Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Is "THUMBS" file a threat?

Posted on 2004-08-02
2
1,293 Views
Last Modified: 2010-04-11
message while copying picture files"
   
    "..THUMBS .. This file has extra info attached ...???

Located in
C:\Windows\System32\THUMBS  ( No extension)
Anyone know what this is?

Bob
0
Comment
Question by:rvseitz
2 Comments
 
LVL 7

Accepted Solution

by:
DavidBirch2dotCom earned 125 total points
ID: 11696765
I think you will find that it is a picture database, XP (I assume thats what you are on) will make one when a folder contains several picture files, It allows the pictures to be shown as a presentation or to enable thumbnail viewing off all the images,  So no its not a virus threat, but its always worth changing the extenstion to something (eg .txt) scanning it with an uptodate scanner, if its all ok then just take off the ending and leave it as it was

David
0
 
LVL 1

Expert Comment

by:gexen
ID: 11698917
Hello,
When it says extra data, it is referring to Alternate Data Streams, a feature built into NTFS.  The thumbs.db file is basically a file that uses ADS that acts as a form of metadata (Data to describe other data) that lets you view thumbnails quicker in Windows XP.  There is nothing to worry about.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question