. Hi! Take a deep breath, and repeat this mantra: You Can't Get A Virus By Reading A Mail Message... You Can't... Usually the unfortunate victim of a virus doesn't understand the critical difference between opening a mail message (safe), and opening/executing/decompressing an attached file (sometimes not so safe). The 'net is a fertile breeding ground for many varieties of viruses and "Trojan horses", but it doesn't have to be a hotbed for unwarranted panic, too. In order to keep the hysteria down to a manageable level, the next time you receive a frantic warning about a new mail virus, reply with this... The following quotes are from the CIAC Internet Hoaxes page: http://ciac.llnl.gov/ciac/CIACHoaxes.html Yours in science... Ref: http://www.apc.net/ia/gmailspm.htm#hoaxes >The Internet is constantly being flooded with information >about computer viruses and Trojans. However, interspersed >among real virus notices are computer virus hoaxes. ... >Users are requested to please not spread unconfirmed >warnings about viruses and Trojans. If you receive an >unvalidated warning, don't pass it to all your friends, >pass it to your computer security manager to validate >first. ... >For a virus to spread, it must be executed. Reading a mail >message does not execute the mail message. Trojans and >viruses have been found as executable attachments to mail >messages, but they must be extracted and executed to do any >harm. However, R.M. III may be onto something (caution - satire!): >From: ROBERT MORRIS III Subj: VIRUS ALERT > >Warning: There's a new virus on the loose that's worse than >anything I've seen before! It gets in through the power >line, riding on the power line 60 Hz subcarrier. It works >by changing the serial port pinouts, and by reversing the >direction one's disks spin. Over 300,000 systems have been >hit by it here in Murphy, West Dakota alone! And that's >just in the last 12 minutes. > >It attacks DOS, Unix, TOPS-20, Apple-II, VMS, MVS, Multics, >Mac, RSX-11, ITS, TRS-80, and VHS systems. > >To prevent the spread of the worm: > >1) Don't use the power line. >2) Don't use batteries either, since there are rumors that > this virus has invaded most major battery plants and is > infecting the positive poles of the batteries. (You > might try hooking up just the negative pole.) >3) Don't upload or download files. >4) Don't store files on floppy disks or hard disks. >5) Don't read messages. Not even this one! >6) Don't use serial ports, modems, or phone lines. >7) Don't use keyboards, screens, or printers. >8) Don't use switches, CPUs, memories, microprocessors, or > mainframes. >9) Don't use electric lights, electric or gas heat or air > conditioning, running water, writing, fire, clothing, or > the wheel. > >I'm sure if we are all careful to follow these 9 easy >steps, this virus can be eradicated, and the precious >electronic fluids of our computers can be kept pure. .