are hiding in executable files.  Some
         of the most vicious, new viruses are hiding in Visual Basic
         script files.  If someone, even a close personal friend,
         unexpectedly sends you a file that ends in .exe or .vbs -- or
         if they unexpectedly send you a zipped file that contains a
         file or files that end in .exe or .vbs -- your safest bet is
         to delete the file without opening it.
 
         The key word here is "unexpectedly."  If you are expecting a
         friend to send you an executable file, you certainly don't
         need to delete that file -- just virus scan it first before
         you open it.
 
         However, if you are in an environment (like a home) where you
         don't often receive ANY files attached to your incoming email
         messages, a better rule would be: "When in doubt, throw it out
         ... and doubt EVERYTHING."
 
How well will these six rules protect your computer from becoming
infected with a virus, Trojan horse, or worm?  Take a look at the
following questions, and decide for yourself.  How many people whose
computers were infected with the "ILoveYou" virus ignored at least one
of these rules?  ALL OF THEM!  How many people who followed these six
rules had their computers infected by "ILoveYou?"  NONE OF THEM!  How
many people whose computers were infected with the WormExplore.Zip
virus ignored at least one of these rules?  ALL OF THEM!  How many
people who followed these six rules had their computers infected by
the WormExplore.Zip virus?  NONE OF THEM!
 
These six rules will not protect you from every computer virus, Trojan
horse, or worm, but they will so significantly decrease your
computer's chances of becoming infected that you can all but forget
about the next virus scare and all the ones that will follow.
 
TODAY'S TOURBUS STOP(S):
    THE LOVE BUG
TODAY'S TOURBUS ADDRESS(ES):
    http://www.cert.org/advisories/CA-2000-04.html
 
---------------------------------
TODAY'S SOUTHERN WORD OF THE WEEK
---------------------------------
 
BAUGH-WEE (noun).  A male child.
Usage: "Baugh-wee, you have any idea how fast you's drivin?"
 
[Special thanks go to J. Ray Bobo for today's word]
 
You can find all of the old Southern Words of the day at

http://netsquirrel.com/crispen/word.html 
 
The Internet Tourbus - U.S. Library of Congress ISSN #1094-2239
Copyright © Bob Rankin and Patrick Crispen - All rights reserved
=====================[ Tourbus Rider Information ]===================
=
    The Internet Tourbus - U.S. Library of Congress ISSN #1094-2238
      Copyright 1995-2000, Rankin & Crispen - All rights reserved
 
  Like Tourbus?  Recommend It!  You could Win $10K or a Sony DVD Player
   CLICK HERE 
 
  HELP the hungry, poor and sick - for free!  http://FreeDonation.com
 
  Join : Send SUBSCRIBE TOURBUS Your Name to LISTSERV@LISTSERV.AOL.COM
  Leave: Send SIGNOFF TOURBUS to LISTSERV@LISTSERV.AOL.COM
  Note : Put LISTSERV commands in the message BODY, not SUBJECT line.
 
  Tourbus Home: Archives, Free Stuff and More - http://www.TOURBUS.com
======================================================================
 
            .~~~.  ))
  (\__/)  .'     )  ))       Patrick Douglas Crispen
  /o o  \/     .~
{o_,    \    {              crispen@netsquirrel.com
   / ,  , )    \           http://www.netsquirrel.com/
   `~  '-' \    } ))    AOL Instant Messenger: Squirrel2K
  _(    (   )_.'
'---..{____}                  Warning: squirrels.

TOURBUS
HOME PAGE
LINUX
TUTORIAL
TOURBUS
ARCHIVES
TOURBUS - 04 MAY 00 - THE LOVE BUG, viruses, hoaxes, urban legends, search engines, cookies, cool sites
TOURBUS Site Search