Also, from Microsoft:
http://www.microsoft.com/security/antivirus/mydoom.asp#howtotell
"How to Help Protect Against These Worms
If you ever receive a questionable e-mail message that contains an attachment?especially if it has a .zip file name extension?do not open the attachment. If you cannot confirm with the sender that the message is legitimate and that the attachment is safe, delete the message immediately. Also note that Microsoft never distributes unsolicited software through e-mail messages.
To block harmful attachments in e-mail messages, get the latest updates for Outlook and Outlook Express by doing the following:
If you use Outlook 2003: Learn which attachment types are blocked in Outlook 2003:
http://support.microsoft.com/?id=829982
If you use Outlook 2002: Get the latest Office service packs and learn which attachment types are blocked in Outlook 2002:
http://office.microsoft.com/officeupdate/default.aspx
http://support.microsoft.com/?kbid=290497
If you use Outlook 2000: Get the latest Office service packs:
http://office.microsoft.com/officeupdate/default.aspx
If you use Outlook Express 6: Learn about virus protection features:
http://support.microsoft.com/?kbid=291387
If you use earlier versions of Outlook Express: Download the latest version of Internet Explorer, which includes the latest version of Outlook Express:
http://www.microsoft.com/windows/ie/downloads/critical/ie6sp1/default.asp
How to Tell If a Computer Is Infected with Mydoom.A or Mydoom.B
Go To:
http://www.microsoft.com/security/antivirus/mydoom.asp#howtotell
Something that I and others have been preaching since the big Love Bug virus struck 4 years ago:
From the makers of AVG, Lavasoft News, February 1, 2004:
"...after this last worm spread (MyDoom), and I looked around various online forums, I noticed something was missing. A very big piece of the puzzle. The one piece that has the largest influence on preventing things like viruses and worms from entering the computer and doing anything in the first place.
So what was your answer to the question? If you didn't say the first line of defense was you, the user of the computer, it's time to rethink your security strategy.
Users hold the largest chance of keeping malicious code like viruses and worms off their systems by one extremely easy method, and many fail to exercise it. Instead, they rely on their antivirus program to catch anything suspicious. The method only takes a few seconds to do, and it can prove wonders in preventing system infection and preventing the spread of such items. If you receive something in your email, whether it's from someone you know or someone you don't, and it contains an attachment, and it looks suspicious in any way, your very next step should be to click Delete.
How do you tell the difference between a suspicious and non-suspicious email? The days of judging this by the sender and the sender only are long gone. Most worms will use your friends' email addresses for sending, in an effort to get you to open it. Your first step should be to see if it just looks strange. You know your friends better than anyone else. Look at the writing style of the email. Does it look like something they'd write? If not, then proceed with caution.
A method that some use when sending attachments is to send an email beforehand, letting the other person know they're about to send an attachment, along with what type of file it is and what it contains. This can help greatly in figuring out if something's safe or not, but of course, don't go on this alone.
Perhaps in an Instant Message or a telephone call one could let the other know of the pending email containing the attachment.
One of the best things you can do is trust your instinct. If it looks suspicious, delete it. You can always ask the sender what they sent and have them resend if necessary. But if you do believe it's safe to open, and it turns out not to be, then make sure your next layer of security, such as your antivirus software, is updated and monitoring, and be prepared with backups of your important files in case that layer of security fails."
http://www.lavasoftnews.com/theeye/i17/print/
From SOPHOS:
"...The MyDoom worm (also known as Novarg or Mimail-R) spreads via email, using a variety of technical-sounding subject lines and attachment names. If the attached file is launched, and the worm activated, the infected computer's hard disk is harvested by the worm for more email addresses to send itself to. The worm opens a backdoor onto infected computers which allows hackers to gain access.
The worm also spreads via the KaZaA file sharing network, and launches a denial of service (DoS) attack from infected computers (known as "zombies") against SCO's website between 1 and 12 February.
"MyDoom is unlike many other mass-mailing worms we have seen in the past, because it does not try to seduce users into opening the attachment by offering sexy pictures of celebrities or private messages," said Graham Cluley, senior technology consultant for Sophos. "MyDoom can pose as a technical-sounding message, claiming that the email body has been put in an attached file. Of course, if you launch that file you are potentially putting your data and computer straight into the hands of hackers."
"When the MyDoom worm forwards itself via email, it can create its attachment in either Windows executable or Zip file format. It is possible the worm's author did this in an attempt to bypass company filters which try and block EXE files from reaching their users from the outside world," continued Cluley."
http://www.sophos.com/virusinfo/articles/mydoom.html

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic