You should also be shure to read up on the latest virus library from Symantec.
And Activex controlls? It's like running with scissors! Verry sharp and pointy scissors. One little trip and you could end up in a bloody mess. I assume that you use Internet Explorer as your default web browser. Whatever you do, DON'T USE INTERNET EXPLORER OR MICROSOFT OUTLOOK. Those two tools support activex and related technologies that enable hackers to abuse your computer and offer you something like vi*gra or security software.
As an alternative, Find a similar application that does not base itself off of Activex technology. My Favorites are Firefox and Thunderbird. These however, aren't your only options. (just the popular ones

) And better yet...
*enters cyborg mode*
Join the Linux community. Resistance is futile.
*exits cyborg mode*
Um.....
What I meant to say was use an operating system that doesn't use exploitable code.
Even more nettiquite: Don't read e-mails that says there is a virus or worm on the loose.
1. They could contain an auto-installing self run virus attached in your message.
2. Even if the message was clean in code, it is usually just fluff that smells like crap because it is usually all bogus. The sender of the message anticipates that you are going to react to the message and maybee do something like send it to your friends to warn them of a possibly non-existent danger. Much like the nature of chain mail, it can get "viral".
3. Companies with dedicated anti-viral software will be happy to list all that is new in the viral world. Usually, they are up to date even for the 0-day viral attacks. So instead of taking word from a shady e-mail, use a trusted website for a reference.
Fix-it-yourself: task manager , computer management ,and the system registry
Task Manager - Press "Ctrl" + "Alt" + "Delete" to bring up the task manager. Click on the proccesses tab and make shure "Show proccesses from all users" is checked. Find anything out of the ordinary? Search your hard drive with the name of unknown program. If its location and residing folder contents are shady, look up the name of the program online and see if it isn't an innocent service application. If it isn't, try and close all related proccesses by right clicking the suspected application and selecting "End Proccess Tree". Then, simply selete the application and all other files related to it. If you recieve an error in deleting the file, chances are, it is still running on your operating system and you must try to once again stop the application in its tracks.
Computer Management - Right-click "My Computer" on the desktop and select "Manage". An application titled "Computer Management" will appear. It is organised by category and sub-category. Expand the "Services and Applications" category to reveal the subcategories "Services", "WMI Control", "Indexing Service", and "Internet Information Service". Click on "Services" to reveal all services that are installed on your computer. Search for all services that are running. Stop all tasks that appear to be shady (hints like not having a description and aren't identified online as default services) Then, edit their settings so that they will not run when the computer starts up.
System Registry - Simple Warez make use of the system registry to execute whenever the computer starts up. Go to Start > run... Type in "regedit" as the input. A window will appear tiled "Registry Editor". Similar to Computer Management, the Registry editor is browsable by its sub-categories. Under the path "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\" there will be a category called "Run" and "RunOnce". By clicking on these, you will see certain values that denote applications that run upon starting up your operating system. The applications that you deem unsafe will not start if you delete those values from the registry.
What a long-winded post I developed. Hopefully, you have read it all and learned a thing or two about security and the windows operating environment. (Gosh, I'm such a "NERD"

)
Untill next time...
*enters cyborg mode*
Join the Linux community. Install the Linux operating system. Resistance is futile.
*exits cyborg mode*