Solved

Viewing email in "Preview" pane, does this mean the email has been "opened"?

Posted on 2004-04-05
4
940 Views
Last Modified: 2010-04-08
In other word, if the message has virus, will it infect the computer by viewing it in Preview pane?

Thanks.

 
 
0
Comment
Question by:robinluo
  • 3
4 Comments
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
Not all viri behave this way, but the simple answer it yes it CAN
http://www.infoworld.com/cgi-bin/displayStory.pl?99119.iibubble.htm
0
 
LVL 27

Expert Comment

by:jjafferr
Comment Utility
Hi robinluo,

It depends on the Option settings, if it is set to "Mark unread after 5 seconds", then it will not be marked Unread untill the 5 seconds are gone,
otherwise, like my setting, Once you move to the second message, the first one is marked Unread.

Hope this helps

jaffer
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 125 total points
Comment Utility
oops that was a contradictory link see

Disable the Microsoft Outlook Preview Pane

Some email viruses are capable of automatically executing as soon as they appear in the Outlook “Preview Pane.”

To prevent the automatic execution of viruses, modify Microsoft Outlook to not show the “Preview Pane:”
Launch Microsoft Outlook 2000 or Outlook 2002
Select the folder (Example: Deleted Items) that you want to change Note: If you can not see your Deleted Items folder (or any of your folders), select “View Menu” and click on “Folder List.”
Keep in mind that you must change the “Preview Pane” setting for each of your folders (including Inbox, Sent Items, etc).
Select the “View” Menu  
Click “Preview Pane” to enable or disable the “Preview Pane”  
Repeat Steps 3-4 for each other folder (Inbox, Sent Items, and any other personal folders)

http://www.trendmicro.com/en/security/general/guide/overview/scg-xp.htm

0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
ThanQ
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
Create high volume marketing opportunities using email signatures with these top 10 DOs and DON'Ts of email signature marketing.
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now