Инсталирайте Steam
вход
|
език
Опростен китайски (简体中文)
Традиционен китайски (繁體中文)
Японски (日本語)
Корейски (한국어)
Тайландски (ไทย)
Чешки (Čeština)
Датски (Dansk)
Немски (Deutsch)
Английски (English)
Испански — Испания (Español — España)
Испански — Латинска Америка (Español — Latinoamérica)
Гръцки (Ελληνικά)
Френски (Français)
Италиански (Italiano)
Индонезийски (Bahasa Indonesia)
Унгарски (Magyar)
Холандски (Nederlands)
Норвежки (Norsk)
Полски (Polski)
Португалски (Português)
Бразилски португалски (Português — Brasil)
Румънски (Română)
Руски (Русский)
Финландски (Suomi)
Шведски (Svenska)
Турски (Türkçe)
Виетнамски (Tiếng Việt)
Украински (Українська)
Докладване на проблем с превода
Low-Level "nuke it from orbit."
Though, I'd get whatever pics and plain-text you could off of it - You don't have to be brutal, just memorable and instructive. :) Just don't tell him and break it out later when he's done sulking.
Don't allow a darn other thing on the network to accept a connection from his machine, though...
"I'm sorry, but your connection attempt to "Family Movie Archive" at "Home Network" has been refused. Pool's closed."
Some early virii took advantage of the OS hiding the file extension by default and getting people to click an executable script by using a false file extension with the real one hidden.
https://www.youtube.com/watch?v=NZDiQczOsdc
And, of course, Spy Pixels in email are still a problem for clients that display embeds automatically.
They can't...until they can. :)
Just from memory, one famous "image" format that could be used to carry bad-stuff was .png. That was years ago, though. But, a lot of image formats are not necessarily just "image" formats. The most infamous, in the past, is the .ico. Then, there's file types that are capable of displaying an internal thumbnail so that they look like an image. The most common of those that's corrupted is .iso, I think.
And, ALL commercial proprietary formats like anything from Adobe or Microsoft are always suspect until they are cleared. (pdf, .doc, etc) The .pdf script exploiting was rampant in the old days.
Oh, and the old trick of hiding an ico, iso, dll, in a RAR or ZIP... WinRar at least allowed users to select to unpack executables or block them.
Also -
Files can contain things that the OS will act on in unusual ways that may expose it to vulnerabilities. There was an exploit years ago involving UTF/Unicode encoding being used for meta info in image formats, for instance. The standard Windows OS is designed to access that, but when dealing with trying to parse certain text encoding schemes, it would open up the system to further attacks and vulnerabilities. So, while not a direct piece of malware, that's an example of something being used to make a system vulnerable to other malware that is active or could be activated.
In essence, an innocent .jpg of a puppy could have UTF-16 (IIRC) in the meta-info that would trigger a stack overlfow/memory exploit that some other piece of software was waiting on to then exploit. Tricksey. (Since fix't)
ie: Ain't no place safe, so we may as well just give up and let the sharks eat us...
Good call. He'll be thankful for that and it's a good "Dad" move. :)
You are absolutely correct.
A couple of days ago I read a very in-depth article about this. Sorry I can't remember the link.
The issue was that while the up-and-coming generation can Google very efficiently and can even make great pics with AI generators or write papers with ChatGPT... they don't really know "why" or "how" any of that works.
It's like being a great race-car driver, but not knowing how to change the oil in an automobile.
https://www.virustotal.com/gui/url/e50e15c9bbe4b0eee15d2c3f441a31904104a82becf5cda3e206560afc37063d
It's detected by virustotal as a PHISHING site
change password and secure the account - if the kid entered their password / logged in, then the scammers are already in the account
https://www.youtube.com/watch?v=g01_MH5O_J8