安装 Steam
登录
|
语言
繁體中文(繁体中文)
日本語(日语)
한국어(韩语)
ไทย(泰语)
български(保加利亚语)
Čeština(捷克语)
Dansk(丹麦语)
Deutsch(德语)
English(英语)
Español-España(西班牙语 - 西班牙)
Español - Latinoamérica(西班牙语 - 拉丁美洲)
Ελληνικά(希腊语)
Français(法语)
Italiano(意大利语)
Bahasa Indonesia(印度尼西亚语)
Magyar(匈牙利语)
Nederlands(荷兰语)
Norsk(挪威语)
Polski(波兰语)
Português(葡萄牙语 - 葡萄牙)
Português-Brasil(葡萄牙语 - 巴西)
Română(罗马尼亚语)
Русский(俄语)
Suomi(芬兰语)
Svenska(瑞典语)
Türkçe(土耳其语)
Tiếng Việt(越南语)
Українська(乌克兰语)
报告翻译问题
Low-Level "nuke it from orbit."
Though, I'd get whatever pics and plain-text you could off of it - You don't have to be brutal, just memorable and instructive. :) Just don't tell him and break it out later when he's done sulking.
Don't allow a darn other thing on the network to accept a connection from his machine, though...
"I'm sorry, but your connection attempt to "Family Movie Archive" at "Home Network" has been refused. Pool's closed."
Some early virii took advantage of the OS hiding the file extension by default and getting people to click an executable script by using a false file extension with the real one hidden.
https://www.youtube.com/watch?v=NZDiQczOsdc
And, of course, Spy Pixels in email are still a problem for clients that display embeds automatically.
They can't...until they can. :)
Just from memory, one famous "image" format that could be used to carry bad-stuff was .png. That was years ago, though. But, a lot of image formats are not necessarily just "image" formats. The most infamous, in the past, is the .ico. Then, there's file types that are capable of displaying an internal thumbnail so that they look like an image. The most common of those that's corrupted is .iso, I think.
And, ALL commercial proprietary formats like anything from Adobe or Microsoft are always suspect until they are cleared. (pdf, .doc, etc) The .pdf script exploiting was rampant in the old days.
Oh, and the old trick of hiding an ico, iso, dll, in a RAR or ZIP... WinRar at least allowed users to select to unpack executables or block them.
Also -
Files can contain things that the OS will act on in unusual ways that may expose it to vulnerabilities. There was an exploit years ago involving UTF/Unicode encoding being used for meta info in image formats, for instance. The standard Windows OS is designed to access that, but when dealing with trying to parse certain text encoding schemes, it would open up the system to further attacks and vulnerabilities. So, while not a direct piece of malware, that's an example of something being used to make a system vulnerable to other malware that is active or could be activated.
In essence, an innocent .jpg of a puppy could have UTF-16 (IIRC) in the meta-info that would trigger a stack overlfow/memory exploit that some other piece of software was waiting on to then exploit. Tricksey. (Since fix't)
ie: Ain't no place safe, so we may as well just give up and let the sharks eat us...
Good call. He'll be thankful for that and it's a good "Dad" move. :)
You are absolutely correct.
A couple of days ago I read a very in-depth article about this. Sorry I can't remember the link.
The issue was that while the up-and-coming generation can Google very efficiently and can even make great pics with AI generators or write papers with ChatGPT... they don't really know "why" or "how" any of that works.
It's like being a great race-car driver, but not knowing how to change the oil in an automobile.
https://www.virustotal.com/gui/url/e50e15c9bbe4b0eee15d2c3f441a31904104a82becf5cda3e206560afc37063d
It's detected by virustotal as a PHISHING site
change password and secure the account - if the kid entered their password / logged in, then the scammers are already in the account
https://www.youtube.com/watch?v=g01_MH5O_J8