In Addition To Anti-Virus Software Protection...
There are some KNOWN security vulnerabilities that have been, slowly but surely, being exposed, then overcome, in both Internet Explorer browser(s), Windows Socket winsock.* and winsock32.* file architecture and even Outlook and Outlook Express softwares.
These security holes were most notably exploited by the
Nimda virus epidemic. That particular virus (I can't recall off the top of My head, which variant) exploited known security holes in Microsoft Windows IP (Internet Protocol) handling architecture to invoke a mass mailing worm in tandem with a destructive payload. Succeptibility was somewhat lower for 3rd party browser software users (i.e. Netscape), but the Windows socket architecture would still support (via cookies) the invocation and execution of a fairly transparent (readme.txt) or (readme.exe) file, which stealthily uploaded itself and "self extracted" its malicious payload. In summary, anti-virus software was simply NOT QUITE enough protection against a virus of such unprecendented stealth. All you had to do was visit ANY unwittingly "infected/host" Internet destination which were often "frequently visited" destinations in your libary of Site Links and SHAZAM! You were afflicted!
The good news for Windows users is that Microsoft realized the "folly of its ways" in designing that architecture and its vulnerabilities later learned to be associated and has been keeping a vigilant litany of
bundled Windows Operating System/Internet Explorer patch updates/upgrades provided free of charge, but take considerable download time, from slower connections (such as dial-up) to the Internet, to address these vulnerabilities.
Sorry the answer had to be so technical, folks, but as a Technical Support Specialist, by trade, I didn't want to see anyone develop a false sense of security nor is My goal to spread wholesale paranoia here either.
😉
*GuitarPeteTklr shreds his way back into tickling oblivion, cursing the producers of virual PC vermin everywhere*
