Current Virus Alerts
Several vunrabilities exist in Microsft windows Xp if you have Xp go to windows security center to see how you can protect your PC by enableing your firewall and automatic updates. You can also optain Windows Service Pack 2 here
The Beagle virus is a virus that is transmitted by e-mail. Once infected the virus sends it's self out to other recipients in your address book. The virus also changes the return address on the message that was sent to a randomly picked address in your address book in the attempt to hide it's origin. The Beagle also sends an attachment with the e-mail. This attachment is usually a .zip or .rar file, the attachment is also password protected and requires you to type in the password that is given.This virus also states to be from your Internet Service Provider. This is some of the common message type.
Dear user of ( your ISP name),
1. Your e-mail account has been temporary disabled because of unauthorized access.
The Welchia Virus takes advantage of some of the same flaws in windows that the Blaster Viruse Exploits. If you have Windows XP please download and run this free removal tool, once this is done be sure to do your Windows updates and use a antivirus program to further protect your system. Click here for the free removal tool. and select open to run this tool.
W32.Blaster.Worm is a worm that exploits the DCOM RPC vulnerability using TCP port 135. The worm targets only Windows 2000 and Windows XP machines. We recommend downloading and running the removal tool and patch. Also make sure you have a virus program installed and that it is up to date.
We also recommend visiting the symantec web site for more info. www.symantec.com
W32 KLEZ was first discovered on April 17 2002. This virus is a variant of the older Klez virus. This virus enters your computer via e-mail. After the initial infection the virus, like many others looks in your ICQ and address books. After finding recipients it e-mails all a copy of it's self, and has the ability to randomly add a unique subject line to the e-mails, to make it look harmless, (i.e.: thought you would like this, it's cute). This e-mail will be sent with your return address or from one in your address book. After reproducing the virus then goes to your program files and begins to infect them. Any files that are infected will not be able to be fixed and will have to be uninstalled and reinstalled. This includes your virus protection program if infected. The most common reason for infection is not having a virus program installed or using out a date definitions. To obtain a free KLEZ removal tool click here
What Is NIMDA?
NIMDA is a complex threat that attacks through many different vulnerabilities, possibly existing on your computer. Once infected, your PC will begin to rapidly infect other machines, causing enormous volumes of traffic over the Internet and impacting the overall system performance of the Internet and your computer(s).
How Does It Spread?
NIMDA primarily spreads through e-mail and web-browsing activities. Unlike past e-mail viruses, NIMDA can infect your computer if you merely read, or even preview an e-mail with the virus attached. Similarly, your computer can become infected just by browsing to an infected web site. The virus can also spread through shared networked drives, and for computers running Windows NT 4.0 or Windows 2000, through the web server component.
How To Protect Your PC
The common vulnerability that the NIMDA worm exploits lies with certain versions of the Internet Explorer® program. If you use Internet Explorer as a web browser on your computer or use Outlook or Outlook Express, you will need to download the appropriate patch from Microsoft to protect both your system and the Final Communications Network. To update Internet Explorer Version 5.01 and 5.5, follow the link
Note: Internet Explorer Version 5.01 Service Pak 2, Version 5.5 Service Pack 2 and Version 6.0 are not vulnerable. If you are not sure which version you are running, we suggest you download and install the patch as a precaution, or click here to download Internet Explorer 6.
If you are running Internet Information Services (IIS) on Windows 2000 or Windows NT, you should uninstall that component from your system. If you choose not to remove the software, you will need to ensure you have downloaded all the necessary patches. A cumulative patch for IIS 4.0 and IIS 5.0 is available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-044.asp.
Remember, if you are operating a home network, you should take the steps outlined above on each of your computers, not just the machine used as the internet server.
As always, we strongly recommends the use of updated anti-virus and personal firewall software on all of your computers.
Please be aware that should your machine become infected and start impacting the performance of the Final Communications network, will have no choice but to disable your account until problem is remedied.
For more information on the NIMDA worm, please visit:
SANS Emergency Incident Handler at http://www.incidents.org/react/nimda.php
Microsoft at http://www.microsoft.com/security
The Homepage virus
I love you
If you receive a E-mail with this as the subject it may be a virus, this is the most wide spread virus since Melissa a year or so ago . Variants of this have already occurred . This tempts the recipient to open a attachment that is disguised as a love letter. Once opened the virus infects your computer, and proceeds to send itself to all contacts in your Outlook or Outlook express mail program . It can also corrupt files on your hard disk. Visit http://www.symantec.com for a more detailed description. VBS love letter Fix can be found HERE
This worm program behaves similarly to Happy99 Worm. It was originally spread by email spamming from a French email address. The first report of this worm was submitted through our exclusive Scan & Deliver system on May 28, 1999 from France. When the attached program file, PrettyPark.exe, is executed, it may display the 3D pipe screen saver.
Once the worm program is executed, it tries to email itself automatically every 30 minutes (or 30 minutes after it is loaded) to email addresses registered in your Internet address book.
It also tries to connect to an IRC server and join a specific IRC channel. The worm sends information to IRC every 30 seconds to keep itself connected, and to retrieve any commands from the IRC channel.
Via IRC, the author or distributor of the worm can obtain system information, including the computer name, product name, product identifier, product key, registered owner, registered organization, system root path, version, version number, ICQ identification numbers, ICQ nicknames, victim's email address, and Dial Up Networking username and passwords. In addition, being connected to IRC opens a security hole in which the client can potentially be used to receive and execute files.
It creates a file called files32.vxd in the Windows\System directory and modifies the following registry entry value from "%1" %* to files32.vxd "%1" %* without your knowledge:
Download the Pretty Park.worm removal tool from Symantec . Click Here
If you receive a E-mail with a attachment called happy 99 don't open it. Most likely its a Worm / Trojan Horse Virus Designed to crash E-mail servers, but has also been noted to cause mail programs on individual machines to crash, lock or not work at all. If you clicked on the attachment and saw fireworks your probably infected with this virus. One way to check and see if you have this virus it to go to the start button then find and search for files called *.ska if you find any you have this virus.
Here is another type of Worm / Trojan Horse Virus that is fairly new, this one is similar to the happy 99 virus but will do damage to files on your computer or network . It will actively search out files with these extensions and try to destroy them ( .h .c .cpp .asm .doc .xls ) this one usually shows up in your mail labeled as attached zipped docs.
This is a word macro virus and is spread thru email also . It does this by sending a infected word macro document . The Subject will appear in the E-mail as
Important message from<name>
And the message will state here is the document you requested , don't show anyone else!!!
These are Just a few that have been going around lately that you should be on the lookout for.
Remember : Be wary of clicking on files from people you don't know.
Or suspicious files. Especially ones with the extension .exe . Also use a good virus program , for its ease of use and one button update feature I recommend Norton Anti-Virus version 5.0 or 2000
344 central Ave.
Silver Creek NY. 14136
copyright © Final Communications