Thread: tl;dr:
View Single Post
  #7  
Old May 21st 18, 08:02 AM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
David B.[_7_]
external usenet poster
 
Posts: 195
Default tl;dr:

On 20-May-18 12:02 PM, Wolffan wrote:
On 20 May 2018, David B. wrote
(in article ):

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?

Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.


That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:


Gee, trollboy, weren’t you bloviating about how it might have been an
eeeeevil malware script which might/might not have been dropped onto your
system by that well-known (to you, anyway) malware distribution tool
EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and
how _that_ is an even greater eeeeevil malware distribution tool. You’re a
lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic,
too.


Good morning, 'sock' - how sad it is that you feel a need to hide your
identity. :-(

People who do so invariable raise my suspicions about them. What this
means, in effect, is that visitors to the Apple Support Communities have
to put their complete faith and trust into what is said by, effectively,
complete strangers. From what I have already determined, advice given is
not necessarily checked by Apple staff.

Why the 'Hosts' chose to delete the whole discussion about ClamXav
intrigued me. It wasn't 'logical' as Spock might have said. The
developer of ClamXav, if genuine, should have been only too pleased to
answer questions on the forums.

When one approves the installation of software like ClamXav onto one's
Apple machine, one is giving 'carte blanche' for that software to do
*anything it wishes* on one's computer.

(Carte blanche, a French phrase, meaning "unlimited discretionary power
to act; unrestricted authority".)

You, as the user, will have absolutely no idea whether or not your
computer has been compromised. I believe this to be a FACT!

Just in case you are wondering about the :bananas: ...................

https://www.bleepingcomputer.com/for...-one-might-do/

By the way, I'm confident in the advice given by Thomas Reed, now a
Director of Malwarebytes Inc and someone who has a profile on LinkedIn.

https://forums.malwarebytes.com/topi...omment-1243073

What's YOUR view of John Daniel?

https://www.linkedin.com/in/etresoft/

"Etresoft, Inc. is a Canadian software development and consulting
corporation in business since 2015. Etresoft's most popular product is
EtreCheck, a macOS diagnostic tool used by over half a million people
and frequently recommended on Apple Support Communities."

http://www.etresoft.com/

He elected to terminate email contact with me and became quite hostile
on the ASC. That really bothers me. :-(

--
David B.



Ads