IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

The Importance of Knowing Filename Extensions Prior to Opening Them

25 February 2007 By Saran

Computer interface with various developed programs and most would have an assigned file name extension tagged to it. There are the usual files that would have a doc, xls, ppt, jpg and bmp file extensions. There are also the compressed files such as zip and amr. The compressed files offer some potential risk since they are usually zipped to group files into one manageable file. Program scripts and installation software are the common contents of these zipped folders to save on space and to make it easier for distribution and transfer.

Filename Extension Genius

It is best to proceed with caution before totally unzipping the contents to any directory of your computer. It is the executable files such as the setup.exe that may garner much doubt. Once executable files are double clicked, it will immediate process and try to install itself on the machine. Once finished, there is no telling what effects it may do or create, thus the need for people to think twice before clicking on the files.

[tags]filename extensions, filenames, zipped, scanning, virus scan, spyware, trojans[/tags]

Filed Under: IT Security Basics, Malware, Operating Systems, Review, Spyware, Storage Tagged With: filename-extensions, filenames, scanning, Spyware, trojans, virus-scan, zipped

Being Aware of File Name Extensions

9 February 2007 By Saran

Downloading files on the web can be done at will but the proper identification of file extensions should be taken into account as well. While most of the programs are compressed in zip and rar files so that downloading can be done easier and faster, being cautious with regards to the contents such executable files must also be exercised.

Filename Extensions

Most of the viruses and contaminations that most files have would be initiated once installation ensues. Ordinarily, tracing the harmful effects cannot be seen until after the full installation has transpired. Only then would a user be able to identify that such programs that are supposedly to be helpful, would turn from aiding to being a destructive means towards a computer workstation.

Files sent through emails are another way of receiving distressing program files that will create mischief and havoc in any computer. It is best to look for alternatives or gather information first before actually pushing through with the download, for the sake of ensuring the overall safety and peace of mind of computer users today.

[tags]filenames, file extensions, zipped, archived, viruses, spyware[/tags]

Filed Under: IT Security Basics, Malware, Real-World Issues, Security Policies, Spyware Tagged With: archived, file-extensions, filenames, Spyware, viruses, zipped

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security