This document provides an overview of web safety and identity theft prevention. It discusses best practices for password security, email security, using virus scanners, risks of social engineering like phone calls and phishing, and how to secure home wireless networks. Specific topics covered include using strong unique passwords, recognizing email spoofing, downloading safe file types, scheduling virus signature updates, securing USB drives, and creating strong wireless network passwords and encryption.
CEH v11 will teach you the latest commercial-grade hacking tools. Highlights of what sets CEH v11 apart from others are given in this SlideShare.
To learn more about CEH v11, click here: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
What are cyber attacks?
In simple terms, cyber attacks are attempts of disabling or stealing information from other computers, by gaining access to admin privileges to them.
Why should businesses be worried?
An average ransomware attack costs a company $5 million. Attackers target all types of businesses, small and large, healthcare, banking & finance, manufacturing, education, even government. The internet has made life a lot easier for business owners, at the same time it has made them easier to get hacked.
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
It gives information regarding 6 different cyber attacks which most of the people become a victim of and which part of society is affected by which attack.
It explains how this attacks are done by hackers and explains ways to prevent them.
As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them. The basic steps of a cyber attack include reconnaissance (finding vulnerabilities); intrusion (actual penetration of the network); malware insertion (secretly leaving code behind);
and clean-up (covering tracks).
Malware comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults. Dell SonicWALL offers comprehensive solutions to counter every stage of cyber attacks and eliminate every type of malware from disrupting your business network.
CEH v11 will teach you the latest commercial-grade hacking tools. Highlights of what sets CEH v11 apart from others are given in this SlideShare.
To learn more about CEH v11, click here: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
What are cyber attacks?
In simple terms, cyber attacks are attempts of disabling or stealing information from other computers, by gaining access to admin privileges to them.
Why should businesses be worried?
An average ransomware attack costs a company $5 million. Attackers target all types of businesses, small and large, healthcare, banking & finance, manufacturing, education, even government. The internet has made life a lot easier for business owners, at the same time it has made them easier to get hacked.
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
It gives information regarding 6 different cyber attacks which most of the people become a victim of and which part of society is affected by which attack.
It explains how this attacks are done by hackers and explains ways to prevent them.
As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them. The basic steps of a cyber attack include reconnaissance (finding vulnerabilities); intrusion (actual penetration of the network); malware insertion (secretly leaving code behind);
and clean-up (covering tracks).
Malware comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults. Dell SonicWALL offers comprehensive solutions to counter every stage of cyber attacks and eliminate every type of malware from disrupting your business network.
What are the most common application level attacks? To find out, take a look at these slides! Click here to learn how CASE can help you create secure applications: http://ow.ly/rARK50BVi4b
The CEH v11 program provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend against future attacks.
What is cyber security. Types of cyber attacks. Web based attacks. System based attacks. Injection attack, Cross-site scripting attack, DNS spoofing, Denial-of-service attack, brute force attack, virus, worms, Trojan horse.
There are different types of attacks that expose enterprise data. An application can be attacked at various layers, on different hardware, and with very different goals in mind, creating a very complex problem for companies who want to protect their intellectual property.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
Malware attacks and data thefts are on the rise as evident from the recent news headlines. The mere use of antivirus software wouldn’t serve the purpose. The reason being, antivirus programs block attacks by using patterns or signatures to identify malicious software code. This signature-based detection was successful when the threats were lesser and spread over a good time frame.
Is your organization using your Facebook fanpage to the fullest? Need some help creating a fresh, branded look with great content that enagages your fans and drives traffic to your website?
Join the Schipul web marketing nerds as we dive into taking your Facebook fanpage to the next level!!! This online webinar course will show you how to tweak, polish and optimize your organization's Facebook presence for great results.
Some Facebook tips and tricks covered on how to optimize your business or nonprofit's Facebook fanpage include:
Graphic design for Facebook success (no arts degree required) - - Facebook page tabs essentials -- Streamlining your Facebook content - to connect or not to connect, we can help -- How to schedule and strategize Facebook fanpage content -- Wrangling multiple page administrators
Confused about what exactly the membership module in Tendenci can do for your organization? Check out this presentation by Albert Hughes from SchipulCon09 for answers!!
What are the most common application level attacks? To find out, take a look at these slides! Click here to learn how CASE can help you create secure applications: http://ow.ly/rARK50BVi4b
The CEH v11 program provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend against future attacks.
What is cyber security. Types of cyber attacks. Web based attacks. System based attacks. Injection attack, Cross-site scripting attack, DNS spoofing, Denial-of-service attack, brute force attack, virus, worms, Trojan horse.
There are different types of attacks that expose enterprise data. An application can be attacked at various layers, on different hardware, and with very different goals in mind, creating a very complex problem for companies who want to protect their intellectual property.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
Malware attacks and data thefts are on the rise as evident from the recent news headlines. The mere use of antivirus software wouldn’t serve the purpose. The reason being, antivirus programs block attacks by using patterns or signatures to identify malicious software code. This signature-based detection was successful when the threats were lesser and spread over a good time frame.
Is your organization using your Facebook fanpage to the fullest? Need some help creating a fresh, branded look with great content that enagages your fans and drives traffic to your website?
Join the Schipul web marketing nerds as we dive into taking your Facebook fanpage to the next level!!! This online webinar course will show you how to tweak, polish and optimize your organization's Facebook presence for great results.
Some Facebook tips and tricks covered on how to optimize your business or nonprofit's Facebook fanpage include:
Graphic design for Facebook success (no arts degree required) - - Facebook page tabs essentials -- Streamlining your Facebook content - to connect or not to connect, we can help -- How to schedule and strategize Facebook fanpage content -- Wrangling multiple page administrators
Confused about what exactly the membership module in Tendenci can do for your organization? Check out this presentation by Albert Hughes from SchipulCon09 for answers!!
What on earth is Drupal? Check out this awesome presentation by David Stagg, JMO and Albert Hughes for the answer. They will not only tell you what Drupal is, but what it can do and whether or not it is right for you.
Schipul SEM guy John-Michael Oswalt explains that if all you look at is Visits and Page Views, you may be missing the point of Web Analytics. This presentation explores useful metrics like Bounce Rate and Time on Site for seeking which of your pages are the top earners. A focus on referring traffic and keywords with a side of Google Insights for Search will help you to measure your traffic better and make actionable decisions from your numbers.
A high level reminder that your websites are important for discovery and positioning.
Your web site is probably your lowest cost expense with your highest return on investment.
Wondering what the future has in store? Check out Aaron Long's presentation on the Future of Non-Profits for tips on how to lower costs, on how to develop your content and how to integrate. Tip: The Web is for you!!
Your orgnization has a story to tell and it's time you started telling it!! In this presentation but Ed Schipul you will learn how to grow your Brand through Online Story.
Email marketing is not dead! It can be an effective communication tool for nurturing your community of students, staff, and potential recruits and donors. In this session, we will discuss the strategy and benefits behind email marketing and tactics for implementing email marketing campaigns - including how to get started building your list, crafting your message, and measuring your results.
Wonder what's coming next in the branding arena? Ed Schipul brings you the Personal Brand Era! In this presentation, he will talk about where we are coming from, he will explain the Renaissance Generation and he will introduce you to the Personal Brand Era.
This presentation covers why emails suck, how a good email gets you what you need, and reveals the best email ever written. It was delivered by Katrina Esco during Ignite Houston 2012 under the Ignite format (5 minutes to present 20 slides that auto-advance every 15 seconds).
Blogging got you all confused? Check out this presentation from Schipul Gals April Kyle and Brandi Lalanne and they'll break it down for you. They walk you through how to choose the blogging software that is right for you, tips to keep your blog fresh and how to track those all important stats.
How do you stop them from entering confidential account information on a convincing phishing website that uses your company branding?
Source Url: https://www.youtube.com/watch?v=MP18ztIpTo4
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
This is my presentation from Finse 2011, a 3.5 hour presentation on passwords. The audience is PhD students & professors, mostly within crypto, access control, biometrics and similar areas.
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsPrecisely
The most effective approach to cybersecurity is having multiple layers of defense mechanisms deployed to protect your systems. This is commonly referred to as “Defense in Depth”.
Because your IBM i holds data that is vital to your business, implementing multiple IBM i technologies that will help prevent or detect an accidental error or malicious behavior is essential.
Watch our on-demand webinar where Carol Woodbury of DXR Security discusses three of the current real-world issues facing organizations today and how layering multiple security technologies can protect your data and avoid business disruptions.
Register to hear about:
• The benefits of implementing defense in depth
• Determining the value and risk level of your data
• Developing a plan to implement as many layers as needed to appropriately reduce risk
This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Cyber Security 101 – A Practical Guide for Small BusinessesPECB
Cybercrime is a massive 21st-century problem and small businesses face a huge hurdle to effectively protect themselves and their customers, compared to larger firms. Budgets are tight and not fully understanding the risks means that gaps can easily be left. This guide helps you build a budget-friendly layered cybersecurity strategy using a mixture of free and paid for services because something covering the gaps is better than nothing.
Main points covered:
• Why Would Cyber Criminals Target Me?
• Reducing Your Exposure
• No Budget to Speak Of
• Seven Areas Every Small Business Needs to Cover
• Dealing with a Security Incident
Presenter:
Nick Ioannou is an IT professional, blogger, author and public speaker on cloud and security issues, with over 20 years’ corporate experience, including 15 years using cloud/hosted software as a service (SaaS) systems. As an early adopter of cloud systems, including BPOS, the first iteration of Office 365, he has been paying for the privilege of bug testing them ever since.
He started blogging in 2012 on free IT resources (http://nick-ioannou.com) currently with over 400+ posts. Author of 'Internet Security Fundamentals' and 'A Practical Guide to Cyber Security for Small Businesses' as well as contributing author of two 'Managing Cybersecurity Risk' books and 'Conquer The Web' by Legend Business Books.
Recorded webinar: https://youtu.be/GZTEYkW45eE
Your Web Marketing tool kit is continuously expanding (and changing!) as online tools evolve. What should you expect out of Facebook advertising vs. YouTube vs. LinkedIn? Do you need a mobile app? Should you spend resources on new social networks like Vine, Pinterest, and Google+?
In this pre-conference intensive workshop, Katrina Kokoska and Caitlin Kaluza from Schipul – The Web Marketing Company will cover the foundational elements of web marketing strategy, and targeting your web marketing efforts to make the most impact on your goals. We’ll also talk trends in web marketing, including geotargeting and the rise of mobile.
The session will start with your website as the home base of your web marketing efforts – and then explore several of the options you have in your web marketing tool kit, including: content strategy, Social Media Marketing, online photo/video content, Search Engine Optimization, Google Adwords PPC Advertising, advertising on social media sites, email marketing, and mobile options. We will break down the strengths of each tactic, tips to get started, and tools for measuring your success.
Sure your company may have a Twitter account and Facebook profile, but are you fully utilizing them to get new customers, support your PR efforts, and share your company culture? Derek Key of Schipul - The Web Marketing Company in Houston, Texas discusses social media marketing strategy and tactics to tell your brand's story and grow your community online. You'll walk away with an understanding of how to focus your social media strategy to get the most benefit for your brand, some tools and tricks you can start using right now to make your life easier when managing multiple accounts, and how to evaluate new tools (think Pinterest, Instagram, Google+ etc.) to see if they fit into your social media mix.
Tips for optimizing your Facebook fanpage: dimensions for extended profile tab and fanpage content area, recommendations for how to use your fanpage, previews of great uses of fan pages.
What do you do when your brand gets out of control online? Aaron Long of Schipul breaks it down in this presentation about the importance of online transparency, customer relations and even anger management!
Looking for Viral Marketing and Linkbait? Matthew Inman shares the comics and quizzes he has created to generate links and high Google rankings for his sites. Search Engine Optimization for the creative side, Unleash the SEO Animal shows how you too can create your own viral campaign.
Kim Hodgson and Jason McElweenie of Schipul break down the importance of keeping your members in the know with Newsletters in this presentation. They review good design, newsletter timing and a few important Do's and Don'ts on online marketing.
Schipul gal JJ Lassberg walks Tendenci users through the what, why and how of the product. What is that crazy thing called Tendenci? Why was it developed the way it was? How can it help you manage your site? Check out this presentation for answers!!
A quick summary of some of the cool features of evernote, and of digital note-taking in general. See the live screencast at http://www.vimeo.com/5128036
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
16. Do Not Download These Types of Files Source: http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
17. Safe File Extensions for Email Downloads Source: http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)