PK
L` _rels/.rels ( PK L; blockjsvbs-winconfig.nuspec ( VaO#70_Hڬá+S.N!*T!;ɚx=K߱w7pUCa=+GvO;_"Шvv39a]Ka3[p
1]E]
0{[ԖxXݹF/rh4&df3W8b_ +\秦wFKsQZ=fx+)P;jdqZd",r/$ɍv8.9MMΥM;~;RGy[(3(q[DFxyAb6뤆+Zw_}6&7>i-D,<؋];dGvIL krȹZsPJ:HQS(e4t^$[`*ygse/Mߛ~KCjЁϤyN慪29#$qRO#T@`/s=$B|bS --uKt FXˍ
*x
)h2=pp/yhK:f PS@&њ&`iaaݳ@Y|L`y, 7T#:r^kwcXp*]X
=i4Op:ګyLTƬ5(m+ֲo56禬cDr]bF<ʨөYlJk\jalFC"Ű=h^-sUK}H,5HO}}-i=ˍaฐKaM ""%J(Q|VPgNfcNOο.O&wp
l&dV]
>vNt8Jչʢ0'"5iэ/W[/׃%U/8;j ED:kJ-PbN|.#Je^uAkxjEI?EoԨNYP`B&%ZSج$3koHeᐽ$:AA`Qti~`tKRb\L|G'%S,l<#}4+iٛL]yTp筢X STV.3?.ګE7^@$
wD)D~sЦq
TrE4;K"!~$Sy^.gX\nbu1ޠPK L tools/.SkipAutoUninstaller ( PK L( # tools/ChocolateyInstall.ps1 ( };@D{$0E$ 'O6f1|hm}tQ:kzs?zjq:<3?5턫Szvxߔ46}#Qu[tp=/biB
P e8MbȵiگơQu&} PK Ln{ tools/ChocolateyUninstall.ps1 ( u;0@J.m9A$b`A9'J?I-wcH\F7KI܌LtL
wkiT-
gEdw F-5b5uj#7oVGG-SLiތT4[cbHTlo6J9ڻ)PK
L;: : Q package/services/metadata/core-properties/26fcc3c1f58a4d35b4340ff976b98ade.psmdcp ( bcurran3**blockjsvbs-winconfig** helps protect you from malware payloads delivered using [JavaScript](https://en.wikipedia.org/wiki/JavaScript) and [VBScript](https://en.wikipedia.org/wiki/VBScript). It does this by simply reassociating the related file extensions (.js, .jse, .vbs, .vbe) to open up in your default text editor (most likely Notepad or Wordpad) instead of executing the scripts via their native script engines.
**blockjsvbs-winconfig** is only one step in helping to protect your computer from malware. There are many more file extensions that you may want to reassociate or disassociate completely. You can simply do this for more file extensions by looking at the ChocolateyInstall and ChocolateyUninstall scripts or read about the [assoc](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/assoc) command.
**blockjsvbs-winconfig** is global. You only need to run it once and it will help protect all users of the computer.
Uninstalling **blockjsvbs-winconfig** will revert the file associations back to default.
####RELATED READING MATERIAL:
* [File extensions and types that are common threat vectors for email](https://support.symantec.com/en_US/article.INFO3768.html)
* [Most Popular Windows File Types Used by Malware (2017)](https://sensorstechforum.com/popular-windows-file-types-used-malware-2017/)
* [50+ File Extensions That Are Potentially Dangerous on Windows](https://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/)
**[PACKAGE NOTES](https://github.com/bcurran3/ChocolateyPackages/blob/master/blockjsvbs-winconfig/readme.md)**blockjsvbs-winconfig0.0.1bcurran3 block javascript vbscript js jse vbs vbe config securityBlock JavaScript and VBScript (Config)choco, Version=0.10.11.0, Culture=neutral, PublicKeyToken=79d02ea9cad655eb;Microsoft Windows NT 10.0.17134.0;.NET Framework 4PK
LA~ [Content_Types].xml ( PK-
L` _rels/.relsPK- L; > blockjsvbs-winconfig.nuspecPK- L e tools/.SkipAutoUninstallerPK- L( # tools/ChocolateyInstall.ps1PK- Ln{ tools/ChocolateyUninstall.ps1PK-
L;: : Q package/services/metadata/core-properties/26fcc3c1f58a4d35b4340ff976b98ade.psmdcpPK-
LA~ [Content_Types].xmlPK