| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Locking Windows |
G'day Bob 18 Apr 04 22:32, Bob Lawrence wrote to David Drummond: DD>> At work, I open .DOCs with Word, and .XLSs with Excel. With the DD>> default settings they advise me of any embedded macros, and ask DD>> if I wish to run them. Unless I know the origins of the DD>> document, I click "no". BL> And what if the formatting is then totally stuffed? Aren't you BL> tempted to go back and click "yes?" After all, you can see it's just BL> a harmless readme file... Not if it has macros - harmless readmes don't require macros... BL> Okay, so you look up the macro and it's called something harmless, BL> and you open the macro and it's jsut a whole lot of stuff about BL> formatting (with one unseen line, "shell c:\cookies\123456.cke") I don't have a directory called c:\cookies... DD>> Having an up-to-date virus checker helps one's confidence. BL> A virus checker won't find a "harmless" macros that runs a trojan BL> hidden somewhere else. It's not a virus. In fact, it's plain text. I don't execute macros in unknown documents. Even if I did, the "trojan hidden somewhere else" would get caught by the virus checker when it was loaded for execution (assuming that it was known by the virus checker). I update my virus checker dat files several time per week. Regards, David --- Msged/LNX TE 06 (pre)* Origin: Anything war can do, peace can do better. (3:640/305) SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 690/734 712/848 SEEN-BY: 774/605 800/221 445 @PATH: 640/305 954 633/260 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.