What's a File Extension?
A file extension is the last characters after the period in the name of a file and identifies the type of data found in the file. For example, to look for images on a computer, one would search for .gif and .jpg files.
Computer system files can be divided into two main groups which both of them are very important and perform a crucial role in your machine's stability and performance. The first group of files is system files, which ensures your system's stability. The second group of files is application files that are used in order to load various programs smoothly. Additionally, there is a third and less desirable group which is made up of malicious files.
Malicious files are designed to infect your machine and perform spyware tasks such as collect personal information about you, cause your computer to run slowly, and change the settings on your computer. In many cases, spyware needs to use a legitimate program or file in order to run so it is important to differentiate between a valid file and one associated with a spyware.
What Will Happen if You Delete or Remove a Safe File?
There are two categories of safe files on a computer system: "safe user added" files and "safe system" files. "Safe user added" files are additional files added onto a system by a user; these files are not essential for the operation of a system (e.g. .mp3 or .jpeg files). "Safe user added" files can be deleted at any time without causing any change or damage to the system.
"Safe system" files are those files that are necessary for the system to run effectively. Deleting any of these files will definitely affect a system in one way or another. The following are examples of "safe system" files:
- Program Files - These files store the programs running on a system. If deleted certain programs may not run or will malfunction.
- Operating System Files - These files are responsible for the operations of a system. If deleted a system may crash or not start-up at all.
- Hidden files - These files are commonly used to hide essential files associated with the operating system or user settings. If deleted a system may crash. Criminals may also use this function to hide the presence of malware.
Top Safe Files By Detection Count
|Name||Detection Count||First Detected||Last Detected|
|154,274||08/28/2012 05:03:35 EST||03/05/2013 11:49:19 EST|
|51,835||03/03/2010 01:47:14 EST||08/17/2010 05:40:01 EST|
|40,610||07/22/2012 08:21:34 EST||10/22/2012 02:43:36 EST|
|35,305||12/12/2012 06:55:05 EST||01/31/2013 11:47:49 EST|
|34,473||01/27/2013 08:26:06 EST||04/09/2013 03:12:08 EST|
|33,459||08/19/2012 02:56:02 EST||06/06/2013 05:43:02 EST|
|32,358||12/18/2010 02:52:58 EST||08/29/2011 07:07:28 EST|
|28,995||04/12/2010 08:19:57 EST||08/17/2010 12:56:48 EST|
|26,241||09/29/2012 08:49:38 EST||06/06/2013 06:42:00 EST|
|22,119||12/12/2012 09:36:10 EST||02/23/2013 06:57:06 EST|
Our database of safe files will provide you with detailed information on each file; this includes the type of file, its classification and the program or process that it is associated with. Take a look at the latest safe files or search by letter or number.
Latest Safe Files
There are currently 181,943 safe files in our database.
|File Name||Detection Count||First Detected||Last Detected|
||4,747||06/11/2013 16:07:58 EST||06/15/2013 03:21:35 EST|
||1,663||06/11/2013 14:57:09 EST||06/15/2013 03:15:01 EST|
||6,474||06/11/2013 14:14:01 EST||06/15/2013 03:21:00 EST|
||141||05/31/2013 07:16:30 EST||N/A|
||112||05/31/2013 07:14:19 EST||N/A|
||200||05/31/2013 06:33:51 EST||N/A|
||253||05/24/2013 09:06:19 EST||N/A|
||231||05/24/2013 09:03:26 EST||N/A|
||219||05/24/2013 09:02:58 EST||N/A|
||81||05/24/2013 08:55:09 EST||N/A|
||78||05/24/2013 08:54:50 EST||N/A|
||75||05/24/2013 08:54:32 EST||N/A|
||41||05/24/2013 08:51:43 EST||N/A|
||37||05/24/2013 08:50:35 EST||N/A|
||19||05/24/2013 08:50:03 EST||N/A|
||290||05/24/2013 08:21:59 EST||N/A|
||231||05/24/2013 07:55:02 EST||N/A|
||117||05/23/2013 12:40:32 EST||05/29/2013 09:53:42 EST|
||2,736||05/16/2013 04:42:17 EST||06/04/2013 22:08:14 EST|
||72||05/14/2013 18:40:39 EST||05/14/2013 18:40:39 EST|
How Can You Tell if a File is Legitimate?
There are legitimate file extensions that are not malicious. File extensions are components of your operating system or software. Therefore, you should check the file before removing it from your computer. In case you are not sure about the legitimacy of file extension, run a scan with an anti-spyware program or ask an expert to examine the file to make sure you don't delete a legitimate file. But remember that a file which is installed without your knowledge is not a legitimate one. Removing files can be risky, because spyware often exploits legitimate files, and if such files are not removed properly they can seriously damage your system.
Here's a list of features that will help you to define whether the file is legitimate:
- First examine the description, the product or the company signature – if signature is absent, misspelled or modified there is a high risk that the file is illegitimate.
- At initial activation an illegitimate file opens a small window and immediately closes under the cursor. This process is called dummywin.exe and proves the illegitimacy of a file.
- A file can get injected when cursor moves on the window and in this way activates the process. Usually certain files will display a notification.
- On a powerful PC the window will display and close instantly before you can even react.
- You can check information on the file online, this will reduce the risk of removing a legitimate program.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z