Open CRDOWNLOAD File

Information, tips and instructions

Dangerous File Extensions

Even though protection of modern computers gets better and better with every year there are still many ways your information could be stolen from your personal computer. You shouldn’t just rely on antiviruses and firewalls for protection. It is important to be aware of ways intruders can get into your computer and how you can protect yourself.

Internet nowadays is the most common source of information for your computer. Applications are downloaded from the business websites. Images, documents and other media files are downloaded from the cloud storage. Many files are received via e-mail. Information constantly flows into your computer from various sources enabled by the internet. Even though most of these files are harmless there are certain kinds of files which could harm your computer and make it an object of attack for hackers.

Below is a list of certain dangerous file extensions:

  • EXE, COM – executable files for Windows. Can contain viruses and malicious code.
  • DLL – dynamic link libraries for Windows. Can contain viruses and malicious code.
  • VBS – Visual Basic script files. Can contain malicious code and viruses.
  • XLS, DOC, XLSX, DOCX – Document files. Can contain malicious Macros.

It is important to know potential dangers of file extensions listed above and only open files which are received from a verifiable source. Do not open files with file extensions from the list above which were downloaded from a random website. If you received an e-mail which has file attached pay attention – it may contain virus or malware in it.

Also pay close attention to compressed files you download. Compressed file by itself cannot harm your computer but it can contain malicious files inside. Once you decompress it malicious files will get copied to your disk. That’s why you need to monitor the sources where you get compressed files too.

Also make sure that you have latest security technologies enabled on your personal computer and mobile devices. Use firewalls and latest antiviruses since they will protect you from significant number of possible attacks.

Learn how to RPMSG file and open ICS file.