Virencheck

Every email is scanned for unwanted content on the BTU's central mail servers. Two completely independent scanners check every email for dangerous content.

Important: Despite the central use of a virus scanner, the computer center still strongly recommends that you use a local virus scanner on your computers. See Virus protection

Tips for avoiding virus infections
The main way viruses spread is through emails. These often contain seemingly interesting “subjects” such as (here in the example of the “Melissa” worm)

  • Question for you
  • Check this!
  • Cool Web Sites
  • 80mb Free Web Space!
  • Cheap Software
  • Cheap Hardware
  • Free Music
  • Free Downloads

Such emails may have attachments that contain viruses. If you click on the attachment, the virus is activated. Some email programs even allow email attachments to be executed automatically. This can be prevented by changing the zone settings (switch to “Restricted Sites”; no active code should be able to be executed in these zones).

How to prevent a virus attack:

  1. Do not open unknown email attachments
    Never trust the subject line of an email that has an unexpected attachment. Before opening an email with an attachment, check that you know the sender. If you don't, be alert.
  2. Reverse approach
    If you absolutely must send an email with an attachment, make sure that the recipient knows what they are receiving and in what format.
  3. Do not send executable files unless it is absolutely necessary. Digital signatures help to increase trust here. Please note rule 2!
  4. Virus protection programs
    Install a virus protection program. For more information, visit the IT-Service website on virus protection.
    Scan your computer regularly (automatically if possible).
    Ensure that virus definitions are updated regularly (automatically if possible) (once a day).

A word about virus hoaxes:

These are messages that warn of supposedly particularly dangerous viruses. The actual virus consists of the fact that you are asked to spread these messages widely. You can find out how to recognize hoaxes, how to respond, and a list of known hoaxes on the very detailed hoax pages of the TU Berlin.