We’ve all heard it about a hundred times already: “Don’t open attachments from unknown senders.” And yet there will always be someone who either has forgotten the last time their system locked up and stopped functioning or they believed their system was protected from viruses. But although administrators are constantly on guard they cannot prevent attachments from being opened.
Attachments which contain viruses are most commonly sent out denoted as executables (“dot exe” extension) and sometimes scripts. The reason is because unsuspecting users will expectedly double click on the attachments to perform some function which they thought would help them. Sometimes hackers will send links to malicious attachments knowing that Outlook does not screen out web site URLs by default.
There are many other types of files with unique filename extensions that can contain viruses. By default, Outlook blocks many types of files based on their extensions because Outlook cannot determine whether files with certain filename extensions contain viruses or not. The benefit is that attachments which do contain viruses are screened out before they are opened by anyone in your end user community. Unfortunately it also means that requested or expected files are also screened out.
Email messages received which contain attachments can produce messages similar to the following:
Outlook blocked access to the following potentially unsafe attachments:</pre>
<p>Even though the email message has resulted in a warning about an unsafe attachment it does not mean that the attachment has been deleted from the email. Although your end users cannot save, delete, open or print their attachments there are still ways to safely open a blocked attachment.
Another way for attachments to be delivered is to request that they be sent as zipped up or compressed files. There are several compression software utilities on the market that will take as input a file of bits and bytes and then “compress” the bits and bytes together. One popular compression program is “WinZip”. The software utilities or programs use basic compression algorithms that have been around for some time and are considered to be reliable at not losing data.
There are two steps to this process. The first step is the compression of the file. The second step is the uncompressing of the compressed file. The compression process creates a compressed archive file that has a file name extension that is different from the original file attachment. The newly created compressed file has a file name extension that Outlook does not identify as suspicious. Outlook will not block these compressed files. Administrators can help their end users with the uncompressing of the compressed file as the corresponding uncompressing algorithms will need to be applied.
Administrators can also advise their end users to request from the originator, of the blocked attachment file, to rename the attachment using a different file name extension. The file name extension should be one which Outlook does not perceive as a threat such as a Word document. Word document use the “dot doc” filename extension which Outlook does not automatically screen out as a pernicious file.
Once the file has been safely renamed and resent to the end user then the file can be safely saved on the local system. After the file has been saved then an end user can rename it to its original filename extension. This will allow the file to be opened using the application that it was originally intended for.
End users can safely save and rename their newly renamed files using the following steps:
- Select the file attachment in the email message.
- Right click on the attachment and then click Copy.
- Choose or create a directory to save the attachment.
- Right click Paste.
- Right click on the pasted file to bring up the pull-down menu.
- Select and click Rename.
- Type in the name of the file using the original file name extension.
Your end user will now be able to double click on the newly renamed file to open it using the appropriate application.