The criminals who change or delete data, or who deliberately gobble largeamounts of computer resources, have a more sinister motive and arecapable of doing immense damage.
The Deeyenda virus also has the capability to stay memory resident while running a host of applications and operation systems, such as Windows 3.11 and Windows 95.
Hoaxes commonly show the following common characteristics:
Other Trojan Horses are downloaded (perhaps in an attachment in e-mail) and installed by the user, who intends to acquire a benefit that is quite different from the undisclosed true purpose of the Trojan Horse.
This is enticement for you to spread the hoax.
Examples of HoaxesA typical hoax in the 1990s warned the recipient that reading an e-mail withthe specified subject line would infect their computers with a virus.
There are many different versions, most of which share key phrases.
Before the year 2001, it was not possible to infect a computermerely by an e-mail: one needed to click on an attachmentthat executed a malicious program.
Here is a version from the Anti-Virus website:
According to this article, a chain letter has three parts:
More on chain letters can be found by using a search engine to seek "chain letters" or "urban legends".
Unauthorized changing of data is generally a fraudulent act.
In 1999, the virus infected a [possibly confidential] document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people.
Please be careful and forward this mail to anyone you care about.
Ifhe were a religious man, he would be one of the most trulyreligious and reverential; he has a very high and noble nature,and better worth immortality than most of us."Although Melville never corresponded with Hawthorne again, he didnot forget him.
This is called a denial of service () attack.
So that you can see examples of how past hoaxes use the characteristicfeatures mentioned , I reproduce thetext of the following hoaxes about computer viruses,in chronological order.