Hello Anthony,

On Mon, 4 Apr 2005 17:39:51 +0200 GMT (04/04/2005, 22:39 +0700 GMT),
Anthony G. Atkielski wrote:

>> You are not in business or academy. In those fields, attached files
>> with macros are common.

AGA> I'm in both, and macro-laden files comprise only a tiny minority of
AGA> attached files.

Different sitautions between you and me.

>> Right. There is no 100% protection, if you need to open those files.

AGA> Often, you don't need to open those files.

Yet often enough, I do.

>> This is utter nonsense. I receive files from people who sent me files
>> before. How do I know they haven't been infected in the meantime?

AGA> By whether or not you consider them trusted sources.

>> What's a "trusted source" anyway?

AGA> One that you know will not provide infected files.

My point is that some oneone who sent me uninfected files one day, may
send me an infected file the next. I have no control over what they do
with their computer.

>> I get business proposals from people who attach company profiles. I
>> don't know these people. Should I reject all proposals from people who
>> I don't know yet?

AGA> If they contain executable code, yes.  It works for me.

Not for me. Well, if they send me .exe files, I do ask them to send me
sensible files. But an Excel  atttachment is quite common.

-- 

Cheers,
Thomas.

A PICTURE IS WORTH A THOUSAND WORDS But it uses up a thousand  times
the memory.

Message reply created with The Bat! 3.0.2.10
under Windows XP 5.1 Build 2600Service Pack 2




________________________________________________
Current version is 3.0.1.33 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to