What is a Virus?

Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.

There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself — it is not alive. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell’s existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.

A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to get executed. Once it is running, it is then able to infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.

Types of Infection

When you listen to the news, you hear about many different forms of electronic infection. The most common are:

• Viruses – A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.

• E-mail viruses – An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book.

• Worms – A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

• Trojan horses – A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run. Trojan horses have no way to replicate automatically.

What’s a “Worm”?

A worm is a computer program that has the ability to copy itself from machine to machine. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. For example, the Code Red worm replicated itself over 250,000 times in approximately nine hours on July 19, 2001.

A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft’s SQL server.

How They Spread

Early viruses were pieces of code attached to a common program like a popular game or a popular word processor. A person might download an infected game from a bulletin board and run it. A virus like this is a small piece of code embedded in a larger, legitimate program. Any virus is designed to run first when the legitimate program gets executed. The virus loads itself into memory and looks around to see if it can find any other programs on the disk. If it can find one, it modifies it to add the virus’s code to the unsuspecting program. Then the virus launches the “real program.” The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time either of those programs gets executed, they infect other programs, and the cycle continues.

Dial-up Connection

Optimizing Your Dial-up Connection

Update your Modem Driver
An easy way to improve your system performance is to run the correct modem driver for your connection. About 75% of all chronically slow connections are attributed to an incorrect modem driver. Fortunately, changing your modem driver is simple. To see if you need the correct modem driver, follow these steps.

  1. On your desktop, double click My Computer then Dial up Networking
  2. Highlight the Cybersouth icon by single left clicking on it once. Choose File then Properties.
  3. Look for a box titled Connect Using. If the text in the box below says Standard Modem anywhere, you need a different driver.

Download your Modem Driver
Visit the website of your modem manufacturer. Follow your modem manufacturer’s instructions for installing the new modem driver. Once the driver is installed, you need to configure it in Dial Up Networking.

Reconfiguring your Modem Driver

  1. On your desktop, double click My Computer then Dial up Networking
  2. Highlight the Cybersouth icon by single left clicking on it once. Choose File then Properties.
  3. Find the box labeled Connect Using and change the modem used. Simply click inside the box to display the list of installed modems, then choose your newly installed modem. Click OK to save your changes.

Tuning Windows95/98
Dial Up Networking, bundled with Microsoft Windows and used to connect to the Internet, has settings you can change to improve your connection speed. Speed up your connection with 5 easy steps!

  1. On your desktop, double click My Computer then Dial up Networking
  2. Highlight the Cybersouth icon by single left clicking on it once. Choose File then Properties.
  3. Either a button or tab called Server Types is now visible. Click it.
  4. Uncheck every box EXCEPT the bottom one. (That is, leave TCP/IP checked and clear the other 5 boxes). Click OK.
  5. Depending on your system, you may have to click OK one more time to return to your desktop. That’s it!

Web Storage

What is My Web Place? 

My Place is one part of Cybersouth Networks Webserver service. Personal Webserver allows members to create Web pages for the Internet complete with images, sounds, and downloadable files. My Place is Internet-accessible disk space on our servers. These servers are running both FTP and WWW servers and may be used for making Web pages and downloadable files available to anyone with Internet connectivity.

This FTP disk space can be used for any of the following:

  • Uploading Web pages (HTML files) for others to use.
  • Making files available to friends or co-workers.
  • Uploading multimedia files for use in your personal page.

To upload the files, type the following address on the browser:


You will be prompt for the user name and password.

To access the files go to:


How do I install the Web Xcelerator Software?

  • To properly set up the Web Xcelerator, please save the WebXcelerator-ip-EN_US.3.02.exe file that we have provided to the desktop.
  • Log off the Internet and close all programs (including your browser), double click on the file that you saved on your desktop, and follow all prompts through completion.
  • Restart computer (if, not automatically performed)
  • Open Browser window, click on “Tools” – “Internet Options” – “Connections” – “Settings” – “Dial up and virtual private network settings”, click on the dial up connection. The two boxes under Proxy server will be checked, (the same under LAN settings). Click the “Advanced” tab, and verify that the proxy IP address is and the port number is 6198.
  • When Internet explorer is opened for the first time, you may experience a delay or even a failure to display the web page. In this case, simply close your web browser and reopen it. Once you reopen the browser, the program should begin successful operation.

How do I disable the Accelerator?

Right click the Accelerator icon on your taskbar and select “Disable”. The Accelerator will remain Disabled until it is “Enabled” again.

Can I use E-bay, while the Acceleratoris enabled?

Generally, no problems are indicated. However, if a difficulty is encountered, right click on the Accelerator icon, select “Settings”, and under “Plus” uncheck “Maximum Privacy Protection”.

Click on “Tools” – “Internet Options” – “General” – under “Temporary Internet files” – Delete cookies – Delete files (check “Delete all offline content”).

Can I use the Accelerator along with my Firewall?

All firewalls must be set to allow full internet access to Pxui.exe and Pxclient.exe files.

What about McAfee?

McAfeeprompts you to “Grant access” or “Block” the Web Xcelerator file (pxclient.exe), once you click on “Grant access” it will continue to work as before.

In case you have already clicked on “Block” by mistake, perform the following:

  • Click on Personal Firewall
  • Click on view the internet application list
  • Click on the Pxclient.exe (on the list)
  • Click on Allow full access (on the right).

What about Norton Internet Security?

Norton will prompt you to “Permit” or “Block” the Web Xcelerator file (pxclient.exe), once you click on “Permit” it will continue to work as before.

In case the “Block” option was chosen by mistake, perform the following:

  • Double click on the Norton Internet Security icon (the little blue and green globe on the system tray).
  • Click on Personal Firewall and then click on “Configure
  • Click on Programs, under Manual Programs Control look for Pxclient.exe on the list and change it to “Permit all” instead of “Block all“.
  • Click OK.

System Requirements

Web Browser

  • Internet Explorer 5.01 or higher
  • Netscape versions 4.07 through 7.0

Operating Systems

  • Windows 98
  • Windows ME
  • Windows XP
  • Windows NT 4
  • Windows 2000


  • 2MB of disk space
  • 3MB RAM

*** MAC and WEB TV are not supported***

Please call technical support if you have any questions or need assistance.

Tech Support Hours
Monday-Friday 9:00AM – 9:00PM & Saturday 10:00AM – 2:00PM
Phone: 912-537-3251 Toll Free: 877-291-8324