A recent rash of computer virus infections across campus has caused significant problems for the Georgetown community, according to University Information Services.
Beth Ann Bergsmark, director of academic and information technology services for UIS, said that the W32.MyDoom virus began to affect the network around Jan. 26 and has since been responsible for computer infections caused by virus-carrying e-mails.
Computers affected by the virus send out multiple e-mail messages to addresses listed in the victim’s e-mail address book, Bergsmark said. Once a computer is infected, UIS must spend time and resources locating, containing and disconnecting the infected machine. It can take several days for a computer to be cleaned and reconnected to the Georgetown network.
Students can protect their computers by running current anti-virus software and to avoid opening suspicious e-mail attachments, Bergsmark said.
It is also critical that students download all critical patches for their operating systems and set strong passwords for their computers.
“Unfortunately, some students assume that since the anti-virus software came with their computer or they installed it a few months ago, that all is fine,” Bergsmark said. “If the daily updates are not set up properly, your anti-virus software will not protect you.”
Georgetown students without anti-virus software can obtain it free from UIS.
Bergsmark said that an important factor in the virus’ success has been the widespread use of peer-to-peer networks such as Kazaa. The virus disguises itself as a popular song or video and is downloaded to students’ computers without their knowledge.
“Recent forms of viruses have exploited computers that have a `blank’ administrator password,” Bergsmark said.
Even after taking precautions, students must still be careful when sifting through their inboxes. An e-mail infected with the yDoom virus can appear to be an e-mail from a system administrator at UIS. Bergsmark said that UIS will normally send text-only e-mails without attachments. Infected e-mails can also impersonate e-mails from people in your e-mail program’s address book.
Students should not download executable files unless they are expecting such a file from a trusted source, Bergsmark said.