Printer Friendly

VERBATIM DEBUNKS VIRUS MYTHS

 VERBATIM DEBUNKS VIRUS MYTHS
 CHARLOTTE, N.C., March 3 /PRNewswire/ -- Publicity about computer


viruses has led to a number of misconceptions concerning how they are transmitted. Verbatim Corporation, the world's leading manufacturer of computer image and data storage products, is clearing up those myths about computer viruses through technical bulletins and its on-line technical staff.
 According to Nicky Hartery, president of Verbatim, to date there has not been a single case of contracting a virus on Verbatim media as supplied by the company.
 "We recognize the serious threat that viruses pose to your data, and we have taken every precaution to insure the integrity of our products as they are manufactured, packaged and shipped to our distributors," says Hartery. "Our manufacturing and quality practices are designed to prohibit and detect any introduction of virus to our products."
 He says that stringent security and audit procedures are in place to prohibit any introduction of a virus program to Verbatim's products.
 "Our pre-formatting operation is designed so that there is no opportunity for a Macintosh or DOS based program to be introduced to our disks," Hartery says. "We are absolutely certain that our manufacturing site is not the source of a virus."
 As a service to its customers, Verbatim provides the following information concerning viruses:
 What is a computer virus?
 -- It is an executable computer program designed to damage data, slow data processing, or display a message, and it may be hidden within other programs. A computer virus program is self-replicating and once present, it will copy itself to hard drives, removable media and network drives.
 How does it work?
 -- Automatically activated, it can be triggered by any parameter monitored by the computer, such as the internal clock. It can remain hidden until activated, remaining dormant for extended periods.
 How is it spread?
 -- A virus spreads by downloading through a modem, a file transfer, or disk access. The disk access can be write, read, or format.
 -- Users are typically unaware of the transfer.
 How do you detect and remove a virus?
 -- Viruses often are detected only upon activation. Detection software is available, such as Central Point Software Anti-Virus, Norton Anti-Virus, Virex, which can be loaded to prevent re-infection.
 -- Viruses are eliminated through virus-killing software programs. All memory, hard drives and floppies must be cleared of the virus.
 What else can I do to prevent a computer virus?
 -- Make sure your new computer disks are still in the shrink-wrapped package.
 --Buy good anti-virus software from a well-recognized publisher and use it religiously on data transmitted to you by modem, through networks or by disks.
 -- Devise, and stick to, a backup schedule. Before backing up, make sure your data is virus-free. Recovery from virus is easier if you maintain good backup practices.
 -- Use only properly licensed software. Do not use bootleg or unauthorized software copies.
 -- Avoid borrowing or copying software from other users. Be cautious of "demonstration" or game software of uncertain origin.
 -- Make all software and media purchases from reputable retailers. Do not accept opened packages of any kind, or packages that have been obviously resealed.
 -- Use password protection for computer and application software.
 Contact Verbatim Corporation, 1200 W.T. Harris Blvd., Charlotte, N.C., 28262, for more information.
 -0- 3/3/92
 /CONTACT: Linda Healy, Verbatim Corporation, 704-547-6783, or Harry Hoover of Loeffler Ketchum Mountjoy PR, 704-542-8131, for Verbatim/ CO: Verbatim Corporation ST: North Carolina IN: CPR SU:


JZ-CM -- CH004 -- 4625 03/03/92 16:23 EST
COPYRIGHT 1992 PR Newswire Association LLC
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1992 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:PR Newswire
Date:Mar 3, 1992
Words:575
Previous Article:SYMBOL TECHNOLOGIES ANNOUNCES AGREEMENT TO SETTLE SHAREHOLDER DERIVATIVE AND CLASS ACTION LAWSUITS
Next Article:HEIN-WERNER CORP. REPORTS FOURTH QUARTER AND 1991 YEAR-END RESULTS
Topics:


Related Articles
NOVEMBER IS COMPUTER VIRUS SEASON
People With Diabetes Can Eat What Everyone Else Does.
People With Diabetes Can Eat What Everyone Else Does.
Safetynet Announces Strategic Marketing Agreement with Verbatim(R) Offers Verbatim Customers Special Access to Safetynet's Yes2K Software Utility.
Roxio, Verbatim, and Fellowes Partner to Promote CD Burning.
Jabs come top in flu fight.
IT's Biggest Security Myths Exposed.
Six most common sex myths busted.

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters