Saturday, October 30, 2010

warning




These are the file types by which images should come as.
Anything else should be unacceptable. There is no reason to
have an Image of any kind come as a .exe file. Don’t ever
accept the excuse that it’s an auto extracting image file!
READ ME AND TEXT FILES
Almost all program information documents on the net come in
one of these formats. These files are simply information
documents typed up in some word processing program or text
editor.




Some examples of their extensions are:
• DOC Document format for Microsoft Word, Word.
Example: (readme.doc)

 for details


• TXT Text format file can be opened by Notepad, Word,
Microsoft Word.
Example: (readme.txt)
• RTF (Rich Text Format)
Those are all acceptable legitimate formats. The truth is that a
text files can come in almost any format. However there are
formats that they really should never come in.
For Example:

• <anything>.com
• <anything>.exe
• <anything>.txt.vbs

There is no reason for any files to be sent to you in any of the
above formats if they are text documents. I can also assure you
there is no reason a file should have a double extension. Such
files if you should ever receive them should be treated with
suspicion.
By no means should you ever open a file if you do not
know what type of file it is.

If you are uncertain about what a file type is here is a method by
which you can check. Go to your favorite search engine for
example:

Altavista: http://www.altavista.com
Or
Metacrawler: http://www.metacrawler.com

• Click into the search field
(Then type the file type you are inquiring about for example)

• Doc file type
• Exe file type
• Rtf file type

This will pull up sites that will give a more detailed explanation of
exactly what type of file it is.
You can use the above information to better understand what
type of files you receive from individuals. Without risking
installing anything on your machine.
We’ve covered methods by which your computer can be accessed
by a Netbios Attack, how files can be infected, and how they can
be delivered. In Chapter 4 we’ll discuss who is responsible for
these attacks. We will look at the type of individuals behind the
keyboard responsible for these attacks.

No comments:

Post a Comment

Total Pageviews

Followers