V
Virus Guy
Can the following file types pose a threat to systems running Win-98
if they are indeed viral but are bypassed during virus scans:
*.jpg
*.gif
*.tif
*.bmp
*.txt
*.cdr (corel draw files)
*.crw (raw image files for Canon digital cameras)
*._dd (checkdisk or ndd file fragments)
*.pdf
*.hlp
*.mdb
*.xls (if running Office 2000 Premium SR1 fully updated via
micro$loth's office update, what threats do .xls or .doc
files pose at this point? Powerpoint files?)
*.mix (microsoft photo-draw picture?)
*.mpg (any known vulnerability in .mpeg, .mov, or .avi files?)
*.avi
*.mov
*.cab
*.wav
I know that any virus or trojan can be packaged or stored in any file
with any file extension, and that files with extensions com, exe, scr,
vbs, etc mean something very specific when handed over to the OS (like
execution vs opening with a linked viewer).
For example, if a .txt file is viral, and if it is "activated" by some
means (double-clicking on it, or auto-opening in a preview pane in
Outlook, etc) then in the case of .txt files that activation usually
means to open it in wordpad or notepad. So can a viral payload in a
..TXT file be activated by opening with the standard viewer?
I pose the same question for all the above file types. Can activation
or opening of any of the above with the standard viewing or linked
program cause an imbedded viral payload to be run or executed?
If the answer depends on the OS, then the OS in question is Win 98se
running MS office 2000 Premium SR1.
(don't bother to reply if your answer is to simply scan all files,
because that tells me nothing about how to configure NAV to bypass
files that pose no threat but can trememdously increase system scan
times needlessly).
if they are indeed viral but are bypassed during virus scans:
*.jpg
*.gif
*.tif
*.bmp
*.txt
*.cdr (corel draw files)
*.crw (raw image files for Canon digital cameras)
*._dd (checkdisk or ndd file fragments)
*.hlp
*.mdb
*.xls (if running Office 2000 Premium SR1 fully updated via
micro$loth's office update, what threats do .xls or .doc
files pose at this point? Powerpoint files?)
*.mix (microsoft photo-draw picture?)
*.mpg (any known vulnerability in .mpeg, .mov, or .avi files?)
*.avi
*.mov
*.cab
*.wav
I know that any virus or trojan can be packaged or stored in any file
with any file extension, and that files with extensions com, exe, scr,
vbs, etc mean something very specific when handed over to the OS (like
execution vs opening with a linked viewer).
For example, if a .txt file is viral, and if it is "activated" by some
means (double-clicking on it, or auto-opening in a preview pane in
Outlook, etc) then in the case of .txt files that activation usually
means to open it in wordpad or notepad. So can a viral payload in a
..TXT file be activated by opening with the standard viewer?
I pose the same question for all the above file types. Can activation
or opening of any of the above with the standard viewing or linked
program cause an imbedded viral payload to be run or executed?
If the answer depends on the OS, then the OS in question is Win 98se
running MS office 2000 Premium SR1.
(don't bother to reply if your answer is to simply scan all files,
because that tells me nothing about how to configure NAV to bypass
files that pose no threat but can trememdously increase system scan
times needlessly).