Timothy said -
Most users are not aware of the security
features and trust the default options, making themselves vulnerable to a
trojan horse attack.  The main rule is to not execute any attachment.  By
default Outlook can execute code without any acceptance by the user.  A
very bad default option.

Andrew said -
That'd only happen in mailers with "execute attachments without asking"
settings. I think only M$ mailers have that nice, userfriendly (snigger)
feature

=====================
If I use Microsoft's Outlook Express to handle mail from the list and I
attempt to open any file attachment, for instance (even) the _plain text_
regulary attached to Ian Pine's mail I get -

"Some files can contain viruses or otherwise be harmful to your computer.
It is important to be certain that this file is from a trustworthy source.

What would you like to do with this file ?

    * Open it

    * Save it to disk"

with the option to -

"Always ask [this] before opening this type of file"
========================

This has been the case for a very long time.  I have set no special
default or written any patches. Users have control and can make their own
decisions - just like any other other "brain damaged" people.

As I said earlier in this thread -
"I'm getting fed up with such thoughtless attacks on everything MS... "

John in Wales



Reply via email to