|Good Times is not a virus; it is a complete hoax. |
There is currently no virus that has the characteristics ascribed to Good Times.
The e-mail Good Times "warning" was written by a couple of pranksters on America Online (AOL) sometime in 1994.
Since then, it has traveled the Internet electronic mail system, spreading fear wherever it crops up. The message is just convincing enough that people spread the news to all of their friends. Needless to say, it has propagated itself well over the years.
Please ignore any messages regarding this supposed "virus" and do not pass on any messages regarding it. Passing on messages about this hoax on serves only to further propagate it.
The original "Good Times" hoax was posted and circulated in November and December of 1994 follows:
Here is some important information. Beware of a file called Goodtimes.
Happy Chanukah everyone, and be careful out there. There is a virus on
America Online being sent by E-Mail. If you get anything called "Good Times",
DON'T read it or download it. It is a virus that will erase your hard drive.
Forward this to all your friends. It may help them a lot.
Soon after the release of CIAC NOTES 04, another "Good Times" message was circulated. This is the same message that is being circulated during this recent "Good Times" rebirth. This message includes a claim that the Federal Communications Commission (FCC) released a warning about the danger of the "Good Times" virus, but the FCC did not and will not ever issue a virus warning.
The following is the expanded "Good Times" hoax message:
The FCC released a warning last Wednesday concerning a matter of
major importance to any regular user of the InterNet. Apparently,
a new computer virus has been engineered by a user of America
Online that is unparalleled in its destructive capability. Other,
more well-known viruses such as Stoned, Airwolf, and Michaelangelo
pale in comparison to the prospects of this newest creation by a
What makes this virus so terrifying, said the FCC, is the fact that
no program needs to be exchanged for a new computer to be infected.
It can be spread through the existing e-mail systems of the
InterNet. Once a computer is infected, one of several things can
happen. If the computer contains a hard drive, that will most
likely be destroyed. If the program is not stopped, the computer's
processor will be placed in an nth-complexity infinite binary loop
- which can severely damage the processor if left running that way
too long. Unfortunately, most novice computer users will not
realize what is happening until it is far too late.