Computer viruses cause actual damage to systems or lead to knowledge theft. The consequences are lost time, broken programs & sometimes actual money stolen.
A hoax can have these same consequences.
A virus hoax is usually distributed by e-mail to 'warn' recipients of a brand new threat to computer systems security. After detailing how this new virus is a serious threat, the e-mail advises you to forward the message to everyone you know. This 'chain letter' effect causes kind of actual harm.
Virus hoaxes can circulate widely. Suppose a recipient distributes it to0 people & each of those0 people distribute it to0 more people, & so on down the line. After only generations, a million bogus e-mail messages will circulate throughout the Net. By the seventh generation the number reaches0 million, & by the eighth generation - 100 million e-mail messages that serve no purpose are clogging up networks worldwide.
Often such hoaxes are forwarded with lovely intentions. A classic example is the e-mail warning about a virus called 'Deeyenda', circulating since 1995. It claims a virus called Deeyenda is circulating by e-mail. The e-mail explains the FCC (Federal Communications Commission) has issued warnings about this virus, & advises the recipient to pass the message on.
This effect may cause servers or routers (specialized computers that route Web traffic) to slow down or even crash.
Everything about the warning is false. Viruses cannot be activated by reading a text e-mail & the FCC doesn't issue warnings about viruses. (Adware, yes. But then it is not usually a warning, but the announcement of a criminal indictment.) Furthermore, there has never been a virus called Deeyenda.
Even a hoax can do actual method destroy. Some warn the user to delete positive files allegedly containing the virus. Such files are usually (unknown to the average user, of work) critical to proper computer operation. Deleting them may have no immediate effect - until the method is re-booted & fails to start.
How to Combat Virus Hoaxes
Fighting a hoax starts with 'recognizing the enemy'.
Clue that a warning is bogus is the use of technical jargon. The 'Good Times' virus hoax contained this warning: 'If the program is not stopped, the computer's processor will be placed in an nth-complexity boundless binary loop which can severely destroy the processor.' This sounds impressive, but in fact there is no such thing as an nth-complexity boundless binary loop. Also, no processor can be harmed by excessive use. Your system may be busy to system desired commands, but no actual harm is done to the hardware.
Virus hoaxes often contain references to actual organizations such as the FCC or a company specializing in antivirus application. If the warning is actual, it will be simple to confirm on these organizations' sites. If the virus warning is actual, you can expect to find references to it in print, on TV, as well as all over the Net.
It ought to go without saying, though some have fallen prey, ought to seldom 'buy' from somebody unknown proposing to 'cure' your virus infection. There is a lot of legitimate antivirus vendors - some offer downloadable products, others provide a service over the Net. But all can be verified by reviews in trade publications & valid testimonials from trusted sources.
Tidak ada komentar:
Posting Komentar