Learn about computer virus myths, hoaxes, urban legends, and the implications if you believe in them. You can also search a list of computer virus hoaxes from A to Z.
1995-2002 Symantec Corporation. All rights reserved. Legal Notices Privacy Policy Symantec Security Response uncovers hoaxes on a regular basis. These hoaxes usually arrive in the form of an email. Please disregard the hoax emails - they contain bogus warnings usually intent only on frightening or misleading users. The best course of action is to merely delete these hoax emails. Please refer ...
www.symantec.com/avcenter/hoax.html
TruthOrFiction.com View Stories By Subject Search New and Updated Anatomy of a Rumor Contact Us About Us Animals Attack On America Aviation-Space Celebrities Education Food-Drink Government Household Humorous Stories Insects-Reptiles Inspirational Internet-Computers Medical Military Miscellaneous Missing Persons Pleas for Help Politics-Politicians Prayer Requests Promises Religious-Spiritual ...
Lies, Damn Lies & ICQ Messages - humorous and occasionally sarcastic analysis of the rumor message passed on Mirabilis's popular ICQ pager.
diamond-back.com/icqlies.html
More than 126, 450 links! 118, 200 links, categorized & cross-referenced, in over 150 categories. Another 8, 200+ uncategorized new links in the works.
www.cyndislist.com/internet.htm
Get the FACTS and TRUTH about so-called e-mail viruses and why they are hoaxes. Includes Good Times, Deeyenda, Irina, and others.
www.gerlitz.com/virushoax
How to Spot a Virus Hoax Joe Wells Senior Editor antivirus online January 10, 1997 Table of Contents Abstract Part 1. Hyperdriven Part 2. Chain Letters from Hell Part 3. Good Times Part 4. Hoax Heuristics Part 5. Deeyenda Part 6. Penpal Part 7. Handling Hoaxes Top of Page Next Page back to index ...
www.research.ibm.com/antivirus/SciPapers/Wells/HOWTOSPOT/howtospot.html
Virus Myths ...
www.stiller.com/myths.htm
Hoaxes about computer viruses and worms, and how to recognize a hoax ...