Ground Rule: If you do not need an attachment, do not click on it, or open it.
- Email Worms are sent to your addresses by spoofing (or faking) the "From" address. This means that the email may look like it came from someone that you know. However, do not open the attachment even if this is from a known e-mail.
- Below is a list of file types that should be considered suspicious when an unintended e-mail arrives:
ADE |
Microsoft Access Project Extension |
ADP |
Microsoft Access Project |
ASP |
Application Service Provider |
BAS |
Visual Basic Class Module |
BAT |
Batch File |
CHM |
Compiled HTML Help File |
CMD |
Windows NT Command Script / DOS Command File |
COM |
MS-DOS Application |
CPL |
Control Panel Extension |
CRT |
Security Certificate |
DLL |
Dynamic Link Library |
DO* |
Word Documents and Templates |
EXE |
Application / Executable File |
HLP |
Windows Help File |
HTA |
HTML Applications |
INF |
Setup Information File |
INS |
Internet Communication Settings |
ISP |
Internet Communication Settings |
JS |
JScript File |
JSE |
JScript Encoded Script File |
LNK |
Shortcut |
MDB |
Microsoft Access Application |
MDE |
Microsoft Access MDE Database |
MSC |
Microsoft Common Console Document |
MSI |
Windows Installer Package |
MSP |
Windows Installer Patch |
MST |
Visual Test Source File |
OCX |
ActiveX Objects |
PCD |
Photo CD Image |
PIF |
Program Information File |