?
Solved

Trojan

Posted on 2006-11-15
4
Medium Priority
?
240 Views
Last Modified: 2013-12-04
Is this true if i download a virus it will only affect my machine, if i open/run it?
0
Comment
Question by:Vast41
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 14

Expert Comment

by:inbarasan
ID: 17945674
Dear Vast41,
Yes. It will affect only if you open or run it

Cheers!
0
 
LVL 8

Expert Comment

by:mfteal
ID: 17945788
Although, the definition of open/run can become a little blurred if you look at something like an email virus. For example, certain vulnerabilities in HTML mail can allow a malicious file attachment to run even if the user only views it in the preview pane or opens the message, but doesn't actively execute the attachment by double-clicking it.
0
 

Author Comment

by:Vast41
ID: 17945830
That's interesting Mfteal so the only way to be sure is catch the mail before it's opened, how many AV'S do that? Thanks
0
 
LVL 8

Accepted Solution

by:
mfteal earned 200 total points
ID: 17945952
I'm not sure how many of them offer this functionality, but many offer email scanning which means that they scan the email as it is being received (either on the exchange server or on the workstation if you don't run your own mail server and collect it from an ISP etc).

One way to see if your own AV offers this is to try sending the Eicar test email to yourself. This isn't a virus but a standard anti virus tester.
http://www.aleph-tec.com/eicar/index.php
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month12 days, 15 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question