E-MAIL ATTACHMENTS |
THE BACKGROUND
Originally E-Mail was a method for sending simple
text across the Internet.
THE FIX
E-mail was broken up into two types of data
THE WORRY
Attachments can contain programs.
THE DANGERS - E-Mail attachments that:
Contain programs
THE RULES
Delete E-mail you get from somebody you do not know.
NOTES
The Internet is just like the rest of the world, most of the people out there are good but there are bad people. I have found it is no better and no worse. You lock your front door as a precaution and do not open it to strangers, you should do the same with your computer.
Spoofing is just changing the return address on the E-Mail. It is easy to "spoof" an E-Mail return address. There are a lot of legitimate reasons to do this. In fact a lot of the E-mail I send is in essence "spoofed". It appears to come from my office, when in fact it may have been sent while I was traveling. This can lead to problems when computer crackers abuse this feature to send E-Mail so that it appears to come from a "friend". I can teach you how to do this in a little under 2 minutes.
Microsoft (MS) Exploits. MS products are designed to work together. MS products are usually installed in the same place on most machines. They share programs and data. They assume that something coming from another MS product is OK. This leaves a computer open to viruses that pretend to be Microsoft programs. It also leaves the system open to programs that look for and read information off your computer since it will always be in the same place on MS computers.