{"id":368,"date":"2012-09-10T12:20:18","date_gmt":"2012-09-10T12:20:18","guid":{"rendered":"https:\/\/www.dsconsultant.net\/blog\/?p=368"},"modified":"2014-01-09T12:23:13","modified_gmt":"2014-01-09T12:23:13","slug":"securite-et-mails","status":"publish","type":"post","link":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails","title":{"rendered":"S\u00e9curit\u00e9 et mails"},"content":{"rendered":"<div>\n<p>J&rsquo;aimerais rappeler ici \u00e0 pas mal de personnes qui me pose des questions sur comment savoir si un message peut \u00eatre un virus.<br \/>\nQuelques observations de base et un peu de logique permet souvent d&rsquo;\u00e9viter des catastrophes.<br \/>\nUn message qui pr\u00e9sente plusieurs des caract\u00e9ristiques ci-dessous, doit toujours \u00eatre consid\u00e9r\u00e9 avec \u00ab\u00a0pr\u00e9cautions\u00a0\u00bb&#8230;<\/p>\n<\/div>\n<div><!--more--><\/div>\n<div>\n<p>&nbsp;<\/p>\n<p>1 &#8211; le message n&rsquo;a pas \u00ab\u00a0d&rsquo;objet\u00a0\u00bb<\/p>\n<p>2 &#8211; le corps ne contient pas de texte mais seulement une pi\u00e8ce jointe et de plus \u00ab\u00a0zipp\u00e9e\u00a0\u00bb (virus plus difficile \u00e0 d\u00e9tect\u00e9 par un antivirus de mauvaise qualit\u00e9 ou pas \u00e0 jour)<\/p>\n<p>3 &#8211; le message n&rsquo;a pas \u00e9t\u00e9 envoy\u00e9 en nom propre mais \u00e0 une liste ou en copie ou \u00ab\u00a0undisclosed recipient\u00a0\u00bb (caract\u00e9ristique d&rsquo;une boite au lettre dont les contacts ont \u00e9t\u00e9 \u00ab\u00a0pirat\u00e9s\u00a0\u00bb par un virus)<\/p>\n<p>4 &#8211; m\u00eame et surtout s&rsquo;il vient d&rsquo;un contact \u00ab\u00a0connu\u00a0\u00bb (m\u00eame remarque que ci-dessus)<\/p>\n<p>5 &#8211; etc&#8230;<\/p>\n<p>&#8230; et donc \u00e0 fortiori si le message pr\u00e9sente absolument toutes ces caract\u00e9ristiques cela ressemble tr\u00e8s fort (trop) \u00e0 un message envoy\u00e9 par un virus ou plus couramment encore par &lsquo;un \u00ab\u00a0viroax&#8230;\u00a0\u00bb (belge ou pas \ud83d\ude09 ).<\/p>\n<p>Dans ces cas, et m\u00eame si vous faites une totale confiance \u00e0 votre antivirus, inutile de chercher \u00e0 v\u00e9rifier si s&rsquo;en est un ou pas \ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>J&rsquo;aimerais rappeler ici \u00e0 pas mal de personnes qui me pose des questions sur comment savoir si un message peut \u00eatre un virus. Quelques observations de base et un peu de logique permet souvent d&rsquo;\u00e9viter des catastrophes. Un message qui pr\u00e9sente plusieurs des caract\u00e9ristiques ci-dessous, doit toujours \u00eatre consid\u00e9r\u00e9 avec \u00ab\u00a0pr\u00e9cautions\u00a0\u00bb&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[5,4,35],"tags":[12,31,10],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 et mails - Mes Notes, Astuces &amp; Conseils informatiques<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 et mails - Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"og:description\" content=\"J&rsquo;aimerais rappeler ici \u00e0 pas mal de personnes qui me pose des questions sur comment savoir si un message peut \u00eatre un virus. Quelques observations de base et un peu de logique permet souvent d&rsquo;\u00e9viter des catastrophes. Un message qui pr\u00e9sente plusieurs des caract\u00e9ristiques ci-dessous, doit toujours \u00eatre consid\u00e9r\u00e9 avec \u00ab\u00a0pr\u00e9cautions\u00a0\u00bb&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails\" \/>\n<meta property=\"og:site_name\" content=\"Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dsconsultant.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-10T12:20:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-01-09T12:23:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dominique Schos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\",\"url\":\"https:\/\/dsconsultant.net\/blog\/\",\"name\":\"Mes Notes, Astuces &amp; Conseils informatiques\",\"description\":\"Dominique Schos Consultant Conseil informatique Maroc\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails#webpage\",\"url\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails\",\"name\":\"S\u00e9curit\u00e9 et mails - Mes Notes, Astuces &amp; Conseils informatiques\",\"isPartOf\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\"},\"datePublished\":\"2012-09-10T12:20:18+00:00\",\"dateModified\":\"2014-01-09T12:23:13+00:00\",\"author\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/dsconsultant.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 et mails\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\",\"name\":\"Dominique Schos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"caption\":\"Dominique Schos\"},\"description\":\"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \\\"Tchat\\\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \\\"flirter\\\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...\",\"sameAs\":[\"https:\/\/www.dsconsultant.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 et mails - Mes Notes, Astuces &amp; Conseils informatiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 et mails - Mes Notes, Astuces &amp; Conseils informatiques","og_description":"J&rsquo;aimerais rappeler ici \u00e0 pas mal de personnes qui me pose des questions sur comment savoir si un message peut \u00eatre un virus. Quelques observations de base et un peu de logique permet souvent d&rsquo;\u00e9viter des catastrophes. Un message qui pr\u00e9sente plusieurs des caract\u00e9ristiques ci-dessous, doit toujours \u00eatre consid\u00e9r\u00e9 avec \u00ab\u00a0pr\u00e9cautions\u00a0\u00bb&#8230;","og_url":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails","og_site_name":"Mes Notes, Astuces &amp; Conseils informatiques","article_publisher":"https:\/\/www.facebook.com\/dsconsultant.net\/","article_published_time":"2012-09-10T12:20:18+00:00","article_modified_time":"2014-01-09T12:23:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Dominique Schos","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/dsconsultant.net\/blog\/#website","url":"https:\/\/dsconsultant.net\/blog\/","name":"Mes Notes, Astuces &amp; Conseils informatiques","description":"Dominique Schos Consultant Conseil informatique Maroc","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails#webpage","url":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails","name":"S\u00e9curit\u00e9 et mails - Mes Notes, Astuces &amp; Conseils informatiques","isPartOf":{"@id":"https:\/\/dsconsultant.net\/blog\/#website"},"datePublished":"2012-09-10T12:20:18+00:00","dateModified":"2014-01-09T12:23:13+00:00","author":{"@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92"},"breadcrumb":{"@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/securite-et-mails#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/dsconsultant.net\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 et mails"}]},{"@type":"Person","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92","name":"Dominique Schos","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","caption":"Dominique Schos"},"description":"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \"Tchat\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \"flirter\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...","sameAs":["https:\/\/www.dsconsultant.net"]}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/368"}],"collection":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/comments?post=368"}],"version-history":[{"count":0,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/368\/revisions"}],"wp:attachment":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media?parent=368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/categories?post=368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/tags?post=368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}