Thomas Fernandez writes:

> You are not in business or academy. In those fields, attached files
> with macros are common.

I'm in both, and macro-laden files comprise only a tiny minority of
attached files.

> Right. There is no 100% protection, if you need to open those files.

Often, you don't need to open those files.

> This is utter nonsense. I receive files from people who sent me files
> before. How do I know they haven't been infected in the meantime?

By whether or not you consider them trusted sources.

> What's a "trusted source" anyway?

One that you know will not provide infected files.

> I get business proposals from people who attach company profiles. I
> don't know these people. Should I reject all proposals from people who
> I don't know yet?

If they contain executable code, yes.  It works for me.

-- 
Anthony
__________________________________________________
Using The Bat! v3.0.1.33 on Windows XP 5.1 Build 2600 



________________________________________________
Current version is 3.0.1.33 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to