>Anyone have good links? >From http://www.sophos.com/virusinfo/whitepapers/prevention.html
"Block receiving/sending of executable code There is very little need for executable code to be received or sent. In most instances it is also illegal, usually breaching the software copyright. Some people are fond of using self-extracting ZIP files to send compressed data files: for security reasons using statically compressed ZIPs (which need PKUNZIP to be decompressed) is a much better solution. The blocking of executable code transfer is often best achieved on the internet gateway. Unfortunately, it is impossible to detect executable code with 100% certainty by analysing either the file content or the file extension. However, blocking files with executable extensions such as EXE, VBS, SHS etc. contributes to overall anti-virus measures. User education also plays a significant part in preventing infections by executable code received by email: the temptation to install a cute screensaver can be very, very high for a PC user who is not security aware." >From http://www.sophos.com/virusinfo/articles/safehex.html "Block any unwanted file types at the email gateway. Viruses often use file types such as VBS, SHS, EXE, SCR, CHM and BAT to spread. It is unlikely that your organisation will ever need to receive files of these types from the outside. If this is the case Sophos recommends blocking all of them at the email gateway - whether they are virus infected or not." HTH -B --- [This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)] --- This E-mail came from the Declude.JunkMail mailing list. To unsubscribe, just send an E-mail to [EMAIL PROTECTED], and type "unsubscribe Declude.JunkMail". The archives can be found at http://www.mail-archive.com.