Click to view Web Link,
click Chapter 11, Click
Web Link
from left navigation,
then click Virus Hoaxes
below Chapter 11
Install a personal
firewall
program
If the antivirus program flags an
e-mail
attachment
as
infected, delete
the
attachment immediately
Set the macro security in programs so you can enable or disable macros
Never open an
e-mail
attachment unless you are expecting it and
it
is from a
trusted
source
Install an antivirus program on all of your computers
Check all
downloaded
programs
for
viruses,
worms,
or
Trojan horses