Discussion:
So ...... is this real, or imagined?
Add Reply
David
2025-02-16 10:25:12 UTC
Reply
Permalink
This is a screenshot:-

Loading Image...

I've erased my hard drive, just in case!
--
Kind regards,
David
FromTheRafters
2025-02-16 11:34:49 UTC
Reply
Permalink
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
David
2025-02-16 13:45:24 UTC
Reply
Permalink
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
--
David
%
2025-02-16 13:46:40 UTC
Reply
Permalink
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
oh i can't wait
FromTheRafters
2025-02-16 15:37:35 UTC
Reply
Permalink
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with EtreCheck
too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
David
2025-02-16 17:26:13 UTC
Reply
Permalink
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent

*Can trojans hide from antivirus*?

//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//

HTH
--
David
FromTheRafters
2025-02-16 19:55:42 UTC
Reply
Permalink
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad
thing.
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
David
2025-02-16 20:44:36 UTC
Reply
Permalink
Post by FromTheRafters
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was!  Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
Post by FromTheRafters
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
--
David
Brock McNuggets
2025-02-16 20:46:01 UTC
Reply
Permalink
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 20:55:22 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.

I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
--
David
Brock McNuggets
2025-02-16 21:07:39 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 21:16:40 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!

(I've just explained that to Mike in another post).
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
--
David
Brock McNuggets
2025-02-16 21:17:23 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
--
David
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 21:26:56 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
Post by FromTheRafters
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Sheesh!
I have it down to a fine art now! Just for kicks, I did a scan with
EtreCheck too - after I'd erased my drive. Would you like to see it?
It's not ramnit again is it? :)
No. You SAW what it was! Trojan OSX.RustAgent
Can't find anything on that specific name. It looks like it was just a
couple of attempts to get you to make a mistake, if it had executed
there would have been more files to quarantine.
Phew!
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
I don't bring my data back - I do a fresh, clean, install.

Straight from the Apple Server.

The process is called *Internet Recovery* (or **macOS Internet
Recovery**). It allows you to perform a **clean install of macOS**
directly from Apple's servers without needing installation media.

To start **Internet Recovery**:
1. Turn off your Mac.
2. Turn it back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe.
3. Follow the on-screen instructions to reinstall macOS.

This method installs **the latest macOS version compatible with your
Mac**. If you need the **original macOS version that came with your
Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) + R** instead.

Ref: (ChatGPT)
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
HTH
--
David
Brock McNuggets
2025-02-16 22:08:39 UTC
Reply
Permalink
On Feb 16, 2025 at 2:26:56 PM MST, "David" wrote
<***@mid.individual.net>:
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
I don't bring my data back - I do a fresh, clean, install.
Your data is still on the Apple Cloud... meaning if you had malware there you
still have the malware.
Post by David
Straight from the Apple Server.
The process is called *Internet Recovery* (or **macOS Internet
Recovery**). It allows you to perform a **clean install of macOS**
directly from Apple's servers without needing installation media.
That is not your data.
Post by David
1. Turn off your Mac.
2. Turn it back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe.
3. Follow the on-screen instructions to reinstall macOS.
This method installs **the latest macOS version compatible with your
Mac**. If you need the **original macOS version that came with your
Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) + R** instead.
Ref: (ChatGPT)
What value do you think that does for software saved in your user fold
(malware or not)?
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues to
users. Rootkit technologies – that are generally employed by Trojans –
can intercept and substitute system functions to make the infected file
invisible to the operating system and antivirus programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
HTH
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 23:34:43 UTC
Reply
Permalink
Post by Brock McNuggets
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
I don't bring my data back - I do a fresh, clean, install.
Your data is still on the Apple Cloud... meaning if you had malware there you
still have the malware.
Sadly, that is 100% true.

That, of course, is when ClamXAV might catch it - if/when I download
data from the iCloud.
Post by Brock McNuggets
Post by David
Straight from the Apple Server.
The process is called *Internet Recovery* (or **macOS Internet
Recovery**). It allows you to perform a **clean install of macOS**
directly from Apple's servers without needing installation media.
That is not your data.
No - that belongs to Apple!
Post by Brock McNuggets
Post by David
1. Turn off your Mac.
2. Turn it back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe.
3. Follow the on-screen instructions to reinstall macOS.
This method installs **the latest macOS version compatible with your
Mac**. If you need the **original macOS version that came with your
Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) + R** instead.
Ref: (ChatGPT)
What value do you think that does for software saved in your user fold
(malware or not)?
I'm not 100% sure what you mean by that.

<snip>
Brock McNuggets
2025-02-16 23:38:28 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
I don't bring my data back - I do a fresh, clean, install.
Your data is still on the Apple Cloud... meaning if you had malware there you
still have the malware.
Sadly, that is 100% true.
That, of course, is when ClamXAV might catch it - if/when I download
data from the iCloud.
Right. My point being that re-installing the OS is unlikely to help. Also
unlikely to cause any real harm though... so if it makes you feel better /
safer so be it. It is not like the old days where doing so was much of a
hassle.
Post by David
Post by Brock McNuggets
Post by David
Straight from the Apple Server.
The process is called *Internet Recovery* (or **macOS Internet
Recovery**). It allows you to perform a **clean install of macOS**
directly from Apple's servers without needing installation media.
That is not your data.
No - that belongs to Apple!
Right.
Post by David
Post by Brock McNuggets
Post by David
1. Turn off your Mac.
2. Turn it back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe.
3. Follow the on-screen instructions to reinstall macOS.
This method installs **the latest macOS version compatible with your
Mac**. If you need the **original macOS version that came with your
Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) + R** instead.
Ref: (ChatGPT)
What value do you think that does for software saved in your user fold
(malware or not)?
I'm not 100% sure what you mean by that.
You are replacing files that are NOT you data... so it does not really help if
there are bad things in your data.
Post by David
<snip>
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 23:54:59 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
I don't bring my data back - I do a fresh, clean, install.
Your data is still on the Apple Cloud... meaning if you had malware there you
still have the malware.
Sadly, that is 100% true.
That, of course, is when ClamXAV might catch it - if/when I download
data from the iCloud.
Right. My point being that re-installing the OS is unlikely to help. Also
unlikely to cause any real harm though... so if it makes you feel better /
safer so be it. It is not like the old days where doing so was much of a
hassle.
Erasing the hard drive is essential *BEFORE* reinstalling the macOS
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Straight from the Apple Server.
The process is called *Internet Recovery* (or **macOS Internet
Recovery**). It allows you to perform a **clean install of macOS**
directly from Apple's servers without needing installation media.
That is not your data.
No - that belongs to Apple!
Right.
Post by David
Post by Brock McNuggets
Post by David
1. Turn off your Mac.
2. Turn it back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe.
3. Follow the on-screen instructions to reinstall macOS.
This method installs **the latest macOS version compatible with your
Mac**. If you need the **original macOS version that came with your
Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) + R** instead.
Ref: (ChatGPT)
What value do you think that does for software saved in your user fold
(malware or not)?
I'm not 100% sure what you mean by that.
You are replacing files that are NOT you data... so it does not really help if
there are bad things in your data.
I'm sorry - I still don't understand your point here.
--
David
Brock McNuggets
2025-02-17 00:21:46 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
While I do sometimes run AVG or some other free malware checker, mostly I just
do not worry. Never had any issue (not since Classic Mac OS days).
Understood.
I'd like you to understand that I do not personally "worry" for myself.
The more knowledge I have, though, the better I can advise my real-life
family and friends.
Didn't you just wipe your hard drive?
I have! That has been my AV strategy for years!
(I've just explained that to Mike in another post).
Seems a bit extreme... and if you bring your data back what good is it doing?
I don't bring my data back - I do a fresh, clean, install.
Your data is still on the Apple Cloud... meaning if you had malware there you
still have the malware.
Sadly, that is 100% true.
That, of course, is when ClamXAV might catch it - if/when I download
data from the iCloud.
Right. My point being that re-installing the OS is unlikely to help. Also
unlikely to cause any real harm though... so if it makes you feel better /
safer so be it. It is not like the old days where doing so was much of a
hassle.
Erasing the hard drive is essential *BEFORE* reinstalling the macOS
No, you can reinstall on top of. And if you do erase the drive local files are
going to be lost.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Straight from the Apple Server.
The process is called *Internet Recovery* (or **macOS Internet
Recovery**). It allows you to perform a **clean install of macOS**
directly from Apple's servers without needing installation media.
That is not your data.
No - that belongs to Apple!
Right.
Post by David
Post by Brock McNuggets
Post by David
1. Turn off your Mac.
2. Turn it back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe.
3. Follow the on-screen instructions to reinstall macOS.
This method installs **the latest macOS version compatible with your
Mac**. If you need the **original macOS version that came with your
Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) + R** instead.
Ref: (ChatGPT)
What value do you think that does for software saved in your user fold
(malware or not)?
I'm not 100% sure what you mean by that.
You are replacing files that are NOT you data... so it does not really help if
there are bad things in your data.
I'm sorry - I still don't understand your point here.
Your malware was in places you are not replacing.
--
Specialist in unnecessary details and overcomplicated solutions.
Mike Easter
2025-02-16 23:47:12 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
To start **Internet Recovery**: 1. Turn off your Mac. 2. Turn it
back on and immediately press and hold **Option (⌥) + Command
(⌘) + R** until you see a spinning globe. 3. Follow the on-
screen instructions to reinstall macOS.
This method installs **the latest macOS version compatible with
your Mac**. If you need the **original macOS version that came
with your Mac**, use **Shift (⇧) + Option (⌥) + Command (⌘) +
R** instead.
Ref: (ChatGPT)
Not the *best* source of info. You should hope to learn that someday.
Post by David
Post by Brock McNuggets
What value do you think that does for software saved in your user
fold (malware or not)?
I'm not 100% sure what you mean by that.
That's what happens when you 'listen' to chatgpt instead of a more
reliable source.

Apple support about macos internet recovery
Post by David
Reinstalling macOS doesn't remove your apps or personal data
Doh. Not so good if you are *really* trying to eliminate malware.
Post by David
If you erase and reinstall macOS, your user accounts, network
settings, and all of the files and folders on your Mac are deleted.
--
Mike Easter
Gremlin
2025-02-17 01:26:03 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly
I just do not worry. Never had any issue (not since Classic Mac OS
days).
Browser hijacking trojans are not Windows/Linux only, Snit.
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues
to users. Rootkit technologies – that are generally employed by
Trojans – can intercept and substitute system functions to make the
infected file invisible to the operating system and antivirus
programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
So you don't know the difference either? A trojan doesn't self replicate.
viruses and worms do that. The specific difference between them is that one
usually needs a host and the other does not. There's also ones that are both.
Toadie and Irok are good examples of that. David was trying to compare an
Apple to an Orange here. For someone who has a masters in IT, how did you
miss the difference there, Snit? :)

Obviously security and matters concerning it are not subjects you are well
versed on.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 01:45:29 UTC
Reply
Permalink
Post by Gremlin
Post by Brock McNuggets
Post by David
I wanted my friends here to be absolutely sure about that!
While I do sometimes run AVG or some other free malware checker, mostly
I just do not worry. Never had any issue (not since Classic Mac OS
days).
Browser hijacking trojans are not Windows/Linux only, Snit.
Can you quote someone who said otherwise? If so, how is it relevant to what I
said?
Post by Gremlin
Post by Brock McNuggets
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues
to users. Rootkit technologies – that are generally employed by
Trojans – can intercept and substitute system functions to make the
infected file invisible to the operating system and antivirus
programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
So you don't know the difference either? A trojan doesn't self replicate.
viruses and worms do that. The specific difference between them is that one
usually needs a host and the other does not. There's also ones that are both.
Toadie and Irok are good examples of that. David was trying to compare an
Apple to an Orange here. For someone who has a masters in IT, how did you
miss the difference there, Snit? :)
Obviously security and matters concerning it are not subjects you are well
versed on.
Oh please, spare me the condescension. You act like you’re revealing some
deep, arcane truth when all you’re doing is regurgitating the absolute basics
of malware classification—something any entry-level IT student already knows.

Yes, a Trojan doesn’t self-replicate. Yes, viruses and worms do. And yes, some
malware can exhibit characteristics of multiple types. Wow. What an
earth-shattering revelation. Maybe next you can explain to us that water is
wet.

The irony here is that you’re accusing David of oversimplifying while
simultaneously pretending that this little taxonomy lesson is some kind of
intellectual triumph. Meanwhile, you completely miss the actual point: blindly
trusting an AV scan without verifying the result is just bad practice.

Now, to be fair, David was the one who erased his drive, not you. Was it
overkill? Probably. But was it harmful to him? Not really. If anything, it was
just unnecessary effort. But instead of focusing on that, you’re fixated on
trying to score cheap points over malware definitions, as if that changes the
core issue.

So sure, keep patting yourself on the back for explaining the ABCs of malware
like it’s groundbreaking. I’m sure someone, somewhere, is impressed.
--
Specialist in unnecessary details and overcomplicated solutions.
Gremlin
2025-02-17 01:26:02 UTC
Reply
Permalink
[snip]
Post by David
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
What friends? :) And if they didn't already know that, they probably
shouldn't be using a computer with a seriously non restricted account. It
should be locked down quite a bit for their safety.
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues
to users. Rootkit technologies – that are generally employed by
Trojans – can intercept and substitute system functions to make the
infected file invisible to the operating system and antivirus
programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
No, it wasn't. A worm isn't a trojan. Trojans do not self replicate. Worms
and viruses do. You compared an Apple to an Orange here, David.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 01:45:29 UTC
Reply
Permalink
Post by Gremlin
[snip]
Post by David
Post by FromTheRafters
Post by David
*Can trojans hide from antivirus*?
Of course, AV's are always playing catch-up to malware purveyors. There
has to be a bad thing, for there to be a thing to detect such bad thing.
I wanted my friends here to be absolutely sure about that!
What friends? :) And if they didn't already know that, they probably
shouldn't be using a computer with a seriously non restricted account. It
should be locked down quite a bit for their safety.
Post by David
Post by FromTheRafters
Post by David
//The Warezov mail worm used this technique and caused serious issues
to users. Rootkit technologies – that are generally employed by
Trojans – can intercept and substitute system functions to make the
infected file invisible to the operating system and antivirus
programs.//
What does this have to do with what was reported?
It was simply an example of a Trojan that DID cause harm. Nothing more.
No, it wasn't. A worm isn't a trojan. Trojans do not self replicate. Worms
and viruses do. You compared an Apple to an Orange here, David.
Oh, give it a rest, Gremlin. You’re so desperate to play “Gotcha!” that you’ve
completely missed the point—again.

David was making a general point about malware evasion techniques, but instead
of engaging in a meaningful discussion, you’re nitpicking over terminology
like some self-important gatekeeper of IT trivia. Yes, a worm and a Trojan are
distinct classifications. Congratulations, you’ve grasped Malware 101. Should
we throw you a party?

The irony is that while you smugly correct David, you completely gloss over
the actual issue: malware—regardless of classification—can evade detection,
and users should be aware of that. But sure, keep fixating on whether one
particular example fits your pedantic little definitions instead of discussing
anything of substance. It’s about as useful as arguing whether a square is a
rectangle while your house is on fire.

So, unless you actually have something worthwhile to add to the discussion,
maybe sit this one out.
--
Specialist in unnecessary details and overcomplicated solutions.
Gremlin
2025-02-17 04:41:37 UTC
Reply
Permalink
Oh, give it a rest, Gremlin. You’re so desperate to play "Gotcha!"
that you've completely missed the point again.
David was making a general point about malware evasion techniques, but
instead of engaging in a meaningful discussion, you’re nitpicking over
terminology like some self-important gatekeeper of IT trivia. Yes, a
worm and a Trojan are distinct classifications. Congratulations,
you’ve grasped Malware 101. Should we throw you a party?
The irony is that while you smugly correct David, you completely gloss
over the actual issue: malware—regardless of classification—can
evade detection, and users should be aware of that. But sure, keep
fixating on whether one particular example fits your pedantic little
definitions instead of discussing anything of substance. It’s about as
useful as arguing whether a square is a rectangle while your house is on
fire.
So, unless you actually have something worthwhile to add to the
discussion, maybe sit this one out.
Interesting that you took such issue with what I wrote, but you didn't have
a problem with FromTheRafters writing essentially the same things, hours
before I did. Can you explain this?

Here's his post MID so everyone else can see Rafters post hours earlier than
my own.
Message-ID: <votg09$o3jh$***@dont-email.me>
http://al.howardknight.net/?ID=173976633500
Date: Sun, 16 Feb 2025 14:57:59 -0500

Here's mine for the record:
Message-ID: <***@cF04o3ON7k2lx05.lLC.9r5>
http://al.howardknight.net/?ID=173976640100
Date: Mon, 17 Feb 2025 01:26:02 -0000

Oh do explain this one Snit, I'm all ears. :)
You took no issue with FTR explaining things, but you went out of your way
to single me out for explaining the same thing.
Had I seen his post, I wouldn't have bothered essentially repeating what he
already stated. But, I am curious as to your specific reason to comment as
you did at me and not him? :)
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 05:22:21 UTC
Reply
Permalink
Post by Gremlin
Oh, give it a rest, Gremlin. You’re so desperate to play "Gotcha!"
that you've completely missed the point again.
David was making a general point about malware evasion techniques, but
instead of engaging in a meaningful discussion, you’re nitpicking over
terminology like some self-important gatekeeper of IT trivia. Yes, a
worm and a Trojan are distinct classifications. Congratulations,
you’ve grasped Malware 101. Should we throw you a party?
The irony is that while you smugly correct David, you completely gloss
over the actual issue: malware—regardless of classification—can
evade detection, and users should be aware of that. But sure, keep
fixating on whether one particular example fits your pedantic little
definitions instead of discussing anything of substance. It’s about as
useful as arguing whether a square is a rectangle while your house is on
fire.
So, unless you actually have something worthwhile to add to the
discussion, maybe sit this one out.
Interesting that you took such issue with what I wrote,
LOL! You really are lost.
Post by Gremlin
but you didn't have
a problem with FromTheRafters writing essentially the same things, hours
before I did. Can you explain this?
Where did he focus on his ego like you did?
Post by Gremlin
Here's his post MID so everyone else can see Rafters post hours earlier than
my own.
http://al.howardknight.net/?ID=173976633500
Date: Sun, 16 Feb 2025 14:57:59 -0500
http://al.howardknight.net/?ID=173976640100
Date: Mon, 17 Feb 2025 01:26:02 -0000
Oh do explain this one Snit, I'm all ears. :)
You took no issue with FTR explaining things, but you went out of your way
to single me out for explaining the same thing.
Had I seen his post, I wouldn't have bothered essentially repeating what he
already stated. But, I am curious as to your specific reason to comment as
you did at me and not him? :)
Your need for repetition is not shared by me.
--
Specialist in unnecessary details and overcomplicated solutions.
Gremlin
2025-02-22 05:27:01 UTC
Reply
Permalink
Post by Brock McNuggets
Post by Gremlin
Oh, give it a rest, Gremlin. You’re so desperate to play "Gotcha!"
that you've completely missed the point again.
David was making a general point about malware evasion techniques, but
instead of engaging in a meaningful discussion, you’re nitpicking
over terminology like some self-important gatekeeper of IT trivia.
Yes, a worm and a Trojan are distinct classifications.
Congratulations, you’ve grasped Malware 101. Should we throw you a
party?
The irony is that while you smugly correct David, you completely gloss
over the actual issue: malware—regardless of classification—can
evade detection, and users should be aware of that. But sure, keep
fixating on whether one particular example fits your pedantic little
definitions instead of discussing anything of substance. It’s about
as useful as arguing whether a square is a rectangle while your house
is on fire.
So, unless you actually have something worthwhile to add to the
discussion, maybe sit this one out.
Interesting that you took such issue with what I wrote,
LOL! You really are lost.
Not hardly. Do you really think these snarky comments are working for you?
Post by Brock McNuggets
Post by Gremlin
but you didn't have
a problem with FromTheRafters writing essentially the same things,
hours before I did. Can you explain this?
Where did he focus on his ego like you did?
Once again, YOU try to make it all about an ego; because you can't
comprehend what you read for shit!
Post by Brock McNuggets
Post by Gremlin
Here's his post MID so everyone else can see Rafters post hours earlier
than my own.
http://al.howardknight.net/?ID=173976633500
Date: Sun, 16 Feb 2025 14:57:59 -0500
http://al.howardknight.net/?ID=173976640100
Date: Mon, 17 Feb 2025 01:26:02 -0000
Oh do explain this one Snit, I'm all ears. :)
You took no issue with FTR explaining things, but you went out of your
way to single me out for explaining the same thing.
Had I seen his post, I wouldn't have bothered essentially repeating
what he already stated. But, I am curious as to your specific reason to
comment as you did at me and not him? :)
Your need for repetition is not shared by me.
Translation: Yes, I singled you out, no, I have no reasonable explanation of
any kind for having done so, Other than the fact I wanted to try to ride you.
If I can't be seen as a peer of yours, I'll try to bring you down to my
level by projecting my well known and documented problems on you. As I've
told you before though, you aren't in a newsgroup full of non tech savvy
idiots that you can play. Read the room, stupid. It's *not* working out for
you.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-16 15:33:47 UTC
Reply
Permalink
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 17:17:56 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware. If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.

*Understanding Trojan Viruses and How to Get Rid of Them*

//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.

Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//

https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/

NOTE
****

Erasing one's hard drive SHOULD remove the Trojan! ;-)
--
David
Brock McNuggets
2025-02-16 18:00:10 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 18:17:11 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!

Folk on the Apple Support Communities forums recommend that one DOES NOT
USE anti-malware software!
--
David
Brock McNuggets
2025-02-16 18:22:10 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
Your image showed otherwise:

https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
Folk on the Apple Support Communities forums recommend that one DOES NOT
USE anti-malware software!
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 18:59:37 UTC
Reply
Permalink
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
Brock McNuggets
2025-02-16 19:19:54 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Yes. Though other forms of malware might.
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
What type unexpected things?
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
How am I confused? Your image shows running of an anti-malware app.

Is your email stored on a server?
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 19:36:30 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Yes. Though other forms of malware might.
Did you not read the McAffee link I sent you?
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
What type unexpected things?
Items disappearing?
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
How am I confused? Your image shows running of an anti-malware app.
You need to re-read your post.
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
--
David
Brock McNuggets
2025-02-16 19:52:28 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Yes. Though other forms of malware might.
Did you not read the McAffee link I sent you?
I did.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
What type unexpected things?
Items disappearing?
Weird.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
How am I confused? Your image shows running of an anti-malware app.
You need to re-read your post.
Oh, I see. You are correct *I* rarely use anti-malware software (though to say
I don't at all is not quite correct). But why change the topic to my system. I
am not concerned about mine.
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 20:49:40 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Yes. Though other forms of malware might.
Did you not read the McAffee link I sent you?
I did.
Good man!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
What type unexpected things?
Items disappearing?
Weird.
Indeed. I have noticed all manner of things over the years!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
How am I confused? Your image shows running of an anti-malware app.
You need to re-read your post.
Oh, I see. You are correct *I* rarely use anti-malware software (though to say
I don't at all is not quite correct). But why change the topic to my system. I
am not concerned about mine.
Even though you use Apple devices, you still need to exercise care if
you use the Internet.
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
--
David
Brock McNuggets
2025-02-16 20:56:33 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Yes. Though other forms of malware might.
Did you not read the McAffee link I sent you?
I did.
Good man!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
What type unexpected things?
Items disappearing?
Weird.
Indeed. I have noticed all manner of things over the years!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
How am I confused? Your image shows running of an anti-malware app.
You need to re-read your post.
Oh, I see. You are correct *I* rarely use anti-malware software (though to say
I don't at all is not quite correct). But why change the topic to my system. I
am not concerned about mine.
Even though you use Apple devices, you still need to exercise care if
you use the Internet.
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 21:20:52 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
I STILL do not have a great deal of faith in ClamXAV.
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
What makes you think it was installed?
It's what Trojans *DO*!
They do not install themselves... just as in the lore for the Trojan Horse.
They use social engineering to get the user to install them.
Are you SURE about this?
Yes. Though other forms of malware might.
Did you not read the McAffee link I sent you?
I did.
Good man!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
//Basic online scenario—You log onto your computer and notice that
something’s just not right, but you can’t quite put your finger on it.
Something just seems…a bit off. If you’ve found yourself in this
situation, or even thinking you are, there’s a real possibility you
could have a Trojan virus on your computer.
Did you have that?
Yes, I have had! (Not now though, on my clean machine!)
What was happening?
Unexpected things occurring and sometime slow.
What type unexpected things?
Items disappearing?
Weird.
Indeed. I have noticed all manner of things over the years!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Trojan viruses can not only steal your most personal information, they
also put you at risk for identity theft and other serious cybercrimes.
In this post, we’ll examine what Trojan viruses are, and where they come
from. We’ll also cover how you can protect yourself and get rid of
viruses so you can stay safe and maintain peace of mind online.//
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
NOTE
****
Erasing one's hard drive SHOULD remove the Trojan! ;-)
It will... as will the anti-malware software.
You don't *USE* anti-malware software!!!
YOU ARE CONFUSED AGAIN!
Post by Brock McNuggets
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
<snip>
How am I confused? Your image shows running of an anti-malware app.
You need to re-read your post.
Oh, I see. You are correct *I* rarely use anti-malware software (though to say
I don't at all is not quite correct). But why change the topic to my system. I
am not concerned about mine.
Even though you use Apple devices, you still need to exercise care if
you use the Internet.
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
It WAS (supposedly) quarantined ..... BEFORE I erased my hard drive!

*Keep up, dear boy*! ;-) (in fun!)
--
David
Brock McNuggets
2025-02-16 21:23:52 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
I STILL do not have a great deal of faith in ClamXAV.
It is dependent on the Clam engine.

...
Post by David
Post by Brock McNuggets
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
It WAS (supposedly) quarantined ..... BEFORE I erased my hard drive!
OK. Any reason to think it was not?
Post by David
*Keep up, dear boy*! ;-) (in fun!)
So quarantined and then erased. Fair enough. :)

But if you did a backup and then brought your data back you brought it back.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 23:45:54 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware.
Sure. From what I can tell, sitting harmlessly in an email until it was
quarantined.
The whole point of a Trojan is that they *DON'T* "sit harmlessly!"'
Did you ever run the app?
I've no idea!
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
I STILL do not have a great deal of faith in ClamXAV.
It is dependent on the Clam engine.
For the most part, yes ...... but Mark Allan can manipulate the software.
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
It WAS (supposedly) quarantined ..... BEFORE I erased my hard drive!
OK. Any reason to think it was not?
Response from the ASC forum.

THIS! Loading Image...
Post by Brock McNuggets
Post by David
*Keep up, dear boy*! ;-) (in fun!)
So quarantined and then erased. Fair enough. :)
<thumb>
Post by Brock McNuggets
But if you did a backup and then brought your data back you brought it back.
I don't know how one can get around that problem :-(

Any ideas?
--
David
Brock McNuggets
2025-02-16 23:52:17 UTC
Reply
Permalink
On Feb 16, 2025 at 4:45:54 PM MST, "David" wrote
<***@mid.individual.net>:

...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
I STILL do not have a great deal of faith in ClamXAV.
It is dependent on the Clam engine.
For the most part, yes ...... but Mark Allan can manipulate the software.
From what I understand he has a wrapper around the Clam engine. He does not
modify the engine.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
It WAS (supposedly) quarantined ..... BEFORE I erased my hard drive!
OK. Any reason to think it was not?
Response from the ASC forum.
THIS! https://i.ibb.co/Q7Chrdqh/Screenshot-2025-02-11-at-18-35-01.png
That does not answer the question.
Post by David
Post by Brock McNuggets
Post by David
*Keep up, dear boy*! ;-) (in fun!)
So quarantined and then erased. Fair enough. :)
<thumb>
Post by Brock McNuggets
But if you did a backup and then brought your data back you brought it back.
I don't know how one can get around that problem :-(
Any ideas?
Stop fearing it. Stop worrying. There is no 100% guarantee that Apple and
third party apps will catch everything, but it is just not worth focusing so
much time on. It is possible the NSA has targeted you and has cameras hidden
in your home, but the chances are miniscule. Not worth looking in your vents
for cameras. Same with malware. Enjoy other things.
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 23:58:55 UTC
Reply
Permalink
Post by Brock McNuggets
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
I STILL do not have a great deal of faith in ClamXAV.
It is dependent on the Clam engine.
For the most part, yes ...... but Mark Allan can manipulate the software.
From what I understand he has a wrapper around the Clam engine. He does not
modify the engine.
He does! Write and ask him - PLEASE!
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
It WAS (supposedly) quarantined ..... BEFORE I erased my hard drive!
OK. Any reason to think it was not?
Response from the ASC forum.
THIS! https://i.ibb.co/Q7Chrdqh/Screenshot-2025-02-11-at-18-35-01.png
That does not answer the question.
Do you disagree with the person who wrote that message?
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
*Keep up, dear boy*! ;-) (in fun!)
So quarantined and then erased. Fair enough. :)
<thumb>
Post by Brock McNuggets
But if you did a backup and then brought your data back you brought it back.
I don't know how one can get around that problem :-(
Any ideas?
Stop fearing it. Stop worrying. There is no 100% guarantee that Apple and
third party apps will catch everything, but it is just not worth focusing so
much time on. It is possible the NSA has targeted you and has cameras hidden
in your home, but the chances are miniscule. Not worth looking in your vents
for cameras. Same with malware. Enjoy other things.
It's my hobby! 🙂 I'm not afraid or fearful - I just don't like "bad guys"!

HTH
--
David
David
2025-02-17 00:15:11 UTC
Reply
Permalink
Post by David
I'm not afraid or fearful - I just don't like "bad guys"!
Your big problems, among others, is that your hobbies are misguided and
self-destructive; and your ability or judgment to assess good guys vs
bad guys is totally outawhack.
Why are you suggesting that FromTheRafters is *NOT* a "good guy"?

You should get a cat, Mike.

Mine is a menace - but great fun!
--
David
Mike Easter
2025-02-17 00:27:11 UTC
Reply
Permalink
Post by David
Why are you suggesting that FromTheRafters is *NOT* a "good guy"?
That is a complete misrepresentation of what I said.

I'm particularly referring to your behavior regarding such dev/s as Mark
Allan and John Daniel; who you act toward as if they were bad guys
because they don't like you because you have mistreated them and so they
treat you as somewhat of a pariah.

That behavior may be why Haley referred to you as narcissistic. I
suppose that could be considered a narcissism trait, but it could be via
alternate personality traits.
--
Mike Easter
T i m
2025-02-19 23:02:27 UTC
Reply
Permalink
Post by Mike Easter
Post by David
Why are you suggesting that FromTheRafters is *NOT* a "good guy"?
That is a complete misrepresentation of what I said.
Why are you continuing to discuss anything with this self confessed
troll and nutjob?
Post by Mike Easter
I'm particularly referring to your behavior regarding such dev/s as Mark
Allan and John Daniel; who you act toward as if they were bad guys
because they don't like you because you have mistreated them and so they
treat you as somewhat of a pariah.
Ironic, considering he believes he is working for some doG. Maybe his
instruction book is out of day (by 2000+ years).
Post by Mike Easter
That behavior may be why Haley referred to you as narcissistic.
They wouldn't be the first to suggest that.
Post by Mike Easter
I
suppose that could be considered a narcissism trait, but it could be via
alternate personality traits.
Yup, he wears many masks and none of them are nice.

T i m
Gremlin
2025-02-22 05:27:02 UTC
Reply
Permalink
Post by T i m
Post by Mike Easter
Post by David
Why are you suggesting that FromTheRafters is *NOT* a "good guy"?
That is a complete misrepresentation of what I said.
Why are you continuing to discuss anything with this self confessed
troll and nutjob?
That's rich, considering. You really shouldn't be so quick to label others,
even David Brooks, as a nutjob. You haven't come across as a normal
individual yourself here. If anything, you've come across (atleast to me) as
one who likes to use others to get things done; because you are too fucking
lazy to learn to do it yourself. You are never going to be able to sell me
the story that you can read a datasheet and select specific components you
need for a project but can't figure out how to configure your smart home
technology. The maths isn't mathing. You pretty much sealed that opinion for
me when Apd wrote he had no interest in doing it for others in your small
circle of friends; once you offered him gear to continue on, I *knew* you
were a lazy bullshitting fucker. You have more in common with Snit than you
do anyone else here, bud.
Post by T i m
Post by Mike Easter
I'm particularly referring to your behavior regarding such dev/s as Mark
Allan and John Daniel; who you act toward as if they were bad guys
because they don't like you because you have mistreated them and so they
treat you as somewhat of a pariah.
Ironic, considering he believes he is working for some doG. Maybe his
instruction book is out of day (by 2000+ years).
Oh for FFS, you really are more like snit than anyone else here.
Post by T i m
Post by Mike Easter
That behavior may be why Haley referred to you as narcissistic.
They wouldn't be the first to suggest that.
That's true.
Post by T i m
Post by Mike Easter
I
suppose that could be considered a narcissism trait, but it could be via
alternate personality traits.
Yup, he wears many masks and none of them are nice.
Once again, you are writing a bit out of turn yourself there, bud. You
obviously had a problem of some kind with me, but you didn't have the balls
to come to me to discuss it, instead, like a punkass little bitch, you opted
to encourage Snit (a well known fucking troll) to consider me as a know it
all. I'm not a know it all, I just happen to have a solid understanding of
some specific things and wouldn't let you slide on your bullshit excuse 'I
can read a datasheet, but I can't figure out a text based configuration file,
somebody help me!'.

Damn, I'd love to run into your happy ass on a jobsite here. Nobody would
get involved in our 'discussion' and you couldn't hide behind a screen
talking shit. You'd be tasting your own blood with a fucking quickness.
Nutless fucking coward. You are a punkass little bitch who likes to run his
mouth like the keyboard cowboy you are, Tim. No question about it. As I
already wrote, you and Snit have much in common. You really do. He's a
wannabe with tech just as much as you are. If it wasn't for Apd holding your
hand thru the whole process, you wouldn't have made any on your own. He
already knows my opinion concerning what you're doing, but, I'll state it
again just to be clear. It's my opinion you are using him; you're a lazy
shit talking fuck who uses others to get things done. There's no valid
reason why you can parse a data sheet for a specific component, understand
everything in the data sheet, but can't figure out how a simple text file
configuration works. Oh sure, you've tried to excuse it as some learning
disability; but I'm not buying it, bud.

If you can select the right component(s) for a project and confirm with it's
specs via a datasheet, you can! write your own configuration files as well
as script when it's necessary. The former is more difficult. Everyone who's
used them knows this too, Tim. You can't bullshit me concerning this, bud.

Your attempt to attack me for the way in which I dealt with a bearing was
hilarious. I provided urls to bearing manufacturers who did not disagree
with the method I selected. You continued trying to jerk me around, though.
I'm not sorry that my technical knowledge and understanding greatly exceeds
yours. That's a you problem, not a me problem. And you aren't going to make
me feel bad for being blunt and candidly honest with you about it, either.
It was your decision to be a nutless bitch and join Snit in trying to troll
me. That's on you.

I put the fucking time in to learn the material. I didn't mooch it off
someone else. I didn't ask others to 'do it for me' repeatedly, as you've
done here. FFS, Have you contributed anything useful to another person
asking for help here? Even once? If so, I'd like the MID to the post. All
I've seen from you is shit talking, and asking Apd to do this and that for
you; you make absolutely no effort to try to do it yourself. FFS, you tried
to send him gear to further assist you and your small community of friends.
Does that mean none of you can figure it out? Yet, you think it wise to use
these devices you are nothing more than an end user of? Until you learn how
to configure it and write script, you are very much an end user of the
product. It 0wns you, You don't 0wn it.

You BS so much that David Brooks could take lessons from you. And you troll
about as well as Snit does. Good job, fuckhead! The best people to try to be
like.
--
I don't need no Dr. All I need...is my lawyer.
David
2025-02-19 23:21:30 UTC
Reply
Permalink
Post by Mike Easter
Post by David
Why are you suggesting that FromTheRafters is *NOT* a "good guy"?
That is a complete misrepresentation of what I said.
I *LIKE* FromTheRafters, especially his wicked sense of humour!
Post by Mike Easter
I'm particularly referring to your behavior regarding such dev/s as Mark
Allan and John Daniel; who you act toward as if they were bad guys
because they don't like you because you have mistreated them and so they
treat you as somewhat of a pariah.
I have purchased, and am using, Mark Allan's ClamXAV product.

John Daniel is STILL an unknown quantity.
Post by Mike Easter
That behavior may be why Haley referred to you as narcissistic.  I
suppose that could be considered a narcissism trait, but it could be via
alternate personality traits.
Just WHO is "Haley"? Your sister, perhaps?

THIS is a great picture:-
Loading Image...
--
David
Gremlin
2025-02-22 05:27:03 UTC
Reply
Permalink
Post by David
Post by Mike Easter
Post by David
Why are you suggesting that FromTheRafters is *NOT* a "good guy"?
That is a complete misrepresentation of what I said.
I *LIKE* FromTheRafters, especially his wicked sense of humour!
Sarcasm and dry wit is his native langauge. :) He's a very likeable person.
Post by David
Post by Mike Easter
I'm particularly referring to your behavior regarding such dev/s as
Mark Allan and John Daniel; who you act toward as if they were bad guys
because they don't like you because you have mistreated them and so
they treat you as somewhat of a pariah.
I have purchased, and am using, Mark Allan's ClamXAV product.
John Daniel is STILL an unknown quantity.
David,

I really wouldn't take anything Tim (I know you're responding to Mike here)
has to say to heart. He's got his own share of issues, dude. He likes to
talk shit and ask others to write configuration files for him, because, he's
a lazy fuck who won't even take a second of his time to learn it. He claims
he can parse a datasheet just fine for specific components but the
configuration files and occasional script Apd has written for him is beyond
him; he tries to use the excuse some disability prevents him from
succesfully doing it. Yea, if the disability is lazy fuck, it sure does.

Apd has tried to teach him a bit too as he's writing the changes Tim
requests. Tim can see the before and after changes, but, he can't figure it
out on his own? c'mon man.

He's a nutless shit talking coward who'd get his ass beat within say, 20
minutes on any of the jobsites i've been on. Someone would take his ass
behind the building and stomp him. He's a shit talking keyboard cowboy, dude.

Loves to claim that you're a bit of a nutjob, and, you are, but he has
absolutely no fucking room to label you; he's got the same problem himself.
How many completely off topic for this newsgroup posts has he made already
trying to guilt trip those of us who don't share his own personal eating
habits or beliefs?

I'm sorry, but, I didn't climb this far up the food chain to live on
Lettuce. :)
Post by David
Post by Mike Easter
That behavior may be why Haley referred to you as narcissistic. I
suppose that could be considered a narcissism trait, but it could be
via alternate personality traits.
Just WHO is "Haley"? Your sister, perhaps?
David,

Questions like this give people the valid suspicion that you're a stalking
nutjob. And, I can confirm that you indeed are. Quite dishonest as well.
Atleast with you, I know where I stand. You don't write off the wall
comments about me to others, you atleast have the balls to come to me
directly and give me your opinion. Tim lost what little respect I had for
him the moment he told Snit he considered me to be a know it all. People who
label me like that don't know me, but they feel inferior to me; when I give
them no reason to do so. I thought! I was being helpful by answering his
questions. I didn't know that by answering them correctly and questioning
why he can't do anything Apd has done for him makes me a know it all. It
just means that I'm not fucking lazy and am willing to learn how to do
something I don't already know how to do.

Tim is a fucktard. I have more respect for you (and snit! of all people)
than I think I ever will him. Anyone who has a problem with me, but lacks
the nuts to bring it directly to my attention isn't worth any of my respect.
His continued efforts to try and troll me over a bearing (you notice he had
no response at any point when I questioned how he'd do it, even when I
shared urls from bearing manufacturers all supporting the method I used; but
hey what would they know about products they make right? Of course, Tim
would know more than them!)

Tim is a first class fucktard, David. Likes to paint with a broad brush.
Probably still thinks he's got people snowed here too. 'Oh, I have a
learning disability. A datasheet makes sense, but a simple text based
configuration file is beyond me' No, that's pure laziness on his part. FFS,
he could compare one configuration file to another and see the changes Apd
made to it to change it's output. He won't even take the time to play around
and learn.

He sealed my opinion of him when he wouldn't accept Apds 'I'm not interested
in doing this for your community of people' and offered to send him hardware
so he could. C'mon. Learn to fucking do it yourself, or don't use the damn
tech. It's really that simple. He's just damn lucky he found someone here
willing to go thru all the jumps and hoops to get it done. Tim didn't even
disclose the software you have to download and install to even begin helping
his lazy ass out. It seems to have royally pissed him off to learn from FTR
and Apd that I could also help him. I'm sure the comment FTR wrote about me
reflashing my own binaries to get it done more efficiently tweaked him good.
And, FTR is right too; that is the route I'd have taken once I was familiar
with the eeprom layout.

The dude has more than one beer missing from the six pack if you catch my
drift.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 00:18:12 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
...
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Seems unlikely you did.
I may well have opened an email attachment (SPAM)
Just to be clear, not only opened the email but saved the attachment and then
opened it? If so the malware app should have found that copy.
I confess that I do do that sometimes!
Fair enough... but had you the malware app should have caught that you did.
I STILL do not have a great deal of faith in ClamXAV.
It is dependent on the Clam engine.
For the most part, yes ...... but Mark Allan can manipulate the software.
From what I understand he has a wrapper around the Clam engine. He does not
modify the engine.
He does! Write and ask him - PLEASE!
Not going to contact him, but I did ask ChatGPT:

-----
The author of ClamXAV, ClamXAV Software, doesn’t typically alter the
underlying ClamAV engine itself but customizes the way it interacts with macOS
to provide an easy-to-use interface and better integration with the system.
ClamXAV leverages ClamAV for virus detection and scanning but wraps it in a
macOS-friendly UI, often adding additional features like automatic updates,
scheduled scans, and integration with system security mechanisms.

However, ClamXAV is based on ClamAV’s open-source engine, so while it might
optimize or configure it to work better with macOS, the core ClamAV scanning
engine remains largely unchanged.
-----

I asked what might change... and got this:
-----
When I say “largely unchanged,” I mean that the core functionality and
scanning engine of ClamAV remain intact, but there could be some customization
in how the engine operates within ClamXAV. Specifically, the author or
ClamXAV’s developers might make adjustments in the following areas:
1. Integration with macOS: The user interface (UI) and experience are
tailored to work seamlessly with macOS, so they might modify how ClamAV
interacts with macOS-specific features like the file system, permissions, or
notification system.
2. Performance Tweaks: To improve efficiency or resource usage on macOS,
ClamXAV might apply certain optimizations or adjust default settings like
memory usage, scan speeds, or scanning depth.
3. Customization of Signature Updates: ClamXAV likely handles the
signature database differently, such as automating updates or setting custom
preferences for when and how updates are fetched, which could differ from
ClamAV’s default method.
4. Reporting and Logging: The way ClamXAV displays scan results, handles
alerts, or logs information might be modified for a smoother macOS experience.
This could include changing the format or type of reports or providing more
user-friendly options for viewing scan results.
5. UI Customization: While ClamAV is a command-line tool, ClamXAV
provides a graphical interface. The author might tweak how scans are
initiated, how progress is displayed, and how the user can interact with the
program.

In general, these are optimizations or alterations aimed at improving
usability on macOS rather than changing ClamAV’s core detection and scanning
functionality.
-----

That fits my prior understanding.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
True... but I do not engage in very risky behavior. I do use software outside
of the App Store but mostly well respected software. I do not use pirated
stuff.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Is your email stored on a server?
Yes, of course. Why do you ask?
With the malware being quarantined I suppose it is a nonissue.
It is /not/ quarantined - it has been erased!!! 🙂
Your image says it was quarantined (which is not the same as erased).
It WAS (supposedly) quarantined ..... BEFORE I erased my hard drive!
OK. Any reason to think it was not?
Response from the ASC forum.
THIS! https://i.ibb.co/Q7Chrdqh/Screenshot-2025-02-11-at-18-35-01.png
That does not answer the question.
Do you disagree with the person who wrote that message?
I do not think it is so black and white. Depends on your usage and desire.
Post by David
Post by Brock McNuggets
Post by David
Post by Brock McNuggets
Post by David
*Keep up, dear boy*! ;-) (in fun!)
So quarantined and then erased. Fair enough. :)
<thumb>
Post by Brock McNuggets
But if you did a backup and then brought your data back you brought it back.
I don't know how one can get around that problem :-(
Any ideas?
Stop fearing it. Stop worrying. There is no 100% guarantee that Apple and
third party apps will catch everything, but it is just not worth focusing so
much time on. It is possible the NSA has targeted you and has cameras hidden
in your home, but the chances are miniscule. Not worth looking in your vents
for cameras. Same with malware. Enjoy other things.
It's my hobby! 🙂 I'm not afraid or fearful - I just don't like "bad guys"!
Enjoy your hobby.

I am getting ready to make some cookies... though might not do it tonight. We
shall see. Made the dough already.
Post by David
HTH
--
Specialist in unnecessary details and overcomplicated solutions.
Gremlin
2025-02-17 01:26:06 UTC
Reply
Permalink
Post by Brock McNuggets
They do not install themselves... just as in the lore for the Trojan
Horse. They use social engineering to get the user to install them.
Not entirely true. Some can self install via exploits.

You really shouldn't give advice of a security wise nature when you know about
as much as David Brooks does concerning it.
You still haven't corrected him or commented that the article is wrong calling
a trojan a virus. There's no such thing as a trojan virus.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 01:41:30 UTC
Reply
Permalink
Post by Gremlin
Post by Brock McNuggets
They do not install themselves... just as in the lore for the Trojan
Horse. They use social engineering to get the user to install them.
Not entirely true. Some can self install via exploits.
That would make it more than just a Trojan, but fair enough that it might be
called that in such a listing. But I was purposely keeping things simple.

Below you go on about your ego and your insecurities. Please talk to your
therapist about such matters -- this is not the proper forum for you to get
that type of help.
Post by Gremlin
You really shouldn't give advice of a security wise nature when you know about
as much as David Brooks does concerning it.
You still haven't corrected him or commented that the article is wrong calling
a trojan a virus. There's no such thing as a trojan virus.
--
Specialist in unnecessary details and overcomplicated solutions.
Gremlin
2025-02-17 04:41:35 UTC
Reply
Permalink
Post by Brock McNuggets
Post by Gremlin
Post by Brock McNuggets
They do not install themselves... just as in the lore for the Trojan
Horse. They use social engineering to get the user to install them.
Not entirely true. Some can self install via exploits.
That would make it more than just a Trojan, but fair enough that it
might be called that in such a listing. But I was purposely keeping
things simple.
It wouldn't be more than just a trojan - the fact it used an exploit or two
in it's delivery system doesn't specialize it. It's still 'just trojan. I'm
curious what you mean by keeping things simple. I'd love to have a
reasonable adult conversation concerning malware and the specific versions
that exist as well as how they can enter a system without you having to
personally run them. If you're up for such a conversation, that is. You seem
to have the misguided notion that you would school me in this. I'd love the
opportunity to find out for myself.
Post by Brock McNuggets
Below you go on about your ego and your insecurities
You've been hitting the medicine cabinet again.
Post by Brock McNuggets
Post by Gremlin
You really shouldn't give advice of a security wise nature when you
know about as much as David Brooks does concerning it.
So far, to quote something you often like to say to me, What you've shown is
that you have about the same knowledge of malware as David Brooks does. Just
going by what you've shown.
Post by Brock McNuggets
Post by Gremlin
You still haven't corrected him or commented that the article is wrong
calling a trojan a virus. There's no such thing as a trojan virus.
Yea, you must be mixing some pharma grade stuff to take what I wrote and
twist that as having something to do with an ego or insecurities.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 05:25:19 UTC
Reply
Permalink
Post by Gremlin
Post by Brock McNuggets
Post by Gremlin
Post by Brock McNuggets
They do not install themselves... just as in the lore for the Trojan
Horse. They use social engineering to get the user to install them.
Not entirely true. Some can self install via exploits.
That would make it more than just a Trojan, but fair enough that it
might be called that in such a listing. But I was purposely keeping
things simple.
It wouldn't be more than just a trojan - the fact it used an exploit or two
in it's delivery system doesn't specialize it. It's still 'just trojan. I'm
curious what you mean by keeping things simple.
Ah, “keeping things simple.” This phrase, deceptively simple in itself, bears
an immense weight of history, cultural nuances, and philosophical
underpinnings. To truly grasp the meaning of “keeping things simple,” we must
embark on an intellectual pilgrimage through the ages, through the various
uses and misuses, the debates, and the contemplations on simplicity across
time. Hold onto your seat, as this is going to be a rather grand odyssey of
thought!

Ancient Greece: The Dawn of Simplicity

Let us begin in ancient Greece, that cradle of Western civilization, where the
idea of simplicity first emerged in a philosophical context. One might imagine
that the Greeks, known for their insatiable thirst for knowledge and debate,
would have had little patience for simplicity. After all, isn’t philosophy a
realm of complex reasoning, the interplay of ideas, and deep analysis? Yet,
here we find the first inklings of “keeping things simple” as a concept.

The great philosopher Socrates, known for his method of questioning, or what
we now call the Socratic method, often employed simplicity as a tool for
understanding. Rather than overcomplicating matters with convoluted reasoning,
Socrates would distill complex topics into their most basic forms by asking
simple questions. His goal? To get to the truth by cutting through the
complexity of human knowledge. In this way, “keeping things simple” was not
merely a tactic for efficiency but a means of intellectual purity. “Know
thyself” was his ultimate motto—a simple but profound reflection that invites
a deep understanding of the human condition, devoid of unnecessary complexity.

The Roman Empire: Simplicity in the Face of Vastness

As we march forward in time to the Roman Empire, we encounter a different kind
of simplicity. The Romans were practical people, with an empire sprawling
across continents, from the misty shores of Britannia to the sandy deserts of
Egypt. The phrase “keeping things simple” took on a more utilitarian meaning
in this context.

For the Romans, simplicity was about efficiency and pragmatism. Their
engineering marvels—roads, aqueducts, and monumental buildings—were built with
an eye toward simplicity in function. The Romans understood that complex
systems are only as good as their ability to serve the practical needs of the
populace. The famous Roman architect Vitruvius emphasized that good
architecture should follow three principles: firmness, commodity, and delight.
Simplicity was implicit in this triad—structures should be simple in their
utility, serving their purpose without unnecessary adornment or complexity.
And so, the phrase “keeping things simple” became aligned with the Roman
worldview: make things work, and do so without convoluted excess.

The Medieval Period: Simplicity as Humility

Fast-forward to the Middle Ages, and we encounter a shift in how “keeping
things simple” was understood. During this period, simplicity was not just a
matter of efficiency or intellect; it became an essential aspect of the
spiritual life. In a world dominated by the Catholic Church, simplicity was
often seen as a virtue tied to humility and devotion to God.

Saint Francis of Assisi, for example, renounced the comforts and luxuries of
his wealthy family to live a life of simplicity and poverty. For him,
simplicity wasn’t just about avoiding unnecessary complexity in daily life; it
was about living closer to God, shedding the distractions of worldly things to
focus on spiritual matters. His famous rule for his followers, “take nothing
with you except the bare necessities,” encapsulates the medieval ideal of
simplicity—not just in terms of material goods but in the soul’s relation to
the divine.

But this idea of simplicity as spiritual devotion was counterbalanced by the
Gothic cathedrals that began to rise in Europe during this same period. These
awe-inspiring structures were anything but simple. They were grand, complex,
and meant to inspire the viewer to contemplate the vastness and power of God.
Here, we see the tension between simplicity as a virtue and the desire for
transcendent beauty—a paradox that continues to define the human experience.

The Renaissance: Simplicity in Art and Science

The Renaissance ushered in an intellectual revival, and with it, a renewed
interest in classical simplicity. The great Leonardo da Vinci, with his blend
of art and science, embodied the Renaissance’s commitment to bringing together
the intellectual and the practical. For Leonardo, simplicity was not about
stripping things down, but about finding the essential truths that lay behind
the complexity of nature. His famous Vitruvian Man is a perfect example of
this approach: the human body, simplified to its most basic geometric
proportions, representing the harmony of nature’s design.

Similarly, Galileo Galilei and Isaac Newton brought simplicity to the
forefront of science. Their theories—whether it was the heliocentric model of
the universe or the laws of motion—were groundbreaking not only because of
their content but because of their elegance. They removed the unnecessary
complexities of previous models and distilled the natural world into simple,
clear principles. In the scientific realm, “keeping things simple” became
synonymous with discovering universal laws that govern the cosmos.

The Enlightenment: Simplicity in Reason

The Enlightenment of the 17th and 18th centuries was marked by a flowering of
intellectual thought, a period in which the phrase “keeping things simple”
took on new meaning. Thinkers like René Descartes and John Locke emphasized
reason, clarity, and logic above all else. Descartes’ famous dictum, “Cogito,
ergo sum” (“I think, therefore I am”), is a profound example of simplicity in
thought—it reduced the human experience to its most basic essence: the act of
thinking.

Yet, the Enlightenment also saw the rise of complicated philosophical
systems—theories of government, ethics, and knowledge that often stretched the
limits of human reason. Immanuel Kant, for example, developed complex ideas
about the mind’s role in shaping reality. In this context, the concept of
simplicity was a counterpoint to the growing complexity of intellectual
systems. The idea of simplicity in understanding became a hallmark of good
philosophy: a good philosopher sought to explain complex ideas in ways that
could be grasped by the common person.

The 19th and 20th Centuries: Simplicity as Modernism

In the 19th and early 20th centuries, simplicity was embraced by the Modernist
movement. Architects like Le Corbusier and artists like Pablo Picasso sought
to reduce forms to their most basic elements. For them, “keeping things
simple” meant rejecting ornamentation and tradition in favor of clean lines,
abstraction, and directness.

But here, too, simplicity came with its own complexities. As modern art and
design sought to simplify, they also challenged conventional notions of
beauty, structure, and purpose. The famous Bauhaus school in Germany
epitomized this ethos—designing functional objects and structures that were
stripped of excess and ornamentation. The motto of the Bauhaus was essentially
a plea for simplicity: “Form follows function.” But this, in itself, required
immense intellectual effort to reimagine the world of design in entirely new
terms.

The Present: Simplicity in Technology and Life

In our current age, “keeping things simple” is more relevant than ever,
especially in the context of technology. The rise of user-friendly interfaces
in computers and smartphones has made simplicity a cornerstone of modern
design. The guiding principle in tech is to create intuitive experiences that
allow users to navigate complex systems with ease. Steve Jobs, the visionary
behind Apple, famously championed the notion that “simplicity is the ultimate
sophistication.”

In everyday life, “keeping things simple” has become a philosophy for managing
the overwhelming complexity of modern existence. Minimalism, both as a
lifestyle choice and as a design philosophy, advocates for shedding the
unnecessary—whether it be possessions, commitments, or even thoughts—in order
to focus on what truly matters.

Conclusion: Simplicity, a Constant Search

At the core of all these philosophical, artistic, and practical inquiries lies
the same essential truth: “keeping things simple” is not about reducing life
to the trivial, but rather about stripping away distractions to reveal the
essence. Whether in philosophy, architecture, or technology, simplicity
remains a highly valued virtue—one that demands discipline, clarity, and,
above all, purpose.

So, what does “keeping things simple” mean? It means cutting through the noise
to find the heart of the matter, whether in thought, design, or daily living.
It is a lesson passed down through the centuries, from the ancient Greeks to
modern Silicon Valley, always reminding us that in the pursuit of
understanding, less can be so much more.
--
Specialist in unnecessary details and overcomplicated solutions.
Brock McNuggets
2025-02-17 05:42:12 UTC
Reply
Permalink
Post by Gremlin
I'd love to have a
reasonable adult conversation concerning malware and the specific versions
that exist as well as how they can enter a system without you having to
personally run them.
Versions that exist? Do you mean classifications? What do you think I know
that you do not? You claim to be an expert in the field. LOL!
Post by Gremlin
If you're up for such a conversation, that is. You seem
to have the misguided notion that you would school me in this. I'd love the
opportunity to find out for myself.
Huh? I noted a few VERY basic things. As have you. What the hell is wrong with
you and why is your ego ALWAYS front and center?
--
Specialist in unnecessary details and overcomplicated solutions.
Mike Easter
2025-02-16 19:44:39 UTC
Reply
Permalink
Post by David
Erasing one's hard drive SHOULD remove the Trojan!
If I understand your (in)security 'strategy'...

... you behave 'stupidly' ie recklessly online, opening spam
receptively, visiting strange websites, and 'yet' you proclaim to one
and all that using 3rd party AV such as ClamXAV is not appropriate or
necessary, while you DO regularly use it; and 'badmouth' such as
EtreCheck and its dev, while regularly or frequently employing it,

AND...

... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.

That plan is not nearly as good as *not* allowing spam in your inbox and
if spam DOES arrive in the inbox, deleting it unopened and unread, and
not venturing into weird websites where you are led by your browsing
history 'directing' you to those kinds of places when you are looking
for anything. Following links from one of your favorite pastimes,
namely YT is not necessarily a good practice.
--
Mike Easter
David
2025-02-16 21:13:27 UTC
Reply
Permalink
Post by Mike Easter
Post by David
Erasing one's hard drive SHOULD remove the Trojan!
If I understand your (in)security 'strategy'...
... you behave 'stupidly' ie recklessly online, opening spam
receptively, visiting strange websites, and 'yet' you proclaim to one
and all that using 3rd party AV such as ClamXAV is not appropriate or
necessary, while you DO regularly use it; and 'badmouth' such as
EtreCheck and its dev, while regularly or frequently employing it,
I have leared a great deal by my actions. I still cannot support the use
of EtreCheck when its developer has lied on LinkedIn and failed to
provide a proper postal address to the Canadian authorities.

Action on that is still in-hand.
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
Post by Mike Easter
That plan is not nearly as good as *not* allowing spam in your inbox and
if spam DOES arrive in the inbox, deleting it unopened and unread, and
not venturing into weird websites where you are led by your browsing
history 'directing' you to those kinds of places when you are looking
for anything.  Following links from one of your favorite pastimes,
namely YT is not necessarily a good practice.
My biggest concern is that whilst most sensible folk are wary of
following links in email and social media, when they are
seeking help and advice - in what they perceive to be a *SAFE* place,
the Apple Support Communities (ASC) forums - they won't hesitate to
click on a link provided by one of the resident 'gurus'!

Etresoft, the developer of EtreCheck, has even admitted in forum posts
that he has deliberately 'fudged' links which he has provided in order
to "keep things simple" for the naive enquirers! That is truly "Bad
Form" in my opinion.

Ask him if you don't believe me!
--
David
Shared with 'ucsm'!
Brock McNuggets
2025-02-16 21:19:14 UTC
Reply
Permalink
Post by David
Post by Mike Easter
Post by David
Erasing one's hard drive SHOULD remove the Trojan!
If I understand your (in)security 'strategy'...
... you behave 'stupidly' ie recklessly online, opening spam
receptively, visiting strange websites, and 'yet' you proclaim to one
and all that using 3rd party AV such as ClamXAV is not appropriate or
necessary, while you DO regularly use it; and 'badmouth' such as
EtreCheck and its dev, while regularly or frequently employing it,
I have leared a great deal by my actions. I still cannot support the use
of EtreCheck when its developer has lied on LinkedIn and failed to
provide a proper postal address to the Canadian authorities.
Action on that is still in-hand.
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
Post by Mike Easter
That plan is not nearly as good as *not* allowing spam in your inbox and
if spam DOES arrive in the inbox, deleting it unopened and unread, and
not venturing into weird websites where you are led by your browsing
history 'directing' you to those kinds of places when you are looking
for anything. Following links from one of your favorite pastimes,
namely YT is not necessarily a good practice.
My biggest concern is that whilst most sensible folk are wary of
following links in email and social media, when they are
seeking help and advice - in what they perceive to be a *SAFE* place,
the Apple Support Communities (ASC) forums - they won't hesitate to
click on a link provided by one of the resident 'gurus'!
Any example of that leading to a bad result?
Post by David
Etresoft, the developer of EtreCheck, has even admitted in forum posts
that he has deliberately 'fudged' links which he has provided in order
to "keep things simple" for the naive enquirers! That is truly "Bad
Form" in my opinion.
Ask him if you don't believe me!
--
Specialist in unnecessary details and overcomplicated solutions.
David
2025-02-16 23:25:05 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Mike Easter
Post by David
Erasing one's hard drive SHOULD remove the Trojan!
If I understand your (in)security 'strategy'...
... you behave 'stupidly' ie recklessly online, opening spam
receptively, visiting strange websites, and 'yet' you proclaim to one
and all that using 3rd party AV such as ClamXAV is not appropriate or
necessary, while you DO regularly use it; and 'badmouth' such as
EtreCheck and its dev, while regularly or frequently employing it,
I have leared a great deal by my actions. I still cannot support the use
of EtreCheck when its developer has lied on LinkedIn and failed to
provide a proper postal address to the Canadian authorities.
Action on that is still in-hand.
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
Post by Mike Easter
That plan is not nearly as good as *not* allowing spam in your inbox and
if spam DOES arrive in the inbox, deleting it unopened and unread, and
not venturing into weird websites where you are led by your browsing
history 'directing' you to those kinds of places when you are looking
for anything. Following links from one of your favorite pastimes,
namely YT is not necessarily a good practice.
My biggest concern is that whilst most sensible folk are wary of
following links in email and social media, when they are
seeking help and advice - in what they perceive to be a *SAFE* place,
the Apple Support Communities (ASC) forums - they won't hesitate to
click on a link provided by one of the resident 'gurus'!
Any example of that leading to a bad result?
Yes - but I'm not sure I can find it now. I'll let you know if I find it.
Post by Brock McNuggets
Post by David
Etresoft, the developer of EtreCheck, has even admitted in forum posts
that he has deliberately 'fudged' links which he has provided in order
to "keep things simple" for the naive enquirers! That is truly "Bad
Form" in my opinion.
Ask him if you don't believe me!
Brock McNuggets
2025-02-16 23:38:41 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
Post by Mike Easter
Post by David
Erasing one's hard drive SHOULD remove the Trojan!
If I understand your (in)security 'strategy'...
... you behave 'stupidly' ie recklessly online, opening spam
receptively, visiting strange websites, and 'yet' you proclaim to one
and all that using 3rd party AV such as ClamXAV is not appropriate or
necessary, while you DO regularly use it; and 'badmouth' such as
EtreCheck and its dev, while regularly or frequently employing it,
I have leared a great deal by my actions. I still cannot support the use
of EtreCheck when its developer has lied on LinkedIn and failed to
provide a proper postal address to the Canadian authorities.
Action on that is still in-hand.
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
Post by Mike Easter
That plan is not nearly as good as *not* allowing spam in your inbox and
if spam DOES arrive in the inbox, deleting it unopened and unread, and
not venturing into weird websites where you are led by your browsing
history 'directing' you to those kinds of places when you are looking
for anything. Following links from one of your favorite pastimes,
namely YT is not necessarily a good practice.
My biggest concern is that whilst most sensible folk are wary of
following links in email and social media, when they are
seeking help and advice - in what they perceive to be a *SAFE* place,
the Apple Support Communities (ASC) forums - they won't hesitate to
click on a link provided by one of the resident 'gurus'!
Any example of that leading to a bad result?
Yes - but I'm not sure I can find it now. I'll let you know if I find it.
Fair enough.
Post by David
Post by Brock McNuggets
Post by David
Etresoft, the developer of EtreCheck, has even admitted in forum posts
that he has deliberately 'fudged' links which he has provided in order
to "keep things simple" for the naive enquirers! That is truly "Bad
Form" in my opinion.
Ask him if you don't believe me!
--
Specialist in unnecessary details and overcomplicated solutions.
Kelly Phillips
2025-02-16 22:19:08 UTC
Reply
Permalink
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?

Those were good times. :)
David
2025-02-16 23:49:39 UTC
Reply
Permalink
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.

I was suggesting that malware can reside elsewhere within the physical
machine.

Please stick to the facts.
--
David
Kelly Phillips
2025-02-17 21:58:05 UTC
Reply
Permalink
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Post by David
Please stick to the facts.
David
2025-02-17 22:27:33 UTC
Reply
Permalink
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
a few examples:

1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.

2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.

3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.

4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.

5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.

6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.

These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
--
David
Passing on viw of ChatGPT
Mike Easter
2025-02-17 23:08:55 UTC
Reply
Permalink
Post by David
Malware *CAN* reside in places other than the main hard drive. Here are
In your world, there's a lot more 'magic' in your digital devices than
need be.

If your 'perception' is that what you 'see' is smoke and mirrors, it
must be pretty scary and/or confusing.
--
Mike Easter
T i m
2025-02-19 23:10:29 UTC
Reply
Permalink
Post by Mike Easter
Post by David
Malware *CAN* reside in places other than the main hard drive. Here
In your world, there's a lot more 'magic' in your digital devices than
need be.
If your 'perception' is that what you 'see' is smoke and mirrors, it
must be pretty scary and/or confusing.
He is probably 'shell shocked' from when someone dropped a bowl behind
him when he was peeling potatoes in the RN and why he is petrified of
everything.

"If you finish that lot by the end of your shift we will give you a ride
in an aeroplane".

T i m
David
2025-02-19 23:29:53 UTC
Reply
Permalink
Post by T i m
Post by Mike Easter
Post by David
Malware *CAN* reside in places other than the main hard drive. Here
In your world, there's a lot more 'magic' in your digital devices than
need be.
If your 'perception' is that what you 'see' is smoke and mirrors, it
must be pretty scary and/or confusing.
He is probably 'shell shocked' from when someone dropped a bowl behind
him when he was peeling potatoes in the RN and why he is petrified of
everything.
"If you finish that lot by the end of your shift we will give you a ride
in an aeroplane".
What a fertile imagination! :-P

"T i m" should write a book about his unfortunate life.

--
D.
Brock McNuggets
2025-02-17 23:30:32 UTC
Reply
Permalink
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…

1. Inside That One Sock That Always Disappears in the Laundry

You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.

2. The Unread Terms & Conditions of Every Website Ever

Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”

3. The Space Between Your Keyboard Keys

You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”

4. That USB Drive You Found in a Parking Lot

“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.

5. The Extra 0.01% on Every Battery Percentage

Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.

6. In Your Grandma’s Chain Emails

If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.

7. The Digital Equivalent of ‘Under the Couch’

Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”

8. Your Smart Fridge’s Ice Dispenser

“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.

9. Inside Your Printer’s Ink Cartridges

Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.

10. The “Close” Button on Fake Ads

You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.

11. The Unused ‘Caps Lock’ Key

No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.

12. Your Wi-Fi Router’s Mysterious Extra Guest Network

Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.

13. In Your Own Reflection on Your Screen

That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.

Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
--
Specialist in unnecessary details and overcomplicated solutions.
%
2025-02-18 00:11:35 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Brock McNuggets
2025-02-18 00:18:52 UTC
Reply
Permalink
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
--
Specialist in unnecessary details and overcomplicated solutions.
%
2025-02-18 00:25:11 UTC
Reply
Permalink
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
its a trick there's no plug
Brock McNuggets
2025-02-18 00:58:15 UTC
Reply
Permalink
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
its a trick there's no plug
I live on a street that says no outlets anyway.
--
Specialist in unnecessary details and overcomplicated solutions.
%
2025-02-18 01:51:31 UTC
Reply
Permalink
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
its a trick there's no plug
I live on a street that says no outlets anyway.
i saw where you live on tv a few days ago
Brock McNuggets
2025-02-18 01:55:48 UTC
Reply
Permalink
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
its a trick there's no plug
I live on a street that says no outlets anyway.
i saw where you live on tv a few days ago
I live on TV.
--
Specialist in unnecessary details and overcomplicated solutions.
%
2025-02-18 02:01:29 UTC
Reply
Permalink
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
its a trick there's no plug
I live on a street that says no outlets anyway.
i saw where you live on tv a few days ago
I live on TV.
i waved at you
Brock McNuggets
2025-02-18 02:41:51 UTC
Reply
Permalink
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by %
Post by Brock McNuggets
Post by David
Post by Kelly Phillips
Post by David
Post by Kelly Phillips
Post by David
Post by Mike Easter
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
I'm aware that you don't agree with my methodology - but it works! :-D
But does it REALLY work? Remember when you used to be extremely fearful
that wiping your drive didn't actually wipe every nook and cranny, and
that your malware could possibly "lurk" or "hide" (your words) in some
dark area of the drive, only to spring back to life at some time in the
future?
I did *NOT* specify *DRIVE* in that regard.
I don't think you have any idea what you've said. It's all good, though.
Post by David
I was suggesting that malware can reside elsewhere within the physical
machine.
Yes, I saw that, as well.
Malware *CAN* reside in places other than the main hard drive. Here are
1. **USB Drives and External Storage**: Malware can infect USB drives,
external hard drives, and SD cards. When these devices are plugged into
a computer, the malware can execute or copy itself onto the system.
2. **Firmware**: Some sophisticated malware targets the firmware of
devices like the BIOS or UEFI (Unified Extensible Firmware Interface).
It can persist through reboots and even OS reinstalls, making it harder
to remove.
3. **Network Devices**: Certain malware can be embedded in devices like
routers, network-attached storage (NAS) devices, or printers. These
devices may have weak security and can serve as entry points for the
malware to infect connected computers.
4. **RAM**: Some malware operates purely in the system's memory (RAM),
leaving no trace on the hard drive. This type of malware is often more
challenging to detect, as it can vanish after a reboot.
5. **Cloud Storage or Network Shares**: Malware can infect cloud storage
services or network shares. Once a device accesses these locations, it
may download or spread the infection to other systems.
6. **Bootable Media**: In some cases, malware can reside on bootable
media, such as CDs, DVDs, or even within boot sector code, and can
execute before the operating system even loads.
These types of malware often require different approaches to detection
and removal since traditional antivirus tools mainly focus on scanning
hard drives.
Oh, you think malware only hides in boring old files and shady downloads? Oh
no, my friend. If malware were truly devious, it would lurk in places no one
would ever suspect…
1. Inside That One Sock That Always Disappears in the Laundry
You thought it was eaten by the washing machine? Nope. That sock was recruited
by a cybercriminal to store malicious code in a fabric-based botnet. Every
missing sock? Part of the same dark web conspiracy.
2. The Unread Terms & Conditions of Every Website Ever
Malware hides in the fine print, knowing full well that no one is actually
reading it. Clause 47.8b clearly states: “By clicking ‘I agree,’ you grant
this malware permission to reorganize your desktop icons into an unholy mess.”
3. The Space Between Your Keyboard Keys
You ever drop a crumb between your keyboard keys and never find it again?
Yeah. It didn’t just fall—it was taken by malware that lives down there. At
night, it whispers “click here for free Bitcoin.”
4. That USB Drive You Found in a Parking Lot
“Oh cool, free USB drive!” WRONG. That thing is stuffed with malware so
malicious, even your toaster would get infected if you plugged it in. In fact,
the USB drive itself is sentient—and it wants to be plugged in.
5. The Extra 0.01% on Every Battery Percentage
Ever notice your phone stays at 100% for a suspiciously long time? Yeah,
that’s malware hoarding that last sliver of battery life for itself, using it
to mine crypto and play Minesweeper when you’re not looking.
6. In Your Grandma’s Chain Emails
If your grandma ever forwarded you an email that said “SEND THIS TO 10 PEOPLE
OR YOUR DOG WILL LEARN TO TYPE”—congratulations! That email contained ancient
malware so old, it runs on MS-DOS but still manages to steal your passwords.
7. The Digital Equivalent of ‘Under the Couch’
Just like lost TV remotes and potato chips, malware hides in the digital void
of your hard drive, chilling in unused sectors and occasionally emerging to
whisper “your warranty is expired.”
8. Your Smart Fridge’s Ice Dispenser
“Why does the ice taste funny?” Because your smart fridge has been hacked and
is now sending encrypted spam emails through its crushed ice function. Also,
it keeps ordering way too much mayonnaise for no reason.
9. Inside Your Printer’s Ink Cartridges
Your printer refuses to work even though there’s plenty of ink left? That’s
malware, siphoning off microscopic droplets of ink to fund its underground
operation. Every paper jam is just it trying to assert dominance.
10. The “Close” Button on Fake Ads
You think you’re escaping, but nope—that fake “X” button is actually a portal
to malware town. Clicking it installs a toolbar that won’t go away and starts
calling you by your first name, which is unsettling.
11. The Unused ‘Caps Lock’ Key
No one ever presses it on purpose. So malware just lives there, rent-free,
waiting for the moment you accidentally hit it so it can shout: BUY A VPN OR
ELSE in all caps.
12. Your Wi-Fi Router’s Mysterious Extra Guest Network
Why does your Wi-Fi have an extra network called “ClickHereForFreeInternet”?
Because malware is now running its own side business selling stolen bandwidth
to confused neighbors and pigeons with internet access.
13. In Your Own Reflection on Your Screen
That’s not you. That’s malware impersonating you, making you question reality
while it quietly drains your PayPal account and makes all your emails end with
“Sent from my iPhone” even when you don’t have one.
Moral of the story? Malware is everywhere. Even in places you wouldn’t
suspect. Stay safe out there, and if your fridge starts demanding ransom
payments… just unplug it.
that's the box on the porch , right
Yes. Glad you understand.
its a trick there's no plug
I live on a street that says no outlets anyway.
i saw where you live on tv a few days ago
I live on TV.
i waved at you
That's the microwave.
--
Specialist in unnecessary details and overcomplicated solutions.
FromTheRafters
2025-02-16 19:57:59 UTC
Reply
Permalink
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware. If someone
was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
*Understanding Trojan Viruses and How to Get Rid of Them*
Trojan virus is a misnomer. Trojans don't replicate, viruses and worms
do.
Mike Easter
2025-02-16 20:14:35 UTC
Reply
Permalink
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
Trojan virus is a misnomer. Trojans don't replicate, viruses and worms do.
That nomenclature problem arises from the 'common practice' (by some) of
referring to all malware as 'viruses'.

And while by some def, trojans don't replicate, by their link to a
'control' they can certainly do some very powerful things, such as what
happens in ransomware.
--
Mike Easter
FromTheRafters
2025-02-16 21:47:16 UTC
Reply
Permalink
Post by Mike Easter
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
Trojan virus is a misnomer. Trojans don't replicate, viruses and worms do.
That nomenclature problem arises from the 'common practice' (by some) of
referring to all malware as 'viruses'.
And while by some def, trojans don't replicate, by their link to a 'control'
they can certainly do some very powerful things, such as what happens in
ransomware.
All true, but it is saddening to see the experts mislabeling things. I
know that they call most ransomware 'cryptovirology' even though it
might not have any replication in its lifecycle. The word virus is just
lodged in the psyche I guess.
%
2025-02-16 22:03:27 UTC
Reply
Permalink
Post by FromTheRafters
Post by Mike Easter
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
Trojan virus is a misnomer. Trojans don't replicate, viruses and worms do.
That nomenclature problem arises from the 'common practice' (by some)
of referring to all malware as 'viruses'.
And while by some def, trojans don't replicate, by their link to a
'control' they can certainly do some very powerful things, such as
what happens in ransomware.
All true, but it is saddening to see the experts mislabeling things. I
know that they call most ransomware 'cryptovirology' even though it
might not have any replication in its lifecycle. The word virus is just
lodged in the psyche I guess.
i do that with everything i call it what i was told it is and now its not
David
2025-02-16 20:51:44 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what good
erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware. If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
*Understanding Trojan Viruses and How to Get Rid of Them*
Trojan virus is a misnomer. Trojans don't replicate, viruses and worms do.
I agree. You taught me that many years ago! :-)

One reason I'd never use McAfee again!
--
David
Gremlin
2025-02-17 01:26:04 UTC
Reply
Permalink
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what
good erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware. If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
FFS, You should have verified it wasn't a false positive before you took
such drastic measures.
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
Find yourself another article to read. There's no such thing as a trojan
virus, David.
Post by David
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-
rid-of-them/
Mcafee should be ashamed of themselves. I get dumbing things down for people,
but holy shit, let's not make them fucking stupid in the process. Again,
there is no such thing as a trojan virus. A trojan and a virus are not the
same beastie. A virus can have a payload, or multiple payloads, but this
doesn't turn it into a trojan. It's still very much a virus, because it self
replicates. Trojans do not.
Post by David
Erasing one's hard drive SHOULD remove the Trojan! ;-)
That's the same line of thought as throwing the baby out with the bath water.
It's counter productive and solves nothing.
Plus, you may have had a false positive. You should always confirm before
you take any action. You should not be advising anyone on how to care for
their machine when security of it is concerned; You do NOT know what the
fuck you are doing. You might as well be more like snit, open up a computer
repair shop and fuck your clients gear up enough that another shop offers a
David discount. <G>
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 01:43:04 UTC
Reply
Permalink
Post by Gremlin
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what
good erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware. If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
FFS, You should have verified it wasn't a false positive before you took
such drastic measures.
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
Find yourself another article to read. There's no such thing as a trojan
virus, David.
Post by David
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-
rid-of-them/
Mcafee should be ashamed of themselves. I get dumbing things down for people,
but holy shit, let's not make them fucking stupid in the process. Again,
there is no such thing as a trojan virus. A trojan and a virus are not the
same beastie. A virus can have a payload, or multiple payloads, but this
doesn't turn it into a trojan. It's still very much a virus, because it self
replicates. Trojans do not.
Post by David
Erasing one's hard drive SHOULD remove the Trojan! ;-)
That's the same line of thought as throwing the baby out with the bath water.
It's counter productive and solves nothing.
Plus, you may have had a false positive. You should always confirm before
you take any action. You should not be advising anyone on how to care for
their machine when security of it is concerned; You do NOT know what the
fuck you are doing. You might as well be more like snit, open up a computer
repair shop and fuck your clients gear up enough that another shop offers a
David discount. <G>
You’re right that a Trojan and a virus are different, and blindly wiping a
hard drive without confirming a threat is overkill. But let’s not pretend that
ClamXAV (or any AV) is infallible—false positives happen, and verifying is
key.

That said, tossing in a jab about me just shows you’re more interested in
taking cheap shots than discussing security properly. If you’ve got a real
point to make, stick to it. Otherwise, you’re just making noise.
--
Specialist in unnecessary details and overcomplicated solutions.
pothead
2025-02-17 15:07:00 UTC
Reply
Permalink
Post by Gremlin
Post by David
Post by Brock McNuggets
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Didn't that come from an email? And it was quarantined. Not sure what
good erasing the hard drive will do.
Regardless of where it came from, ClamXAV reported it as malware. If
someone was/is using an Apple computer WITHOUT such an anti-malware
software running, they'd nver know that a Trojan had been installed on
their computer.
FFS, You should have verified it wasn't a false positive before you took
such drastic measures.
Post by David
*Understanding Trojan Viruses and How to Get Rid of Them*
Find yourself another article to read. There's no such thing as a trojan
virus, David.
Post by David
https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-
rid-of-them/
Mcafee should be ashamed of themselves. I get dumbing things down for people,
but holy shit, let's not make them fucking stupid in the process. Again,
there is no such thing as a trojan virus. A trojan and a virus are not the
same beastie. A virus can have a payload, or multiple payloads, but this
doesn't turn it into a trojan. It's still very much a virus, because it self
replicates. Trojans do not.
Post by David
Erasing one's hard drive SHOULD remove the Trojan! ;-)
That's the same line of thought as throwing the baby out with the bath water.
It's counter productive and solves nothing.
Plus, you may have had a false positive. You should always confirm before
you take any action. You should not be advising anyone on how to care for
their machine when security of it is concerned; You do NOT know what the
fuck you are doing. You might as well be more like snit, open up a computer
repair shop and fuck your clients gear up enough that another shop offers a
David discount. <G>
David could call the business "Jack The Ripper's Computer Repair". Their slogan could be
"Once we fix a computer it's fixed forever".
--
pothead

Why did Joe Biden pardon his family?
Read below to learn the reason.
The Biden Crime Family Timeline here:
https://oversight.house.gov/the-bidens-influence-peddling-timeline/
H***@invalid.com
2025-02-16 22:04:08 UTC
Reply
Permalink
Post by Mike Easter
Post by David
Erasing one's hard drive SHOULD remove the Trojan!
If I understand your (in)security 'strategy'...
... you behave 'stupidly' ie recklessly online, opening spam
receptively, visiting strange websites, and 'yet' you proclaim to one
and all that using 3rd party AV such as ClamXAV is not appropriate or
necessary, while you DO regularly use it; and 'badmouth' such as
EtreCheck and its dev, while regularly or frequently employing it,
AND...
... your most frequently used anti-malware tactic is to 'regularly'
erase your hdd and reinstall from scratch.
That plan is not nearly as good as *not* allowing spam in your inbox and
if spam DOES arrive in the inbox, deleting it unopened and unread, and
not venturing into weird websites where you are led by your browsing
history 'directing' you to those kinds of places when you are looking
for anything. Following links from one of your favorite pastimes,
namely YT is not necessarily a good practice.
--
Mike Easter
You do know your complaints merely feed this asshole's profoundly
oversized narcissistic ego. Right?

What happens when you don't kill file this a-wipe is that commonsense
is overcome with churned up disgust with this sicko's deliberately
insane posts.
Mike Easter
2025-02-16 22:30:59 UTC
Reply
Permalink
Post by H***@invalid.com
You do know your complaints merely feed this asshole's profoundly
oversized narcissistic ego. Right?
My analysis of the defects and limitations of the BDB persona continues
to evolve.
Post by H***@invalid.com
What happens when you don't kill file this a-wipe is that commonsense
is overcome with churned up disgust with this sicko's deliberately
insane posts.
How his 'deliberation' actually works is somewhat of a puzzle. I
certainly don't think it is as simple as:
- narcissism
- deliberate insanity (or stupidity, foolishness, 'inverse' trolling)

I also don't find commonsense 'overcome'; as BDB and /his/ msg/s can't
'overcome' anything.

So far, one of the most annoying things about the content of BDB's msg/s
is his recent enchantment and deathgrip embrace of chatgpt; that has
indeed brought me to the brink of his disappearing from my thread pane.
--
Mike Easter
T i m
2025-02-21 14:18:42 UTC
Reply
Permalink
Post by Mike Easter
Post by H***@invalid.com
You do know your complaints merely feed this asshole's profoundly
oversized narcissistic ego. Right?
My analysis of the defects and limitations of the BDB persona continues
to evolve.
But what they are evolving (to the foregone conclusion), you are still
encourage all his trolling and madness. You aren't helping him.
Post by Mike Easter
Post by H***@invalid.com
What happens when you don't kill file this a-wipe is that commonsense
is overcome with churned up disgust with this sicko's deliberately
insane posts.
How his 'deliberation' actually works is somewhat of a puzzle. I
 - narcissism
 - deliberate insanity (or stupidity, foolishness, 'inverse' trolling)
But even if none are deliberate (and he has stated himself that many of
them are), you are encouraging him with any level of reply / conversation.
Post by Mike Easter
I also don't find commonsense 'overcome'; as BDB and /his/ msg/s can't
'overcome' anything.
You can't rationalise with the irrational.
Post by Mike Easter
So far, one of the most annoying things about the content of BDB's msg/s
is his recent enchantment and deathgrip embrace of chatgpt;
Unfortunately ChatGPT is the nearest thing he has simulating the idea
that he has a brain. He recites it's nonsense because he has nothing
himself.
Post by Mike Easter
that has
indeed brought me to the brink of his disappearing from my thread pane.
And should be way over the brink by now (hopefully).

He is also a trolling coward and in denial. At least you are willing to
confess and take responsibility for your actions.

Cheers, T i m
Mike Easter
2025-02-21 17:41:52 UTC
Reply
Permalink
you are still encourage all his trolling and madness. You aren't helping
him.
What you might do to mitigate your aggravation, besides filtering BDB
out of your thread pane view, in terms of my msg/s is to employ a tactic
I have often used, particularly in the case of the Snit-SC wars in the
past was: whenever I opened a msg from either of those posters and the
msg was a reply to the other, I ignored the content of the msg and moved
on.

Then, for a while, I completely algorithmically ignored all of both of
their msg/s by deleting them unseen; because Tb doesn't have the ability
to 'granularly' score a message or use wildcards.

Another strategy I have considered for the weakness of Tb involves the
use of a powerful filter *before* Tb. Back in the old days when I was
'principally' Win and using Outlook Express, I employed several
different 3rd party tools because of its many deficiencies; OE-QuoteFix,
SpamPal, NFilter/NewsProxy.

The ideal 'pre-agent' filter is powerful in that it can look at the
content of the msg body as part of its filtration process and filter out
based on that content and not allow it into Tb's threadpane.

Tb couldn't possibly do that even if its filters were more powerful,
because the content of the thread pane is based on what Tb gets from the
overview content of the msg, which is a subset of the /headers/ only.
--
Mike Easter
T i m
2025-02-21 20:44:53 UTC
Reply
Permalink
Post by Mike Easter
you are still encourage all his trolling and madness. You aren't
helping him.
What you might do to mitigate your aggravation
<snip whooshage>

It's not the inconvenience to me I was commenting on, it was the
futility of / for *you* trying to rationalise with the fool / troll /
physco.

You keep threatening to fully KF the troll but as yet, don't seem to
have done so. Why not, what are you waiting for?

What do you think is going to change for the better ... he gets therapy
or stops being arrogant and entitled, starts to recognise real threats
and be able to differentiate them from innocent people (and plain weird)
and so stop harassing them?

Any conversation with the troll simply gives him and his crazy thoughts
some level of credence when he obviously deserves none.

Unless you actually relish dealing with him and his BS?

Cheers, T i m
%
2025-02-21 20:49:42 UTC
Reply
Permalink
Post by T i m
Post by Mike Easter
you are still encourage all his trolling and madness. You aren't
helping him.
What you might do to mitigate your aggravation
<snip whooshage>
It's not the inconvenience to me I was commenting on, it was the
futility of / for *you* trying to rationalise with the fool / troll /
physco.
You keep threatening to fully KF the troll but as yet, don't seem to
have done so. Why not, what are you waiting for?
What do you think is going to change for the better ... he gets therapy
or stops being arrogant and entitled, starts to recognise real threats
and be able to differentiate them from innocent people (and plain weird)
and so stop harassing them?
Any conversation with the troll simply gives him and his crazy thoughts
some level of credence when he obviously deserves none.
Unless you actually relish dealing with him and his BS?
Cheers, T i m
but why are you getting picked on
Mike Easter
2025-02-21 21:04:01 UTC
Reply
Permalink
Post by T i m
What do you think is going to change for the better
You are currently spending much more time and space and keystrokes
talking about BDB than I.

It reminds me of the time I had to ignore both Snit and SC because
neither of them would stop stressing the group over the other and I was
finding myself trying to get at least one of them to stop that.

The number of reasons that *you* should/could at least slip into the/my
'read' category, making your msg/s /less likely/ to be read by me are
mounting:
- you are too marrow-minded and intolerant in your own animal-related
belief system
- you are too sensitive to the things that are wrong w/ BDB which
trigger commentary
- you invite/instigate my criticisms of your msg/s which are as
useless as you claim my criticisms of BDB behaviors are
--
Mike Easter
T i m
2025-02-21 21:51:16 UTC
Reply
Permalink
Post by Mike Easter
Post by T i m
What do you think is going to change for the better
You are currently spending much more time and space and keystrokes
talking about BDB than I.
About, possibly, to, defiantly not (and the problem).
Post by Mike Easter
It reminds me of the time I had to ignore both Snit and SC because
neither of them would stop stressing the group over the other and I was
finding myself trying to get at least one of them to stop that.
That was sorted for me by putting them both in my killfile. Ironically
the one I wsh I didn't have to (for the reasons you state) is SC.
Post by Mike Easter
The number of reasons that *you* should/could at least slip into the/my
'read' category, making your msg/s /less likely/ to be read by me are
This is likely to say more about you than me ...
Post by Mike Easter
 - you are too marrow-minded and intolerant in your own animal-related
belief system
Ah yes, just as I thought. I don't support animal exploitation,
suffering and death (nothing to do with beliefs, all to do with real
world fact) and you actively promote it (even with your own pets and
animals that 'annoy you').

I wonder which of us has the moral high ground here? I wonder which of
us will be on the right side of history?
Post by Mike Easter
 - you are too sensitive to the things that are wrong w/ BDB which
trigger commentary
IYO of course. The facts are that I'm only offering you chance to avoid
my killfile by not promoting that particular trolls trolling. I'm not
alone in that.
Post by Mike Easter
 - you invite/instigate my criticisms of your msg/s which are as
useless as you claim my criticisms of BDB behaviors are
Nearly. What I do is question your support of a self confessed troll and
weirdo and *your* repeated threats to KF the freak but not actually
doing so.

Cheers, T i m
T***@no-googling.com
2025-02-16 22:20:25 UTC
Reply
Permalink
I got rid of all that intrusive and fail-to-deliver Security
programming junk years back.
I use a very simple program that puts my computer in a virtual mode.
Nothing downloaded during a session actually is copied to my C:
drive. I use no anti virus nor any other "security" program except
for Windows firewall to keep some programs from phoning home.

Online life has gotten so simple since starting this method years
back.
Mike Easter
2025-02-17 00:47:08 UTC
Reply
Permalink
He's an insecure flubup who*must* be noticed and in control.
While that may be true, that doesn't 'disqualify' the content of his
messages from being fodder for more rational discussion.

IMO, BDB doesn't 'control' what content follows the critique of him, his
persona and his apparent foolishness.

I suppose you could consider the court jester's performance before the
king to 'suggest' that the jester is in control, but I don't see it that
way.
--
Mike Easter
Gremlin
2025-02-17 01:26:01 UTC
Reply
Permalink
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Based on the content of your screenshot, you more than slightly over reacted.
It posed no real threat to you, and wiping your machine wasn't necessary.
Trojans are not viruses or worms. They do not self replicate.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 01:45:48 UTC
Reply
Permalink
Post by Gremlin
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Based on the content of your screenshot, you more than slightly over reacted.
It posed no real threat to you, and wiping your machine wasn't necessary.
Trojans are not viruses or worms. They do not self replicate.
Good to see you agree with what I have told him.
--
Specialist in unnecessary details and overcomplicated solutions.
Gremlin
2025-02-17 04:41:38 UTC
Reply
Permalink
Post by Brock McNuggets
Post by Gremlin
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Based on the content of your screenshot, you more than slightly over
reacted. It posed no real threat to you, and wiping your machine wasn't
necessary. Trojans are not viruses or worms. They do not self
replicate.
Good to see you agree with what I have told him.
As I made perfectly clear to all who can read, I based my comments on the
screenshot he shared. Not what anyone wrote. I haven't made it thru all of
your posts yet, and, I have no plans on wasting the time to do so. You
attacked me for repeating what FromTheRafters already told him, a
considerable time before I did. You wrote nothing to FTR about that,
though. You singled me out for telling David the same fucking thing. You
attacked me for being pendantic (sp?) concerning the differences. Going so
far as to state I was nitpicking. Crickets to FTRs comment and Mikes
followup along with FTRs followup to Mike Easter. Oh, but I say the same
fucking thing, later on, I'm the bad guy. I shouldn't be 'smug' towards
David. I wasn't being smug, you illiterate shitstain on the underwear of
life.

I hadn't read all of your replies to him at the time I wrote that, either.
So if by chance we agreed on the most basic of all possible information to
provide him, great. Does that mean you actually know much about the
subject without having to use google? Hahaha, highly doubtful.
--
I don't need no Dr. All I need...is my lawyer.
Brock McNuggets
2025-02-17 05:21:21 UTC
Reply
Permalink
Post by Gremlin
Post by Brock McNuggets
Post by Gremlin
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Based on the content of your screenshot, you more than slightly over
reacted. It posed no real threat to you, and wiping your machine wasn't
necessary. Trojans are not viruses or worms. They do not self
replicate.
Good to see you agree with what I have told him.
As I made perfectly clear to all who can read, I based my comments on the
screenshot he shared.
As did I. Likely why we reached similar conclusions. None of this was that
deep.
Post by Gremlin
Not what anyone wrote.
Maybe. Maybe not. Who cares?
Post by Gremlin
I haven't made it thru all of
your posts yet,
To busy writing your ego-filled manifestos. Sure.
Post by Gremlin
and, I have no plans on wasting the time to do so. You
attacked me
Your victim mentality is showing again.
Post by Gremlin
for repeating what FromTheRafters already told him, a
considerable time before I did. You wrote nothing to FTR about that,
though. You singled me out for telling David the same fucking thing.
I noted we agreed. Get her it.
Post by Gremlin
You
attacked me for being pendantic (sp?) concerning the differences. Going so
far as to state I was nitpicking. Crickets to FTRs comment and Mikes
followup along with FTRs followup to Mike Easter. Oh, but I say the same
fucking thing, later on, I'm the bad guy. I shouldn't be 'smug' towards
David. I wasn't being smug, you illiterate shitstain on the underwear of
life.
I hadn't read all of your replies to him at the time I wrote that, either.
So if by chance we agreed on the most basic of all possible information to
provide him, great. Does that mean you actually know much about the
subject without having to use google? Hahaha, highly doubtful.
Your ego is showing again.
--
Specialist in unnecessary details and overcomplicated solutions.
Steve Carroll
2025-02-17 17:18:26 UTC
Reply
Permalink
Post by Gremlin
Post by Brock McNuggets
Post by Gremlin
Post by David
This is a screenshot:-
https://i.ibb.co/HLgy7hNf/Screenshot-2025-02-11-at-10-07-47.png
I've erased my hard drive, just in case!
Based on the content of your screenshot, you more than slightly over
reacted. It posed no real threat to you, and wiping your machine wasn't
necessary. Trojans are not viruses or worms. They do not self
replicate.
Good to see you agree with what I have told him.
As I made perfectly clear to all who can read, I based my comments on the
screenshot he shared. Not what anyone wrote.
The way any sensible person would. That, as opposed to those who *claim*
to be anti-consensus, yet, rarely miss a chance to find it 'Good to see'
people agreeing with them, as if that gave them some sort of validation.

Notably, Glasser didn't write: 'Good to see you agree with the facts'.

He doesn't even realize when he's doing it. He'll call this an "attack"
but it's just an observation of what he did here (and has for years).

I suspect part of this comes from his apparent belief that when he
writes something, it's automatically an established fact in his mind...
at least, that's the 'sales' pitch... who knows if he believes it.

(cue up the usual attempts to 'shine the light elsewhere' by GoOfy)
H***@invalid.com
2025-02-17 04:17:49 UTC
Reply
Permalink
Post by Mike Easter
He's an insecure flubup who*must* be noticed and in control.
While that may be true, that doesn't 'disqualify' the content of his
messages from being fodder for more rational discussion.
There is no rationality in discussing anything with him. No matter
how experienced or knowledgeable is the one replying to his post, he
merely bears down on the designed "problem" he has "found" with that
specific software. His game never changes.
Post by Mike Easter
IMO, BDB doesn't 'control' what content follows the critique of him, his
persona and his apparent foolishness.
I suppose you could consider the court jester's performance before the
king to 'suggest' that the jester is in control, but I don't see it that
way.
A court jester entertained the king and his cohorts. The BigDumb does
not entertain any one. He exasperates those who reply to his nonsense
when they find they cannot obtain any amount of clarity through
discussion with him. He is an expert at planning a closed
"discussion" wherein only his surreptitiously designed "problem"
prevails.
Post by Mike Easter
--
Mike Easter
- Haley -
Loading...