PS if you can’t email a file because it is filtered for some reason, you could upload it somewhere (temporarily or semi-permanently) and share the link. There are also tools like Bittorrent sync and similar that enable you to share a directory in which you can put whatever you want.
I’ve had this problem, until I hit on the perfect solution to keep the systems from thinking I’m sending a virus. I change the extension from .exe to .virus and it has worked every time!
And the UI is a steaming pile of shit. I despise when I get a file in the 7zip format and have to break out that piece of garbage.
Actualy, I had a brain fart earlier. It is WinRar that I have used for around 25 years (I still use a 20 or so year old version of it). Not only do I have no need to replace it, I have no need to upgrade it. (I do actually have a legit, legal key for it, but I haven’t searched it down after the latest install several years ago because the nag screen is so inconsequential.)
Back when I was using it, it had a clunky, non-standard UI, like it had been ported over from the Amiga OS or something.
ETA: Thinking about it more, one of my problems was the versions I used didn’t have a right-click menu item. When you had a 7zip, you had to open the 7zip program and manuver to wherever the file is located with its terrible UI, then open it from within 7zip. (This was maybe 15 years ago.)
Sorry, answered before I had my caffeine. The reason the product stops is: a nested zip such as this isn’t really an effective attack. After several levels of opening archives, even the most dedicated mark is going to get tired of the game.
This would get caught by the product I support for several different reasons. Might work against really poor ones that are working off the file name, though.
Actually, I know of an algorithm that will sometimes decrease the size of a file, and never increase it, in such a way that, with enough applications of the algorithm, the file will eventually become arbitrarily small.
Of course, the catch is that, to unpack it correctly, you need to know exactly how many times to apply the reverse algorithm.
It’s not supposed to be an attack so much as an example of a zip file that, besides possibly other files, contains a copy of itself. Therefore it contains infinitely many levels of archives, if you want to think about it like that, so that any anti-virus program that attempts to scan it will have to give up sooner or later.
This trick will not mask any contents (malicious or otherwise), of course, because any actual data must appear after a finite number of levels.
It’s also been years since I tried this, but I think we tried renaming the .exe file. Another thing we tried was encrypting the zip file. Also, if the sender is the one with a Gmail account, they automatically have a Google Drive account and could share the documents there.
What is the detection beyond “potentially harmful file”? If it matches some pattern then renaming it will not help; encrypting the archive with a password will, though
I have a program that is guaranteed to decrease the size of your file every time. For convenience, it even encrypts your file and gives you a “randomly” generated password for decryption.
The password is just the first N bytes of the file.
Maybe it’s just the higher level security that commercial users get with their enterprise solutions but…
Anything executable is blocked. (Including java etc.)
Anything that is an executable but just renamed, is detected and blocked.
ZIP files with executables inside are blocked.
Encrypted files are sometimes blocked.
Windows will warn you about files downloaded from the internet… my Office programs make me explicitly enable even editing.
Basically, most businesses don’t want you receiving and downloading executable files. Even if you think they are harmless - are they?
Most programs are written with a collection of library modules - and the programmer has no definite knowledge what is in those libraries - even if not intentional malicious software, they may allow entry via a failing in the software - the old PDF and JPG libraries vulnerabilities come to mind.
I doubt this is a commercial thing. He or she just said g-mail was dumping the program into the spam folder or otherwise blocking it.
Sometimes it is not that hard to bypass restrictions imposed on corporate laptops, but why bother? You’ll just get fired. Better to put the games and movies on your personal computer.
One thing is that when I send a file (executable or not) to someone I know, I always attach it to a personal note of the sort, “Margie sends her best wishes. And how is Evelyn?”