(function(a,e,f,g,b,c,d){a.GoogleAnalyticsObject=b;a[b]=a[b]||function(){(a[b].q=a[b].q||[]).push(arguments)};a[b].l=1*new Date;c=e.createElement(f);d=e.getElementsByTagName(f)[0];c.async=1;c.src=g;d.parentNode.insertBefore(c,d)})(window,document,"script","https://www.google-analytics.com/analytics.js","ga");ga("create","UA-732153-7","auto",{allowLinker:!0,siteSpeedSampleRate:10});ga("set","transport","beacon");ga("set","anonymizeIp",!0);ga("require","linker"); ga("linker:autoLink","askapache.com askapache.net htaccess.io htaccesselite.com askapache.info htaccess.guru".split(" "),!0);ga("send","pageview"); CLASS="ARTICLE" BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#840084" ALINK="#0000FF" >

Introduction to Viruses & Virus Hoaxes

Jennifer Vesperman

jenn@linuxchix.org

2002-02-24

Revision History
Revision 0.12002-02-17Revised by: MEG
Converted from text file. Modified wording.
Revision 0.22002-02-23Revised by: MEG
Incorporated Jenn's comments.
Revision 0.32002-02-24Revised by: MEG
Conforming to LDP standards. Added abstract

Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Overview
2. Virus Checkers
3. Virus Hoaxes
4. Links