Here I will breakdown our partners that give Invisus' customers the protection they will ever need!

Anti-Virus= Sophos
(An article I found from Brooklyn College)

Viruses are a constant threat to the college's computing infrastructure. Thanks to our SOPHOS desktop/server virus protection, and our ANTIGEN email virus protection, BC has escaped the scourge of many major virus epidemics that have plagued other organizations throughout the world.

Sophos may not be a familiar name to you because, unlike Norton and McAfee, Sophos markets its product to corporate customers only, so you will not find it pre-installed on a personal computer purchased at retail. However, Sophos has been in business for many years and its software is designed to work in large networked environments such as we have here at the college. The software uses a combination of virus scanning and checksumming to minimize the number of times each file needs to be virus-checked, thus minimizing impact on computer and network performance. Heuristic capabilities built into the software allow the detection of virus variants that have not yet been analyzed by the Sophos (or other) labs. You can learn more about Sophos at http://www.sophos.com.

The SOPHOS upate program checks for vital updates every hour to insure that your computer is as well protected as possible.

What are Computer Viruses?

A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are created by people. Even a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. A more dangerous type of virus is capable of transmitting itself across networks and bypassing security systems.

Virus Hoaxes & Chain Letters

Hoaxes usually arrive in the form of an e-mail and contain bogus warnings often intended only to frighten or mislead users. Hoax messages try to get you to e-mail them to everyone you know.

Chain letters have the same purpose as hoax messages but use a slightly different method of coercing you into passing them on to everyone you know. Chain letters generally offer luck or money if you send them on and play on your fear of bad luck. Chain letters that deal in money are illegal no matter what they state in the letter.

Probably the biggest risk for hoax messages is their ability to multiply. Mail servers may not have the capacity to handle the volume of messages and may slow down to a crawl or crash.

Please disregard hoax and chain letter e-mail.. The best course of action is to simply delete them.
Top 10 virus hoaxes
1 Hotmail hoax
2 Olympic torch
3 A virtual card for you
4 M&S vouchers
5 Meninas da Playboy
6 Bonsai kitten
7 Bill Gates fortune
8 Justice for Jamie
9 MSN is closing down
10 Budweiser frogs screensaver
Source: Sophos Anti-Virus

Virus Protection at BC
Viruses are typically spread by opening certain file types such as executable or command files. These files usually end with either an .exe or .com extension and can be spread via e-mail attachments. BC has three levels of virus protection:

* All e-mail sent to anyone whose e-mail address ends in "@brooklyn.cuny.edu" is automatically checked for viruses before arriving at your desktop. Suspicious e-mail attachments are quarantined for three days before forwarding.
* If e-mail with a known virus is detected on the BC E-mail Server, the attachment is deleted and replaced with a harmless text file. Your e-mail message will alert you that the malicious file has been replaced.
* Anti-virus software is installed on all computers. Anti-virus programs can detect and remove viruses on your desktop.

Virus Prevention

While all e-mail sent to anyone @booklyn.cuny.edu is scanned, viruses can still get through. E-mail from 3rd party e-mail accounts (Hotmail, MSN, Yahoo, etc.) that are checked on campus via web browsers can contain viruses. Viruses can also come from opening email attachments via Usenet news groups or listservs. Therefore, we recommend checking e-mail from these accounts off campus, and scanning any disks brought from home or third party applications not supported by the college.

Get this level of protection NOW!

Jennifer Sasser
478-338-2469

Related Articles

Valentine's E book

This e book was written because of my concern for the breakdown I have seen in families, which leads to the breakdown in so many other aspects of our lives. Our businesses can suffer when we are not totally contented. And there is nothing in this world that can give as much contentment as love. Busi...

Divorce - the other side of the coin

Nowadays, happy couples decide to change their lives as they reach the conclusion that they get along together. Individuals may marry for several reasons, but the emotional one underlies to such a decision. The bond that is established through marriage should be for a lifetime, but that is n...

Getting the best possible towing auto to your needs

Should you're feeling the need in order to get the very best possible towing automobile as a way to get your automobile to the nearby maintenance lot, then it's very important of you to think of requiring the aid of towing simi valley. With this particular, you will have the ability to get the best ...

New Money Making Method - Get Traffic By Talking

I just found a NEW money making method.A chance to partner with a millionaire...And get traffic by talking.Seriously. Just talk.Then get traffic when you automatically golive on...* WordPress In 1 Minute* FaceBook In 2 Minutes* Google In 10 MinutesAnd do it all, just by talking for a few minuteseach...

The Truth About the Average Twitter User

A study from security firm Barracuda Labs provides some interesting insights into the state of the Twitterverse. Unfortunately for the microblogging startup, the stats say that most of its users aren’t very active.The study looked at around 19 million Twitter accounts in order to figure out how pe...

Computer : Feminine or Muscular

It just my opinion that COMPUTER is more Feminine than Muscular ! Anyone agree ?Computer need an expensive accessories therefore we need to spend more money rather than we gain money by using Computer. Computer will give you any information that you need even every single information Computer will r...