26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Running E-Mail Attachments<br />

The most popular means of transmitting a virus is via e-mail. Virus writers (<strong>and</strong> sometimes<br />

the virus programs themselves) attach innocent-looking files to e-mail messages, <strong>and</strong> then<br />

send them out to thous<strong>and</strong>s of users. You receive the e-mail message, along with the<br />

attachments. If you ignore the attachments, no harm is done. But if you open the attachment—<br />

thinking that it’s a picture or a Word document or a text file—you launch an executable<br />

program that contains the virus, <strong>and</strong> your system gets infected.<br />

You can reduce your risk by not opening file attachments—even if they come from someone<br />

you know. Unfortunately, too many users open any <strong>and</strong> all attachments without thinking, <strong>and</strong><br />

contribute to today’s huge virus infection rates.<br />

Accepting Files While Chatting <strong>and</strong> Messaging<br />

Exchanging text messages with other users is a relatively safe activity. The activity becomes<br />

dangerous when you start receiving files from the people you talk to, or unsolicited files from<br />

other system users. Download <strong>and</strong> open one of these files, <strong>and</strong> you run the risk of infection.<br />

Ignore the file <strong>and</strong> you stay safe.<br />

The key is to ignore requests to send you files, no matter where they come from, or what they<br />

propose to offer. Maybe it’s a picture of someone you’ve been chatting with in a “personals”<br />

room. Maybe it’s a hot new utility you can use to automate your chat session. It doesn’t<br />

matter. The file might be exactly what it claims to be—or it could be a deadly virus.<br />

It doesn’t even matter if you can see the extension of the file. You know JPG files are safe to<br />

download, so you don’t think twice about accepting the file mypicture.jpg from one of your<br />

chat buddies. But what if a malicious "buddy" actually sent you a file with a name like this<br />

mypicture.jpg<br />

.exe<br />

That’s right, it’s the old double-dot/double-extension spoof, but with a lot of spaces between<br />

the main name <strong>and</strong> the .exe extension. The filename is so long, in fact, that the extension<br />

doesn’t show in the message window; all you see is the first part of the filename,<br />

mypicture.jpg. Download what you think is a picture file, <strong>and</strong> you get an infected program file<br />

instead.<br />

The lesson here is that if you accept files when chatting or messaging, you run a very real risk<br />

of your system becoming infected.<br />

Assessing Your Risk Potential<br />

Given the particular way you use your computer, how likely is it that you’ll catch a computer<br />

virus Compare your computer use with the activities listed in Table 2.2 to determine how at<br />

risk you are for a virus infection.<br />

Table 2.2: Virus Risk Potential for Common Computer Activities<br />

Activity Risk Comments<br />

Using commercial Very Low Probably the safest activity you can engage in.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!