Autoexecuting .exe email attachments are a convenience on the Windows platform that were developed to mitigate several of the OS's weaknesses. This convenience was then exploited to become a major threat vector. We see this with lots of convenience developments on Windows. They get exploited to become vulnerabilities in the system.Timelessblur said:I personly would be ticks if I lost the ablitly to email exe. Mainly because I yes I email them to friends when they ask for it and I have to email in assments that are exe. I think people who program will understand how bad that would be. General there is a simple rule in dealing with attachments that are programs. first if you dont know who it is from. DONT OPEN IT. 2nd rule if you where not expecting it dont open it.
Those are my rules for dealling with most attachments. If I dont know who it is from or if I was not expecting it I dont open it. The only attachment that vollnt that rule are from my school and those are maybe a word file or a pdf type file. But then again I do know there sorces and they are sent though my schools email address that is among the worst in dealing with viruses.
One specific weakness that autoexecuting .exe files mitigate is that the Windows set of essential standard utilities is woefully incomplete. Missing is standard archiving software such as .zip. MacOS X has .zip built into the OS. Every Mac and every copy of MacOS X ship with a copy of Stuffit Expander. MacOS X includes a built-in disk image mounter for .dmg and img files. Every MacOS X users is guarranteed access to three archiving technologies, not just one.
The MacOS 9 version of DiskCopy allowed the creation of self-mounting disk images, .smi files. This feature makes no sense on a preemptive multitasking OS like MacOS X. The self-mounting image feature was removed from the MacOS X version of DiskCopy/Disk Utilities. Aladdin Systems (now Allume Systems) followed suite with Stuffit Deluxe. You can create a self-extracting archive (.sea) for MacOS 9, but you can't do it for MacOS X. I have never heard of a MacOS 9 exploit based on .smi or .sea (Stuffit, Compact Pro, or Zip). However, Apple chose not to develop self-extracting archive technology in MacOS X. Although they could jumped into the breach to satisfy the crybabies, no third-party Mac developer did so. The end result is that a totally unnecessary exploit path was never created. And what's more, this makes an executable file attached to email automatically suspect.
Now, for your little rule about not opening email from people that you don't know. Where have you been? That guarantees you nothing. There are worms out there that copy your email address from your Windows-using friends's address books. They then capture an unprotected computer in Guam or Geneva or someplace and send emails in your cousin's name to you.