Solved

Trojan

Posted on 2006-11-15
4
238 Views
Last Modified: 2013-12-04
Is this true if i download a virus it will only affect my machine, if i open/run it?
0
Comment
Question by:Vast41
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 14

Expert Comment

by:inbarasan
ID: 17945674
Dear Vast41,
Yes. It will affect only if you open or run it

Cheers!
0
 
LVL 8

Expert Comment

by:mfteal
ID: 17945788
Although, the definition of open/run can become a little blurred if you look at something like an email virus. For example, certain vulnerabilities in HTML mail can allow a malicious file attachment to run even if the user only views it in the preview pane or opens the message, but doesn't actively execute the attachment by double-clicking it.
0
 

Author Comment

by:Vast41
ID: 17945830
That's interesting Mfteal so the only way to be sure is catch the mail before it's opened, how many AV'S do that? Thanks
0
 
LVL 8

Accepted Solution

by:
mfteal earned 50 total points
ID: 17945952
I'm not sure how many of them offer this functionality, but many offer email scanning which means that they scan the email as it is being received (either on the exchange server or on the workstation if you don't run your own mail server and collect it from an ISP etc).

One way to see if your own AV offers this is to try sending the Eicar test email to yourself. This isn't a virus but a standard anti virus tester.
http://www.aleph-tec.com/eicar/index.php
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question