Solved

Trojan

Posted on 2006-11-15
4
236 Views
Last Modified: 2013-12-04
Is this true if i download a virus it will only affect my machine, if i open/run it?
0
Comment
Question by:Vast41
  • 2
4 Comments
 
LVL 14

Expert Comment

by:inbarasan
ID: 17945674
Dear Vast41,
Yes. It will affect only if you open or run it

Cheers!
0
 
LVL 8

Expert Comment

by:mfteal
ID: 17945788
Although, the definition of open/run can become a little blurred if you look at something like an email virus. For example, certain vulnerabilities in HTML mail can allow a malicious file attachment to run even if the user only views it in the preview pane or opens the message, but doesn't actively execute the attachment by double-clicking it.
0
 

Author Comment

by:Vast41
ID: 17945830
That's interesting Mfteal so the only way to be sure is catch the mail before it's opened, how many AV'S do that? Thanks
0
 
LVL 8

Accepted Solution

by:
mfteal earned 50 total points
ID: 17945952
I'm not sure how many of them offer this functionality, but many offer email scanning which means that they scan the email as it is being received (either on the exchange server or on the workstation if you don't run your own mail server and collect it from an ISP etc).

One way to see if your own AV offers this is to try sending the Eicar test email to yourself. This isn't a virus but a standard anti virus tester.
http://www.aleph-tec.com/eicar/index.php
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Right-Click in Explorer Very Slow in Windows 10 3 120
Excel files protected mode 4 50
ransomware and redirected folders 9 102
Design of sending events/logs to SIEM/Arcsight 2 286
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question