Problem solve Get help with specific problems with your technologies, process and projects.

Using a fictional e-mail address to isolate malware

Here's one way of catching malware before it spreads throughout your network.



This tip was submitted to the searchSecurity Tip Exchange Contest by user Brandon Henrie. Let other users know how useful it is by rating the tip below.

Keeping viruses out of the system has been priority #1 for some time. We found that when we could detect an infected user sooner rather than later, we saved in lots of ways. Our solution was to add a fictional user to the address book who would receive infected e-mails. In the contact name field we added the computer name, as well as the branch it's working in so that we know the actual infected PC, as well as the branch, so that we could contain the problem as quickly as possible. This way, we are able to inform someone they have a virus, rather than wait days to hear about computer problems.


This was last published in November 2001

Dig Deeper on Malware, virus, Trojan and spyware protection and removal

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close