Saturday, August 2, 2008

124 Ways Sugar Ruins Your Health

http://editor.nourishedmagazine.com.au/articles/124-ways-sugar-ruins-your-health
124 Ways Sugar Ruins Your Health

By Nancy Appleton

As much as we try to deny it, we all feel in our bones that sugar is harmful to us. Why else would we try to restrict our and our children’s intake of it to only a few sweets at a time? We know it instinctively, but perhaps we need to know more… Dr Nancy Appleton has laid it out for us with this exhaustive and well referenced article.

  1. Sugar can suppress the immune system.
  2. Sugar upsets the mineral relationships in the body.
  3. Sugar can cause hyperactivity, anxiety, difficulty concentrating, and crankiness in children.
  4. Sugar can produce a significant rise in triglycerides.
  5. Sugar contributes to the reduction in defense against bacterial infection (infectious diseases).
  6. Sugar causes a loss of tissue elasticity and function, the more sugar you eat the more elasticity and function you loose.
  7. Sugar reduces high density lipoproteins.
  8. Sugar leads to chromium deficiency.
  9. Sugar leads to cancer of the breast, ovaries, prostate, and rectum.
  10. Sugar can increase fasting levels of glucose.
  11. Sugar causes copper deficiency.
  12. Sugar interferes with absorption of calcium and magnesium.
  13. Sugar can weaken eyesight.
  14. Sugar raises the level of a neurotransmitters: dopamine, serotonin, and norepinephrine.
  15. Sugar can cause hypoglycemia.
  16. Sugar can produce an acidic digestive tract.
  17. Sugar can cause a rapid rise of adrenaline levels in children.
  18. Sugar malabsorption is frequent in patients with functional bowel disease.
  19. Sugar can cause premature aging.
  20. Sugar can lead to alcoholism.
  21. Sugar can cause tooth decay.
  22. Sugar contributes to obesity.
  23. High intake of sugar increases the risk of Crohn’s disease, and ulcerative colitis.
  24. Sugar can cause changes frequently found in person with gastric or duodenal ulcers.
  25. Sugar can cause arthritis.
  26. Sugar can cause asthma.
  27. Sugar greatly assists the uncontrolled growth of Candida Albicans (yeast infections).
  28. Sugar can cause gallstones.
  29. Sugar an cause heart disease.
  30. Sugar can cause appendicitis.
  31. Sugar can cause multiple sclerosis.
  32. Sugar can cause hemorrhoids.
  33. Sugar can cause varicose veins.
  34. Sugar can elevate glucose and insulin responses in oral contraceptive users.
  35. Sugar can lead to periodontal disease.
  36. Sugar can contribute to osteoporosis.
  37. Sugar contributes to saliva acidity.
  38. Sugar can cause a decrease in insulin sensitivity.
  39. Sugar can lower the amount of Vitamin E in the blood.
  40. Sugar can decrease growth hormone.
  41. Sugar can increase cholesterol.
  42. Sugar can increase the systolic blood pressure.
  43. Sugar can cause drowsiness and decreased activity in children.
  44. High sugar intake increases advanced glycation end products (AGEs)(Sugar bound non- enzymatically to protein)
  45. Sugar can interfere with the absorption of protein.
  46. Sugar causes food allergies.
  47. Sugar can contribute to diabetes.
  48. Sugar can cause toxemia during pregnancy.
  49. Sugar can contribute to eczema in children.
  50. Sugar can cause cardiovascular disease.
  51. Sugar can impair the structure of DNA.
  52. Sugar can change the structure of protein.
  53. Sugar can make our skin age by changing the structure of collagen.
  54. Sugar can cause cataracts.
  55. Sugar can cause emphysema.
  56. Sugar can cause atherosclerosis.
  57. Sugar can promote an elevation of low density lipoproteins (LDL).
  58. High sugar intake can impair the physiological homeostasis of many systems in the body.
  59. Sugar lowers the enzymes ability to function.
  60. Sugar intake is higher in people with Parkinson’s disease.
  61. Sugar can cause a permanent altering the way the proteins act in the body.
  62. Sugar can increase the size of the liver by making the liver cells divide.
  63. Sugar can increase the amount of liver fat.
  64. Sugar can increase kidney size and produce pathological changes in the kidney.
  65. Sugar can damage the pancreas.
  66. Sugar can increase the body’s fluid retention.
  67. Sugar is enemy #1 of the bowel movement.
  68. Sugar can cause myopia (nearsightedness).
  69. Sugar can compromise the lining of the capillaries.
  70. Sugar can make the tendons more brittle.
  71. Sugar can cause headaches, including migraine.
  72. Sugar plays a role in pancreatic cancer in women.
  73. Sugar can adversely affect school children’s grades and cause learning disorders.
  74. Sugar can cause an increase in delta, alpha, and theta brain waves.
  75. Sugar can cause depression.
  76. Sugar increases the risk of gastric cancer.
  77. Sugar and cause dyspepsia (indigestion).
  78. Sugar can increase your risk of getting gout.
  79. Sugar can increase the levels of glucose in an oral glucose tolerance test over the ingestion of complex carbohydrates.
  80. Sugar can increase the insulin responses in humans consuming high-sugar diets compared to low sugar diets.
  81. High refined sugar diet reduces learning capacity.
  82. Sugar can cause less effective functioning of two blood proteins, albumin, and lipoproteins, which may reduce the body’s ability to handle fat and cholesterol.
  83. Sugar can contribute to Alzheimer’s disease.
  84. Sugar can cause platelet adhesiveness.
  85. Sugar can cause hormonal imbalance; some hormones become underactive and others become overactive.
  86. Sugar can lead to the formation of kidney stones.
  87. Sugar can lead to the hypothalamus to become highly sensitive to a large variety of stimuli.
  88. Sugar can lead to dizziness.
  89. Diets high in sugar can cause free radicals and oxidative stress.
  90. High sucrose diets of subjects with peripheral vascular disease significantly increases platelet adhesion.
  91. High sugar diet can lead to biliary tract cancer.
  92. Sugar feeds cancer.
  93. High sugar consumption of pregnant adolescents is associated with a twofold increased risk for delivering a small-for-gestational-age (SGA) infant.
  94. High sugar consumption can lead to substantial decrease in gestation duration among adolescents.
  95. Sugar slows food’s travel time through the gastrointestinal tract.
  96. Sugar increases the concentration of bile acids in stools and bacterial enzymes in the colon. This can modify bile to produce cancer-causing compounds and colon cancer.
  97. Sugar increases estradiol (the most potent form of naturally occurring estrogen) in men.
  98. Sugar combines and destroys phosphatase, an enzyme, which makes the process of digestion more dificult.
  99. Sugar can be a risk factor of gallbladder cancer.
 100. Sugar is an addictive substance.
 101. Sugar can be intoxicating, similar to alcohol.
 102. Sugar can exacerbate PMS.
 103. Sugar given to premature babies can affect the amount of carbon dioxide they produce.
 104. Decrease in sugar intake can increase emotional stability.
 105. The body changes sugar into 2 to 5 times more fat in the bloodstream than it does starch.
 106. The rapid absorption of sugar promotes excessive food intake in obese subjects.
 107. Sugar can worsen the symptoms of children with attention deficit hyperactivity disorder (ADHD).
 108. Sugar adversely affects urinary electrolyte composition.
 109. Sugar can slow down the ability of the adrenal glands to function.
 110. Sugar has the potential of inducing abnormal metabolic processes in a normal healthy individual and to promote chronic degenerative diseases.
 111. I.Vs (intravenous feedings) of sugar water can cut off oxygen to the brain.
 112. High sucrose intake could be an important risk factor in lung cancer.
 113. Sugar increases the risk of polio.
 114. High sugar intake can cause epileptic seizures.
 115. Sugar causes high blood pressure in obese people.
 116. In Intensive Care Units: Limiting sugar saves lives.
 117. Sugar may induce cell death.
 118. Sugar may impair the physiological homeostasis of many systems in living organisms.
 119. In juvenile rehabilitation camps, when children were put on a low sugar diet, there was a 44% drop in antisocial behavior.
 120. Sugar can cause gastric cancer.
 121. Sugar dehydrates newborns.
 122. Sugar can cause gum disease.
 123. Sugar increases the estradiol in young men.
 124. Sugar can cause low birth-weight babies. 

Sources

  1. Sanchez, A., et al. “Role of Sugars in Human Neutrophilic Phagocytosis,” American Journal of Clinical Nutrition. Nov 1973;261:1180_1184. Bernstein, J., et al. “Depression of Lymphocyte Transformation Following Oral Glucose Ingestion.” American Journal of Clinical Nutrition.1997;30:613.
  2. Couzy, F., et al.”Nutritional Implications of the Interaction Minerals,” Progressive Food and Nutrition Science 17;1933:65-87.
  3. Goldman, J., et al. “Behavioral Effects of Sucrose on Preschool Children.” Journal of Abnormal Child Psychology.1986;14(4):565_577.
  4. Scanto, S. and Yudkin, J. “The Effect of Dietary Sucrose on Blood Lipids, Serum Insulin, Platelet Adhesiveness and Body Weight in Human Volunteers,” Postgraduate Medicine Journal. 1969;45:602_607.
  5. Ringsdorf, W., Cheraskin, E. and Ramsay R. “Sucrose,Neutrophilic Phagocytosis and Resistance to Disease,” Dental Survey. 1976;52(12):46_48.
  6. Cerami, A., Vlassara, H., and Brownlee, M.”Glucose and Aging.” Scientific American. May 1987:90.
  7. Lee, A. T. and Cerami, A. “The Role of Glycation in Aging.” Annals of the New York Academy of Science; 663:63-67.
  8. Albrink, M. and Ullrich I. H. “Interaction of Dietary Sucrose and Fiber on Serum Lipids in Healthy Young Men Fed High Carbohydrate Diets.” American Journal of Clinical Nutrition. 1986;43:419-428.
  9. Pamplona, R., et al. “Mechanisms of Glycation in Atherogenesis.” Med Hypotheses. Mar 1993;40(3):174-81.
  10. Kozlovsky, A., et al. “Effects of Diets High in Simple Sugars on Urinary Chromium Losses.” Metabolism. June 1986;35:515_518.
  11. Takahashi, E., Tohoku University School of Medicine, Wholistic Health Digest. October 1982:41.
  12. Kelsay, J., et al. “Diets High in Glucose or Sucrose and Young Women.” American Journal of Clinical Nutrition. 1974;27:926_936.
  13. Thomas, B. J., et al. “Relation of Habitual Diet to Fasting Plasma Insulin Concentration and the Insulin Response to Oral Glucose,” Human Nutrition Clinical Nutrition. 1983; 36C(1):49_51.
  14. Fields, M.., et al. “Effect of Copper Deficiency on Metabolism and Mortality in Rats Fed Sucrose or Starch Diets,” Journal of Clinical Nutrition. 1983;113:1335_1345.
  15. Lemann, J. “Evidence that Glucose Ingestion Inhibits Net Renal Tubular Reabsorption of Calcium and Magnesium.” Journal Of Clinical Nutrition. 1976 ;70:236_245.
  16. Acta Ophthalmologica Scandinavica. Mar 2002;48;25.
  17. Taub, H. Ed. “Sugar Weakens Eyesight,” VM NEWSLETTER;May 1986:6
  18. “Sugar, White Flour Withdrawal Produces Chemical Response.” The Addiction Letter .Jul 1992:4.
  19. Dufty, William. Sugar Blues. (New York:Warner Books, 1975).
  20. Ibid.
  21. Jones, T. W., et al. “Enhanced Adrenomedullary Response and Increased Susceptibility to Neuroglygopenia: Mechanisms Underlying the Adverse Effect of Sugar Ingestion in Children.” Journal of Pediatrics. Feb 1995;126:171-7.
  22. Ibid.
  23. Lee, A. T.and Cerami A. “The Role of Glycation in Aging.” Annals of the New York Academy of Science.1992;663:63-70.
  24. Abrahamson, E. and Peget, A.. Body, Mind and Sugar. (New York:Avon,1977.}
  25. Glinsmann, W., Irausquin, H., and Youngmee, K. “Evaluation of Health Aspects of Sugar Contained in Carbohydrate Sweeteners. F. D. A. Report of Sugars Task Force.” 1986:39.
  26. Makinen K.K.,et al. “A Descriptive Report of the Effects of a 16_month Xylitol Chewing_gum Programme Subsequent to a 40_month Sucrose Gum Programme.” Caries Research. 1998; 32(2)107_12.
  27. Keen, H., et al. “Nutrient Intake, Adiposity, and Diabetes.” British Medical Journal. 1989; 1: 655_658
  28. Persson P. G., Ahlbom, A., and Hellers, G. Epidemiology. 1992;3:47-52.
  29. Yudkin, J. New York: Sweet and Dangerous.:Bantam Books:1974: 129.
  30. Darlington, L., Ramsey, N. W. and Mansfield, J. R. “Placebo_Controlled, Blind Study of Dietary Manipulation Therapy in Rheumatoid Arthritis,” Lancet. Feb 1986;8475(1):236_238.
  31. Powers, L. “Sensitivity: You React to What You Eat.” Los Angeles Times. (Feb. 12, 1985).
  32. Cheng, J., et al. “Preliminary Clinical Study on the Correlation Between Allergic Rhinitis and Food Factors.” Lin Chuang Er Bi Yan Hou Ke Za Zhi Aug 2002;16(8):393-396.
  33. Crook, W. J. The Yeast Connection. (TN:Professional Books, 1984).
  34. Heaton, K. “The Sweet Road to Gallstones.” British Medical Journal. Apr 14, 1984; 288: 1103_1104.
  35. Misciagna, G., et al. American Journal of Clinical Nutrition. 1999;69:120-126.
  36. Yudkin, J. “Sugar Consumption and Myocardial Infarction.” Lancet..Feb 6, 1971:1(7693):296-297.
  37. Suadicani, P., et al. “Adverse Effects of Risk of Ishaemic Heart Disease of Adding Sugar to Hot Beverages in Hypertensives Using Diuretics.” Blood Pressure. Mar 1996;5(2):91-71.
  38. Cleave, T. The Saccharine Disease. (New Canaan, CT: Keats Publishing, 1974).
  39. Erlander, S. “The Cause and Cure of Multiple Sclerosis, “The Disease to End Disease.” Mar 3, 1979;1(3):59_63.
  40. Cleave, T. The Saccharine Disease. (New Canaan, CT: Keats Publishing, 1974.)
  41. Cleave, T. and Campbell, G. (Bristol, England:Diabetes, Coronary Thrombosis and the Saccharine Disease: John Wrightand Sons, 1960).
  42. Behall, K. “Influ ence of Estrogen Content of Oral Contraceptives and Consumption of Sucrose on Blood Parameters.” Disease Abstracts International. 1982;431437.
  43. Glinsmann, W., Irausquin, H., and K. Youngmee. Evaluation of Health Aspects of Sugar Contained in Carbohydrate Sweeteners. F. D. A. Report of Sugars Task Force.1986;39:36_38.
  44. Tjderhane, L. and Larmas, M. “A High Sucrose Diet Decreases the Mechanical Strength of Bones in Growing Rats.” Journal of Nutrition. 1998:128:1807_1810.
  45. Appleton, N. New York: Healthy Bones. Avery Penguin Putnam:1989.
  46. Beck_Nielsen H., Pedersen O., and Schwartz S. “Effects of Diet on the Cellular Insulin Binding and the Insulin Sensitivity in Young Healthy Subjects.” Diabetes. 1978;15:289_296 .
  47. Journal of Clinical Endocrinology and Metabolism. Aug 2000.
  48. Gardner, L. and Reiser, S. “Effects of Dietary Carbohydrate on Fasting Levels of Human Growth Hormone and Cortisol.” Proceedings of the Society for Experimental Biology and Medicine. 1982;169:36_40.
  49. Reiser, S. “Effects of Dietary Sugars on Metabolic Risk Factors Associated with Heart Disease.” Nutritional Health. 1985;203_216.
  50. Hodges, R., and Rebello, T. “Carbohydrates and Blood Pressure.” Annals of Internal Medicine. 1983:98:838_841.
  51. Behar, D., et al. “Sugar Challenge Testing with Children Considered Behaviorally Sugar Reactive.” Nutritional Behavior. 1984;1:277_288.
  52. Furth, A. and Harding, J. “Why Sugar Is Bad For You.” “New Scientist.” Sep 23, 1989;44.
  53. Simmons, J. “Is The Sand of Time Sugar?” LONGEVITY. June 1990: 49_53.
  54. Randolph, T. G. et al. “Allergic Reactions Following Intravenous Injection of Corn Sugar (Dextrose)”. Archives of Surgery. 1950;64:554-564. 47. “Sucrose Induces Diabetes in Cat.” Federal Protocol. 1974;6(97).
  55. Cleave, T.:The Saccharine Disease: (New Canaan Ct: Keats Publishing, Inc., 1974).131.
  56. Ibid. 132.
  57. Vaccaro O., Ruth, K. J. and Stamler J. “Relationship of Postload Plasma Glucose to Mortality with 19_yr Follow_up.” Diabetes Care. Oct 15,1992;10:328_334.
  58. Tominaga, M., et al, “Impaired Glucose Tolerance Is a Risk Factor for Cardiovascular Disease, but Not Fasting Glucose.” Diabetes Care. 1999:2(6):920-924.
  59. Lee, A. T. and Cerami, A. “Modifications of Proteins and Nucleic Acids by Reducing Sugars: Possible Role in Aging.” Handbook of the Biology of Aging. ( New York: Academic Press, 1990.).
  60. Monnier, V. M. “Nonenzymatic Glycosylation, the Maillard Reaction and the Aging Process.” Journal of Gerontology 1990:45(4 ):105_110.
  61. Dyer, D. G., et al. “Accumulation of Maillard Reaction Products in Skin Collagen in Diabetes and Aging.” Journal of Clinical Investigation. 1993:93(6):421_22.
  62. Veromann, S.et al.”Dietary Sugar and Salt Represent Real Risk Factors for Cataract Development.” Ophthalmologica. 2003 Jul-Aug;217(4):302-307.
  63. Monnier, V. M. “Nonenzymatic Glycosylation, the Maillard Reaction and the Aging Process.” Journal of Gerontology. 1990:45(4):105_110.
  64. Pamplona, R., et al. “Mechanisms of Glycation in Atherogenesis.” Medical Hypotheses . 1990: 174_181.
  65. Lewis, G. F. and Steiner, G. “Acute Effects of Insulin in the Control of Vldl Production in Humans. Implications for Theinsulin-resistant State.” Diabetes Care. 1996 Apr;19(4):390-3 R. Pamplona, M. .J., et al. “Mechanisms of Glycation in Atherogenesis.” Medical Hypotheses. 1990;40:174-181.
  66. Ceriello, A. “Oxidative Stress and Glycemic Regulation.” Metabolism. Feb 2000;49(2 Suppl 1):27-29.
  67. Appleton, Nancy. New York; Lick the Sugar Habit. Avery Penguin Putnam, 1988.
  68. Hellenbrand, W. “Diet and Parkinson’s Disease. A Possible Role for the Past Intake of Specific Nutrients. Results from a Self-administered Food-frequency Questionnaire in a Case-control Study.” Neurology. Sep 1996;47(3):644-650. 61. Cerami, A., Vlassara, H., and Brownlee, M. “Glucose and Aging.” Scientific American. May 1987: 90.
  69. Goulart, F. S. “Are You Sugar Smart?” American Fitness. March_April 1991: 34_38.
  70. Ibid.
  71. Yudkin, J., Kang, S. and Bruckdorfer, K. “Effects of High Dietary Sugar.” British Journal of Medicine. Nov 22, 1980;1396.
  72. Goulart, F. S. “Are You Sugar Smart?” American Fitness. March_April 1991: 34_38. Milwakuee, WI,: damage pancreas
  73. Ibid. fluid retention
  74. Ibid. bowel movement
  75. Ibid. nearsightedness
  76. Ibid. compromise the lining of the capillaries
  77. Nash, J. “Health Contenders.” Essence. Jan 1992; 23: 79_81.
  78. Grand, E. “Food Allergies and Migraine.”Lancet. 1979:1:955_959.
  79. Michaud, D. “Dietary Sugar, Glycemic Load, and Pancreatic Cancer Risk in a Prospective Study.” J Natl Cancer Inst. Sep 4, 2002 ;94(17):1293-300.
  80. Schauss, A. Diet, Crime and Delinquency. (Berkley Ca; Parker House, 1981.)
  81. Christensen, L. “The Role of Caffeine and Sugar in Depression.” Nutrition Report. Mar 1991;9(3):17-24.
  82. Ibid.
  83. Cornee, J., et al. “A Case-control Study of Gastric Cancer and Nutritional Factors in Marseille, France,” European Journal of Epidemiology. 1995;11:55-65.
  84. Yudkin, J. Sweet and Dangerous.(New York:Bantam Books,1974) 129.
  85. Ibid, 44
  86. Reiser, S., et al. “Effects of Sugars on Indices on Glucose Tolerance in Humans.” American Journal of Clinical Nutrition. 1986:43;151-159.
  87. Reiser,S., et al. “Effects of Sugars on Indices on Glucose Tolerance in Humans.” American Journal of Clinical Nutrition. 1986;43:151-159.
  88. Molteni, R, et al. “A High-fat, Refined Sugar Diet Reduces Hippocampal Brain-derived Neurotrophic Factor, Neuronal Plasticity, and Learning.” NeuroScience. 2002;112(4):803-814.
  89. Monnier, V., “Nonenzymatic Glycosylation, the Maillard Reaction and the Aging Process.” Journal of Gerontology. 1990;45:105-111.
  90. Frey, J. “Is There Sugar in the Alzheimer’s Disease?” Annales De Biologie Clinique. 2001; 59 (3):253-257.
  91. Yudkin, J. “Metabolic Changes Induced by Sugar in Relation to Coronary Heart Disease and Diabetes.” Nutrition and Health. 1987;5(1-2):5-8.
  92. Ibid.
  93. Blacklock, N. J., “Sucrose and Idiopathic Renal Stone.” Nutrition and Health. 1987;5(1-2):9-
  94. Curhan, G., et al. “Beverage Use and Risk for Kidney Stones in Women.” Annals of Internal Medicine. 1998:28:534-340.
  95. Journal of Advanced Medicine. 1994;7(1):51-58.
  96. Ibid
  97. Ceriello, A. “Oxidative Stress and Glycemic Regulation.” Metabolism. Feb 2000;49(2 Suppl 1):27-29.
  98. Postgraduate Medicine.Sept 1969:45:602-07.
  99. Moerman, C. J., et al. “Dietary Sugar Intake in the Etiology of Biliary Tract Cancer.” International Journal of Epidemiology . Ap 1993;.2(2):207-214.
 100. Quillin, Patrick, “Cancer’s Sweet Tooth,” Nutrition Science News. Ap 2000.
 101. Rothkopf, M.. Nutrition. July/Aug 1990;6(4).
 102. Lenders, C. M. “Gestational Age and Infant Size at Birth Are Associated with Dietary Intake among Pregnant Adolescents.” Journal of Nutrition. Jun 1997;1113- 1117.
 103. Ibid.
 104. Bostick, R. M., et al. “Sugar, Meat.and Fat Intake and Non-dietary Risk Factors for Colon Cancer Incidence in Iowa Women.” Cancer Causes & Control. 1994:5 :38-53.
 105. Ibid.
 106. Kruis, W., et al. “Effects of Diets Low and High in Refined Sugars on Gut Transit, Bile Acid Metabolism and Bacterial Fermentation.” Gut. 1991;32:367-370.
 107. Ludwig, D. S., et al. “High Glycemic Index Foods, Overeating, And Obesity.” Pediatrics. Mar 1999;103(3):26-32.
 108. Yudkin, J and Eisa, O. “Dietary Sucrose and Oestradiol Concentration in Young Men”.
 109. Annals of Nutrition and Metabolism.1988:32(2):53-55.
 110. Lee, A. T. and Cerami A. “The Role of Glycation in Aging.” Annals of the New York Academy of Science. 1992; 663:63-70.
 111. Moerman, C., et al.”Dietary Sugar Intake in the Etiology of Biliary Tract Cancer.” International Journal of Epidemiology. Ap 1993; 22(2):207-214.
 112. “Sugar, White Flour Withdrawal Produces Chemical Response.” The Addiction Letter. Jul 1992:4.
 113. Colantuoni, C., et al. “Evidence That Intermittent, Excessive Sugar Intake Causes Endogenous Opioid Dependence.” Obes Res. Jun 2002 ;10(6):478-488.
 114. Annual Meeting of the American Psychological Society, Toronto, June 17, 2001.
 115. www.mercola.com
 116. Ibid.
 117. The Edell Health Letter. Sept 1991;7:1.
 118. Sunehag, A. L., et al. “Gluconeogenesis in Very Low Birth Weight Infants Receiving Total Parenteral Nutrition” Diabetes. 1999 ;48 7991_800.
 119. Christensen L., et al. “Impact of A Dietary Change on Emotional Distress.” Journal of Abnormal Psychology .1985;94(4):565_79.
 120. Nutrition Health Review. Fall 85. changes sugar into fat faster than fat
 121. Ludwig, D. S., et al. “High Glycemic Index Foods, Overeating and Obesity.” Pediatrics. March 1999;103(3):26-32.
 122. Pediatrics Research. 1995;38(4):539-542.
 123. Berdonces, J. L. “Attention Deficit and Infantile Hyperactivity.” Rev Enferm. Jan 2001;4(1)11-4
 124. Blacklock, N. J. “Sucrose and Idiopathic Renal Stone.” Nutrition Health. 1987;5(1 & 2):9-17.
 125. Lechin, F., et al. “Effects of an Oral Glucose Load on Plasma Neurotransmitters in Humans.” Neurophychobiology. 1992;26(1-2):4-11.
 126. Fields, M. Journal of the American College of Nutrition. Aug 1998;17(4):317_321.
 127. Arieff, A. I. Veterans Administration Medical Center in San Francisco. San Jose Mercury; June 12/86. IVs of sugar water can cut off oxygen to the brain.
 128. De Stefani, E.”Dietary Sugar and Lung Cancer: a Case_control Study in Uruguay.” Nutrition and Cancer. 1998;31(2):132_7.
 129. Sandler, Benjamin P. Diet Prevents Polio. Milwakuee, WI,:The Lee Foundation for for Nutritional Research, 1951.
 130. Murphy, Patricia. “The Role of Sugar in Epileptic Seizures.” Townsend Letter for Doctors and Patients. May, 2001. Murphy Is Editor of Epilepsy Wellness Newsletter, 1462 West 5th Ave., Eugene, Oregon 97402
 131. Stern, N. & Tuck, M. “Pathogenesis of Hypertension in Diabetes Mellitus.” Diabetes Mellitus, a Fundamental and Clinical Test. 2nd Edition, (PhiladelphiA; A:Lippincott Williams & Wilkins, 2000)943-957.
 132. Christansen, D. “Critical Care: Sugar Limit Saves Lives.” Science News. June 30, 2001; 159:404.
 133. Donnini, D. et al. “Glucose May Induce Cell Death through a Free Radical-mediated Mechanism.”Biochem Biohhys Res Commun. Feb 15, 1996:219(2):412-417.
 134. Ceriello, A. “Oxicative Stress and Glycemic Regulation.” Metabolism. Feb 2000;49(Suppl I):27-29.
 135. Schoenthaler, S. The Los Angeles Probation Department Diet-Behavior Program: Am Empirical Analysis of Six Institutional Settings. Int J Biosocial Res 5(2):88-89.
 136. Cornee, J., et al. “A Case-control Study of Gastric Cancer and Nutritional Factors in Marseille, France.” European Journal of Epidemiology 11 (1995):55-65.
 137. “Gluconeogenesis in Very Low Birth Weight Infants Receiving Total Parenteral Nutrition. Diabetes. 1999 Apr;48(4):791-800.
 138. Glinsmann, W., et al. “Evaluation of Health Aspects of Sugar Contained in Carbohydrate Sweeteners.” FDA Report of Sugars Task Force (1986) 39. 123. Yudkin, J. and Eisa, O. “Dietary Sucrose and Oestradiol Concentration in Young Men. Annals of Nutrition and Metabolism. 1988;32(2):53-5.
 139. Lenders, C. M. “Gestational Age and Infant Size at Birth Are Associated with Dietary Intake Among Pregnant Adolescents.” Journal of Nutrition 128.1998:1807-1810 

 
About the Author...

This article appears on Nancy Appleton's website, and more information is available in her book, "Lick the Sugar Habit". Email Dr Appleton for more information.

Friday, August 1, 2008

There is God

Yesterday I missed my Cell phone while I was traveling from Chrompet to Pallavaram. I went to pallavaram to take train pass and the debit cards.
While i stopped i checked my packet i found it missing. i was totally collapsed. i prayed to God and GuruDheva could you please check it and give to me.
Really miracle happened. While I was calling from the another phone A person took it and told me he is having the cell phone please come and collect it tomorrow.
In middle of night I got doubt whether he will give me the phone or not. But my inner mind told me that you have given all your responsibility to him so don't worry God and GuruDheva will take care the mobile and you will get it back.
so i went to bed peacefully. Today morning i got up 8 am and i went to meet him at 9.00 am. His Name is Ramesh and he is having Timber mart wood shop in anna nagar, chrompet. I told him no person will have the great thought. he replyed me that i have lost nearly 5- 6 cell phones. i know what is the pain if some one lost the phone. i gave him my visiting card and i got his visiting card also. So God and GuruDheva is there to get my cell back if i was wrong it may went in wrong hand my cell phone is gone and i have to get scolding from lot of people.
Thanks to God and GuruDheva and i am praying to GuruDheva and God that he should get more good things in life. Let his business may flourish more.

Thursday, July 31, 2008

A letter viruses list and explanation

A letter viruses: Scroll down the page and choose the desired name:

A-204 (Jerusalem)

Jerusalem virus

Name: Jerusalem

Also known as: A-204, 1808(EXE), 1813(COM), ArabStar, BlackBox, BlackWindow, Friday13th, HebrewUniversity, Israeli, PLO, Russian

Type: File infector

Affects: PCs

Discovered: October 1, 1987
Note: the Jerusalem virus was originally thought to have originated in Israel as it was first discovered in a Hebrew university there. However, antivirus researchers received new evidence in 1991 that points to Italy as being the originating country.

Description: The Jerusalem virus is one of the older and certainly one of the more commonly known viruses. Several variants of Jerusalem exist, infecting both .EXE and .COM files found on the system. The first of the Jerusalem viruses contained a bug that caused it to repeatedly infect the EXE files over and over, until eventually the file sizes overwhelmed computer resources.

Jerusalem has a malicious payload that activates each Friday the 13th, deleting any programs run on that day. The virus causes a general slowdown of the computer thirty minutes after an infected program is run and also causes the screen to roll up two lines. Some minor variants of Jerusalem do not cause the screen anomaly, making their presence harder to detect by the naked eye.

A4F-Spoof and HOAX

AOL4Free Hoax

Description: The AOL4Free saga is part hoax, part reality. First, there is a Macintosh program named aol4free (note, it does not use the filename aol4free.com) Second, there is hoax generated that stated aol4free.com deleted files on users hard drives. Finally, there is a Trojan by the same name, which has been dubbed A4F-Spoof by the antivirus vendors to avoid confusion. (The assumption is that the hoax was a spin-off of the Mac program, and the Trojan a spin-off of the hoax).

Example of hoax email:

Anyone who recieves this must send it to as many people as you can. It is essential that this problem be reconciled as soon as possible.

A few hours ago, I opened an E-mail that had the subject heading of aol4free.com

Within seconds of opening it, a window appeared and began to display my files that were being deleted. I immediately shut down my computer, but it was too late. This virus wiped me out.

It ate the Anti-Virus Software that comes with the Windows '95 Program along with F-Prot AVS. Neither was able to detect it. Please be careful and send this to as many people as possible, so maybe this new virus can be eliminated.

Remember:
Hoaxes are a waste of both time and money. Please don't forward them on to others. And if you are tempted to forward something just in case, read the article Toxic Excuses instead.

A.I.D.S. HOAX

A.I.D.S Virus Hoax

Description: With its bad grammar and ALL CAPS, this alleged virus warning is a classic example of a hoax. The hoax urgently warns of a malicious virus that will "EAT AWAY AT YOUR MEMORY".

Example of hoax email:

THERE IS A VIRUS GOING AROUND CALLED THE A.I.D.S VIRUS. IT WILL ATTACH ITSELF INSIDE YOUR COMPUTER AND EAT AWAY AT YOUR MEMORY THIS MEMORY IS IRREPLACEABLE. THEN WHEN IT'S FINISHED WITH MEMORY IT INFECTS YOUR MOUSE OR POINTING DEVICE. THEN IT GOES TO YOUR KEY BOARD AND THE LETTERS YOU TYPE WILLNOT REGISTER ON SCREEN.

BEFORE IT SELF TERMINATES IT EATS 5MB OF HARD DRIVE SPACE AND WILL DELETE ALL PROGRAMS ON IT AND IT CAN SHUT DOWN ANY 8 BIT TO 16 BIT SOUND CARDS RENDERING YOUR SPEAKERS USELESS. IT WILL COME IN E-MAIL CALLED "OPEN:VERY COOL! :) DELETE IT RIGHT AWAY. THIS VIRUS WILL BASICLY RENDER YOUR COMPUTER USELESS. YOU MUST PASS THIS ON QUICKLY AND TO AS MANY PEOPLE AS POSSLE!!!!!

Anniv911 worm

11September.exe

Chet worm misleads in bid to infect

The day prior to the first anniversary of the September 11 tragedy, a new email worm exploiting the date made its debut. Dubbed W32/Anniv911 by the discoverers and W32/Chet by antivirus vendors, the Chet worm arrives in email with an attachment named '11september.exe '. The filename contains what is known as a trailing space, possibly bypassing some content filtering and antivirus software vulnerable to this exploit.

The worm message has the subject line 'All people!!' and contains the following text:

Dear ladies and gentlemen!
The given letter does not contain viruses, and is not Spam. We ask you to be in earnest to this letter. As you know America and England have begun bombardment of Iraq, cause of its threat for all the world. It isn't the truth. The real reason is in money laundering and also to cover up traces after acts of terrorism September, 11, 2001. Are real proofs of connection between Bush and Al-Qaeda necessary for you? Please! There is a friendly dialogue between Bin Laden and the secretary of a state security of USA in the given photos. In the following photo you'll see, how FBI discusses how to strike over New York to lose people as much as possible. And the document representing the super confidential agreement between CIA and Al-Qaeda is submitted to your attention. All this circus was specially played to powder brains!! You'll find out the truth. Naked truth, instead of TV showed.

For your convenience, and to make letter less, all documentary materials (photos and MS Word documents) are located in one EXE file. Open it, and all materials will be installed on your computer. You will receive the freshest and classified documents automatically from our site. It isn't a virus! You can trust us absolutely. We hope, that it will open your eyes on many things occurring in this world.

Of course, if you believe the claims in the text and open the supposedly 'virus-free' attachment, you will become infected with the W32/Anniv911 a.k.a. Chet worm and it will in turn send itself out from your machine in a bid to mislead and infect even more users.

The worm was first detected by MessageLabs, a managed service provider that specializes in email security, and reported to AVIEN and AVI-EWS, rapid information exchange groups designed to stem the flow of viruses.

Removing the Worm
Search for and delete the following files:

C:\BOOT.TXT
C:\WINDOWS\SYSTEM\SYNCHOST1.EXE

Locate the following Registry Key:

HKEY_CURRENT_USER

and delete the Value: DefaultLcid3="2"

Locate the following Registry Key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\run

and delete the Value: ICQ1="C:\WINDOWS\SYSTEM\synchost1.exe"

Risk Factor
Antivirus vendors began issuing updates to detect the Chet worm hours after it was discovered. Fortunately, due to a bug in the worm's code, it is unlikely to run properly and thus poses little risk of spread. However, attention should be paid to the social engineering aspect of the Chet worm message, as other virus writers might attempt to use similar messages to tempt users into opening their viral files. Email attachments received unexpectedly should be viewed with suspicion. MailDefense effectively and automatically removes potentially harmful attachments and content from email and is a good solution for those who are seeking an additional layer of protection between updates or simply wish to have enhanced protection for their email.

Anti

Anti virus

Name: Anti

Also known as:

Type: Macintosh application infector

Affects: System 6 Macintoshes running Finder

Discovered: In France

Description: According to reports from Bigelow's Virus Troubleshooting guide, authored by Ken Dunham, ANTI infects only applications and not the System file. Due to a bug in the virus, all the Code 1 resource attributes are cleared. This can result in an affected application using memory less effectively. This damage cannot be corrected by disinfection; optimally affected files should be restored from a clean backup. There are two variants of the ANTI virus. ANTI.A renders ANTI.B inoperable.

AntiCMOS

AntiCMOS

Name: AntiCMOS

Also known as: Gaxelle Lenart LiXi

Type: Resident Boot sectors MBR virus

Affects: PCs

Discovered: June 1994; Hong Kong

Description: Common boot sector virus affecting both hard drives and floppy disks. Spread by booting from infected floppy diskette. Diskettes used in the infected machine will likely become infected as well. Two variants: AntiCMOS.a and AntiCMOS.b.

AntiEXE

AntiEXE virus

Name: AntiEXE

Also known as: D3, NewBug, Anti-Exe, BootDr79, NC-Boot

Type: Boot sector MBR Stealth virus

Affects: PCs

Discovered: 1995

Description: Common boot sector virus affecting both hard drives and floppy disks. Spread by booting from infected floppy diskette. Diskettes used in the infected machine will likely become infected as well. Uses stealth techniques to hide its presence in the boot sector. Tries to thwart standard behavior-blockers by redirected BIOS disk interrupt 13h to interrupt D3h instead.

Anthrax

Anthrax virus

PR needs vaccine against virus vype

As if there are not enough legitimate acts of terrorism in the world, public relations folks went into overdrive regarding a broken email-borne virus that should have been dubbed "the little virus that couldn't". Even worse, the crippled virus was originally dubbed VBS.Antrax by Panda Software. (Antrax is the Spanish word for Anthrax).

Though virus analyzers noted that VBS.VBSWG.AF, a.k.a. Antrax virus, intends "to send itself via MAPI email but fails due to bugs in the script", that wasn't enough to stop hyperactive public relations teams, who quickly issued a media release on the non-event. CNN then acted on the release and reported the information during their broadcast. Even Reuters picked up the story, claiming that once "the attachment is opened the worm spreads itself to everyone listed in the email address book." In reality, the file fails to attach itself to the outgoing email, and thus the worm self-destructs on its very first try.

"It is disappointing to see some of our competitors hyping up a virus like this, particularly in the current political climate," said Graham Cluley, senior technology consultant for Sophos Anti-Virus. "Anti-virus companies should act responsibly when it comes to virus alerts. Sadly, on this occasion, it's possible that the only thing which will spread is greater confusion and panic amongst the public."

Just another worm
VBS.VBSWG.AF is just another VBS script virus. Like others, its intent is to spread via email. Unlike others, lame coding makes this impossible. The email, should you ever receive it (doubtful) carries the subject line: Antrax Info and body which reads:

si no sabes que es el antrax o cuales son sus efectos aquite mando una foto para que veas los efectos que tiene.

Nota:la foto esta un poco fuerte.

In English, this translates to:

If you don't know what antrax is or what the results of it are, please see the attached picture so that you can see the results that it has.

Note: the picture might be too strong.

The attached file is named "antraxinfo.vbs".

The virus also modifies the SCRIPT.INI file used with mIRC to facilitate spread via Internet Relay Chat.

AOL4FREE HOAX

AOL4Free Hoax

Description: The AOL4Free saga is part hoax, part reality. First, there is a Macintosh program named aol4free (note, it does not use the filename aol4free.com) Second, there is hoax generated that stated aol4free.com deleted files on users hard drives. Finally, there is a Trojan by the same name, which has been dubbed A4F-Spoof by the antivirus vendors to avoid confusion. (The assumption is that the hoax was a spin-off of the Mac program, and the Trojan a spin-off of the hoax).

Example of hoax email:

Anyone who recieves this must send it to as many people as you can. It is essential that this problem be reconciled as soon as possible.

A few hours ago, I opened an E-mail that had the subject heading of aol4free.com

Within seconds of opening it, a window appeared and began to display my files that were being deleted. I immediately shut down my computer, but it was too late. This virus wiped me out.

It ate the Anti-Virus Software that comes with the Windows '95 Program along with F-Prot AVS. Neither was able to detect it. Please be careful and send this to as many people as possible, so maybe this new virus can be eliminated.

APost worm

Don't Read this Readme

The APost virus disguises itself as readme.exe

On September 3, 2001, Labor Day holiday in the U.S. and Canada, a new email virus began spreading. The virus, dubbed APost, sends itself as an attachment named Readme.exe. Legitimate Readme files are generally text only (carrying the .TXT extension and not the .EXE extension used by the virus). Readme files accompany nearly every software program distributed and serve to provide valuable installation, configuration, and compatibility information about that software. The new, viral readme.exe could cause confusion among those persons who do not have file extension viewing enabled. By default, Microsoft® has this feature turned off in Windows, likely causing many to be left unaware of the true nature of the file. The Attachments Center provides tips on turning this feature on.

Alex Shipp, Senior Anti-Virus Technologist for MessageLabs initially reported the virus and antivirus vendor Sophos quickly followed with an alert of their own. Analysis performed by Alexey Podrezov, virus researcher for F-Secure Corp indicates the APost virus arrives via an email with the following characteristics:

Subject: As per your request!

Body: Please find attached file for your review.
I look forward to hear from you again very soon. Thank you

Attachment: readme.exe

If the readme.exe file is opened, the worm displays the following message box:


Image provided courtesy of F-Secure

If the user clicks the Open button, a second message box is displayed:


Image provided courtesy of F-Secure

The worm copies itself to the root of all local and mapped drives and sends itself to all recipients listed in the Microsoft® Outlook address book. The Sent items folder, however, will not reflect the worm's emails as they are deleted automatically after sending.

Manual removal instructions
Edit the Registry to remove the 'macrosoft' subkey from the following key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run

Search the root of all local and network drives, as well as floppies, for the file README.EXE and delete it.

Locate and delete the file README.EXE from the Windows directory. If the file cannot be deleted, make the registry modification noted above, reboot the system, and then delete the file.

ArabStar

Jerusalem virus

Also known as: A-204, 1808(EXE), 1813(COM), ArabStar, BlackBox, BlackWindow, Friday13th, HebrewUniversity, Israeli, PLO, Russian

Type: File infector

Affects: PCs

Discovered: October 1, 1987
Note: the Jerusalem virus was originally thought to have originated in Israel as it was first discovered in a Hebrew university there. However, antivirus researchers received new evidence in 1991 that points to Italy as being the originating country.

Description: The Jerusalem virus is one of the older and certainly one of the more commonly known viruses. Several variants of Jerusalem exist, infecting both .EXE and .COM files found on the system. The first of the Jerusalem viruses contained a bug that caused it to repeatedly infect the EXE files over and over, until eventually the file sizes overwhelmed computer resources.

Jerusalem has a malicious payload that activates each Friday the 13th, deleting any programs run on that day. The virus causes a general slowdown of the computer thirty minutes after an infected program is run and also causes the screen to roll up two lines. Some minor variants of Jerusalem do not cause the screen anomaly, making their presence harder to detect by the naked eye.

Ashar

Name: Brain Virus

Also known as: Ashar, (C)Brain, Clone, Nipper, Pakistani, PakistaniBrain

Type: Memory resident stealth boot sector infector

Affects: PCs

Discovered: January 1986

Description: The Brain virus is a memory resident stealth boot sector infector that changes the infected disk's volume label to "(c) brain" or "(c) ashar" depending on variant.

While no longer in-the-wild, Brain achieved notoriety for being the first known PC virus. It infected boot sectors, hooking into INT13. If the virus were resident in memory, the boot sector would look normal.

AutoStart Worm

AutoStart Worm

Name: AutoStart worm

Also known as:

Type: Macintosh application infector

Affects: PowerPC Macintoshes and compatibles, typically running QuickTime v2.0 with the "Enable CD-ROM AutoPlay" option enabled

Discovered: Hong Kong

Description: As with any worm, the AutoStart worm makes copies of itself, rather than infecting other files. According to reports from Bigelow's Virus Troubleshooting guide, authored by Ken Dunham, Autostart begins by copying itself to the root directory as an invisible QuickTime AutoStart application. It then copies itself to the Extensions folder. Data destruction occurs with A, B, E, and F variants. Variants C and D have no malicious payload, and in fact attempt to remove the other variants. Filenames are typically DB, BD, DELDB, Desktop Print Spooler, Desktop Printr Spooler, or DELDesktop Print Spooler. There exist similarly named files which are legitimate, so caution should be exercised if removing these files.

Avril

Avril, Lirva, Naith

A worm by any other name is still a worm

Language helps us to easily communicate with one another. By assigning names to people, places, and things, we are able to identify them to ourselves and others. Now imagine if common items were all assigned random names at the whim of whoever interacted with it. The name would then become meaningless inasmuch as it would provide no ready means of identification and provide little help to communication. That's exactly the current situation with viruses - each vendor assigns whatever name they see fit. This free for all poses no benefit to users, who are then left to fend for themselves in determining what the virus is and whether they are protected from it. Such is again the case with the Avril, Lirva, Naith virus - a single email worm with a half dozen names assigned to it. Both McAfee and Symantec have dubbed this threat W32/Lirva.a@MM. MessageLabs refers to it as W2/Naith.A-mm, Central Command as Worm/Avril.A, and Sophos as W32/Avril-A. F-Secure simply calls it Lirva. Believing simple is good, this article will also refer to the email worm as Lirva.

According to Gergely Erdelyi of F-Secure, Lirva is a password stealing mass-mailing e-mail worm that uses several different methods to spread. In addition to email, Lirva spreads via mIRC, ICQ, KaZaA, and open shares via Windows networked drives. As with previous threats, such as the equally schizophrenically named Yaha variants, Lirva disables antivirus and security applications installed on the infected system. Because newly spreading viruses are not detectable by signature-based scanners without a special update, this leaves users vulnerable to not only the infection, but the inability to obtain the updates needed for detection and disinfection. It also leaves the system vulnerable to further threat, because the software designed to protect the system no longer functions properly. This situtation is worsened by the fact that Lirva (like the Yaha variants, Klez.H and others), takes advantage of a an old vulnerability in Microsoft products that allows the worm to infect automatically when the email carrying the virus is read or even just previewed. The vulnerability affects unpatched versions of Microsoft's Internet Explorer 5.01 or 5.5 (and in many cases, IE 6.x), which can allow attachments to be automatically executed simply by reading - or in some cases, previewing, the email message. Outlook and Outlook Express, and any mail other client that relies upon Internet Explorer to render HTML email messages are vulnerable to this exploit. To ensure you are protected from this vulnerability and others, visit the Windows Update site and allow it to scan your system for necessary security patches.

Lirva harvests email addresses from files on the system ending with any of the following extensions: .DBX, .MBX, .WAB, .HTML, .EML, .HTM, .TBB, .SHTML, .NCH, and .IDX and sends itself to those addresses with email subject lines, message body, and attachment names which have been randomly selected from pre-defined lists in the worm's code.

The worm pays dubious homage to Canadian singer Avril Lavigne, causing the Internet Explorer browser to open to her website on the 7th, 11th, and 24th of each month. Lirva also displays a series of colorful ellipses on the desktop.

Detecting the Worm
Because Lirva copies itself as hidden system files with randomly generated names, identifying the files can be difficult. However, a registry key created by the worm provides an easy means to determine whether an infection has taken place. The key, HKEY_LOCAL_MACHINE\Software\HKLM\Software\OvG\Avril Lavigne, can be easily searched for by following the steps below.

Searching the Registry

Click Start
Click Run
Type REGEDIT and click OK
Click Edit | Find
Type Avril Lavigne
Click Find Next

or you can manually browse the registry to see if the key exists:
HKEY_LOCAL_MACHINE\Software\HKLM\Software\OvG\Avril Lavigne

Removing the Worm
Because antivirus software on the system is frequently disabled by this worm, the safest bet for proper detection and removal of Lirva is the use of an online scanner. Trend Micro's free online virus scanner Housecall is ideally suited for this purpose.

Latest Malware and Vulnerabilities

From Mary Landesman, your guide to Antivirus Software, the latest viruses and other computer-related threats, plus virus encyclopedias to help you find out what that virus does.
A Storm of Scary Email
In recent weeks, a rash of spam has been sent that bear much resemblance to the all-too-familiar tactics of the Storm botnet.
Most Damaging Malware
All malware is bad, but some types of malware do more damage than others. That damage can range from loss of files or total loss of security. This list (in no particular order) provides an overview of the most damaging types of malware.
Easily Remove the MonaRonaDona 'Virus'
The MonaRonaDona 'virus' is a self-advertised 'virus' that isn't even a virus at all. It's a non-replicating program (i.e., a Trojan) that loads when Windows is started, changing the Internet Explorer title bar to read MonaRonaDona and displaying a message which blocks access to your legitimate running programs.
What is JS/Psyme (and How to Get Rid of It)
Many users have experienced repeated warnings of infection by Psyme each time they open their browser. Depending on the antivirus in use, the name given in the warning may be any of the following: Downloader.Psyme (Symantec), Troj/Psyme (Sophos), Trojan.VBS.KillAV (Kaspersky), TrojanDownloader.VBS.Psyme (CA),Trojan.Downloader.JS.Psyme (Kaspersky), VBS/Petch.A (F-Prot), VBS/Psyme (McAfee)
What is the Storm Worm?
The so-called Storm worm is actually not a worm, but rather a family of Trojans that typically include a backdoor, SMTP relay, P2P communications, email harvester, downloader, and often a rootkit.
U.Z.A. O/S Eliminator Worm
The so-called "U.Z.A. O/S Eliminator" worm appears to have originated in Maldives sometime in late July or early August 2007. The worm exploits the autorun feature, enabling it to spread from removable USB/thumb drives to other computers.
Freedom / Outlaw Worm
The Freedom 'virus' is a worm that infects local and USB drives, disables access to Task Manager, Registry Editor and other system utilities, and may try to delete MP3 files found on infected systems. Here's how to clean it.
Trojan.MeSpam Makes You the Spammer
Instead of relying on bots to do the dirty work, Trojan.MeSpam makes you the culprit. Once infected, every forum post you make, every webmail you send, and every blog comment you leave will also deposit a link pointing to a nefarious website.
Rinbot Worm Prompts Repeated Denials
Is Rinbot the little worm that isn't? Or is it simply the worm that no one wants to acknowledge exists? Here's a timeline of this "non-threat".
Storm Worm
The Storm worm spreads via email, using a variety of subject lines and message text that may masquerade as news articles or other current events.
Skype Chatosky Worm: Friend or Foe?
Thanks to the Chatosky worm, I uncovered some things about the Skype service that I might not otherwise have known.
Qspace Javascript Worm Targets MySpace Users
MySpace users are yet again a victim of another targeted attack. Dubbed JS_QSPACE.A by antivirus vendor Trend Micro and JS.Qspace by Symantec, the Javascript worm exploits a cross-site scripting (XSS) vulnerability embedded in a malicious Quicktime .MOV file.
Rontokbro aka Brontok Worm
A mass-mailing email worm that also spreads via USB and thumb drives, the Rontokbro worm - also know as Brontok - takes a multifacted approach to defy detection and removal.
Stration Email Worm
Stration is a mass-mailing email worm that attempts to download a file from a remote server. The worm may inject itself into certain running processes, potentially causing it to bypass firewalls or other security software.
Stration Worm
Stration is a mass-mailing email worm that may attempt to download files from a remote server.
VML FUD FAQ
There's a lot of misinformation being disseminated around the recently discovered VML vulnerability. Here's an attempt to address those misconceptions and alleviate some of the fears.
Zero-Day VML Vulnerability Impacts IE, Windows
A zero-day vulnerability in the Windows implementation of Vector Markup Language (VML) impacts all supported versions of Internet Explorer, all supported versions of Microsoft Windows 2003, Windows XP, and Windows 2000, and recent versions of Outlook and Outlook Express.
Are You in a Botnet?
With 12 million infected systems under their control, botnet operators are controlling a population rougly the size of Guatemala. In fact, the number of infected systems would place it at about 70 out of 230 sovereign states and territories worldwide.
Popular Antivirus Apps *Do* Work
The more a story gets told, the more the original story gets changed by each new storyteller. Sometimes, the story gets so far removed from the original, that the entire intent of the story is lost and new intent construed. Such is the case with the story of antivirus effectiveness, which was recently put through the spin cycle, wrung out, and reformed by Charlie White, editor of the Gizmodo gadget blog.
McAfee Downplays Security Flaws
Vulnerability researchers at eEye Digital uncovered serious flaws in McAfee security products that could allow attackers to gain remote control of affected systems.
Yahoo worm: JS/Yamanner
An early-morning report on a security mailing list led to the discovery of Yamanner, a mass-mailing email worm that impacted Yahoo webmail users.
Gamblers Lose Big with Free Tool
Every successful gambler knows how to handle a certain amount of risk, and how to minimize their losses. But a free tool that promised to help gamblers get the most out of the game turned out to be a Trojan that scammed them out of their winnings.
Hoot Worm Preys on Company
It seems a disgruntled employee targeted their enterprise with a worm that causes pictures of a rather odd looking owl to print on nearly 40 printers specific to the targeted firm.
Nugache Worm
Nugache is a worm that may spread via email, IM, or P2P networks.
Ransomware: Trojans demand money from victims
Having your computer infected with a virus or other malicious software is upsetting enough. But over the past year, a new type of attack promises to be even more disconcerting. Dubbed ransomware, this new attack infects the system, encrypts the files, and then demands payment from its victims.
QuickBatch Trojan Targets the Blind
There is no such thing as a good virus, but some viruses are more despicable than others. Case in point, the newly discovered W32/QuickBatch.G!tr Trojan that specifically targets members of the blind community.
Bagle worm variant warns: 'Lawsuit Against You'
Bagle worm variant that spreads via email and fileshares/P2P networks warns of 'Lawsuit Against You'
Nyxem aka Blackmal worm
Discovered on January 17, 2006, the Nyxem worm has a dangerous payload that executes on the 3rd of each month, overwriting files with specific extensions.
2005: Top Ten Malware Events
Here's the best and worst of 2005 from a malware perspective.
2003: Year of the Black Sheep
It seems appropriate that the Chinese dubbed 2003 as the Year of the Black Sheep. Among other things, the sheep is a symbol of untidiness - and from a virus standpoint, the year was indeed a mess.
2002: Virus Writers Contribute to SPAM
The year 2002 ushered in a new era of malicious marketing code
2001: Year of the Virus
Detecting email-borne viruses every 18 seconds, MessageLabs calls 2001 The Year of the Virus
WMF Image Handling Exploit
A serious vulnerability in Windows Fax and Picture Viewer can allow remote attackers to use .WMF image files to gain control of your system.
Sober.X Worm Description
Sober.X is a mass-mailing email worm that sends itself in either English or German depending on the recipient's domain. In addition to mass-mailing, Sober.X terminates processes related to various antivirus and security programs.
Sober.U Worm
Sober.U arrives in an email message that may be in either German or English language, depending on the recipient's domain.
Sober.T Worm
Sober.T arrives in an email message that may be in either German or English language, depending on the recipient's domain.
sober.s Worm
sober.s arrives in an email message that may be in either German or English language, depending on the recipient's domain.
Sober.R Worm
Sober.R arrives in an email message that may be in either German or English language, depending on the recipient's domain.
Sony Stinx Trojan
The Sony Stinx Trojan exploits the Sony DRM cloaking technology (aka rootkit) installed by music CDs published by Sony after March 2005. This allows the malware to be hidden from view - effectively masking its presence even from most antivirus scanners. The Sony Stinx Trojan installs an IRC Backdoor Trojan that allows remote access to compromised PCs, downloads other malware, and disables the Windows XP firewall.
Slapper worm gets facelift: Linux Lupper worm, aka Plupi and Lupii
The Linux Slapper worm has been given a facelift and this time BBS admins and web bloggers are the target. The new worm has been given a half dozen new names, including Linux/Lupper worm Linux.Plupi, Backdoor.Linux.Smal, ELF_LUPPER.A and Exploit.Linux.Lupii.
Sony President Defends Rootkit
the President of Sony BMG's Global Digital Business, Thomas Hesse, defends Sony's installation of a rootkit by declaring, "Most people, I think, don't even know what a Rootkit is, so why should they care about it?"
Sony Rootkit Strikes Sour Note
If you've purchased a Sony-labeled music CD since March 2005 and used it on your PC, chances are it installed a rootkit that can be easily exploited by virus writers.
Alleged Botnet Creators Arrested
Dutch police have announced the arrests of the alleged author of W32.Toxbot and two alleged accomplices.
First Sony PSP Trojan
PSP.Brick impacts the Sony PSP game console, flashing critical system files and rendering the console unbootable. The newly discovered PSP.Brick isn't technically a virus - it's a Trojan. But the news surrounding PSP.Brick could be described as a polymorphic virus - it spreads fast and the story changes with each reporter it infects.
IM Worms Pose Signficant Threat
Since January 1, 2005, at least 358 descriptions have been published for specific IM threats.
Kelvir Instant Messenger (IM) worm
The most prevalent IM worm is Kelvir family of worms that target MSN Messenger users.
Agent.AD Trojan nabs headlines from London attacks
Just hours after BBC published a news report titled "London attackers 'meant to kill'", the Agent.AD Trojan email stole the headline and part of the copy, using it as a ruse to entice victims into opening its infected attachment.
AIM worm impersonates iTunes app
IM worms continue to expand their repertoire of social engineering tricks. W32/Olameg-net, a.k.a. Opanki.Y and AIM/Megalo, installs itself to the Windows System directory as itunes.exe, presumably trying to disguise itself as the popular Apple iTunes application.
Michael Jackson suicide spam a Trojan
Malware authors eager to capitalize on the Michael Jackson trial have been sending booby-trapped spam messages claiming the pop-singer has attempted suicide.
Mytob.BI worm
Discovered May 31, 2005, Mytob.BI is a mass-mailing email worm that compromises system security by terminating processes related to various antivirus software, disabling the XP SP2 firewall, and modifying the HOSTS file to prevent access to antivirus updates and certain other websites.
Mytob.AR
Discovered May 30, 2005, Mytob.AR is a mass-mailing email worm that compromises system security by terminating processes related to various antivirus software, disabling the XP SP2 firewall, and modifying the HOSTS file to prevent access to antivirus updates and certain other websites.
Prevent the Mytob worm
The Mytob variants are mass-mailing email worms that compromise system security by terminating processes related to various antivirus software and modifiying the Registry to disable the XP SP2 firewall.
Sober.P turns to spam
The Sober.P worm has morphed into a spam Trojan, sending politically-charged messages from infected systems.
Sober hangover begins
The Sober.P worm abruptly stopped its mass-mailing at midnight GMT on May 9th, presumably entering its second stage of infection.
Firefox flaws rated extremely critical
Firefox flaws rated extremely critical
Sober.P worm threatens
Discovered May 2, 2005, Sober.P (also known as Sober.O) is a mass-mailing email that sends itself in either German or English language, depending on the intended recipient's domain.
Crog IM worm
The Crog worm edits the system registry to lower security settings, modifies the HOSTS file to redirect access to various security sites and shuts down processes associated with various security software.
Kelvir IM worms
Three new IM worms, Kelvir.A, Kelvir.B, and Kelvir.C were discovered by antivirus vendors on March 6th and 7th, 2005.
Bagle.BE worm
Discovered on March 1, 2005 in conjunction with several mass-spammed Bagle-like Trojans, Bagle.BE arrives in an email with a blank subject line
Troj/BagleDl-L
Troj/BagleDl-L is a Trojan, not a worm, and does not contain mass-mailing capabilities. However, Troj/BagleDl-L was mass-spammed via email during the morning of March 1st, 2005.
Bagle.AZ worm
Like Bagle.AY, Bagle.AZ is a mass mailing email and P2P filesharing worm with downloader capabilites.
Bagle.AY worm
Bagle.AY is a mass mailing email and P2P filesharing worm with backdoor and downloader capabilites. As with previous variants and most modern email worms, the worm uses its own SMTP engine to spread via email and the From address is spoofed.
MyDoom.AM hijacks HOSTS
MyDoom.AM is a mass-mailing email and P2P filesharing worm that modifies the HOSTS file to prevent infected users from accessing certain antivirus vendor sites.
Lovgate.W worm
A mass-mailing email and filesharing worm, Lovgate.W also contains backdoor capabilities
A stocking full of coal: Multiple flaws in Windows could lead to compromise
Ever wonder what Bill Gates gets for Christmas? This year, the Chinese security firm VenusTech delivered three new Windows exploits just in time for the holidays.
Zafi.D worm spreads Christmas fear
A new variant of the Zafi worm, dubbed Zafi.D, sends itself as a Christmas greeting - in a variety of languages depending on the recipient's domain.
MakeLOVEnotSPAM mask worn byTrojan
Dubbed TrojanDropper.FakeSpamFighter and Troj/Mdrop-IT, the Trojan masquerades as the Lycos infamous MakeLOVEnotSPAM screensaver
Sober.I worm
Sober.I is a mass-mailing email worm that sends itself in both German and English, depending on the infected users' operating system language. Sober.I uses is own SMTP engine to send itself to email address found on infected systems, spoofing the From address.
Bofra.A worm exploits SHDOCVW.DLL flaw
Bofra.A worm exploits SHDOCVW.DLL flaw
Klez Help Center
The Klez virus uses a variety of techniques to fool and aggravate users
Homepage Virus
Also known as Homepage, this e-mail worm was discovered in the wild on May 8th, 2001
IRCsome McVeigh Video a RAT
Alleged movie of Timothy McVeigh execution really the Subseven remote access Trojan.
Sobig.E worm
The Sobig.E worm spreads via email. The Sobig.E worm attachment is a ZIP file.
Virus Encyclopedia
From your Antivirus.About.com guide, an encyclopedia of virus and hoax descriptions. Includes PC, Macintosh, Unix, Active Content, and Wireless infectors.
AntiVirus Research Center
Timely and searchable information concerning viruses currently in-the-wild and even those that are not.
AVP's VirusList
So comprehensive, it might be somewhat difficult to navigate. Well worth the effort, AVP delivers the definitive virus encyclopedia.
Hoaxes and Myths
Though not a virus, hoaxes and myths can still cause downtime and loss of productivity due to unwarranted panic. Rob Rosenberger maintains a plethora of information concerning these non-threatening threats.
Computer Virus Info
From F-Secure, an alphabetized database of virus descriptions. Search by exact name or keyword.
Panda Virus Descriptions
From the makers of Panda Antivirus, an encyclopedia searchable by name, category or family. The database is prefaced by an introduction to computer viruses and a handy glossary of terms.
The WildList
Compiled from various reporting agencies and individuals. Listing all viruses actually causing active infections worldwide, the wildlist is updated monthly.
Virus Analyses
One very long list of just some of the viruses detected by Sophos.
Virus Information Library
The McAfee AVERT Virus Information Library includes detailed information on viruses as well as popular hoaxes and myths.
WildList Virus Descriptions
F-Secure simplifies the WildList by linking descriptions to the names of the viruses reported to be in the wild. Updated monthly.

Virus Encyclopedia

Virus Encyclopedia
Also see: Hoax Encyclopedia

Welcome to the virus information center. Here you will find virus descriptions and profiles of common viruses and other malicious code affecting PC's, Mac's, Unix systems, and Wireless Devices, as well as active content threats exploiting browser and email security vulnerabilites. Browse alphabetically to find the desired description. If you are unable to find a description for a particular virus, please post a message in the forum.

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

If you don't find a particular virus listed here, it might be a hoax. Hoaxes aren't just a benign joke. Even when not believed, they clog mailservers and reduce productivity. When they are believed, reactive precautions can be as costly as a real threat. Visit the Hoax Center to learn more.

Other virus encyclopedias

Email is a virtual conveyor belt for viruses and your browser settings can leave you vulnerable to hijackings and spyware. Be sure to check out Securing your email and Securing Internet Explorer. Also see the Executable file attachments center for a list of common executable attachment types that you'll want to avoid.

Hoax Encyclopedia

Also see: Virus Encyclopedia

by Mary Landesman

Virus hoaxes, scams, and chain letters abound in email. Before forwarding that dire sounding warning or too good to be true promise, check the validity of it here. Chances are, it's a hoax. Virus hoaxes and myths waste time and money - and can make the sender look foolish. Don't fall victim to a virus hoax. Check the list of hoaxes below to find out the facts behind that email.


!0000 Tip
#77
48 Hours
5-Cent Email Tax
809 Area Code
90#
AAAAA.AAA Tip
A.I.D.S.
AIM Petition
Airline Spiders
Al-Jazeera Interview
An Internet Flower for You
AOL4FREE
AOL Email Tracking
AOL.EXE
AOL/Intel Merger
AOL Messenger Petition
A Virtual Card for You
Believe the Unbelievable
Bill Gates Email Tracking
Bill Gates Email Tracking 2
Bluemountain Greetings
British Airways 'Free Flight'
Bud Frogs
Buddy List
Butt Spider
California/Wobbler
Card for You
Cell Phone Hoax
Cellsaver
Choke (Worm & Hoax)
Death69
Deeyenda Maddick
Demon (Worm & Hoax)
Discount
Disney $5000
DR.SIMON.WAJNTRAUBWS
Economic Slowdown
Elf Bowling
Euro - Afro Asian Sweepstake
Euro Lottery International
Family Pictures
Fat Cat
FCC Virus Warning
Federal Bill 602P
Free Nokia Phone
Frogapult
G Virus
Give a Cat a Colonic
Good Times
Hackingburgh
Hard Drive Killer
Hotmail Warning
International Sweepstakes Lottery
Internet Flower

Invitation
Irina
It Takes Guts to Say Jesus
JDBGMGR.EXE
Join the Crew
Klingerman
Knockout Perfume
Let's Watch TV
Life is beautiful.pps
Lotus Notes
Matrix_99.MTX
Microsoft Email Tracking
MS/AOL Email Tracking
Mobile Phone Hoax
Mohammed Al-Asuquf
Monkeyman935
MSN Hacker List
MSN Hotmail Shutdown
MSN server shutdown
Naughty Robot
Nigerian 419 Scam
November 15 Hotmail shutdown
NEW PICTURES OF FAMILY
Nokia Phones for free
Olympic Torch
OPEN:VERY COOL!
Osama Bin-Laden hanged
Osama vs Bush
Outback Steakhouse
Penny Brown
PenPal Greetings
Perfume
Perrin
PKZ300
PLEEEEEEEASE READ
President Bush
Returned/Unable to Deliver
RH Power Tracking
Ryder Trucks
Sandman
Sector Zero
Shopping in Malls
Spiders in the toilet
Strunkenwhite
Sulfnbk.exe
Swiffer WetJet
Two-Striped Telamonia
Upgrade Internet2
Vigo Examiner
Virtual Card for You
Win a Holiday
Win a Nokia
WTC Survivor
VIRUS WITH NO CURE

A virus hoax has only one purpose in life and that is to spread to as many people as possible. Quite the same goal as viruses, some might say. Don't be fooled into forwarding a hoax "to everyone you know". Consult this article first instead.

How to Get files from the directory - One more method

 import os import openpyxl # Specify the target folder folder_path = "C:/Your/Target/Folder"  # Replace with the actual path # Cre...