Content deleted Content added
Guy Harris (talk | contribs) Put back "for example", but as an English phrase rather than as the Latin abbreviation "e.g.". Those are *examples* of extensions, but are not a *complete set* of extensions. |
HeyElliott (talk | contribs) |
||
Line 44:
|access-date=2009-05-31 }}</ref>
Eventually, [[Windows 95]] introduced support for long file names, and removed the 8.3 name/extension split in file names from non-NT Windows, in an extended version of the commonly used [[File Allocation Table|FAT]]
== Content type ==
Line 58:
There is no standard mapping between filename extensions and media types, resulting in possible mismatches in interpretation between authors, web servers, and client software when transferring files over the Internet. For instance, a content author may specify the extension ''svgz'' for a compressed [[Scalable Vector Graphics]] file, but a web server that does not recognize this extension may not send the proper content type ''application/svg+xml'' and its required compression header, leaving web browsers unable to correctly interpret and display the image.
[[BeOS]], whose [[Be File System|BFS]] file system supports extended attributes, would tag a file with its media type as an extended attribute. The [[KDE]] and [[GNOME]]
== Executable programs ==
Line 72:
The default behavior of [[File Explorer]], the file browser provided with [[Microsoft Windows]], is for filename extensions to not be displayed. Malicious users have tried to spread [[computer virus]]es and [[computer worm]]s by using file names formed like [[ILOVEYOU|<code>LOVE-LETTER-FOR-YOU.TXT.vbs</code>]]. The hope is that this will appear as <code>LOVE-LETTER-FOR-YOU.TXT</code>, a harmless text file, without alerting the user to the fact that it is a harmful computer program, in this case, written in [[VBScript]]. Default behavior for [[ReactOS]] is to display filename extensions in [[Windows Explorer|ReactOS Explorer]].
Later Windows versions (starting with
Some viruses take advantage of the similarity between the "[[.com]]" [[top-level domain]] and the [[COM file|".COM" filename extension]] by emailing malicious, executable command-file attachments under names superficially similar to URLs (''e.g.'', "myparty.yahoo.com"), with the effect that unaware users click on email-embedded links that they think lead to websites but actually download and execute the malicious attachments.
|