A CDE Definition
In the past, email servers accepted all file attachments, allowing viruses to be executed by unwary recipients who clicked on them. It was not uncommon to get messages such as "click this - coolest thing I've ever seen" from a friend whose email address was stolen from the user's contact list.
Today, most mail systems will not allow an executable to be attached in the first place, let alone accept them. Nevertheless, executable files can find their way into a user's computer, and the important thing to know is which files are potentially dangerous.
Data Are Not Executed (Theoretically)
It is commonly assumed that, except for macros within spreadsheets and word processing documents, all data are safe because they do not contain instructions. However, some illustration and image files do contain commands that are executed. In addition, every application in the act of processing its data is in an execution mode that can be diverted to do harm if the file contains bogus code and the software is not rock solid from a security standpoint. See virus, double extension and extension.
The Windows Extension Default
When looking at file names in Explorer, be aware that new installations of Windows hide the file extension. See hidden file extensions.
EXE/COM (machine language)
EPS/PS (PostScript document)
HTA (hypertext app)
INF (AutoRun file)
MSI/MSP (MS Installer, patch)
PS1/PS2 (PowerShell script)
PSC1/PSC2 (PowerShell script)
REG (Registry file)
SCF (Explorer command)
SCR (screen saver)
SHS (OLE object package)
TIFF (TIFF image)
WMF/EMF (Windows Metafile image)
WS/WSF (Windows script)
DATA - WINDOWS & MAC
(can contain executable macros)
GENERALLY SAFE EXTENSIONS
Before/After Your Search Term
|daisy chain||dangling pointer|
|daisy wheel||dangling reference|
|Dan Bricklin's demo programs||Darbee Visual Presence|
|Danger, Inc.||dark current|
Terms By Topic
Click any of the following categories for a list of fundamental terms.