User Guide

Default Vulnerable and Compressed File Extensions
314 Dr SolomonsAnti-Virus
Select one of the extensions shown, then click Remove to delete it
from the list.
•ClickDefault to restorethe originalextensionentries.Thisremoves
any extensions you have added to the list.
4. Whenyou have finished changingthe list, clickOK tosave your changes
and close the dialog box. Click Cancel to close the dialog box without
saving your changes.
Current list of vulnerable file name extensions
In this list, ? symbols represent wildcards—Dr Solomon’s Anti-Virus
substitutes any character for the ? sothat it scansmore than one file type with
similar extensions. For example, the software will use the .XL? wildcard to
look for viruses in Microsoft Excel spreadsheet (.XLS) and template (.XLT)
files.
NOTE: Network Associates recommends that you scan your system
thoroughly during your first scan operation, or periodically thereafter,
without limiting the scope of the scan operation to these file types. This
ensures that your system starts in a virus-free condition. You can then
use this list of extensions to limit the scope of later scan operations.
Table 9-1. Vulnerable file name extensions
Extension File Type File Description
<BLANK> Any Files with no extension.
.??_ Compressed Windows compressed files.
.ARC Macro/script LH ARC files, older version
.ARJ Archive Robert Jung .ARJ compressed archive files.
.ASP Macro/script Microsoft Active Server Pages files. These files
contain script commands for use with Microsoft
Internet Information Server.
.BAT Program DOS batch files.
.CAB Compressed Windows Compressed Application Binary or
"cabinet" files.
.CDR Macro Corel Draw document file. Later versions of
Corel Draw include a scripting language that can
generate macro viruses.
.CLA Program Java class files (truncated from .CLASS)