Thread: tl;dr:
View Single Post
  #4  
Old May 20th 18, 12:02 PM posted to alt.computer.workshop, comp.sys.mac.system, comp.sys.mac.misc, alt.comp.os.windows-10, alt.uk.law
Wolffan
external usenet poster
 
Posts: 20
Default tl;dr:

On 20 May 2018, David B. wrote
(in article ):

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?


Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.


That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:


Gee, trollboy, weren’t you bloviating about how it might have been an
eeeeevil malware script which might/might not have been dropped onto your
system by that well-known (to you, anyway) malware distribution tool
EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and
how _that_ is an even greater eeeeevil malware distribution tool. You’re a
lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic,
too.

Ads