In an attempt to protect our users, MITI (Midwest Internet
Technologies Inc) employs a variety of methods to stop viruses and other
unwanted items from sneaking there way onto your computers, by scanning
emails and other files on our systems. We use various software systems,
including MailScanner, ClamAntiVirus, and SpamAssassin, among others, to
scan for malicious files, etc. Sometimes false positives can occur, we
apologize in advance if such a incident occurs and causes you any
inconvenience. Bear in mind we are trying to protect you in the process!
Emails, and particularly email attachments, can contain viruses.
Certain email attachments may be blocked, either by our mail systems (Mailscanner),
or sometimes by your email client.
MITI electronically scans all incoming and outgoing email (and email
attachments) for the presence of viruses. Attachments which have a virus
recognized by Mailscanner are removed from emails. The {Virus?} tag is
added to the subject line and, included with the email, is an
"MITI-Attachment-Warning.txt" attachment that gives you information
about the virus.
As one of its functions Mailscanner may also remove certain types of
email attachments which are known to be capable of harboring viruses. In
these cases the {Filename?} tag is added to the subject line of the
email. All executable files are blocked. Zip files are allowed, but if
the file contains a restricted attachment (see below), the zip file will
be blocked. All password protected archives (ZIP,TAR etc) are blocked.
All double file extensions (except repeated file extensions, eg
bah.zip.zip) are banned, as this is often an attempt to hide the real
filename extension e.g. virus.exe.jpg
Sometimes MailScanner working in concert with SpamAssassin may add
the {Spam?} tag to the subject line, which means that email has passed
certain heuristic or comparative checks that may Identify it as spam.
You may also increase the spam checks by adjusting your spam detection
score in your SpamAssassin personal control panel.
The following attachment types and/or extensions may be filtered:
.ANI - Windows animated cursor file security vulnerability
.ASF - Windows media files
.BAT - DOS Batch file
.CER - Dangerous Security Certificate (according to Microsoft)
.CHM - A Windows compiled help file
.CMD - DOS command instruction
.CNF - A SpeedDial script
.COM - DOS executable
.CPL - Control Panel Item
.CUR - Windows cursor file security vulnerability
.EXE - Windows Executable
.HLP - Windows help file security vulnerability
.HTA - Archived HTML page
.ICO - Windows icon file security vulnerability
.INS - Windows Internet Settings
.ITS - Dangerous Internet Document Set (according to Microsoft)
.JOB - Possible Microsoft Task Scheduler attack
.JS - Javascript file
.JSE - Jscript
.LNK - Eudora link
.MA[DFGMQRSVW] - Microsoft Access shortcuts
.MAU - Dangerous attachment type (according to Microsoft)
.MD - Dangerous attachment type (according to Microsoft)
.MHTML - Eudora meta-refresh
.MNG - MNG/PNG movies
.PIF - MS-DOS Program shortcut
.PRF - Dangerous Outlook Profile Settings (according to Microsoft)
.PST - Dangerous Office Data File (according to Microsoft)
.REG - Windows Registry patches
.SCF - Windows explorer command
.SCR - Windows screensaver
.SCT - Windows script component
.SHB - Shortcut into a document
.SHS - Shell script object
.SYS - DOS executable
.TMP - Dangerous Temporary File (according to Microsoft)
.VB[ES] - Visual Basic scripts
.VSMACROS - Dangerous Visual Studio Macros (according to Microsoft)
.VS - Dangerous attachment type (according to Microsoft)
.WS - Windows scripting host scripts
.WS[CFH] - Windows scripting host scripts
.XNK - Microsoft Exchange shortcut
Some of the above attachment types can be sent by simply renaming the
attachment to something harmless. You would then include instructions
with the message to rename the file back to its original type upon
receipt. This won't work for .exe and certain other attachments, as
Mailscanner can tell when it scans it what type of attachment it is.
|