top curve

Viruses and Worms

This page is under construction. Please email if you have any specific questions.

Safe Computing Practices

Following safe computing practices is the key to keeping your computer and work safe. While some attacks are virtually impossible to block, the majority of viruses and worms can be kept at bay by simplying being alert to what you are doing. Below are descriptions of the common types of attacks that can occur and ways to ensure that you are not made a victim.

Spoofed Emails

These days it is not uncommon to receive spoofed emails on a regular basis. A spoofed email is an email whose headers are altered to appear like they are from someone or somewhere else other than the actual sender. Spoofed emails are used by spammers to hide the actual location of origin. These emails often have stories as messages and typically are asking for donations or money of some sort. The only true method of dealing with these emails is to delete them.