Timothy said -
Most users are not aware of the security
features and trust the default options, making themselves vulnerable to a
trojan horse attack. The main rule is to not execute any attachment. By
default Outlook can execute code without any acceptance by the user. A
very bad default option.
Andrew said -
That'd only happen in mailers with "execute attachments without asking"
settings. I think only M$ mailers have that nice, userfriendly (snigger)
feature
=====================
If I use Microsoft's Outlook Express to handle mail from the list and I
attempt to open any file attachment, for instance (even) the _plain text_
regulary attached to Ian Pine's mail I get -
"Some files can contain viruses or otherwise be harmful to your computer.
It is important to be certain that this file is from a trustworthy source.
What would you like to do with this file ?
* Open it
* Save it to disk"
with the option to -
"Always ask [this] before opening this type of file"
========================
This has been the case for a very long time. I have set no special
default or written any patches. Users have control and can make their own
decisions - just like any other other "brain damaged" people.
As I said earlier in this thread -
"I'm getting fed up with such thoughtless attacks on everything MS... "
John in Wales