About WebLens

Internet Hunt

New! A-Z Index

WebLens Blog
Tips and tricks on writing, photography, Internet, CSS, blogging, web design and more

Privacy Policy


Main Search

Search engines


Web directories

Jumplists & gateways

Blog search & blogging tools

Invisible web

Scholarly & academic research

Reference desk tools

Job Search

Freelance & elance resources

Career planning tools

Resume help

Youth & student employment

Finding jobs Online

Travel Research

Booking your trip

Destination research

Locating airlines

Finding accommodations

Bargains & discounts



Canadian info

Companies & corporations

Debate & discussion

Genealogy tools


Health Resources

Images & Stock Photos

Safe search & kids' resources

Money & finance

Music & MP3 search


News, weather, sports

People & business finders


Shop online

Software downloads

Writers' resources

Search Help

Constructing queries

Search tips & tricks

Feature comparison chart

Information integrity

More search resources

Internet beginner's guides

Web Design & SEO

Web design tools & resources

Domain name tools

Optimizing your site

Submitting your site

Internet advertising resources

Net demographics research

Online payment processing

Tech Tools

Spyware & ad blockers

Fighting viruses & hackers

Identifying myths & hoaxes

Internet troubleshooting

Ask an expert

Custom Search

Quik Tip

Need to perform the same search frequently? Save it as a favourite, or enroll to receive Google Alerts, emailed web or news search updates. More information here.
Powered by Conduit

Tools for Fighting Viruses, Worms, & Hackers

Virus makers continue to invent ever more cunning ways to sneak into your computer. This is evidenced by the latest assault on your computer's security, the Nimda worm. One of the worst yet, Nimda has spread faster and has done more damage than the infamous Code Red worm that preceded it. Like Code Red, Nimda is technically not a virus, but a worm. It has the potential to infect PCs running Windows 95, 98, ME, NT, or 2000 and servers running Windows NT and 2000. It spreads aggressively and has four distinct propagation mechanisms. Like many other worms, Nimda targets known security holes in Internet Explorer, spreading via email and the Web as well as through open file shares. It exploits the user's Outlook and Outlook Express address books to spread and, like other recent worms, is executed automatically when an infected message is merely viewed — without even opening the attachment! These developments mean that Internet users must be more vigilant than ever. Protect your computer by installing the anti-virus and/or firewall software provided by the vendors below. Check the links below for more information about viruses.

Note: Blackstone Marketing & Communications accepts no liability whatsoever for any consequences users experience as a result of downloading and/or installing programs and/or security patches listed on this page.

Understanding Today's Security Threats

Not Just Email: Web-Aware Worms

8Wire: Nimda Worm a Cocktail of Trouble Incidents.org: Nimda Propagation Mechanisms Counterpane: Nimda Will Resurrect Itself Every 10 Days ZDNet: How Code Red Revealed the Perils of Port 80 CERT Advisory: Malicious HTML Tags Embedded in Web Requests

Deception & Trickery

War Vote: Masquerades as Email Poll Kournikova: Disguised as Sexy Photo Naked Wife: More Sexy Stuff Stages Worm: Looks Like Harmless Humourous Text File LoveBug: Declaration of Love Mother's Day: Gift Order Confirmation VBS.Hard: Masquerades as Alert from Symantec Fake Nimda Fix: Disguised as Message from SecurityFocus & TrendMicro

Virus Profiles & Repair

Norton: Nimda Description Norton: War Vote Description (Subject line is a message for "peace between America and Islam") Norton: Code Red Description Norton: AnnaKournikova Description (fake JPG) Norton: Hybris (Snow White) Description Norton: KakWorm Description (no attachment necessary) Norton: Melissa Description Norton: LoveLetter Description Norton: Nimda removal tool Norton: Other Removal Tools Norton: Full List of Viruses, Worms & Trojan Horses

What About Macintosh?

Viruses and the Mac FAQ ICSA Labs: Mac Viruses

General Virus Information

Symantec Anti-virus Research Center (SARC) SARC Virus Encyclopedia SARC Virus Hoax List SARC Virus Calendar SolveNET Virus Tips CERT Computer Virus Resources Viruses, Worms, Trojan Horses: What's the Difference? Symantec: Guide to Malicious Code

Security News

CERT SecurityFocus AntiOnline Internet Security Review CNN: Insurgency on the Internet Frontline: Hackers @Stake Security Consulting (was elite hacker group LOpht) ZDNet: Security News Shields Up! Security Newsgroups

Tools for Fighting Viruses, Worms & Hackers

Anti-Virus Software Vendors

Norton McAfee Sophos Trend Micro F-Secure VirusStriker My-eTrust (was INoculateIt) C|Net List (Mac) C|Net List (PC)

Online Virus & Security Scans

McAfee Online Scan Symantec Virus & Security Check Shields Up! (Highly recommended)

Firewall Software Vendors

How do Firewalls Work? Zone Alarm (shareware) Black Ice (shareware) Norton Personal Firewall Norton Internet Security (firewall & anti-virus protection) McAfee Personal Firewall My-eTrust (was INoculateIt) Steve Gibson's LeakTest software download LeakTest Firewall Scoreboard

Outlook/IE Security Patches

Autoexecute Email Attachments Update (Nimda exploits this hole) Scripting Update (Kakworm) Microsoft Scripting Update (8/1999) Microsoft V-Card Vulnerability Update (2/2001) Outlook 2000 Email Security Update (6/2000) Outlook 98 Email Security Update (6/2000) Microsoft Updates: Nimda, Code Red, Kakworm, & Other Threats Microsoft: Other Security Updates for Explorer & Outlook Microsoft Security Patch Search SlipStick Systems: Protecting Outlook Against Viruses Exchange Administrator: Outlook Security Discussion Microsoft Security Home

More Security Tools & Techniques

CERT: Home Network Security Microsoft Word 2000 Viewer Microsoft Word 97 Viewer How to Use Security Zones in IE How to Back Up the Windows Registry How to Disable the Windows Scripting Host How to Use Norton Anti-Virus 2000 With Eudora Port Numbers and Uses Simovits: Ports Used by Trojans Sans Institute: What Ports Do Well-Known Trojan Horses Use? ZDNet: Plug Open Ports for Security