Sending documents, image and other files as email attachments is an easy way to share information. It is also an easy way to send viruses and infect computers.
Attackers use email attachments because it is an easy and effective method to spread viruses. They work well because:
To help reduce the likelihood of being infected by a virus sent as an attachment, follow these tips.
The University, along with most other Internet service providers, blocks attachments which are "simply-executable" programs. The reason for this practice is to limit the possibility of viruses being spread via email. There is always a delay between a new virus appearing and conventional anti-virus software being able to detect it. Refusing executable attachments will reduce the occurrences of new viruses getting on to the network via email. The file types currently blocked are those with the any of the following extensions:
|
Blocked Attachments: |
||||||||||
|
ADE |
ADP |
ASX |
||||||||
| BAS |
BAT |
. | ||||||||
| CHM |
CMD |
COM |
CPL |
CRT |
||||||
| EXE | ||||||||||
| HTA | HLP | |||||||||
|
INF |
INS |
ISP |
||||||||
|
JS |
JSE |
|
||||||||
| LNK | ||||||||||
|
MDA |
MDB |
MDE |
MDL |
MDT
|
MDW |
MDZ |
MSC |
MSI |
MSP |
MST |
| OPS | ||||||||||
|
PCD |
PIF |
PRF |
|
|
||||||
| REG | ||||||||||
| SCF |
SCR |
SCT |
SHB |
SHS |
|
|||||
| URL | ||||||||||
| VB |
VBE |
VBS |
||||||||
|
WSC |
WSF |
WSH |
|
|||||||
If an email with a banned attachment type comes into the University from an external source, the attachment will be replaced by a warning message and the email forwarded to the recipient. No warning is passed back to the sender.
Where you have a genuine need to send a program as an attachment then you should enclose it in a ZIP file before attaching it. Windows XP and Mac OS X have this functionality built in. Do not create a self-extracting zip file because that will result in an executable type of file that will also be blocked.
In order to properly receive a program file as an attachment, you will have to ask the sender to enclose the program in a ZIP file before sending.
Attackers have attached viruses with seemingly harmless filenames to email messages. Some computers are configured by default to hide filename extensions and attackers will try to take advantage of this and mask the .exe file by giving it a fake extension to make an executable file look like a simple document or text file. If your file extensions are hidden you would see only "filename.txt" or "filename.doc" and could mistake it for a harmless file. With the ability to see file extension, the file would read "filename.txt.exe" or "filename.doc.exe." Attackers may even deceive you by having the virus behave as you would expect, while it is really attacking your computer. To help avoid this, make sure that your computer shows all file extensions.
Information and Communications Technology
Saskatoon, Saskatchewan
Canada
ICT Help Desk: 306-966-4817 or 1-800-966-4817
ICT Finance and Administration Office: 306-966-4866
Contact Us | Site Index | Provide Website Feedback
© U of S 1994 –
Disclaimer
Policies