Quote:
Originally Posted by Sir Richard
In order to fully verify there is a threat you must open the Archive 1st...
[/font]
|
This happens anyway. The contents get written to a temp location and file writing is scanned by the real-time scanner.
I have never found any convincing argument for email scanners for the same reason. Any operation on the attachment with give the real time scanner an opportunity to inspect it.
Regards
DrT