PureBytes Links
Trading Reference Links
|
> but worth your time
Certainly is a good post from an AV point of view as well as for being an eye-opener
on file property+extension details.
Since here the Powertoys tools-set is also installed, then all of the following
keys listed below were showing the "NeverShowExt" values and have deleted them
as instructed, tho all could have also been renamed into "AlwaysShowExt".
key "Shortcut"(linkfile)
key "Send To Clipboard as Name PowerToy"
key "Send To Command Line PowerToy"
key "Send To Clipboard as Contents PowerToy"
key "Send To Mail Recipient MAPI PowerToy"
key "value not set"
key "value not set"
key "Send To Internet Mail Recipient PowerToy"
key "Send To Any Folder PowerToy"
key "Document Shortcut"(DocShortcut)
key "Internet Shortcut"(urlfile)
key "Link"(linkfile)
key "Shortcut to MS-DOS-program"(piffile)
key "Windows Explorer Command"(SHCmdFile)
key "Shell Extension"(ShellExt)
key "Scrapobject"(ShellScrap)
Results so far, are that now the following file extensions are visable:
.NameOnClipboard
.CommandLine
.ContentsOnClipboard
.MapiMail + .MapiSend
.CMCSend
.DeskLink
.InternetMailSend
.Other Folder
.doc.lnk + .shb
.URL
.lnk
.pif
.scf
.ShellExt
.shs
Thanks................
Regards,
Ton Maas
ms-irb@xxxxxxxxxxxxxxxx
Dismiss the ".nospam" bit (including the dot) when replying.
Homepage http://home.planet.nl/~anthmaas
----- Original Message -----
From: "Mark Jurik"
To: "'Omega List'" <Omega-list@xxxxxxxxxx>; "'MetaStock List'" <metastock@xxxxxxxxxxxxxxxxxx>
Sent: donderdag 13 juli 2000 4:33
Subject: email virus exploits hidden file extensions
> This is a long one, but worth your time....
>
> - Mark Jurik
>
> ======================================================
>
> ----------- eMail Virus requires modification to Registry to avoid being a victim --------------
>
>
> Dow Jones Newswire: Major Companies Crippled By Computer Virus
--------------------------snip--------------------
|