Hello Anthony, On Mon, 4 Apr 2005 17:39:51 +0200 GMT (04/04/2005, 22:39 +0700 GMT), Anthony G. Atkielski wrote:
>> You are not in business or academy. In those fields, attached files >> with macros are common. AGA> I'm in both, and macro-laden files comprise only a tiny minority of AGA> attached files. Different sitautions between you and me. >> Right. There is no 100% protection, if you need to open those files. AGA> Often, you don't need to open those files. Yet often enough, I do. >> This is utter nonsense. I receive files from people who sent me files >> before. How do I know they haven't been infected in the meantime? AGA> By whether or not you consider them trusted sources. >> What's a "trusted source" anyway? AGA> One that you know will not provide infected files. My point is that some oneone who sent me uninfected files one day, may send me an infected file the next. I have no control over what they do with their computer. >> I get business proposals from people who attach company profiles. I >> don't know these people. Should I reject all proposals from people who >> I don't know yet? AGA> If they contain executable code, yes. It works for me. Not for me. Well, if they send me .exe files, I do ask them to send me sensible files. But an Excel atttachment is quite common. -- Cheers, Thomas. A PICTURE IS WORTH A THOUSAND WORDS But it uses up a thousand times the memory. Message reply created with The Bat! 3.0.2.10 under Windows XP 5.1 Build 2600Service Pack 2 ________________________________________________ Current version is 3.0.1.33 | 'Using TBUDL' information: http://www.silverstones.com/thebat/TBUDLInfo.html

