Such operations may include, for example, requesting a user's approval to open or execute the received digital object; automatically opening or executing the received objects; asking the user of the receiving device 120 whether to keep or to delete the received digital object; playing the received digital object; adding the received digital object to a play-list; performing a virus scan on the rec