StealthMail
Limitations
For security reasons, StealthMail Add-in does not allow emails with attachments of following file types.
Executables
*.EXE
Executable program files. Most programs on Windows have this extension.
*.PIF
A special file containing information for DOS programs. Despite the fact that they do not contain executable code, they can be potentially dangerous.
*.MSI
Starts the process of installing the program on your computer.
*.MSP
Install updates for already installed programs.
*.COM
Programs for MS-DOS.
*.SCR
File screensaver.
*.HTA
HTML applications are executable in your browser and can be dangerous.
*.CPL
The Control Panel file. All items in the control panel have this extension.
*.MSC
Microsoft Management Console files. Applications such as the Group Policy Editor and the Disk Management tool have the * .MSC extension.
*.JAR
Executable code for the Java environment.
*.APPLICATION
An application installer that uses Microsoft's ClickOnce technology.
*.GADGET
Gadget for display on the desktop in Windows Vista and 7.
Scripts
*.BAT
A batch file containing a sequence of commands for your computer. Originally used in MS-DOS.
*.CMD
A batch file like * .BAT, but this file extension was executed in Windows NT
*.VB, *.VBS, *.VBE
The VBScript file. It will execute its VBScript at startup.
*.JS, *.JSE
JavaScript file. When used on web pages it is relatively safe - if you work in a web browser. However, Windows can open these files outside the browser, which is a threat.
*.WS, *.WSF, *.WSC, *.WSH
Windows Script files.
*.PS1, *.PS1XML, *.PS2, *.PS2XML, *.PSC1, *.PSC2
Command script for Windows PowerShell.
*.MSH, *.MSH1, *.MSH2, *.MSHXML, *.MSH1XML, *.MSH2XML
Command script for Monad. Monad was later renamed PowerShell
Shortcuts
*.SCF
The Windows Explorer command file. Can contain potentially dangerous commands.
*.LNK
Link to start the program. It can contain command-line attributes that can do dangerous things, such as deleting files without the User’s permission.
*.INF
A text file used to automatically start from the connected media. It is often used to infect computers from a flash drive or a disk.
The rest
*.REG
The Windows registry file. These files contain a list of registry entries that will be added or deleted if you run them. The danger is that you can delete sensitive information from the registry or add unwanted or malicious data to it.